Continuous verification using multimodal biometrics

Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be contin...

Description complète

Détails bibliographiques
Publié dans:IEEE transactions on pattern analysis and machine intelligence. - 1998. - 29(2007), 4 vom: 13. Apr., Seite 687-700
Auteur principal: Sim, Terence (Auteur)
Autres auteurs: Zhang, Sheng, Janakiraman, Rajkumar, Kumar, Sandeep
Format: Article
Langue:English
Publié: 2007
Accès à la collection:IEEE transactions on pattern analysis and machine intelligence
Sujets:Evaluation Study Journal Article
LEADER 01000caa a22002652 4500
001 NLM168403218
003 DE-627
005 20250208010334.0
007 tu
008 231223s2007 xx ||||| 00| ||eng c
028 5 2 |a pubmed25n0561.xml 
035 |a (DE-627)NLM168403218 
035 |a (NLM)17299225 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Sim, Terence  |e verfasserin  |4 aut 
245 1 0 |a Continuous verification using multimodal biometrics 
264 1 |c 2007 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Date Completed 24.04.2007 
500 |a Date Revised 10.12.2019 
500 |a published: Print 
500 |a Citation Status MEDLINE 
520 |a Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system 
650 4 |a Evaluation Study 
650 4 |a Journal Article 
700 1 |a Zhang, Sheng  |e verfasserin  |4 aut 
700 1 |a Janakiraman, Rajkumar  |e verfasserin  |4 aut 
700 1 |a Kumar, Sandeep  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on pattern analysis and machine intelligence  |d 1998  |g 29(2007), 4 vom: 13. Apr., Seite 687-700  |w (DE-627)NLM098212257  |x 0162-8828  |7 nnns 
773 1 8 |g volume:29  |g year:2007  |g number:4  |g day:13  |g month:04  |g pages:687-700 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 29  |j 2007  |e 4  |b 13  |c 04  |h 687-700