
Biometrics and Surveillance
The choice of biometric to be used in a particular task
depend on the match between the acquisition and pro-
cessing capability of the biometric to the requirements
of the task. Such characteristics include the discrimina-
tive power of the biometric, ease of acquisition, the
permanence of the biometric, and miscellaneous con-
siderations such as acceptability of its use and
▶ privacy
concerns [4, 5]. Towards this end, we discuss some
of the important variates that need be considered in
biometric surveillance.
1. Cooperative acquisiti on. Ease of acquisition is
probably the most important consideration for use of
a particular biometric. Consider the task of home
surveillance, where the system tries to detect intruders
by comparing the acquired biometric signature to a
database of individuals. It is not possible in such a task
to use iris as a biometric, because acquisition of iris
pattern requires cooperation of the subject. Similarly,
for the same task, it is also unreasonable to use con-
trolled face recognition (with known pose and illumi-
nation) as a possible biometric for similar reasons.
Using the cooperation of subject as a basis, allows
us to classify biometrics into two kinds: cooperative and
non-cooperative. Fingerprints, hand prints, speech
(controlled), face (controlled), iris, ear, and DNA are
biometrics that need the active cooperation of the
subject for acquisition. These biometrics, given the
cooperative nature of acquisition, can be collected
reliably under a controlled setup. Such controls could
be a known sentence for speech, a known pose and
favorable illumination for face. Further, the subject
could be asked for multiple samples of the same bio-
metric for increased robustness to acquisition nois e
and errors. In return, it is expected that the biometric
performs at increased reliability with lower false alarms
and lower mis-detections. However, the cooperative
nature of acquisition makes these biometrics unusable
for a variety of operating tasks. None the less, such
biometrics are extremely useful for a wide range of
tasks, such as secure access control, and for controlled
verification tasks such as those related to passports and
other identification related documents.
In contrast, a cquisition of the biometric without
the cooperation of the subject(s) is necessary for sur-
veillance of regions with partially or completely unre-
stricted access, wherein the sheer number of subjects
involved does not merit the use of active acquisition.
Non-cooperative biometrics are also useful in surveil-
lance scenarios requiring the use of behavioral
biometrics, as with behavioral biometrics the use of
active acquisition methods might inherently affect the
very behavior that we want to detect. Face and gait are
probably the best examples of such biometrics.
2. Inherent capability of discrimination. Each bio-
metric depending on its inherent variations across
subjects, and intra-variations for each individual has
limitations on the size of the dataset it can be used
before its operating characteristics (false alarm and
mis-detection rate) go below acceptable limits. DNA,
iris, and finge rprint provide robust discrimination
even when the number of individuals in the data-
base are in tens of thousands. Face (under controlled
acquisition) can robustly recognize with low false
alarms and mis-detections upto datasets containing
many hundreds of individuals. However, performance
of face as a biometric steeply degrades with uncon-
trolled pose, illumination, and other effects such as
aging, disguise, and emotions. Gait, as a biometric
provides similar performance capabilities as that of
face under uncontrolled acquisition. However, as
stated above, both face and gait can be captured with-
out the cooperation of the subject, which makes them
invaluable for certain applications. However, their use
also critically depends on the size of the database that
is used.
3. Range of operation. Another criterion that be-
comes important in practical deployment of systems
using biometrics is the range at whi ch acquisition can
be performed. Gait, as an example, works with the
human silhouette as the basic building block, and can
be reliably captured at ranges upto a 100 m (assuming
a common deployment scenario). In contrast, finger-
print needs contact between the subject and the sensor.
Similarly, iris requires the subject to be at much closer
proximity than what is required for face.
4. Miscellaneous considerations. There exist a host
of other considerations that decide the suitability of
a biometric to a particular surveillance application.
These include the permanence of the biometric, secu-
rity considerations such as the ease of imitating or
tampering , and privacy considerations in its acquisi-
tion and use [4, 5]. For example, the permanence of
face as a biometric depends on the degradation of its
discriminating capabilities as the subject ages [6
, 7].
Surveillance
S
1311
S