Elements of information theory
Elements of information theory
On the Error-Reject Trade-Off in Biometric Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
Expert Conciliation for Multi Modal Person Authentication Systems by Bayesian Statistics
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Integrating Faces and Fingerprints for Personal Identification
ACCV '98 Proceedings of the Third Asian Conference on Computer Vision-Volume I - Volume I
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Information fusion in fingerprint authentication
Information fusion in fingerprint authentication
Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
Secure biometric systems
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
On the asymptotics of M-hypothesis Bayesian detection
IEEE Transactions on Information Theory
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
In this paper we investigate multimodal biometric person and object identification. We model this process of multimodal identification as multimodal multiple hypothesis testing with independent modalities. We analyze theoretical performance limits that can be attained in such a multimodal protocol in terms of exponents of average error probability. Furthermore, we address a privacy related issues in this paper. In particular, we consider performance/privacy trade-off due to the indirect multimodal identification performed in a secret subspace and approximate the obtained performance limits using properties of random projections. Finally, a set of experiments exemplifies our findings.