Abstract
We outline our computational framework for identity. We have a prototype web application, but this paper is a conceptual level. The interest is in identity as an equivalence relation and how information can be evidence for identity hypotheses. Our account is based on the situation theory of Barwise and Perry. We consider a (legal) identity case to be a constellation of situations, and we indicate how the structure of such a case facilitates discounting and combining evidence using Dempster-Shafer theory. Semantic Web resources are used to capture the structure of evidence as it relates to situations. We have developed OWL ontologies and use the concepts therein defined in RDF triple stores to capture case data. URIs (as used in the Semantic Web) are used for unambiguous references to individuals. We sketch a scenario that uses two biometric modalities in an uncontrolled environment and show how our framework applies. Recently, biometrics has gained the limelight as a means to identify individuals, but much else may be available for this task, including sensor data, witness reports, and data on file. To our knowledge, this is the only framework that in principle can accommodate any kind of evidence for identity. It is not an alternative to biometrics, but rather provides a way to incorporate biometrics into a larger context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alvarez-Melis, D., Jaakkola, T.S.: A causal framework for explaining the predictions of black-box sequence-to-sequence models. arXiv preprint arXiv:1707.01943 (2017)
Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)
Barwise, J., Perry, J.: Situations and Attitudes (new ed.). Center for the Study of Language and Information, New York (1998)
Chan, W., Jaitly, N., Le, Q.V., Vinyals, O.: Listen, attend and spell. arXiv preprint arXiv:1508.01211 1(2), 3 (2015)
Curley, S.P.: The application of Dempster-Shafer theory demonstrated with justification provided by legal evidence. Judgment Decis. Mak. 2(5), 257 (2007)
Devlin, K.: Logic and Information. Cambridge University Press, Cambridge (1995)
Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321–357 (1995)
Esterline, A., Nick, W., Mason, J.: Situations, information, and evidence (late breaking report). In: 2018 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 171–173. IEEE (2018)
Giannelli, P.C.: Chain of custody. In: Faculty Publications, School of Law, Case Western Reserve University, p. 309 (1993)
Haack, S.: Evidence Matters: Science, Proof, and Truth in the Law. Cambridge University Press, Cambridge (2014)
Haenni, R.: Uncover Dempster’s Rule Where it is Hidden. In: FUSION, pp. 1–8 (2006)
Halpern, J.Y.: Reasoning About Uncertainty. MIT Press, Cambridge (2005)
Halpin, H.: Sense and reference on the web. Minds Mach. 21(2), 153–178 (2011)
Kripke, S.: Naming and Necessity. Harvard University Press, Cambridge (1980)
McDaniel, M., Sloan, E., Day, S., et al.: Situation-based ontologies for a computational framework for identity focusing on crime scenes. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1–7, March 2017
Merriam-Webster Online. Merriam-Webster Online Dictionary entry: Profiling. https://www.merriamwebster.com/dictionary/profiling. Accessed 02 Jan 2019
Putnam, H.: The meaning of ‘meaning’. Minn. Stud. Philos. Sci. 7, 131–193 (1975)
Rani, M.P., Arumugam, G.: An efficient gait recognition system for human identification using modified ica. Int. J. Comput. Sci. Inf. Technol. 2(1), 55–67 (2010)
Smets, P., Kennes, R.: The transferable belief model. Artif. Intell. 66(2), 191–234 (1994)
The American Heritage Dictionary. The American heritage dictionary entry: given name. https://ahdictionary.com/word/search.html?q=given+name. Accessed 02 Jan 2019
Wooldridge, M.: An Introduction to Multiagent Systems. Wiley, Hoboken (2009)
Zhou, X., Bhanu, B.: Feature fusion of side face and gait for video-based human identification. Pattern Recognit. 41(3), 778–795 (2008)
Alonso-Fernandez, F., Bigun, J.: A survey on periocular biometrics research. Pattern Recognit. Lett. 82, 92–105 (2018). https://arxiv.org/abs/1810.03360
Bartuzi, E., Roszczewska, K., Czajka, A., Pacut, A.: Unconstrained biometrie recognition based on thermal hand images. In: 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1–8. IEEE (2018)
Gonzalez-Sosa, E., Fierrez, J., Vera-Rodriguez, R., Alonso-Fernandez, F.: Facial soft biometrics for recognition in the wild: Recent works, annotation, and COTS evaluation. IEEE Trans. Inf. Forensics Secur. 13(8), 2001–2014 (2018)
Mason, J., Kyei, K., Foster, H., Esterline, A.: A framework for identity: Dempster-Shafer theory the flow and combination of evidence. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1700–1706. IEEE (2018)
Mason, J., et al.: A computational framework for identity based on situation theory. In: International Symposium on Affective Science and Engineering, pp. 1–7. Japan Society of Kansei Engineering (2018)
Acknowledgments
This research is based upon work supported by the Army Research Office (Contract No. W911NF-15-1-0524).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mason, J., Chatterjee, P., Roy, K., Esterline, A. (2019). A Framework to Identify People in Unstructured Environments Incorporating Biometrics. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11637. Springer, Cham. https://doi.org/10.1007/978-3-030-24900-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-24900-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24899-4
Online ISBN: 978-3-030-24900-7
eBook Packages: Computer ScienceComputer Science (R0)