Skip Navigation Links.
Collapse <span class="m110 colortj mt20 fontw700">Volume 12 (2024)</span>Volume 12 (2024)
Collapse <span class="m110 colortj mt20 fontw700">Volume 11 (2023)</span>Volume 11 (2023)
Collapse <span class="m110 colortj mt20 fontw700">Volume 10 (2022)</span>Volume 10 (2022)
Collapse <span class="m110 colortj mt20 fontw700">Volume 9 (2021)</span>Volume 9 (2021)
Collapse <span class="m110 colortj mt20 fontw700">Volume 8 (2020)</span>Volume 8 (2020)
Collapse <span class="m110 colortj mt20 fontw700">Volume 7 (2019)</span>Volume 7 (2019)
Collapse <span class="m110 colortj mt20 fontw700">Volume 6 (2018)</span>Volume 6 (2018)
Collapse <span class="m110 colortj mt20 fontw700">Volume 5 (2017)</span>Volume 5 (2017)
Collapse <span class="m110 colortj mt20 fontw700">Volume 4 (2016)</span>Volume 4 (2016)
Collapse <span class="m110 colortj mt20 fontw700">Volume 3 (2015)</span>Volume 3 (2015)
Collapse <span class="m110 colortj mt20 fontw700">Volume 2 (2014)</span>Volume 2 (2014)
Collapse <span class="m110 colortj mt20 fontw700">Volume 1 (2013)</span>Volume 1 (2013)
American Journal of Applied Mathematics and Statistics. 2022, 10(1), 14-21
DOI: 10.12691/AJAMS-10-1-3
Review Article

Evaluating the Performance of Biometric Identification Systems Using the Beta-binomial Distribution Model

Arnold Kiura Njuki1, , Thomas Mageto1 and Anthony Ngunyi2

1Department of Statistics and Acturial Sciences, Jomo Kenyatta University of Agriculture and Technology, Juja, Kenya

2Department of Statistics and Acturial sciences, Dedan Kimathi University of Technology, Nyeri, Kenya

Pub. Date: March 15, 2022

Cite this paper

Arnold Kiura Njuki, Thomas Mageto and Anthony Ngunyi. Evaluating the Performance of Biometric Identification Systems Using the Beta-binomial Distribution Model. American Journal of Applied Mathematics and Statistics. 2022; 10(1):14-21. doi: 10.12691/AJAMS-10-1-3

Abstract

Biometric authentication system has become a mainstream solution across industries and devices. From securing highly confidential data to unlocking smartphones, biometrics have eliminated the hassle of remembering multiple complex passwords and PINs. It means that nobody can gain access to a device or system without your presence. This paper discusses a method which could be used in the testing process of biometric systems on the side of users and customers. Large –scale biometric systems traditionally undergo a series of tests beyond technology and scenario testing. These large-scale system tests are typically at the system level, not just the biometric subsystem level, and occur multiple times in the life of a system in such forms as factory acceptance tests before shipment, site or system acceptance tests before initiating operations, and in- use tests to ensure that performance remains at acceptable levels and/or to reset thresholds or other technical parameters. The conventional statistical methods use the binomial distribution to estimate the expected number of failure, but in the field of the biometrics the probability parameter can’t be constant which means that it is necessary to describe a process. The results have shown that the probability is characterized with two parameters of the beta distribution, and these are predictable from a smaller sample of the investigated population with the maximum likelihood method.

Keywords

format, microsoft word template, style, insert, template

Copyright

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References

[1]  Rand R Wilcox, “Estimating the Parameters of the Beta- Binomial Distribution,” University of Southern California. (2016).
 
[2]  Gabor Á. Werner, László Hanka Ph.D, “Using the Beta-Binomial Distribution for the Analysis of Biometric Identification,” Óbuda University. (2015).
 
[3]  Dan Navarro, Amy Perfors, “An introduction to the Beta-Binomial model,” COMPSCI 3016: Computational Cognitive Science, University of Adelaide (2014).
 
[4]  László Hanka, “Mathematical Methods in Biometrics,” University of Óbuda, (2012).
 
[5]  In.van Tilborg H.C.A., Jajodia S. “Biometric Testing. In: (eds) Encyclopedia of Cryptography and Security.” Springer, Boston, MA. (2011).
 
[6]  J.Tong and D.Lord. “Beta-Binomial Models-CMRSC”. (2007).
 
[7]  Gammasi M, Lazzaroni M,Mishori M, Piuri V, Sana D, Scotti F. “Accuracy and performance of Biometric Systems”. (2004).
 
[8]  Dass SC, Zhu Y, Jain AK,Anal Mach Intell, “Validating a biometric authentication system: sample size requirements”. IEEE Trans Pattern (2006).
 
[9]  U.K. Biometrics Working Group. “Best practices in testing and reporting performance of biometric devices”, available in www.cesg.gov.uk/biometrics, (2000).
 
[10]  Michael E. Schuckers. “Using the Beta-binomial distribution to assess the performance of a biometic device” Submitted to Pattern Recognition (2003)[Online].
 
[11]  G. R. Doddington, W. Liggett, A. F. Martin, M. Przybocki, and D. A. Reynolds, “Sheep, Goats, Lambs and Wolves: A statistical analysis of speaker performance in the NIST speaker recognition evaluation”. (1998).
 
[12]  S. Silvey. “Statistical Inference” Halsted Press, New York. (1975).
 
[13]  Chatfield and Goodhart. “Applied Statistics” 19, 240-250 (1970).
 
[14]  Lin Hong, Yifei Wan, and Anil Jain. “Fingerprint Image Enhancement: Algorithm and Performance Evaluation” Pattern Recognition and Image Processing Laboratory Department of Computer Science, Michigan State University. 4-6 (1998).