Visualization for Biometric Evaluation Romain Giot - - PowerPoint PPT Presentation

visualization for biometric evaluation
SMART_READER_LITE
LIVE PREVIEW

Visualization for Biometric Evaluation Romain Giot - - PowerPoint PPT Presentation

Visualization for Biometric Evaluation Romain Giot <romain.giot@u-bordeaux.fr> Romain Giot <romain.giot@u-bordeaux.fr> Introduction Who am I ? Work place University of Bordeaux IUT Bordeaux Computer Science


slide-1
SLIDE 1

Visualization for Biometric Evaluation

Romain Giot <romain.giot@u-bordeaux.fr>

Romain Giot <romain.giot@u-bordeaux.fr>

slide-2
SLIDE 2

Introduction

slide-3
SLIDE 3

Who am I ?

  • Work place

– University of Bordeaux

  • IUT Bordeaux
  • Computer Science department

– Laboratoire Bordelais de

Recherche en Informatique

  • Research works

– Biometric authentication

  • Keystroke dynamics,

multibiometrics, template update

– Large graph visualization

  • Node placement, edge routing
slide-4
SLIDE 4

Visualization for biometric evaluation - plan

  • Few information about data visualization
  • Quick introduction to biometric authentication
  • Presentation of

– Common visual tools used to evaluate biometric

authentication systems

– Novel one which focus on other aspects

slide-5
SLIDE 5

Some principles of visualisation (with few information

  • n perception)
slide-6
SLIDE 6

Data visualization

  • « The use of computer-supported, interactive,

visual representations of data to amplify cognition » [Card 99]

  • Scientific visualization
slide-7
SLIDE 7

Data visualization

  • « The use of computer-supported, interactive,

visual representations of data to amplify cognition » [Card 99]

  • Information visualization
slide-8
SLIDE 8

Data visualization pionners Joseph Priestley 1733-1804

  • Discover of Oxygen, inventor of timeline

charts (1769)

slide-9
SLIDE 9

Data visualization pionners William Playfair 1759-1823

  • Founder of graphical methods of statistics :

line, bar, area, and pie charts.

1801 1786

slide-10
SLIDE 10

Data visualization pionners John Snow 1813 -1858

  • 1854 Broad Street cholera outbreak
slide-11
SLIDE 11

Data visualization pionners Florence Nightingale 1820-1910

slide-12
SLIDE 12

Data visualization pionners Joseph Minard 1781-1870

  • Sankey diagrams (1869)
slide-13
SLIDE 13

Since then, more visualization methods have been used

slide-14
SLIDE 14

Since then, more visualization methods have been used

slide-15
SLIDE 15

Since then, more visualization methods have been used

slide-16
SLIDE 16

What is a data ?

  • Fundamental types of data

– Entities – Relations (between entities)

  • Attributes

– Quantitative

  • Number of inhabitants, area, ...

– Ordinal

  • Result of a competition

– Categorical/Nominal

  • Brand of a car
slide-17
SLIDE 17

Several visual attributes exist

  • Position
  • Density
  • Shape
  • Size
  • Texture
  • Orientation
  • Saturation
  • Curvature
  • Movement
  • Text

http://www.fusioncharts.com/

slide-18
SLIDE 18

Visual attributes – quantitative attributes

  • Often used but bad

– Color & density

  • More accurate

– Position, length,

  • rientation

[Mackinley]

slide-19
SLIDE 19

Visual attributes – choice order

[Mackinley]

slide-20
SLIDE 20

Interpretation can be complex – cognitive load

low medium high

slide-21
SLIDE 21

Interpretation can be erroneous

slide-22
SLIDE 22

Gestalt law – Relations representation

http://www.fusioncharts.com/

slide-23
SLIDE 23

One dimensional data visualization - examples

slide-24
SLIDE 24

Two dimensional data visualization - examples

slide-25
SLIDE 25

More than 2 dimensional data visualization - examples

[Elmqvist2008]

slide-26
SLIDE 26

More than 2 dimensional data visualization - examples

slide-27
SLIDE 27

Visualization of relational data

slide-28
SLIDE 28

The Nested Blocks and Guidelines Model

The Nested Blocks and Guidelines Model. Miriah Meyer, Michael Sedlmair, P. Samuel Quinan, and Tamara Munzner.Information Visualization 14(3), Special Issue on Visualization Evaluation (BELIV)

slide-29
SLIDE 29

Very fast introduction to biometric authentication

slide-30
SLIDE 30

Biometric authentication

  • Sole authentication based on what we are

– Use of biometric data – Very hard to share (better than a password) – Vary hard to be stolen or lost (better than a token)

  • Various modalities exist

– Physiological: face recognition, iris recognition, voice

recognition, ...

– Behavioral: keystroke & mouse dynamics, voice

recognition, signature, ...

slide-31
SLIDE 31

Basic workflow of a biometric authentication system

Presentation

  • f one or several

biometric sample(s) Computation of the biometric reference sample(s) Storage reference Presentation

  • f one

biometric sample Computation of the biometric score sample Reference of claimed individual score Comparison to the decision threshold User is rejected User is accepted Score strictly below to threshold Score higher than threshold

Enrollment Verification

slide-32
SLIDE 32

Basic workflow of a biometric authentication system

Presentation

  • f one or several

biometric samples Computation of the biometric reference sample(s) Storage reference Presentation

  • f one or several

biometric samples Presentation

  • f one

biometric samples Computation of the biometric score sample reference score Comparison to decision threshold User is rejected User is accepted Score below to threshold Score higher than threshold

Enrollment Verification Failure to acquire False Match False Non Match Failure to acquire Failure to enroll

slide-33
SLIDE 33
  • Need of a database of samples

Gallery and Probe

  • Gallery serves to compute

the biometric references

  • Use of the probe to compute

biometric scores

Intrascores (|I|*|P|)

Interscores (|I|*|I|*|P|)

  • Usual metrics

False Non Match Rate

False Match Rate

Equal Error Rate

Score Database Generation Score Database Generation

|I|

slide-34
SLIDE 34
  • Need of a database

Gallery and Probe

  • Gallery serves to compute

the biometric reference

  • Use of the probe to compute

biometric scores

Intrascores (|I|*|P|)

Interscores (|I|*|I|*|P|)

  • Usual metrics

False Non Match Rate

False Match Rate

Equal Error Rate

Score Database Generation Score Database Generation

|I| |P|

slide-35
SLIDE 35
  • Need of a database

Gallery and Probe

  • Gallery serves to compute

the biometric

  • Use of the probe to compute

biometric scores

Intrascores (|I|*|P|)

Interscores (|I|*|I|*|P|)

  • Usual metrics

False Non Match Rate

False Match Rate

Equal Error Rate

Score Database Generation Score Database Generation

slide-36
SLIDE 36

The performance depends on the decision threshold

slide-37
SLIDE 37

Standard visual evaluation tools for biometric authentication

slide-38
SLIDE 38
  • BEAT project funded by the European

Commission, under the Seventh Framework Program (2011-2017) lists

– Receiver Operating Characteristic (ROC) – Detection Error Trade-off (DET) – Expected Performance Curve (EPC)

  • Other visualizations

– Scores distribution – Zoo plot

Biometrics Evaluation and Testing

[Poh et al. 2012]

slide-39
SLIDE 39

Scores distribution

[Anzar et al. 2013]

slide-40
SLIDE 40

http://biometrics.derawi.com/?page_id=51

The ROC curve

slide-41
SLIDE 41

On the comparison of ROC curves

[Chul Lee 2011]

slide-42
SLIDE 42

[Schukers 2010]

Confidence intervals in the ROC curve

slide-43
SLIDE 43

Expected Performance Curves

[Bengio et al. 2005]

slide-44
SLIDE 44

Zoo Plot – a local approach

[Yager 2010]

slide-45
SLIDE 45

Nested blocks and guidelines model

data: List of FNMR, FMR per threshold How perform the system depending on decision threshold ? What is the individual classification ? data: List of averaged genuine and impersonation scores per individual Scatter plot How the system generalizes

  • n different

datasets ? Line chart data: List of error rates depending

  • n a threshold

Line chart Zoo plot EPC FMR/FNMR curve DET curve ROC curve X = FMR Y = 1-FNMR X = FMR Y = 1-FNMR log-scale X = thershold Y = FMR/FNMR X = genuine score Y = impostor score X = threshold Y = error rate

slide-46
SLIDE 46
  • ROC, EPC, Scores distribution

– Global information – => problematic threshold configuration can be identified – => Impossible to identify the problematic individuals

  • Zoo plot

– Individual information – => BUT screen space not well used – Possible to identify the problematic individuals – => BUT impossibility to understand why

  • EPC

– Allows to see generalization on other datasets – Hard to read and understand

  • All of them

– Lack of information to understand the reasons of failures

Discussions on these common methods

slide-47
SLIDE 47
  • There are several ways to compute the ROC

curves

– Some are exact [Fawcett 2006] (and fast) – Most are inexact (and probably slower)

  • Papers are never clear on the used algorithm

(but it mostly seem it is the inexact way)

– So most of ROC curves are partly lying on the results

they show

Additional issues to the ROC curve

slide-48
SLIDE 48

Some propositions of novel evaluation methods for biometric authentication

slide-49
SLIDE 49

Zoo Graph – an extended Zoo plot

  • Purpose

– Easily track the problematic individuals – Easily track the impersonating relations between

individuals

  • Idea

– Zooplot shows problematic individuals – But not relations between them

  • So add links to show impersonation ability

– Provide space equally for individuals

  • Apply a specific non linear mapping
slide-50
SLIDE 50

Zoo Graph – an extended Zoo plot

slide-51
SLIDE 51

Zoo Graph – an extended Zoo plot

[Giot et al. 2016]

slide-52
SLIDE 52
  • Advantages

– The non-linear mapping of individuals position reduces

  • verlapping (and help to better estimate the distribution)

– The edges as well as the nodes size highlight the bad

individuals

  • Limits

– Does not scale well when there are more than 10% of

FMR (hair ball effect)

– Edges are computed on averaged scores => the drawing

can be over-optimistic

Discussion on the Zoo Graph

slide-53
SLIDE 53

Biometric Power Graph – Sample analysis

  • Purpose

– Easily track the problematic individuals – AND easily track the problematic samples – Easily track the impersonating relations between

individuals

  • Idea

– Enhance Zoo Graph by displaying the samples – Cluster the individuals based on their biometric behavior – Use graph layout methods instead of an ad hoc

projection

slide-54
SLIDE 54

Biometric Power Graph – Sample analysis

slide-55
SLIDE 55

Biometric Power Graph

[Giot et al. 2017]

slide-56
SLIDE 56

Biometric Power Graph – better encodings

  • Each sample

provides its

– Inability to be verified

  • green/gray

– Ability to impersonate

  • thers
  • blue/red

– Ratio of impersonation

  • size

Biometric Power Graph

slide-57
SLIDE 57

Biometric Power Graph – better encodings

  • Each individuals

provides its

– FMR

  • for attacks
  • when attacked

– FNMR

Biometric Power Graph

slide-58
SLIDE 58

Biometric Power Graph

slide-59
SLIDE 59
  • Advantages

– Clear identification of problematic samples – Clear identification of different individual behaviors

  • Limitations

– Huge drawing size => interaction is mandatory – More complex to handle than standard methods – The display is CPU/GPU intensive and does not parallel

well on GPU because of edge bundling that plots too many things at the same pixel location

Discussion on the Biometric Power Graph

slide-60
SLIDE 60

Conclusion

slide-61
SLIDE 61
  • Few works in the literature try to bring new visual

evaluations (or improve existing ones)

– ROC curve visualization can be improved (addition of score

distribution)

– No visualization targets spoofing attacks – No visualization targets user behavior in template update systems

  • Zoo graph and biometric power graph visualizations

are promising, but

– The cognitive effort to understand them is far more important than

for the ROC curve

– The computational power needed to compute them is for more

important than for the ROC curve

Consideration of the new visualizations

slide-62
SLIDE 62
  • Biometric authentication systems need to be

evaluated

  • This can be done helped with graphics
  • Main visualizations work well to give the

performance of the system but fail to explain their failures

  • Some visualizations have been created to
  • vercome these issues but still need to be improved
  • Some sub-research fields still need to be explored

to improve the state of evolution

Conclusion

slide-63
SLIDE 63

Questions