27
Chapter 5 Basic System Errors (Alireza Tavakkoli)

Chapter 5 Basic System Errors (Alireza Tavakkoli)

  • View
    230

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Chapter 5 Basic System Errors (Alireza Tavakkoli)

Chapter 5

Basic System Errors

(Alireza Tavakkoli)

Page 2: Chapter 5 Basic System Errors (Alireza Tavakkoli)

2

Outline

• Matching

• The Receiver Operating Curves (ROC)

• Error Conditions Specific to Biometrics

• Negative Authentication

• Trade-offs

Page 3: Chapter 5 Basic System Errors (Alireza Tavakkoli)

3

Matching

• Definition

• Notations:Biometric Uniqueness

Page 4: Chapter 5 Basic System Errors (Alireza Tavakkoli)

4

Matching Scores

• Similarity measure Prob (B=B’)– Higher match score Higher Prob.

• Similarity d(B’,B)– [0,Inf.) [0,1]

Page 5: Chapter 5 Basic System Errors (Alireza Tavakkoli)

5

The Tail of Two Errors

• Hypothesis Test and Errors:

• Two Errors:– False Match (Type I)– Flase Non-match (Type II)

NonMatchHhypothesisAlternate

MatchHhypothesisNullThe

a

:

: 0

Page 6: Chapter 5 Basic System Errors (Alireza Tavakkoli)

6

Score Distributions

Hard Decision

Reliability of s

Page 7: Chapter 5 Basic System Errors (Alireza Tavakkoli)

7

FMR and FNMR

x

y

a

xFNMRdsHspxF

yFMRdsHspyG

0|

1|

T

s m

T

s

T

nTs nTs a

dsspdsHspTFNRM

dsspdsspdsHspFMR

0|)(

1|

Page 8: Chapter 5 Basic System Errors (Alireza Tavakkoli)

8

Estimating Error from Data

• Access to G(y) & F(x)

• Estimation:

• Need to be studied more

N

jjj

i

M

ii

sN

sN

sG

sM

sM

sF

1

1

#11ˆ

#11ˆ

YY

XX

Page 9: Chapter 5 Basic System Errors (Alireza Tavakkoli)

9

Error Rates of Match Engines

• FM and FNM – Accept/Reject Object

• FA and FR– Accept/Reject Null Hypothesis

Page 10: Chapter 5 Basic System Errors (Alireza Tavakkoli)

10

Positive Authentication

• Errors in Pos. Authentication:– False Accept (FA)– False Reject (FR)

• Problems:– FA Security Breach– FR Convenience Problems

Page 11: Chapter 5 Basic System Errors (Alireza Tavakkoli)

11

ROC

T

TTROC

TTT

1,0

0,1

FNMR,FMRROC

- Design vs Application

- Security vs Convenience

FMR ↑ FNMR ↓

Page 12: Chapter 5 Basic System Errors (Alireza Tavakkoli)

12

Variations of ROCs

Semi-log plots

Log-log plot

Page 13: Chapter 5 Basic System Errors (Alireza Tavakkoli)

13

Using the ROC Curve

• Comparing matchers– Tradeoff between FMR & FNMR.– Specific Threshold FMR(T)/FNMR(T)

Page 14: Chapter 5 Basic System Errors (Alireza Tavakkoli)

14

Expressing Quality of ROC

• The Equal Error Rate:

• d-prime:

• Expected Overall Error

• Cost Function

Page 15: Chapter 5 Basic System Errors (Alireza Tavakkoli)

15

Expressing Quality of ROC

• The Equal Error Rate:

Page 16: Chapter 5 Basic System Errors (Alireza Tavakkoli)

16

Expressing Quality of ROC

• d-prime:

22'

nm

nmd

Page 17: Chapter 5 Basic System Errors (Alireza Tavakkoli)

17

Expressing Quality of ROC

• Expected Overall Error

TEE

pp

pTFNMRpTFMRTE

T

GI

GI

min

1

)(

min

Page 18: Chapter 5 Basic System Errors (Alireza Tavakkoli)

18

Expressing Quality of ROC

• Cost Function

GFAGFNM PFMRCPFNMRCCost 1

Page 19: Chapter 5 Basic System Errors (Alireza Tavakkoli)

19

Error Conditions Specific to Biometrics

• FTAFTEFTU Significant Cost.

• FTA:

• FTE:

• Manual vs Automatic Authentication

• CMC or RPM

Page 20: Chapter 5 Basic System Errors (Alireza Tavakkoli)

20

Negative Authentication

• Negative Hypotheses:

• The Two Errors:– Falsely missing B– Incorrectly matching B

and B’.

Page 21: Chapter 5 Basic System Errors (Alireza Tavakkoli)

21

Negative Authentication

• Detection Theory Terminology:– False Negative– False Positive

Page 22: Chapter 5 Basic System Errors (Alireza Tavakkoli)

22

Trade Offs

• Different Errors Different Outcomes– False Accept Security Breach.– False Reject Inconvenience.

• Convenience vs Security• Cost vs Security• Cost of Negative Authentication

Page 23: Chapter 5 Basic System Errors (Alireza Tavakkoli)

23

Convenience vs Security

• Convenience of a Biometric

• Convenience of Implementation

FAR1

FRR1

Security

eConvenienc

Page 24: Chapter 5 Basic System Errors (Alireza Tavakkoli)

24

Cost vs Security in Pos. Auth.

• Why it is important

– FRR ↑ Service denial Exception handling

• Dynamic Authentication Protocol

FRRCost

Page 25: Chapter 5 Basic System Errors (Alireza Tavakkoli)

25

Cost of Negative Authentication

• Screening:

• Higher FPR&FNR Inconvenient to all

FPR

FNR1

Cost

Security

Page 26: Chapter 5 Basic System Errors (Alireza Tavakkoli)

26

Neg. Vs Pos. Authentiocation

Page 27: Chapter 5 Basic System Errors (Alireza Tavakkoli)

27

• Questions?