SlideShare a Scribd company logo
1 of 25
Download to read offline
Reintroducing Watchlist Statistics




  Duane Blackburn
Federal Bureau of Investigation
  dblackburn@fbiacademy.edu




                         Biometrics Technology
Face Recognition Debate
                 Fall 2001



Could the hijackers have been spotted?




             Biometrics Technology
Face Recognition Debate
                               Fall 2001

                        Can it track me?
              Gregory                              Tara Kaye
                                 Nancy           DOB: 4/21/74
              Dorsey             Leflore
    Dorothy                                   Divorced Mother of 2
    Shedd                                        2002 Income:
                                                    $45,328
Matthew
Millner
                                                  Dennis
                                                  Ricks
  Joe
Grammer
                                                   Gerald
Elinor                                            Galbraith
Pardini                                            Allan
                                                   Olliff
Wilfred
Moesch                                            Clayton
Tayler                                            Weddell
Persky

                           Biometrics Technology  Nicolas
                                                  Marocco
Face Recognition Debate
        Fall 2001
Or will this happen?
  Osama bin Laden




    Biometrics Technology
Why the confusion?

• Confusing
  – Verification vs. Identification
     • incorrect usage of statistics
  – Identification (open set) vs. Identification
    (closed set)
  – False alarm rate, false accept rate, false
    match rate, etc.



                    Biometrics Technology
Statistics Shortcomings



• ROC (Verification)
  – Making a claim to your identity
• CMC (Identification)
  – Each probe is in the database
     • Are measuring closed set identification
• Neither relates to the problem!
  – Solution: develop statistics that measure
    this problem.
                    Biometrics Technology
Chronologically


• Face Recognition at a Chokepoint -
  Scenario Evaluation Results.
 http://www.dodcounterdrug.com/facialrecognition
• FRVT 2002.      http://www.frvt.org.


• Both available in the Biometrics
  Catalog,
  http://www.biometricscatalog.org.

                  Biometrics Technology
First Step




• Forget what you know!




          Biometrics Technology
Baseline Performance


   Face Recognition Vendor
     Test 2002 (FRVT 2002)
     - http://www.frvt.org




Biometrics Technology
Three Tasks



• Verification – Are you who you say you
  are?
• Watchlist – Are you in my database? If
  so, who are you?
• Identification – You are in my database,
  can I find you?


               Biometrics Technology
Verification

                                       Threshold = 0.8
               Claim                     Response = 0.75

                                     Threshold = 0.7
               Claim                    Response = 0.65
                                      Threshold = 0.6

• Determines if the claimed identity of a face is
  correct.
• Metrics:
   – Probability of Correct Verification
       • 1- (False Reject Rate)
   – False Accept
                       Biometrics Technology
Verification
                                        Case #1 - Want a low false accept rate


                                            False Accept Rate = 0.1%

                                                        Verification

                                        1
                                      0.9
Probability of Correct Verification




                                      0.8
                                      0.7
                                                                            Cognitec
                                      0.6
                                      0.5                                   Eyematic
                                      0.4                                   Identix
                                      0.3
                                      0.2
                                      0.1
                                        0
                                                            1
                                                 False Accept Rate = 0.1%




                                               Biometrics Technology
Verification
                                                Case #2 - Want a high verification rate


                                                Probability of Verification = 95%
                                                               Verification
Probability of Correct Verification =




                                                                                           Cognitec
                                        1                                                  Eyematic
                                                                                           Identix
                95%




                                            0    0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                          False Accept Rate


                                                         Biometrics Technology
Verification ROC




                                                                                                                                       Verification




                                                                                        Probability of Correct
                                                                                         Verification = 95%
                                                                                                                                                                   Cognitec
                                                                                                                 1                                                 Eyematic
                                                                                                                                                                   Identix




                                                                                                                     0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                                                                                                  False Accept Rate




                                     Verification

                          1
Probability of Correct




                         0.8
    Verification




                         0.6                              Cognitec
                                                          Eyematic
                         0.4                              Identix

                         0.2

                          0
                                          1
                               False Accept Rate = 0.1%




                                                                     Biometrics Technology
Watchlist

                      Threshold = 0.8
               0.75
                      Threshold = 0.7

               0.65
                      Threshold = 0.62
Database


               0.60


               0.55

               0.25
           Biometrics Technology
Watchlist

                      Threshold = 0.8
               0.75
                      Threshold = 0.7

Database       0.65


               0.70


               0.25


               0.55
           Biometrics Technology
Watchlist
                               Case #1 - Want a high detect and identification rate


                                            Detect and Identify = 75%
                                                          Watchlist
Detect and Identification Rate =




                                                                                     Cognitec
                                   1                                                 Eyematic
             75%




                                                                                     Identix




                                       0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                     False Alarm Rate



                                                  Biometrics Technology
Watchlist
                                          Case #2 - Want a low false alarm rate


                                            False Alarm Rate = 0.1%
                                                         Watchlist
Detection and Identification Rate




                                      1
                                    0.9
                                    0.8
                                    0.7
                                                                            Cognitec
                                    0.6
                                    0.5                                     Eyematic
                                    0.4                                     Identix
                                    0.3
                                    0.2
                                    0.1
                                      0
                                                             1
                                                  False Alarm Rate = 0.1%



                                                Biometrics Technology
Watchlist
                                                                                                                                          Watchlist




                                                                                       Detect and Identification
                                                                                              Rate = 75%
                                                                                                                                                                     Cognitec
                                                                                                                   1                                                 Eyematic
                                                                                                                                                                     Identix




                                                                                                                       0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9   1
                                                                                                                                     False Alarm Rate




                                            Watchlist

                                1
Detection and Identification




                               0.8

                               0.6                             Cognitec
            Rate




                                                               Eyematic
                               0.4                             Identix

                               0.2

                                0
                                                1
                                     False Alarm Rate = 0.1%




                                                                          Biometrics Technology
Identification

                0.75


Database        0.65


                0.80
                0.70


                0.25


                0.55
           Biometrics Technology
Identification




Database
                    That’s watchlist,
                    not identification!




           Biometrics Technology
Identification


• I know you are in the database, but who are you?
   – Closed universe test.
• Compares your picture to all pictures in the
  database and lists them according to similarity.
• Metrics:
   –   How often is the top answer correct?
   –   How often is the answer in the top 2?
   –   How often is the answer in the top 3?
   –   How often is the answer in the top n?




                       Biometrics Technology
Identification




Biometrics Technology
Three Tasks


• Verification – Are you who you say you
  are?
• Watchlist – Are you in my database? If
  so, who are you?
• Identification – You are in my database,
  can I find you?
 Make sure you use the correct terms
     and the correct statistics!
               Biometrics Technology
Government Biometric References



• Biometrics Catalog -
  http://www.biometricscatalog.org
• FRVT - http://www.frvt.org
• Biometric Consortium – http://www.biometrics.org




                Biometrics Technology

More Related Content

Viewers also liked

Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of GamificationDave McAllister
 
La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...cristinamoreubi
 
Jing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationJing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationNational University
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentationcmhusted
 
Central_social info
Central_social infoCentral_social info
Central_social infoandy biggin
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Riskexcellence
 
Organi-Deviance Part I
Organi-Deviance Part IOrgani-Deviance Part I
Organi-Deviance Part Icmhusted
 
Blending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsBlending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsNational University
 
Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Pete Baikins
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitStephen Haggard
 
DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012Carlos Vázquez
 
Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Graham Richards
 
早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼンShingo Hamada
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at workPete Baikins
 

Viewers also liked (19)

Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of Gamification
 
eTwinning 2 0 Building The Community For Schools In Europe
eTwinning 2 0 Building The Community For Schools In EuropeeTwinning 2 0 Building The Community For Schools In Europe
eTwinning 2 0 Building The Community For Schools In Europe
 
WIRA brochure 2010
WIRA brochure 2010WIRA brochure 2010
WIRA brochure 2010
 
La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...La palabra en la celebración: Evangelio dialogado...
La palabra en la celebración: Evangelio dialogado...
 
Jing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationJing and Voicethread in K12 Education
Jing and Voicethread in K12 Education
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentation
 
MyJewel introduction
MyJewel introductionMyJewel introduction
MyJewel introduction
 
Central_social info
Central_social infoCentral_social info
Central_social info
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3
 
Organi-Deviance Part I
Organi-Deviance Part IOrgani-Deviance Part I
Organi-Deviance Part I
 
Blending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education ProgramsBlending Digital Content in Teacher Education Programs
Blending Digital Content in Teacher Education Programs
 
DiffCalculus Week 3
DiffCalculus Week 3DiffCalculus Week 3
DiffCalculus Week 3
 
Playful Leadership workshop June 2016
Playful Leadership workshop June 2016Playful Leadership workshop June 2016
Playful Leadership workshop June 2016
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visit
 
DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012DiffCalculus: September 11, 2012
DiffCalculus: September 11, 2012
 
Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09Yorks IoF - Sheffield Hallam Sept 09
Yorks IoF - Sheffield Hallam Sept 09
 
早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン早稲田サイコム科学と社会 プレゼン
早稲田サイコム科学と社会 プレゼン
 
Guión 4 septiembre
Guión 4 septiembreGuión 4 septiembre
Guión 4 septiembre
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at work
 

More from Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 

More from Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

BCC 2003 - Reintroducing Watchlist Statistics

  • 1. Reintroducing Watchlist Statistics Duane Blackburn Federal Bureau of Investigation dblackburn@fbiacademy.edu Biometrics Technology
  • 2. Face Recognition Debate Fall 2001 Could the hijackers have been spotted? Biometrics Technology
  • 3. Face Recognition Debate Fall 2001 Can it track me? Gregory Tara Kaye Nancy DOB: 4/21/74 Dorsey Leflore Dorothy Divorced Mother of 2 Shedd 2002 Income: $45,328 Matthew Millner Dennis Ricks Joe Grammer Gerald Elinor Galbraith Pardini Allan Olliff Wilfred Moesch Clayton Tayler Weddell Persky Biometrics Technology Nicolas Marocco
  • 4. Face Recognition Debate Fall 2001 Or will this happen? Osama bin Laden Biometrics Technology
  • 5. Why the confusion? • Confusing – Verification vs. Identification • incorrect usage of statistics – Identification (open set) vs. Identification (closed set) – False alarm rate, false accept rate, false match rate, etc. Biometrics Technology
  • 6. Statistics Shortcomings • ROC (Verification) – Making a claim to your identity • CMC (Identification) – Each probe is in the database • Are measuring closed set identification • Neither relates to the problem! – Solution: develop statistics that measure this problem. Biometrics Technology
  • 7. Chronologically • Face Recognition at a Chokepoint - Scenario Evaluation Results. http://www.dodcounterdrug.com/facialrecognition • FRVT 2002. http://www.frvt.org. • Both available in the Biometrics Catalog, http://www.biometricscatalog.org. Biometrics Technology
  • 8. First Step • Forget what you know! Biometrics Technology
  • 9. Baseline Performance Face Recognition Vendor Test 2002 (FRVT 2002) - http://www.frvt.org Biometrics Technology
  • 10. Three Tasks • Verification – Are you who you say you are? • Watchlist – Are you in my database? If so, who are you? • Identification – You are in my database, can I find you? Biometrics Technology
  • 11. Verification Threshold = 0.8 Claim Response = 0.75 Threshold = 0.7 Claim Response = 0.65 Threshold = 0.6 • Determines if the claimed identity of a face is correct. • Metrics: – Probability of Correct Verification • 1- (False Reject Rate) – False Accept Biometrics Technology
  • 12. Verification Case #1 - Want a low false accept rate False Accept Rate = 0.1% Verification 1 0.9 Probability of Correct Verification 0.8 0.7 Cognitec 0.6 0.5 Eyematic 0.4 Identix 0.3 0.2 0.1 0 1 False Accept Rate = 0.1% Biometrics Technology
  • 13. Verification Case #2 - Want a high verification rate Probability of Verification = 95% Verification Probability of Correct Verification = Cognitec 1 Eyematic Identix 95% 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Accept Rate Biometrics Technology
  • 14. Verification ROC Verification Probability of Correct Verification = 95% Cognitec 1 Eyematic Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Accept Rate Verification 1 Probability of Correct 0.8 Verification 0.6 Cognitec Eyematic 0.4 Identix 0.2 0 1 False Accept Rate = 0.1% Biometrics Technology
  • 15. Watchlist Threshold = 0.8 0.75 Threshold = 0.7 0.65 Threshold = 0.62 Database 0.60 0.55 0.25 Biometrics Technology
  • 16. Watchlist Threshold = 0.8 0.75 Threshold = 0.7 Database 0.65 0.70 0.25 0.55 Biometrics Technology
  • 17. Watchlist Case #1 - Want a high detect and identification rate Detect and Identify = 75% Watchlist Detect and Identification Rate = Cognitec 1 Eyematic 75% Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Alarm Rate Biometrics Technology
  • 18. Watchlist Case #2 - Want a low false alarm rate False Alarm Rate = 0.1% Watchlist Detection and Identification Rate 1 0.9 0.8 0.7 Cognitec 0.6 0.5 Eyematic 0.4 Identix 0.3 0.2 0.1 0 1 False Alarm Rate = 0.1% Biometrics Technology
  • 19. Watchlist Watchlist Detect and Identification Rate = 75% Cognitec 1 Eyematic Identix 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 False Alarm Rate Watchlist 1 Detection and Identification 0.8 0.6 Cognitec Rate Eyematic 0.4 Identix 0.2 0 1 False Alarm Rate = 0.1% Biometrics Technology
  • 20. Identification 0.75 Database 0.65 0.80 0.70 0.25 0.55 Biometrics Technology
  • 21. Identification Database That’s watchlist, not identification! Biometrics Technology
  • 22. Identification • I know you are in the database, but who are you? – Closed universe test. • Compares your picture to all pictures in the database and lists them according to similarity. • Metrics: – How often is the top answer correct? – How often is the answer in the top 2? – How often is the answer in the top 3? – How often is the answer in the top n? Biometrics Technology
  • 24. Three Tasks • Verification – Are you who you say you are? • Watchlist – Are you in my database? If so, who are you? • Identification – You are in my database, can I find you? Make sure you use the correct terms and the correct statistics! Biometrics Technology
  • 25. Government Biometric References • Biometrics Catalog - http://www.biometricscatalog.org • FRVT - http://www.frvt.org • Biometric Consortium – http://www.biometrics.org Biometrics Technology