PUMA publications for /author/P.J.%20Phillipshttps://puma.uni-kassel.de/author/P.J.%20PhillipsPUMA RSS feed for /author/P.J.%20Phillips2024-03-28T19:59:42+01:00An introduction evaluating biometric systemshttps://puma.uni-kassel.de/bibtex/2b84d37310fed293b821c56b00b3bfb36/seboettgseboettg2014-06-19T09:50:17+02:00recognition biometrics pattern opencv face-recognition <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="P.J. Phillips" itemprop="url" href="/author/P.J.%20Phillips"><span itemprop="name">P. Phillips</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Martin" itemprop="url" href="/author/A.%20Martin"><span itemprop="name">A. Martin</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="C.L. Wilson" itemprop="url" href="/author/C.L.%20Wilson"><span itemprop="name">C. Wilson</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Przybocki" itemprop="url" href="/author/M.%20Przybocki"><span itemprop="name">M. Przybocki</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Computer</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">33 </span></span>(<span itemprop="issueNumber">2</span>):
<span itemprop="pagination">56-63</span></em> </span>(<em><span>Februar 2000<meta content="Februar 2000" itemprop="datePublished"/></span></em>)Thu Jun 19 09:50:17 CEST 2014Computerfeb256-63An introduction evaluating biometric systems332000recognition biometrics pattern opencv face-recognition On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testingIEEE Xplore Abstract - An introduction evaluating biometric systems