Subject: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | Biometrics | Systems Evaluation | Behavioral biometrics | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | Metrics | Authentication
We present in this chapter an overview of techniques for the performance evaluation of behavioral biometric systems. The BioAPI standard that defines the architecture of a biometric system is presented in the first part of the chapter... The general methodology for the ... View more
Clarke, N. L., & Furnell, S. M., (2007). Advanced user authentication for mobile devices. Computers & security, Vol. 26, pp. 109-119.
Han, J., & Bhanu, B., (2006). Individual Recognition Using Gait Energy Image. IEEE Transaction on Pattern Analysis and Machine Intelligence , Vol. 28, (2), pp. 316-322.
Hanley, J. A & McNeil B. J., (1982). The meaning and use of the a rea under a receiver operating characteristic (ROC) curve. Radiology, Vol. 143, pp. 29-36.
Hemery, B., Rosenberger, C., Toinard, C., & Emile, B., (2006). Comparative study of invariant descriptors for face recognition. 8th International IEEE Conference on Signal Processing (ICSP).
Muller H., Muller W., Squire D.M., Marchand -Maillet S., & Pun T., (2001). erformance evaluation in conten t-based image retrieval: Overview and proposals. Pattern Recognition Letters , Vol. 22, pp 593-601. T E R M S D E F I N I T I O N S