By Topic

On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Schmid, N.A. ; Dept. of Comput. Sci. & Electr. Eng., West Virginia Univ., Morgantown, WV ; Nicolo, F.

Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a selected encoding method, the recognition capability of a system is limited by the relationship between the number of classes that the recognition system can encode and the length of encoded data describing the template at a specific level of distortion. In this paper, we evaluate empirical recognition capacity of biometric systems under the constraint of two global encoding techniques: principal component analysis (PCA) and independent component analysis (ICA). The developed methodology is applied to predict the capacity of different recognition channels formed during the acquisition of different iris and face databases. The proposed approach relies on data modeling and involves classical detection and information theories. The major contribution is in providing a guideline on how to evaluate capabilities of large-scale biometric recognition systems that are based on PCA and ICA encoding. Recognition capacity can also be promoted as a global quality measure of biometric databases.

Published in:

Information Forensics and Security, IEEE Transactions on  (Volume:3 ,  Issue: 3 )