Computational Intelligence - February 2017 - 17

Kenneth Lai, Svetlana N.Yanushkevich,
Vlad P. Shmerko, and Shawn C. Eastwood
Biometric Technology Laboratory, Department of Electrical
and Computer Engineering, University of Calgary, CANADA

Abstract-A biometric-enabled watchlist (or a database of persons of interest) is commonly accepted by national and international security agencies. In particular, the facetrait has demonstrated promising performance in large-scale open-set tasks in
forensics and law enforcement scenarios. However, their application in the security of
mass-transit systems, such as e-borders, is very limited. We evaluate the risks of
unwanted effects using Doddington's metric and various databases. The key contribution of this paper is a novel technique for traveler risk categorization using a biometric-enabled watchlist and an evidence-accumulation paradigm, as well as its
impact on e-border performance.

a

I. Introduction and Objectives

©istockphoto.com/maxiphoto,
no fly sign-image licensed by ingram publishing

mechanism which enables the identification of individuals of interest is known as a
watchlist. Advanced biometrics bring a new horizon in forensic watchlist technologies [1]. It is well documented in forensics that errors can occur in profiling,
searching, matching, and identification using biometric traits [2], [3]. Our study is
aimed at bridging the gap between the forensic biometric and biometric-enabled watchlist
used in contemporary automated border control (e-borders) for homeland security.
Traveler risk assessment in e-borders has the following main components: authentication and watchlist technologies [4]-[6]. In e-borders the central problem is to
improve the performance, such as throughput, and minimize the risks of the border
crossing of an unwanted traveler [7].
The International Air Transport Association (IATA) and International Civil Aviation Organization (ICAO) predict that the volume of international air travelers
will grow at around 4.1% per year. Passenger numbers are expected to reach
7.3 billion by 2034 [8]. Each of these 7.3 billion travelers should be checked via
watchlists at all phases of the traveler's journey including pre-screening, screening,
airport logistics, border crossing, and flight via distributed mass-surveillance.
Traditionally, traveler risk assessment is based on past and present behavior, and
is aiming at predicting potential future threats. These risks are analyzed, systematized, modeled, and various recommendations for their mitigation have been
developed, in particular in [9]-[11].
In e-borders, the problem "Is this traveler on the watchlist?" [4], [7], [12] is
reformulated as "Assess the risk of the traveler being on the watchlist" [5], [13].
Conceptually, this means that the watchlist check [14] is replaced by the watchlistbased inference of risks. We study such risks in this paper.
This paper investigates the unwanted effects of biometric-based watchlists
for mass applications in e-borders. These effects carry additional weight in
traveler risk assessment. For an evaluation of these risks, we conducted
experiments using different approaches and databases, and a unified Doddington's categorization metric. Besides the formalized background of

February 2017 | Ieee ComputatIonal IntellIgenCe magazIne

17


http://www.istockphoto.com/maxiphoto

Table of Contents for the Digital Edition of Computational Intelligence - February 2017

Computational Intelligence - February 2017 - Cover1
Computational Intelligence - February 2017 - Cover2
Computational Intelligence - February 2017 - 1
Computational Intelligence - February 2017 - 2
Computational Intelligence - February 2017 - 3
Computational Intelligence - February 2017 - 4
Computational Intelligence - February 2017 - 5
Computational Intelligence - February 2017 - 6
Computational Intelligence - February 2017 - 7
Computational Intelligence - February 2017 - 8
Computational Intelligence - February 2017 - 9
Computational Intelligence - February 2017 - 10
Computational Intelligence - February 2017 - 11
Computational Intelligence - February 2017 - 12
Computational Intelligence - February 2017 - 13
Computational Intelligence - February 2017 - 14
Computational Intelligence - February 2017 - 15
Computational Intelligence - February 2017 - 16
Computational Intelligence - February 2017 - 17
Computational Intelligence - February 2017 - 18
Computational Intelligence - February 2017 - 19
Computational Intelligence - February 2017 - 20
Computational Intelligence - February 2017 - 21
Computational Intelligence - February 2017 - 22
Computational Intelligence - February 2017 - 23
Computational Intelligence - February 2017 - 24
Computational Intelligence - February 2017 - 25
Computational Intelligence - February 2017 - 26
Computational Intelligence - February 2017 - 27
Computational Intelligence - February 2017 - 28
Computational Intelligence - February 2017 - 29
Computational Intelligence - February 2017 - 30
Computational Intelligence - February 2017 - 31
Computational Intelligence - February 2017 - 32
Computational Intelligence - February 2017 - 33
Computational Intelligence - February 2017 - 34
Computational Intelligence - February 2017 - 35
Computational Intelligence - February 2017 - 36
Computational Intelligence - February 2017 - 37
Computational Intelligence - February 2017 - 38
Computational Intelligence - February 2017 - 39
Computational Intelligence - February 2017 - 40
Computational Intelligence - February 2017 - 41
Computational Intelligence - February 2017 - 42
Computational Intelligence - February 2017 - 43
Computational Intelligence - February 2017 - 44
Computational Intelligence - February 2017 - 45
Computational Intelligence - February 2017 - 46
Computational Intelligence - February 2017 - 47
Computational Intelligence - February 2017 - 48
Computational Intelligence - February 2017 - 49
Computational Intelligence - February 2017 - 50
Computational Intelligence - February 2017 - 51
Computational Intelligence - February 2017 - 52
Computational Intelligence - February 2017 - 53
Computational Intelligence - February 2017 - 54
Computational Intelligence - February 2017 - 55
Computational Intelligence - February 2017 - 56
Computational Intelligence - February 2017 - Cover3
Computational Intelligence - February 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com