Abstract
An experiment was conducted on human face recognition performance in an access control scenario. Ten judges compared fifty individuals to security ID style photos where 20% of the photos were of different people, assessed to look similar to the individual presenting the photo. Performance was better than that observed in the only other comparable live-to-photo experiment [1] with a false match rate of 9% [CI95%: 2%, 16%] in this study compared to 66% [CI95%: 50%, 82%] and a false reject rate of 5% [CI95%: 0%, 11%] compared to 14% [CI95%: 0.3%, 28%]. These differences were attributed to divergences in experimental methodology, especially with regards to the distractor tasks used. It is concluded that the figures provided in the current study are more appropriate estimates of performance in access control scenarios. Substantial individual variation in face matching abilities, response time and confidence ratings was observed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kemp, R., Towell, N., Pike, G.: When seeing should not be believing: Photographs, credit cards and fraud. App. Cog. Psych. 11, 211–222 (1997)
Blackburn, T., Butavicius, M., Graves, I., Hemming, D., Ivancevic, V., Johnson, R., Kaine, A., McLindin, B., Meaney, K., Smith, B., Sunde, J.: Biometrics Technology Review 2002. DSTO-GD, 0359 (2002)
Butavicius, M.: Evaluating and predicting the performance of an identification face recognition system in an operational setting. Aust. Soc. for Op. Res. Bull. 25(2), 2–13 (2006)
Kaine, A.: The Impact of Facial Recognition Systems on Business Practices within an Operational Setting. In: Proc. 25th conference on Inf. Techn. Interfaces (ITI 2003), pp. 315–320 (2003)
McLindin, B., Butavicius, M., Meaney, K.: Gallery Image Effects on Facial Recognition Systems. In: Proc. EC-VIP, 4th EURASIP conference on Video/Image Processing and Multimedia Communications, vol. 2, pp. 445–460 (2003)
Sunde, J., Butavicius, M., Graves, I., Hemming, D., Ivancevic, V., Johnson, R., Kaine, A., McLindin, B.A., Meaney, K.A.: Methodology for evaluating the Operational Effectiveness of Facial Recognition Systems. In: Proc. EC-VIP, 4th EURASIP conference on Video/Image Processing and Multimedia Communications, vol. 2, pp. 441–448 (2003)
Vast, R., Butavicius, M.: A Literature Review of Face Recognition for Access Control: Human Versus Machine Solutions. DSTO-TR, 1747 (2005)
Lee, M.D., Vast, R.L., Butavicius, M.A.: Face matching under time pressure and task demands. In: Sun, R., Miyake, N. (eds.) Proc. of the 28th Annual Conference of the Cog. Sci. Soc., pp. 1675–1680. Cog. Sci. Soc., Vancouver (2006)
Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Analysis and Machine Intelligence 22, 1090–1104 (2000)
Noldus: The Observer Quick Start Guide, Version 5.0. Noldus Information Technology (2003)
Fletcher, K., Butavicius, M.A., Lee, M.D.: The effects of external feature similarity and time pressure on unfamiliar face matching. British Journal of Psychology (in press)
Cohen, J.: Statistical power analysis for the behavioral sciences, 2nd edn. Lawrence Erlbaum, Hillsdale (1988)
Burton, M.A., Miller, P., Bruce, V., Hancock, P.J.B., Henderson, Z.: Human and automatic face recognition: a comparison across image formats. Vision Research 41, 3185–3195 (2001)
Luckman, A.J., Allinson, N.M., Ellis, A.W., Flude, B.M.: Familiar face recognition: A comparative study of a connectionist model and human performance. Neurocomputing 7, 3–27 (1995)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Butavicius, M., Mount, C., MacLeod, V., Vast, R., Graves, I., Sunde, J. (2008). An Experiment on Human Face Recognition Performance for Access Control. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85563-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-85563-7_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85562-0
Online ISBN: 978-3-540-85563-7
eBook Packages: Computer ScienceComputer Science (R0)