SlideShare a Scribd company logo
1 of 25
Download to read offline
Reintroducing Watchlist Statistics




  Duane Blackburn
Federal Bureau of Investigation
  dblackburn@fbiacademy.edu




                         Biometrics Technology
Face Recognition Debate
                 Fall 2001



Could the hijackers have been spotted?




             Biometrics Technology
Face Recognition Debate
                               Fall 2001

                        Can it track me?
              Gregory                              Tara Kaye
                                 Nancy           DOB: 4/21/74
              Dorsey             Leflore
    Dorothy                                   Divorced Mother of 2
    Shedd                                        2002 Income:
                                                    $45,328
Matthew
Millner
                                                  Dennis
                                                  Ricks
  Joe
Grammer
                                                   Gerald
Elinor                                            Galbraith
Pardini                                            Allan
                                                   Olliff
Wilfred
Moesch                                            Clayton
Tayler                                            Weddell
Persky

                           Biometrics Technology  Nicolas
                                                  Marocco
Face Recognition Debate
        Fall 2001
Or will this happen?
  Osama bin Laden




    Biometrics Technology
Why the confusion?

• Confusing
  – Verification vs. Identification
     • incorrect usage of statistics
  – Identification (open set) vs. Identification
    (closed set)
  – False alarm rate, false accept rate, false
    match rate, etc.



                    Biometrics Technology
Statistics Shortcomings



• ROC (Verification)
  – Making a claim to your identity
• CMC (Identification)
  – Each probe is in the database
     • Are measuring closed set identification
• Neither relates to the problem!
  – Solution: develop statistics that measure
    this problem.
                    Biometrics Technology
Chronologically


• Face Recognition at a Chokepoint -
  Scenario Evaluation Results.
 http://www.dodcounterdrug.com/facialrecognition
• FRVT 2002.      http://www.frvt.org.


• Both available in the Biometrics
  Catalog,
  http://www.biometricscatalog.org.

                  Biometrics Technology
First Step




• Forget what you know!




          Biometrics Technology
Baseline Performance


   Face Recognition Vendor
     Test 2002 (FRVT 2002)
     - http://www.frvt.org




Biometrics Technology
Three Tasks



• Verification – Are you who you say you
  are?
• Watchlist – Are you in my database? If
  so, who are you?
• Identification – You are in my database,
  can I find you?


               Biometrics Technology
Verification

                                       Threshold = 0.8
               Claim                     Response = 0.75

                                     Threshold = 0.7
               Claim                    Response = 0.65
                                      Threshold = 0.6

• Determines if the claimed identity of a face is
  correct.
• Metrics:
   – Probability of Correct Verification
       • 1- (False Reject Rate)
   – False Accept
                       Biometrics Technology
Verification
                                        Case #1 - Want a low false accept rate


                                            False Accept Rate = 0.1%

                                                        Verification

                                        1
                                      0.9
Probability of Correct Verification




                                      0.8
                                      0.7
                                                                            Cognitec
                                      0.6
                                      0.5                                   Eyematic
                                      0.4                                   Identix
                                      0.3
                                      0.2
                                      0.1
                                        0
                                                            1
                                                 False Accept Rate = 0.1%




                                               Biometrics Technology
Verification
                                                Case #2 - Want a high verification rate


                                                Probability of Verification = 95%
                                                               Verification
Probability of Correct Verification =




                                                                                           Cognitec
                                        1                                                  Eyematic
                                                                                           Identix
                95%




                                            0    0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                          False Accept Rate


                                                         Biometrics Technology
Verification ROC




                                                                                                                                       Verification




                                                                                        Probability of Correct
                                                                                         Verification = 95%
                                                                                                                                                                   Cognitec
                                                                                                                 1                                                 Eyematic
                                                                                                                                                                   Identix




                                                                                                                     0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                                                                                                  False Accept Rate




                                     Verification

                          1
Probability of Correct




                         0.8
    Verification




                         0.6                              Cognitec
                                                          Eyematic
                         0.4                              Identix

                         0.2

                          0
                                          1
                               False Accept Rate = 0.1%




                                                                     Biometrics Technology
Watchlist

                      Threshold = 0.8
               0.75
                      Threshold = 0.7

               0.65
                      Threshold = 0.62
Database


               0.60


               0.55

               0.25
           Biometrics Technology
Watchlist

                      Threshold = 0.8
               0.75
                      Threshold = 0.7

Database       0.65


               0.70


               0.25


               0.55
           Biometrics Technology
Watchlist
                               Case #1 - Want a high detect and identification rate


                                            Detect and Identify = 75%
                                                          Watchlist
Detect and Identification Rate =




                                                                                     Cognitec
                                   1                                                 Eyematic
             75%




                                                                                     Identix




                                       0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                     False Alarm Rate



                                                  Biometrics Technology
Watchlist
                                          Case #2 - Want a low false alarm rate


                                            False Alarm Rate = 0.1%
                                                         Watchlist
Detection and Identification Rate




                                      1
                                    0.9
                                    0.8
                                    0.7
                                                                            Cognitec
                                    0.6
                                    0.5                                     Eyematic
                                    0.4                                     Identix
                                    0.3
                                    0.2
                                    0.1
                                      0
                                                             1
                                                  False Alarm Rate = 0.1%



                                                Biometrics Technology
Watchlist
                                                                                                                                          Watchlist




                                                                                       Detect and Identification
                                                                                              Rate = 75%
                                                                                                                                                                     Cognitec
                                                                                                                   1                                                 Eyematic
                                                                                                                                                                     Identix




                                                                                                                       0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                                                                                                     False Alarm Rate




                                            Watchlist

                                1
Detection and Identification




                               0.8

                               0.6                             Cognitec
            Rate




                                                               Eyematic
                               0.4                             Identix

                               0.2

                                0
                                                1
                                     False Alarm Rate = 0.1%




                                                                          Biometrics Technology
Identification

                0.75


Database        0.65


                0.80
                0.70


                0.25


                0.55
           Biometrics Technology
Identification




Database
                    That’s watchlist,
                    not identification!




           Biometrics Technology
Identification


• I know you are in the database, but who are you?
   – Closed universe test.
• Compares your picture to all pictures in the
  database and lists them according to similarity.
• Metrics:
   –   How often is the top answer correct?
   –   How often is the answer in the top 2?
   –   How often is the answer in the top 3?
   –   How often is the answer in the top n?




                       Biometrics Technology
Identification




Biometrics Technology
Three Tasks


• Verification – Are you who you say you
  are?
• Watchlist – Are you in my database? If
  so, who are you?
• Identification – You are in my database,
  can I find you?
 Make sure you use the correct terms
     and the correct statistics!
               Biometrics Technology
Government Biometric References



• Biometrics Catalog -
  http://www.biometricscatalog.org
• FRVT - http://www.frvt.org
• Biometric Consortium – http://www.biometrics.org




                Biometrics Technology

More Related Content

Viewers also liked

Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of GamificationDave McAllister
 
La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...cristinamoreubi
 
Jing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationJing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationNational University
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentationcmhusted
 
Central_social info
Central_social infoCentral_social info
Central_social infoandy biggin
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Riskexcellence
 
Organi-Deviance Part I
Organi-Deviance Part IOrgani-Deviance Part I
Organi-Deviance Part Icmhusted
 
Blending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsBlending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsNational University
 
Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Pete Baikins
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitStephen Haggard
 
DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012Carlos Vázquez
 
Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Graham Richards
 
早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼンShingo Hamada
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at workPete Baikins
 

Viewers also liked (19)

Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of Gamification
 
eTwinning 2 0 Building The Community For Schools In Europe
eTwinning 2 0 Building The Community For Schools In EuropeeTwinning 2 0 Building The Community For Schools In Europe
eTwinning 2 0 Building The Community For Schools In Europe
 
WIRA brochure 2010
WIRA brochure 2010WIRA brochure 2010
WIRA brochure 2010
 
La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...
 
Jing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationJing and Voicethread in K12 Education
Jing and Voicethread in K12 Education
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentation
 
MyJewel introduction
MyJewel introductionMyJewel introduction
MyJewel introduction
 
Central_social info
Central_social infoCentral_social info
Central_social info
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3
 
Organi-Deviance Part I
Organi-Deviance Part IOrgani-Deviance Part I
Organi-Deviance Part I
 
Blending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsBlending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education Programs
 
DiffCalculus Week 3
DiffCalculus Week 3DiffCalculus Week 3
DiffCalculus Week 3
 
Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Playful Leadership workshop June 2016
Playful Leadership workshop June 2016
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visit
 
DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012
 
Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09
 
早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン
 
Guión 4 septiembre
Guión 4 septiembreGuión 4 septiembre
Guión 4 septiembre
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at work
 

More from Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 

More from Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

BCC 2003 - Reintroducing Watchlist Statistics

  • 1. Reintroducing Watchlist Statistics Duane Blackburn Federal Bureau of Investigation dblackburn@fbiacademy.edu Biometrics Technology
  • 2. Face Recognition Debate Fall 2001 Could the hijackers have been spotted? Biometrics Technology
  • 3. Face Recognition Debate Fall 2001 Can it track me? Gregory Tara Kaye Nancy DOB: 4/21/74 Dorsey Leflore Dorothy Divorced Mother of 2 Shedd 2002 Income: $45,328 Matthew Millner Dennis Ricks Joe Grammer Gerald Elinor Galbraith Pardini Allan Olliff Wilfred Moesch Clayton Tayler Weddell Persky Biometrics Technology Nicolas Marocco
  • 4. Face Recognition Debate Fall 2001 Or will this happen? Osama bin Laden Biometrics Technology
  • 5. Why the confusion? • Confusing – Verification vs. Identification • incorrect usage of statistics – Identification (open set) vs. Identification (closed set) – False alarm rate, false accept rate, false match rate, etc. Biometrics Technology
  • 6. Statistics Shortcomings • ROC (Verification) – Making a claim to your identity • CMC (Identification) – Each probe is in the database • Are measuring closed set identification • Neither relates to the problem! – Solution: develop statistics that measure this problem. Biometrics Technology
  • 7. Chronologically • Face Recognition at a Chokepoint - Scenario Evaluation Results. http://www.dodcounterdrug.com/facialrecognition • FRVT 2002. http://www.frvt.org. • Both available in the Biometrics Catalog, http://www.biometricscatalog.org. Biometrics Technology
  • 8. First Step • Forget what you know! Biometrics Technology
  • 9. Baseline Performance Face Recognition Vendor Test 2002 (FRVT 2002) - http://www.frvt.org Biometrics Technology
  • 10. Three Tasks • Verification – Are you who you say you are? • Watchlist – Are you in my database? If so, who are you? • Identification – You are in my database, can I find you? Biometrics Technology
  • 11. Verification Threshold = 0.8 Claim Response = 0.75 Threshold = 0.7 Claim Response = 0.65 Threshold = 0.6 • Determines if the claimed identity of a face is correct. • Metrics: – Probability of Correct Verification • 1- (False Reject Rate) – False Accept Biometrics Technology
  • 12. Verification Case #1 - Want a low false accept rate False Accept Rate = 0.1% Verification 1 0.9 Probability of Correct Verification 0.8 0.7 Cognitec 0.6 0.5 Eyematic 0.4 Identix 0.3 0.2 0.1 0 1 False Accept Rate = 0.1% Biometrics Technology
  • 13. Verification Case #2 - Want a high verification rate Probability of Verification = 95% Verification Probability of Correct Verification = Cognitec 1 Eyematic Identix 95% 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Accept Rate Biometrics Technology
  • 14. Verification ROC Verification Probability of Correct Verification = 95% Cognitec 1 Eyematic Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Accept Rate Verification 1 Probability of Correct 0.8 Verification 0.6 Cognitec Eyematic 0.4 Identix 0.2 0 1 False Accept Rate = 0.1% Biometrics Technology
  • 15. Watchlist Threshold = 0.8 0.75 Threshold = 0.7 0.65 Threshold = 0.62 Database 0.60 0.55 0.25 Biometrics Technology
  • 16. Watchlist Threshold = 0.8 0.75 Threshold = 0.7 Database 0.65 0.70 0.25 0.55 Biometrics Technology
  • 17. Watchlist Case #1 - Want a high detect and identification rate Detect and Identify = 75% Watchlist Detect and Identification Rate = Cognitec 1 Eyematic 75% Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Alarm Rate Biometrics Technology
  • 18. Watchlist Case #2 - Want a low false alarm rate False Alarm Rate = 0.1% Watchlist Detection and Identification Rate 1 0.9 0.8 0.7 Cognitec 0.6 0.5 Eyematic 0.4 Identix 0.3 0.2 0.1 0 1 False Alarm Rate = 0.1% Biometrics Technology
  • 19. Watchlist Watchlist Detect and Identification Rate = 75% Cognitec 1 Eyematic Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Alarm Rate Watchlist 1 Detection and Identification 0.8 0.6 Cognitec Rate Eyematic 0.4 Identix 0.2 0 1 False Alarm Rate = 0.1% Biometrics Technology
  • 20. Identification 0.75 Database 0.65 0.80 0.70 0.25 0.55 Biometrics Technology
  • 21. Identification Database That’s watchlist, not identification! Biometrics Technology
  • 22. Identification • I know you are in the database, but who are you? – Closed universe test. • Compares your picture to all pictures in the database and lists them according to similarity. • Metrics: – How often is the top answer correct? – How often is the answer in the top 2? – How often is the answer in the top 3? – How often is the answer in the top n? Biometrics Technology
  • 24. Three Tasks • Verification – Are you who you say you are? • Watchlist – Are you in my database? If so, who are you? • Identification – You are in my database, can I find you? Make sure you use the correct terms and the correct statistics! Biometrics Technology
  • 25. Government Biometric References • Biometrics Catalog - http://www.biometricscatalog.org • FRVT - http://www.frvt.org • Biometric Consortium – http://www.biometrics.org Biometrics Technology