Combating Accuracy Issues in Biometric Solutions
|
|
- Kenneth Gilbert
- 5 years ago
- Views:
Transcription
1 NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018
2 Biometric Authentication Technology 2 NEC Corporation 2018
3 NEC s suite of Biometrics Solutions Bio-IDiom Contactless Contact-based Fingerprint/ Palmprint Finger vein Ear Acoustics Authentication Iris Face Voice 3 NEC Corporation 2018
4 Characteristics of Different Biometric Authentication Fingerprint recognition offers great convenience with high accuracy and ease of use. Face recognition is highly convenient in that it does not require any special actions Walk-through entry/exit while holding your luggage, etc. High DNA Iris Vein Finger print Contact-based Contactless Accuracy Palm print Otoacoustic Face Low Low 4 NEC Corporation 2018 Hand writing Convenience Voice NEC s key technology High *Source: Addition to Biometrics Market White Paper 2007 version Yano Research Institute, Ltd.
5 Facial Authentication in Biometrics Authentication Facial authentication is an authentication method similar to how a person identifies another person な認証方式 1. Natural Feeling We usually recognize person by face. Less resistance for user 3. Ease of Verification It's possible for a human operator to verify the correctness by comparing the photos. 2. No Special Action No special action like touching devices, at the most look at the camera. Convenience 4. No special devices No special devices, just a camera (with or without infrared). Easy for a human to verify Even webcam can be used 5 NEC Corporation 2018
6 History of NEC s Face Technology 1963 Started character recognition technology R&D Started face recognition R&D Application of pattern recognition technology established through character recognition R&D Commercialized face recognition SDK NeoFace Ranked No.1 in NIST *1 Evaluation 3 consecutive wins in Still Image Matching 2017 NIST FIVE No Character R&D 2009(MBGC *2 ), 2010(MBE *3 ), 2013(FRVT *4 ) Newly ranked No.1 in Video Face Evaluation NIST Face in Video Evaluation (FIVE *5 ) Evaluation under various environmental conditions 1989 Face R&D NIST Evaluation 3 Consecutive Wins Still Image Matching Video Face *1 US Institute of Standards and Technology *2 MBGC (Multiple Biometric Grand Challenge) *3 MBE(Multiple Biometrics Evaluation) *4 FRVT(Face Vendor Test) *5 FIVE (Face In Video Evaluation) 6 NEC Corporation 2018
7 Facial 1-to-1 Matching Are You who You said You are? 2 1) Input Identity 2) Input Picture Facial System Matching Score (0.89) =? > Threshold (0.85) 1 ID/Face Database Photo used during Enrollment 7 NEC Corporation 2018
8 Facial 1-to-N Matching Who are You? Facial System Distant Top from the rest =? Input Picture Face/ID Database 8 NEC Corporation 2018
9 Facial N-to-N Matching Who is present at the Scene? Distant Top from the rest Facial System =? Video Frames Face/ID Database 9 NEC Corporation 2018
10 Difference from Still Image Matching Video Face is far more difficult OK OK OK High Speed (real time) Simultaneous recognition Distance from camera (low resolution) Various face angles Various lighting OK OK OK Still Image Cooperative Cooperative Video Non-Cooperative 10 NEC Corporation 2018
11 Different Modes of Operation for Facial Modes of Operation Accuracy Measurement 1-1 Matching No. of times, the system accurately agrees that the subject is who he/she says he/she is 1-N Matching N-N Matching No. of times, the system accurately points out that the subject is the correct person registered in the database No. of times the system accurately flags out that the correct registered persons are present (There can be missed detections also) Among the above modes, the first one is the simplest and has the highest chance of achieving high accuracy because of the 2 nd factor But identical twins may still fool the system 11 NEC Corporation 2018
12 Garbage-In-Garbage-Out (GIGO) Any System 12 NEC Corporation 2018
13 Factors contributing to the accuracy of Facial Cooperativeness of Subjects Quality of Enrollment Photo Camera Specs & Settings Quality of Input Image/Video Camera Positions & Lighting Factors contributing to the Accuracy of Facial Size of Database Facial Algorithm 15 NEC Corporation 2018
14 Compensate for the High Accuracy Facial System, How? Compensate for the non-cooperativeness non-cooperativeness of Subjects of Subjects Suitable cameras and proper settings Use Good Quality Photo for Enrollment (where possible) Capture Good Quality Face Images How to implement a High Accuracy Facial System? Use proven FR technologies like NEC s NeoFace Suitable camera positions & lighting to capture faces at good angles Limit size of Database (where possible) 16 NEC Corporation 2018
15 Multi-modal Biometrics NEC の生体認証 Iris Face Finger vein Fingerprint/ Palmprint Voice Ear acoustic 17 NEC Corporation 2018
16 Other ways to identify a Person from a Distance Head Person Head/ Silhouette Face (Shape) Head Upper Body Upper Clothing Body Color MAC Address Lower Body Lower Clothing Body Color Lower Body Walking Clothing Style Color 18 NEC Corporation 2018
17 NLS on LinkedIn Follow us on LinkedIn and keep up to date with the news, articles and opportunities available 20 NEC Corporation 2018
NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest
NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most
More informationIntroduction to Bio-IDiom. NEC biometric authentication Bio-IDiom. April, 2018 Safer City Solutions Division Corporate Marketing Division NEC
Introduction to Bio-IDiom NEC biometric authentication Bio-IDiom April, 2018 Safer City Solutions Division Corporate Marketing Division NEC Progress of Digital Transformation Wave of rapidly progressing
More informationNIST Tests Supporting Biometric Identification Applications
NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationIntroduction to NEC s Public Safety Solutions
Introduction to NEC s Public Safety Solutions Takehiko Akiyama Manager, Transportation & City Infrastructure Div. NEC Corporation February 20 th 2018 Today s Agenda Introduction Law Enforcement Civil
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationCongratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.
INSTALLATION Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. From this point on, you may install any additional
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationNeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe
NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time
More informationComputer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();
More informationComputer Security 4/15/18
Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)
More informationDatasheet Fujitsu PalmSecure Contactless Biometrics Authentication
Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Award-winning Contactless Authentication Technology Verifies An Individual s Identity by Recognizing Palm Vein Patterns enabling dynamic
More informationAWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card
AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution
More informationIdentification or Verification? Advanced Identification Technology
Identification or Verification? Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationBiometrics Technology: Multi-modal (Part 2)
Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationStuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication
Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals
More informationCreating Innovation through the Digitalization of Ekimachi Spaces
FEATURED ARTICLES Social Innovation through Global Customer Co-creation Creating Innovation through the Digitalization of Ekimachi Spaces The collaborative creation of services in urban fields such as
More informationQuick Start Guide (External Preview Version)
Quick Start Guide (External Preview Version) 2016 PSP Security Co. Ltd. All rights reserved A. Establishing Connection 1. The following peripherals are required to operate AccuFACE: 12 VDC power supply
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationRightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)
Save money and increase productivity with an affordable biometric soft clock for Kronos that runs on PCs, tablets & smartphones! Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationDisabling facial unlocking using facial expression
Technical Disclosure Commons Defensive Publications Series April 11, 2018 Disabling facial unlocking using facial expression Bernadette Alexia Carter Follow this and additional works at: https://www.tdcommons.org/dpubs_series
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationIDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY
IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY WHAT IS MULTIMODALITY? MULTIMODALITY: COMBINATION OF 2 OR SEVERAL COMPLEMENTARY BIOMETRICS Examples: Face and Iris, Hand and face, Finger vein & Fingerprint
More informationHuman Identification Using Biometry
Human Identification Using Biometry by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional. Fundamentals of Biometrics Biometry Definition Generic therm that describes
More informationLarge-scale AFIS and multi-biometric identification. MegaMatcher SDK
Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationAdvances in Stand-off Biometrics
Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationHassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R
Hassle-free banking in the DIGITAL AGE through NEXT-GEN Technologies W H I T E PA P E R Experience smooth transactions with the new generation of banking and payments using facial recognition. Financial
More informationBiometrics: The Password You ll Never Forget
1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within
More informationImplementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition
RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication
More informationPALM VEIN TECHNOLOGY
Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)
More informationStart Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE
Verifi ENTERPRISE Start Here IMPORTANT. Always install the Software prior to Hardware Installation Quick Installation Guide Windows XP Fast User Switching Compatible QAS 097 022505 PG1 RA About the Reader
More informationBioEnable Iris Recognition Solutions
BioEnable Iris Recognition Solutions Dual Iris Scanner Dual Iris Scanner is a compact USB biometric device used to Iris capture and Iris recognition. Scans 2 eyes at a time in split second Exceed industry
More informationFFP Fingerprint USB Flash Drive User Manual
FFP Fingerprint USB Flash Drive User Manual Fingerprint encryption USB3.0 High speed Multiple platform support Quick Start 1. Plug-in the flash drive to an USB port on your computer, and click CD Drive:
More informationBiometric identity verification for large-scale high-security apps. Face Verification SDK
Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated
More informationIntroduction of Toshiba Face Recognition Software Toshiba Corporation 1
Introduction of Toshiba Face Recognition Software 2016 Toshiba Corporation 1 Why choose Toshiba s FRS? * Performance ** - NIST-Proven World Top Class Accuracy & Speed - 150 patents Experience - Over 1000
More informationBiometric Data Acquisition using MATLAB GUIs
Biometric Data Acquisition using MATLAB GUIs Robert C. Schultz, Robert W. Ives U.S. Naval Academy, Electrical Engineering Department Annapolis, MD 21402-5025 rschultz@usna.edu, ives@usna.edu Abstract -
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationUSE CASES. See how Polygon s Biometrid can be used in different usage settings
USE CASES See how Polygon s Biometrid can be used in different usage settings Web/Mobile Authentication Digital user authentication using biometrics Password management is increasingly harder for the user.
More informationBiometric authorization of Internet services users Online demo
Biometric authorization of Internet services users Online demo Offline demo of the project IT A system for biometric authentication of Internet users based on the fusion of facial and palmprint features
More informationChapter 6. Multibiometrics
148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationA Contactless Palmprint Recognition Algorithm for Mobile Phones
A Contactless Palmprint Recognition Algorithm for Mobile Phones Shoichiro Aoyama, Koichi Ito and Takafumi Aoki Graduate School of Information Sciences, Tohoku University 6 6 05, Aramaki Aza Aoba, Sendai-shi
More informationBiometric Use Case Models for Personal Identity Verification
Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April
More informationBiometrics Hybrid System Based Verification
Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,
More informationFace Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian Hebei Engineering and
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationBiometrics 101. Presented by The International Biometrics & Identification Association (IBIA)
Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com
More informationThe need for secure biometric devices has been increasing over the past
Kurt Alfred Kluever Intelligent Security Systems - 4005-759 2007.05.18 Biometric Feature Extraction Techniques The need for secure biometric devices has been increasing over the past decade. One of the
More informationEasiSign. Application Software. User Manual. Version
EasiSign Application Software User Manual Version 1..3.0 www.prestigio.com Contents 1. Introduction to the software... 1 2. Installation instructions... 2 2.1 Running Environment... 2 2.2 To install EasiSign...
More informationKeywords Palmprint recognition, patterns, features
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm
More informationEaget Fingerprint Flash Drive
Eaget Fingerprint Flash Drive User Manual Fingerprint Encryption High speed identification Dual Storage Metal Case Table of Contents 1. Before You Start... 1 1.1For Users...1 1.2Parameter and Compatible
More informationFSN-PalmSecureID-for ATM Machines
T he application of biometric solutions in ATMs and electronic point-of-sale solutions provide a high- security environment. By using a smartcard, on which the client's unique palm vein pattern is stored,
More informationTECHNOLOGY UPDATE STOCKHOLM, NOVEMBER
TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER 1 2017 Disclaimer FORWARD-LOOKING STATEMENTS The presentation contains forward-looking statements with words such as believes, anticipates, outlook, confident, meeting
More informationVoice, Face and Behavioural Biometrics
Voice, Face and Behavioural Biometrics Authentication & Fraud Prevention in the age of Virtual Assistants Brett Beranek, Director Product Strategy, Biometrics, Security & Fraud 2016 Nuance Communications,
More informationAuthentication: Beyond Passwords
HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationChapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.
Chapter 2: Access Control and Site Security ACIS 5584 E-Commerce Security Dr. France Belanger Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall Access Control Definitions Access
More informationBrunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print)
Welcome Brunswic Welcome to Brunswic Total solution Provider in video surveillance security system, Biometric Identification,Professional Sensing solution for IP system and LPR Technology. Brunswic is
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationNEXT BIOMETRICS NB-3020-U2 WINDOWS 10 INSTALLATION GUIDE VERSION: 1.0
NEXT BIOMETRICS NB-3020-U2 WINDOWS 10 INSTALLATION GUIDE VERSION: 1.0 NB-3020-U2 Windows 10 Installation Guide 2 CONTENTS 1 DEVICE INSTALLATION... 3 2 ADDING FINGERPRINT TO YOUR WINDOWS ACCOUNT... 5 3
More informationTable of Contents. 1. Before You Start AH650 Fingerprint Flash Drive at a Glance System Partition Safety Instructions...
Table of Contents 1. Before You Start... 2 1.1 AH650 Fingerprint Flash Drive at a Glance... 2 1.2 System Partition... 3 1.3 Safety Instructions... 3 2. Running the Fingerprint Management Application...
More informationFace ID Security. November 2017
Face ID Security November 2017 Face ID Security Overview With a simple glance, Face ID securely unlocks iphone X. It provides intuitive and secure authentication enabled by the TrueDepth camera system,
More information(12) United States Patent
US00729.8873B2 (12) United States Patent Miller, Jr. et al. (10) Patent No.: (45) Date of Patent: Nov. 20, 2007 (54) MULTIMODAL PLATFORM (75) Inventors: S. James Miller, Jr., Poway, CA (US); William Frederic
More informationOverview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT
DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationFace RFID Fingerprint Recognition Reader Sensor Fanless Touch 24/7 VESA
2017 by (Germany). All information subject to change without notice. Pictures for illustration purposes only. Shuttle Biometric System BR06 Shuttle has proven its experience in the field of biometric systems
More informationComputer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 09. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2017 April 17, 2017 CS 419 2017 Paul Krzyzanowski 1 Biometrics Identify a person based on physical or behavioral
More informationINTUS 1600PS Palm Vein Authentication
INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationMatch On Card MINEX 2
Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card
More informationDiscovering Computers Living in a Digital World
Discovering Computers 2011 Living in a Digital World Objectives Overview See Page 257 for Detailed Objectives 2 Objectives Overview See Page 257 for Detailed Objectives 3 What Is Input? Inputis any data
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationTelebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.
Telebiometrics, and applications in Japan Yoshiaki ISOBE Systems Development Lab. Hitachi, Ltd. yoshiaki.isobe.en@hitachi.com 2 Introduction Biometrics i is one of Authentication ti ti technologies Authentication
More informationNow there is: Asignio web-based signature authentication.
THE COST OF KYC AND AML Know Your Customer (KYC) technology and Anti-Money Laundering (AML) compliance are crucial elements of modern banking. Financial institutions are trusted to verify and authenticate
More informationCAN WE ESCAPE PASSWORDS?
INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationPOLYBIO Multibiometrics Database: Contents, description and interfacing platform
POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,
More informationCAS Sign On for Windows
CAS Sign On for Windows Presentation pour l OSSIR 12 novembre 2001 Jean-Francois Kin - Keyware BIOMETRICS OVERVIEW What is Biometrics? The Science of measuring one or more physical or behavioural characteristics
More informationMediaTek Natural User Interface
MediaTek White Paper October 2014 2014 MediaTek Inc. Table of Contents 1 Introduction... 3 2 Computer Vision Technology... 7 3 Voice Interface Technology... 9 3.1 Overview... 9 3.2 Voice Keyword Control...
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationExam Scheduling Instructions
Exam Scheduling Instructions Exam Scheduling Instructions Overview CertNexus exams are delivered online via FastTest with remote proctoring provided by a third-party proctoring service, Examity. You will
More informationSmart Mobile Identity. Revolutionizing biometric identity verification
Smart Mobile Identity Revolutionizing biometric identity verification Introduction Mobile devices are poised to transform the biometric industry and greatly broaden the use of biometrics for identity verification.
More informationBiometrics and Image processing
Biometrics and Image processing M. M Saad, C. Rosenberger, A. Elmoataz GREYC research lab (UMR 6072) ENSICAEN - CNRS Université de Caen Basse-Normandie FRANCE Outline 1 GREYC research lab 2 E-payment &
More informationBiometric Palm vein Recognition using Local Tetra Pattern
Biometric Palm vein Recognition using Local Tetra Pattern [1] Miss. Prajakta Patil [1] PG Student Department of Electronics Engineering, P.V.P.I.T Budhgaon, Sangli, India [2] Prof. R. D. Patil [2] Associate
More informationSetting PSE 15 Preferences
Setting PSE 15 Preferences Most of the preferences in both the Organizer and the Photo Editor module can be left at their defaults. In this document we will highlight a few you may want to review early
More informationRobust Biometrics Based on Palmprint
Robust Biometrics Based on Palmprint Lalit V. Jadhav 1, Prakash V. Baviskar 2 11 North Maharashtra University, Department Of E & TC, SSVP s College of Engineering, Dhule, Maharashtra, INDIA. 2] North Maharashtra
More information