SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
The 8th International Conference on Information Technology and Applications (ICITA 2013)

Abstract-- The purpose of this paper is to illustrate the
automatic detection of biometric transaction times using
hand geometry as the modality of interest. Video recordings
were segmented into individual frames and processed
through a program to automatically detect interactions
between the user and the system. Results include a mean
enrollment time of 15.860 seconds and a mean verification
time of 2.915 seconds.
Index Terms-- Biometrics, Hand Geometry Recognition,
Transaction Time
I. INTRODUCTION
This paper highlights the use of hand geometry to
demonstrate a method of automatically calculating biometric
transaction times. Biometrics is defined as the automated
recognition of individuals based on their behavioral and
biological characteristics [1]. Hand geometry refers to the
process of identifying a person by the shape of his or her hand.
This modality is based on taking a photograph of the user’s hand
while placed on a surface, finding singular points on the hand
and taking measurements of them [2]. Hand geometry systems
use different measurements of features such as finger length,
finger width, finger thickness, finger area and palm width to
perform authentication on individuals [3].
Hand geometry is commonly used in time and attendance
systems or access control systems. Operationally, hand
geometry has proven extremely popular in time and attendance
applications [4]. There are also many different benefits that
make hand geometry appealing to businesses and users. Hand
geometry functions as a medium cost system since only a
low/medium resolution charged-coupled device (CCD) camera
is needed. It also provides fast computational speeds, low
template size, and good ease of use for users [5].
During the capture process, a certain amount of time occurs
when the subject is enrolling into the system and subsequently
verified. This period beginning with the biometric sample
presentation and ending with the biometric system decision is
known as biometric transaction time [6]. Calculating these time
periods help to better understand not only the system’s ease of
use, but also the amount of time a user’s spends when using a
M. Brockly is with the Technology, Leadership, and Innovation Department
of Purdue University, West Lafayette IN 47907 USA (telephone:
765-494-2311, e-mail: mbrockly@purdue.edu).
S. Elliott is with the Technology, Leadership, and Innovation Department of
Purdue University, West Lafayette IN 47907 USA (telephone: 765-494-2311,
e-mail: elliott@purdue.edu).
ISBN: 978-0-9803267-5-8
particular biometric. This amount of time creates an
understanding of which biometric is the best choice for a
specific application. When implementing a biometric system,
especially in a time and attendance environment, a fast
transaction time is required to prevent unnecessary time costs.
II. BACKGROUND
A. Motivation
The motivation for this research was to establish a way to
automatically determine transaction times from recorded video,
without the need for manual coding. Prior research into
biometric transaction time includes using human observers to
code when events occur in order to achieve time on task [7].
Other research has recommended video recording these events
in order to manually record the timing data at a later time [8].
Human observers may be prone to error as they may be unable
to note the exact moment when interactions occur, or note it
repeatedly. Video coding is also susceptible to interrater
reliability issues. Interrater reliability represents the degree to
which the ratings of different judges are proportional when
expressed as deviations from their means [9]. Not all video
coders will report the same result and this research aims to
achieve consistent reporting of transaction times without the use
of humans.
B. Impact to the Community
For biometric timing terminology such as transactions,
attempts, presentations, and interactions, conflicts in definitions
exist in many sources [6], [10]-[13]. This research primarily
follows the definitions used in [10] with the exception of
interaction. A transaction is defined as “the sequence of
attempts to the system on the part of the user for the purpose of
enrollment, verification or identification” [10]. An attempt is
defined as “the submission of one (or a sequence of) biometric
samples to the system on the part of the user” [10]. A
presentation is defined as “the submission of a single biometric
sample to the system on the part of the user” [10]. Finally, an
interaction is defined by the authors as the action(s) that take
place within a presentation. Fig. 1 shows the hierarchy of these
terms.
Automatic Detection of Biometric Transaction
Times
Michael E. Brockly, Stephen J. Elliott, Member, IEEE
The 8th International Conference on Information Technology and Applications (ICITA 2013)
Fig. 1. Terminology Hierarchy
III. METHODOLOGY
The data collection used an Ingersoll Rand Handkey II as the
biometric capture device. The device was positioned against a
wall and located 90 centimeters above ground level. All events
were recorded on a Logitech HD Pro C910 webcam. This
webcam was positioned 24 centimeters above the hand
geometry machine in order to completely record all lights on the
top of the device. These recordings were used to monitor all
interactions that occurred within the biometric transaction
process. The device and camera setup is displayed in Fig. 2.
This study involved the data collection of thirty-five subjects
enrolling into a hand geometry system and subsequently
verifying their hand in the system immediately afterward. The
enrollment process consisted of the test administrator entering a
PIN and the subject placing their hand three times on the surface
of the device to create a biometric template. Once enrolled in
the system, the test administrator entered the PIN again and the
subject placed their hand on the surface one more time to verify.
The verification process was repeated four times.
Fig. 2. Recording Configuration
After the data collection finished, videos were split into
individual frames using freely available software called FFmpeg
[14]. The video recordings were segmented into fifteen frames
per second. These frames were then analyzed using the Hand
Geometry HBSI Tool developed at the Biometrics Standards,
Performance and Assurance (BSPA) Labs at Purdue University.
This program, created in Java Standard Edition (SE) 1.7,
automatically detects when lights change on the device,
determining when interactions occur. As the frames are
analyzed, any light changes from off to on and vice versa are
noted. A listing of all possible lights is shown in Fig. 3. The red
lights near the hand in Fig. 3 show when an interaction occurs.
There is also a green and red light at the top of the sensor that
when illuminated, denotes either a successful or unsuccessful
attempt.
Fig. 3. Hand Geometry Lights
The program works by responding to color changes at
specific groupings of pixels in the video recordings. The
program user will load in the video frames into the program and
crop out only the selected area of interest (Fig. 4).
Fig. 4. Hand Geometry HBSI Tool
Before analyzing the data, the authors established a model
shown in Fig. 5 to determine the timing schema. This model was
created in accordance with the Operational Times Model shown
in [6]. This research is primarily concerned with the biometric
transaction time. The time begins when the lights are first all on,
until the time that they are all off and the green or red light is
illuminated. Subject interaction time was not used for this
research since the test administrators entered the PIN for each of
the subjects.
The 8th International Conference on Information Technology and Applications (ICITA 2013)
Lights all on Lights change Lights all off
Biometric Subsystem
Decision
User places hand
Sample Acquisition
Green or red light
Biometric Transaction Time
Fig. 5. Biometric Transaction Time Model
IV. RESULTS
The methodology was used to determine transaction times for
both the enrollment transaction and the verification
transactions.
A. Transaction Times for Enrollment
Each subject began the data collection by following the
enrollment procedure. Prior to collection, subjects were
assigned a specific PIN number that was entered by the test
administrator. After the PIN was entered all four of the hand
lights on the device were illuminated. Once illuminated, the
enrollment time started. Subjects inserted their hand and
touched all the pins in the device with their fingers to extinguish
all of the lights. After the lights were out, the subject repeated
this process two more times in order to complete the process.
Once three presentations occurred, the biometric template was
created and the subject was successfully enrolled into the
system.
All thirty-five subjects were successfully enrolled into the
hand geometry system with three presentations. The shortest
enrollment time was 5.802 seconds and the longest enrollment
time was 116.142 seconds. Although the user with 116.142
seconds was an outlier, they did not achieve a system timeout
and were successfully enrolled. The mean enrollment time was
15.860 seconds. Fig. 6 displays the histogram of mean
enrollment time.
1209060300
30
25
20
15
10
5
0
Time (in seconds)
Frequency
Mean 15.86
StDev 18.40
N 35
Normal
Mean Enrollment Time
Fig. 6. Mean Enrollment Time
B. Transaction Times for Verifications
Once enrolled into the system, each subject was verified
against their template four times. The test administrator entered
the PIN for the subject and again all four lights were
illuminated. Once the lights came on, the verification time
started, as did the transaction time. Subjects inserted their hand
and touched all the pins in the device with their fingers to
extinguish the lights. Once all the lights were extinguished, the
device used either a green or red light to denote a successful to
unsuccessful transaction respectively. Thirty-three subjects
were able to complete four successful transactions and only two
subjects required five attempts to do so.
Table 1 shows the mean transaction times for each of the four
verifications along with an overall mean verification time. The
two unsuccessful attempts with transaction times of 5.132
seconds and 2.066 seconds were excluded from the results.
Verification transactions three and four had the lowest mean
transaction times. Verification transaction four, although having
a 0.056 second longer mean time than transaction three, had the
lowest standard deviation. This trend indicates that the range of
individual transaction times is being reduced, and subjects may
be becoming habituated to the verification process. Boxplots of
verification times are included in Fig. 7; overall the four
verification transaction times are not statistically significant
from each other.
Table 1. Mean Times
Category Mean Time
Standard
Deviation
Enrollment 15.860 seconds 18.40
Verification 1 3.040 seconds 1.297
Verification 2 3.119 seconds 2.192
Verification 3 2.723 seconds 1.076
Verification 4 2.779 seconds 0.963
Verification Mean 2.915 second 0.8460
Verification 4Verification 3Verification 2Verification 1
12
10
8
6
4
2
0
Time(inseconds)
Verification Times
Fig. 7. Boxplot of Verification Times
The 8th International Conference on Information Technology and Applications (ICITA 2013)
54321
12
10
8
6
4
2
0
Time (in seconds)
Frequency
Mean 2.915
StDev 0.8460
N 35
Normal
Mean Verification Time
Fig. 8. Mean Verification Time
V. CONCLUSIONS
This paper has shown that videos can be automatically coded
post-hoc to determine transaction times without the use of a
human operator. Transaction times in this research are accurate
to one-fifteenth of a second. This allows for very accurate
timing data as soon as events in the biometric system occur.
Automatically coding data allows researchers to spend less time
coding data and more time analyzing it. This method eliminates
interrater reliability and human bias when coding.
This paper has also validated the terminology expressed in
section II. Through frame segmentation and analysis with the
hand geometry tool, individual interactions with the system are
demonstrated. These interactions can be quantified further than
simply transaction times. Future research will now be able to
report exactly how many interactions, presentations, etc. occur
with complete confidence. In the metric of hand geometry, the
tool can also detect the number of interactions needed to
perform an enrollment or verification. Each time one of the
lights change on the device, a new interaction is recorded.
Recording which lights remain on the longest can help to
improve the device or improve the instructions to the subject.
Outside of hand geometry, the same logic may be applied to
other biometric modalities. Individual interactions occur in
every biometric process. When video is recorded, it can be
processed through a similar tool to record whenever pixels in
the recording change. Future research includes using this
methodology on other biometric modalities such as fingerprint
recognition and iris recognition. These modalities can be
analyzed for both biometric transaction times as well as the
number of interactions, presentations, or attempts needed to
successfully complete a transaction.
The methodology can also be replicated in order to detect
Human Biometric Sensor Interaction (HBSI) errors. In the event
of an error, metrics can be automatically assigned based on a set
of conditions. For example, in hand geometry, if the red light is
shown to denote an unsuccessful attempt, the presence of the
other red hand lights can be used to justify a specific error
metric such as a concealed interaction (CI). HBSI error
detection can also be replicated onto other modalities in order to
quantify error metrics. This will be validated in future research.
REFERENCES
[1] International Organization for Standardization (ISO). (2010). Information
processing systems – Vocabulary – Part 37: Harmonized Biometric
Vocabulary. ISO/IEC DIS 2382.37
[2] Sanchez-Reillo, R. (2009). Hand Geometry. Encyclopedia of Biometrics.
Springer US. doi: 10.1007/978-0-387-73003-5_251
[3] Zhang, D., & Kanhangad, V. (2011). Hand Geometry Recognition.
Encyclopedia of Cryptography and Security. Springer US.
doi:10.1007/978-1-4419-5906-5_1377
[4] Liu, S., & Silverman, M. (2001). A practical guide to biometric security
technology. IT Professional, 3(1), 27–32. Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=899930
[5] Sanchez-Reillo, R., & Gonzalez-Marcas, A. (2000). Access control
system with hand geometry verification and smart cards. Aerospace and
Electronic Systems Magazine, IEEE, 15(45), 45–48. Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=825671
[6] Lazarick, R. T., Kukula, E. P., & Elliott, S. J. (2009, July). Operational
Times. Enclyclopedia of Biometrics. Springer US.
doi:10.1007/978-0-387-73003-5_114
[7] Theofanos, M., Stanton, B., Orandi, S., Micheals, R., & Zhang, N.-F.
(2007). NISTIR 7403 Usability Testing of Ten-Print Fingerprint Capture
NISTIR 7403 Usability Testing of Ten-Print Fingerprint Capture. NISTR,
(March), 1–56. Retrieved from
http://zing.ncsl.nist.gov/biousa/docs/NISTIR-7403-Ten-Print-Study-030
52007.pdf
[8] Bailey, B. P., Konstan, J. a., & Carlis, J. V. (2000). Measuring the effects
of interruptions on task performance in the user interface. SMC 2000
Conference Proceedings. 2000 IEEE International Conference on
Systems, Man and Cybernetics. “Cybernetics Evolving to Systems,
Humans, Organizations, and their Complex Interactions” (Cat.
No.00CH37166), 2, 757–762. doi:10.1109/ICSMC.2000.885940
[9] Tinsley, H. E. A., & Weiss, D. J. (1975). Interrater Reliability and
Agreement of Subjective Judgments. Journal of Counseling Psychology,
22(4), 358–376
[10] International Organization for Standardization (ISO). (2005). Biometric
Performance Testing and Reporting – Part 1: Principles and Framework.
ISO.IEC FCD 19795-1
[11] International Organization for Standardization (ISO). (2011). Information
technology – Biometric performance testing and reporting – Part 6:
Testing methodologies for operational evaluation. ISO/IEC FCD
19795-6.2
[12] Micheals, R., Stanton, B., Theofanos, M., & Orandi, S. (2006). A
Taxonomy of Definitions for Usability Studies in Biometrics.
Gaithersburg: NIST
[13] ILO Seafarers’ Identity Documents Biometric Interoperability Test
(ISBIT-4) Report. (2009). ILO (Vol. 2003, pp. 1-162)
[14] FFmpeg (Version 1.2) [Software]. Available from http://www.ffmpeg.org

Más contenido relacionado

La actualidad más candente

2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20Alexander Decker
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...Alexander Decker
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET Journal
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET Journal
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automationIRJET Journal
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring SystemIRJET Journal
 

La actualidad más candente (19)

2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
IJET-V3I1P25
IJET-V3I1P25IJET-V3I1P25
IJET-V3I1P25
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
370 374
370 374370 374
370 374
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring System
 

Similar a (2013) Automatic Detection of Biometric Transaction Times

Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsIJCSIS Research Publications
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Video recommender in openclosed systems
Video recommender in openclosed systemsVideo recommender in openclosed systems
Video recommender in openclosed systemseSAT Publishing House
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusioneSAT Publishing House
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
 
Thermal Imaging in Surgical Site Infection (SSI) Detection
Thermal Imaging in Surgical Site Infection (SSI) DetectionThermal Imaging in Surgical Site Infection (SSI) Detection
Thermal Imaging in Surgical Site Infection (SSI) DetectionIRJET Journal
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 

Similar a (2013) Automatic Detection of Biometric Transaction Times (20)

N010438890
N010438890N010438890
N010438890
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
H364752
H364752H364752
H364752
 
Video recommender in openclosed systems
Video recommender in openclosed systemsVideo recommender in openclosed systems
Video recommender in openclosed systems
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
Thermal Imaging in Surgical Site Infection (SSI) Detection
Thermal Imaging in Surgical Site Infection (SSI) DetectionThermal Imaging in Surgical Site Infection (SSI) Detection
Thermal Imaging in Surgical Site Infection (SSI) Detection
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 

Más de International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Más de International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

(2013) Automatic Detection of Biometric Transaction Times

  • 1. The 8th International Conference on Information Technology and Applications (ICITA 2013)  Abstract-- The purpose of this paper is to illustrate the automatic detection of biometric transaction times using hand geometry as the modality of interest. Video recordings were segmented into individual frames and processed through a program to automatically detect interactions between the user and the system. Results include a mean enrollment time of 15.860 seconds and a mean verification time of 2.915 seconds. Index Terms-- Biometrics, Hand Geometry Recognition, Transaction Time I. INTRODUCTION This paper highlights the use of hand geometry to demonstrate a method of automatically calculating biometric transaction times. Biometrics is defined as the automated recognition of individuals based on their behavioral and biological characteristics [1]. Hand geometry refers to the process of identifying a person by the shape of his or her hand. This modality is based on taking a photograph of the user’s hand while placed on a surface, finding singular points on the hand and taking measurements of them [2]. Hand geometry systems use different measurements of features such as finger length, finger width, finger thickness, finger area and palm width to perform authentication on individuals [3]. Hand geometry is commonly used in time and attendance systems or access control systems. Operationally, hand geometry has proven extremely popular in time and attendance applications [4]. There are also many different benefits that make hand geometry appealing to businesses and users. Hand geometry functions as a medium cost system since only a low/medium resolution charged-coupled device (CCD) camera is needed. It also provides fast computational speeds, low template size, and good ease of use for users [5]. During the capture process, a certain amount of time occurs when the subject is enrolling into the system and subsequently verified. This period beginning with the biometric sample presentation and ending with the biometric system decision is known as biometric transaction time [6]. Calculating these time periods help to better understand not only the system’s ease of use, but also the amount of time a user’s spends when using a M. Brockly is with the Technology, Leadership, and Innovation Department of Purdue University, West Lafayette IN 47907 USA (telephone: 765-494-2311, e-mail: mbrockly@purdue.edu). S. Elliott is with the Technology, Leadership, and Innovation Department of Purdue University, West Lafayette IN 47907 USA (telephone: 765-494-2311, e-mail: elliott@purdue.edu). ISBN: 978-0-9803267-5-8 particular biometric. This amount of time creates an understanding of which biometric is the best choice for a specific application. When implementing a biometric system, especially in a time and attendance environment, a fast transaction time is required to prevent unnecessary time costs. II. BACKGROUND A. Motivation The motivation for this research was to establish a way to automatically determine transaction times from recorded video, without the need for manual coding. Prior research into biometric transaction time includes using human observers to code when events occur in order to achieve time on task [7]. Other research has recommended video recording these events in order to manually record the timing data at a later time [8]. Human observers may be prone to error as they may be unable to note the exact moment when interactions occur, or note it repeatedly. Video coding is also susceptible to interrater reliability issues. Interrater reliability represents the degree to which the ratings of different judges are proportional when expressed as deviations from their means [9]. Not all video coders will report the same result and this research aims to achieve consistent reporting of transaction times without the use of humans. B. Impact to the Community For biometric timing terminology such as transactions, attempts, presentations, and interactions, conflicts in definitions exist in many sources [6], [10]-[13]. This research primarily follows the definitions used in [10] with the exception of interaction. A transaction is defined as “the sequence of attempts to the system on the part of the user for the purpose of enrollment, verification or identification” [10]. An attempt is defined as “the submission of one (or a sequence of) biometric samples to the system on the part of the user” [10]. A presentation is defined as “the submission of a single biometric sample to the system on the part of the user” [10]. Finally, an interaction is defined by the authors as the action(s) that take place within a presentation. Fig. 1 shows the hierarchy of these terms. Automatic Detection of Biometric Transaction Times Michael E. Brockly, Stephen J. Elliott, Member, IEEE
  • 2. The 8th International Conference on Information Technology and Applications (ICITA 2013) Fig. 1. Terminology Hierarchy III. METHODOLOGY The data collection used an Ingersoll Rand Handkey II as the biometric capture device. The device was positioned against a wall and located 90 centimeters above ground level. All events were recorded on a Logitech HD Pro C910 webcam. This webcam was positioned 24 centimeters above the hand geometry machine in order to completely record all lights on the top of the device. These recordings were used to monitor all interactions that occurred within the biometric transaction process. The device and camera setup is displayed in Fig. 2. This study involved the data collection of thirty-five subjects enrolling into a hand geometry system and subsequently verifying their hand in the system immediately afterward. The enrollment process consisted of the test administrator entering a PIN and the subject placing their hand three times on the surface of the device to create a biometric template. Once enrolled in the system, the test administrator entered the PIN again and the subject placed their hand on the surface one more time to verify. The verification process was repeated four times. Fig. 2. Recording Configuration After the data collection finished, videos were split into individual frames using freely available software called FFmpeg [14]. The video recordings were segmented into fifteen frames per second. These frames were then analyzed using the Hand Geometry HBSI Tool developed at the Biometrics Standards, Performance and Assurance (BSPA) Labs at Purdue University. This program, created in Java Standard Edition (SE) 1.7, automatically detects when lights change on the device, determining when interactions occur. As the frames are analyzed, any light changes from off to on and vice versa are noted. A listing of all possible lights is shown in Fig. 3. The red lights near the hand in Fig. 3 show when an interaction occurs. There is also a green and red light at the top of the sensor that when illuminated, denotes either a successful or unsuccessful attempt. Fig. 3. Hand Geometry Lights The program works by responding to color changes at specific groupings of pixels in the video recordings. The program user will load in the video frames into the program and crop out only the selected area of interest (Fig. 4). Fig. 4. Hand Geometry HBSI Tool Before analyzing the data, the authors established a model shown in Fig. 5 to determine the timing schema. This model was created in accordance with the Operational Times Model shown in [6]. This research is primarily concerned with the biometric transaction time. The time begins when the lights are first all on, until the time that they are all off and the green or red light is illuminated. Subject interaction time was not used for this research since the test administrators entered the PIN for each of the subjects.
  • 3. The 8th International Conference on Information Technology and Applications (ICITA 2013) Lights all on Lights change Lights all off Biometric Subsystem Decision User places hand Sample Acquisition Green or red light Biometric Transaction Time Fig. 5. Biometric Transaction Time Model IV. RESULTS The methodology was used to determine transaction times for both the enrollment transaction and the verification transactions. A. Transaction Times for Enrollment Each subject began the data collection by following the enrollment procedure. Prior to collection, subjects were assigned a specific PIN number that was entered by the test administrator. After the PIN was entered all four of the hand lights on the device were illuminated. Once illuminated, the enrollment time started. Subjects inserted their hand and touched all the pins in the device with their fingers to extinguish all of the lights. After the lights were out, the subject repeated this process two more times in order to complete the process. Once three presentations occurred, the biometric template was created and the subject was successfully enrolled into the system. All thirty-five subjects were successfully enrolled into the hand geometry system with three presentations. The shortest enrollment time was 5.802 seconds and the longest enrollment time was 116.142 seconds. Although the user with 116.142 seconds was an outlier, they did not achieve a system timeout and were successfully enrolled. The mean enrollment time was 15.860 seconds. Fig. 6 displays the histogram of mean enrollment time. 1209060300 30 25 20 15 10 5 0 Time (in seconds) Frequency Mean 15.86 StDev 18.40 N 35 Normal Mean Enrollment Time Fig. 6. Mean Enrollment Time B. Transaction Times for Verifications Once enrolled into the system, each subject was verified against their template four times. The test administrator entered the PIN for the subject and again all four lights were illuminated. Once the lights came on, the verification time started, as did the transaction time. Subjects inserted their hand and touched all the pins in the device with their fingers to extinguish the lights. Once all the lights were extinguished, the device used either a green or red light to denote a successful to unsuccessful transaction respectively. Thirty-three subjects were able to complete four successful transactions and only two subjects required five attempts to do so. Table 1 shows the mean transaction times for each of the four verifications along with an overall mean verification time. The two unsuccessful attempts with transaction times of 5.132 seconds and 2.066 seconds were excluded from the results. Verification transactions three and four had the lowest mean transaction times. Verification transaction four, although having a 0.056 second longer mean time than transaction three, had the lowest standard deviation. This trend indicates that the range of individual transaction times is being reduced, and subjects may be becoming habituated to the verification process. Boxplots of verification times are included in Fig. 7; overall the four verification transaction times are not statistically significant from each other. Table 1. Mean Times Category Mean Time Standard Deviation Enrollment 15.860 seconds 18.40 Verification 1 3.040 seconds 1.297 Verification 2 3.119 seconds 2.192 Verification 3 2.723 seconds 1.076 Verification 4 2.779 seconds 0.963 Verification Mean 2.915 second 0.8460 Verification 4Verification 3Verification 2Verification 1 12 10 8 6 4 2 0 Time(inseconds) Verification Times Fig. 7. Boxplot of Verification Times
  • 4. The 8th International Conference on Information Technology and Applications (ICITA 2013) 54321 12 10 8 6 4 2 0 Time (in seconds) Frequency Mean 2.915 StDev 0.8460 N 35 Normal Mean Verification Time Fig. 8. Mean Verification Time V. CONCLUSIONS This paper has shown that videos can be automatically coded post-hoc to determine transaction times without the use of a human operator. Transaction times in this research are accurate to one-fifteenth of a second. This allows for very accurate timing data as soon as events in the biometric system occur. Automatically coding data allows researchers to spend less time coding data and more time analyzing it. This method eliminates interrater reliability and human bias when coding. This paper has also validated the terminology expressed in section II. Through frame segmentation and analysis with the hand geometry tool, individual interactions with the system are demonstrated. These interactions can be quantified further than simply transaction times. Future research will now be able to report exactly how many interactions, presentations, etc. occur with complete confidence. In the metric of hand geometry, the tool can also detect the number of interactions needed to perform an enrollment or verification. Each time one of the lights change on the device, a new interaction is recorded. Recording which lights remain on the longest can help to improve the device or improve the instructions to the subject. Outside of hand geometry, the same logic may be applied to other biometric modalities. Individual interactions occur in every biometric process. When video is recorded, it can be processed through a similar tool to record whenever pixels in the recording change. Future research includes using this methodology on other biometric modalities such as fingerprint recognition and iris recognition. These modalities can be analyzed for both biometric transaction times as well as the number of interactions, presentations, or attempts needed to successfully complete a transaction. The methodology can also be replicated in order to detect Human Biometric Sensor Interaction (HBSI) errors. In the event of an error, metrics can be automatically assigned based on a set of conditions. For example, in hand geometry, if the red light is shown to denote an unsuccessful attempt, the presence of the other red hand lights can be used to justify a specific error metric such as a concealed interaction (CI). HBSI error detection can also be replicated onto other modalities in order to quantify error metrics. This will be validated in future research. REFERENCES [1] International Organization for Standardization (ISO). (2010). Information processing systems – Vocabulary – Part 37: Harmonized Biometric Vocabulary. ISO/IEC DIS 2382.37 [2] Sanchez-Reillo, R. (2009). Hand Geometry. Encyclopedia of Biometrics. Springer US. doi: 10.1007/978-0-387-73003-5_251 [3] Zhang, D., & Kanhangad, V. (2011). Hand Geometry Recognition. Encyclopedia of Cryptography and Security. Springer US. doi:10.1007/978-1-4419-5906-5_1377 [4] Liu, S., & Silverman, M. (2001). A practical guide to biometric security technology. IT Professional, 3(1), 27–32. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=899930 [5] Sanchez-Reillo, R., & Gonzalez-Marcas, A. (2000). Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE, 15(45), 45–48. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=825671 [6] Lazarick, R. T., Kukula, E. P., & Elliott, S. J. (2009, July). Operational Times. Enclyclopedia of Biometrics. Springer US. doi:10.1007/978-0-387-73003-5_114 [7] Theofanos, M., Stanton, B., Orandi, S., Micheals, R., & Zhang, N.-F. (2007). NISTIR 7403 Usability Testing of Ten-Print Fingerprint Capture NISTIR 7403 Usability Testing of Ten-Print Fingerprint Capture. NISTR, (March), 1–56. Retrieved from http://zing.ncsl.nist.gov/biousa/docs/NISTIR-7403-Ten-Print-Study-030 52007.pdf [8] Bailey, B. P., Konstan, J. a., & Carlis, J. V. (2000). Measuring the effects of interruptions on task performance in the user interface. SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. “Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions” (Cat. No.00CH37166), 2, 757–762. doi:10.1109/ICSMC.2000.885940 [9] Tinsley, H. E. A., & Weiss, D. J. (1975). Interrater Reliability and Agreement of Subjective Judgments. Journal of Counseling Psychology, 22(4), 358–376 [10] International Organization for Standardization (ISO). (2005). Biometric Performance Testing and Reporting – Part 1: Principles and Framework. ISO.IEC FCD 19795-1 [11] International Organization for Standardization (ISO). (2011). Information technology – Biometric performance testing and reporting – Part 6: Testing methodologies for operational evaluation. ISO/IEC FCD 19795-6.2 [12] Micheals, R., Stanton, B., Theofanos, M., & Orandi, S. (2006). A Taxonomy of Definitions for Usability Studies in Biometrics. Gaithersburg: NIST [13] ILO Seafarers’ Identity Documents Biometric Interoperability Test (ISBIT-4) Report. (2009). ILO (Vol. 2003, pp. 1-162) [14] FFmpeg (Version 1.2) [Software]. Available from http://www.ffmpeg.org