C4.5: programs for machine learning
C4.5: programs for machine learning
Machine Learning - Special issue on learning with probabilistic representations
Machine Learning
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
Simple fuzzy logic rules based on fuzzy decision tree for classification and prediction problem
Intelligent information processing II
Towards understanding user perceptions of authentication technologies
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Behavioural biometrics: a survey and classification
International Journal of Biometrics
Understanding user perspectives on biometric technology
Communications of the ACM - Enterprise information integration: and other tools for merging data
An investigation of factors affecting biometric technology adoption in a developing country context
International Journal of Biometrics
International Journal of Computer Applications in Technology
Keystroke dynamics authentication for collaborative systems
CTS '09 Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems
Impact of combining quality measures on biometric sample matching
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
GREYC keystroke: a benchmark for keystroke dynamics biometric systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
AUC: a better measure than accuracy in comparing learning algorithms
AI'03 Proceedings of the 16th Canadian society for computational studies of intelligence conference on Advances in artificial intelligence
Study on Color Spaces for Single Image Enrolment Face Authentication
ICPR '10 Proceedings of the 2010 20th International Conference on Pattern Recognition
User classification for keystroke dynamics authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Clustering and classification of maintenance logs using text data mining
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Hi-index | 0.00 |
This paper presents a modality-independent evaluation methodology to study users' acceptance and satisfaction of biometric systems. It uses a survey questionnaire for data collection, and some data-mining tools for their analysis. We have applied it on two biometric systems developed in our research laboratory. The results from this survey show the necessity of taking users point of view when designing and evaluating biometric systems. A panel of 100 volunteers was more satised from the keystroke system than the face one. Users surprisingly considered that its perceived performance was also better, even if the used face system has a better performance with an EER of 8.76% than the keystroke one with an EER of 17.51%. The robustness of a system against attacks, computation time required during the verication phase and its easiness to use have been identied as important factors inuencing their opinions regarding the tested systems.