Mobile ID, the Size Compromise
|
|
- Jewel Anthony
- 5 years ago
- Views:
Transcription
1 Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1
2 Presentation Plan The quest for increased matching accuracy. Increased adoption of Palm prints and 1000 PPI resolution Increased adoption of mobile ID Increased no. of projects; Early history ; Observations & Standards Standards explained A) PIV & Appendix F; B) Mobile ID best practices explained 3 rd Party tests and results: A) UIDAI; B) NIST Conclusions Questions? 2
3 The quest for increased accuracy: Palm print PPI Proven fact: Fingerprint/Palm print Image quality and size directly correlate to matching performance. Result: Law Enforcement around the globe is adopting devices with larger scanning areas and higher scanning resolutions to feed their AFIS. Examples (only). Adoption of / By Palm LS 1000 PPI LS UK Ident1/NPIA FBI or 2011 RCMP Norway PDMT
4 The quest for increased accuracy: Multi-Factor Identification 4
5 The quest for increased accuracy: Palm print PPI Increase in image quality True1000ppi L Scan 1000P VS. 500ppi re-sampled to 1000ppi 1000ppi L Scan 1000PX VS. 500ppi on L Scan 500P Main objective: increase ID accuracy Increase in scanning area / size 5
6 Mobile ID Definition: Rapid Mobile Identification w/ 2 fp against an AFIS Increasing demand and multiple applications: Mobile ID, Special Operative/forces, Forensic investigation, port police, border control, etc. Increasing offer: Mobile ID: Rapidly increasing demand Increasing quantity of projects: Rapid ID: Several US States/counties. Swiss Mobile AFIS, Police, Switzerland Lantern/MIDAS/Mobile ID, UK Mobile ID, PSNI, Northern Ireland 6
7 Mobile ID: Early History and Standards Result: Increased no. of public tenders and deployments. Requirements mainly driven by operational needs and the Officer s convenience/tolerance. Size, weight and usability (ergonomics, functionality) = main selectors 7
8 Mobile ID: Early History and Standards Observations: The contrast between no-mobility and mobility = positive But little to no benchmarking done on matching accuracy between devices and vendors. Few to no credible industry 3 rd party standards and best practices considered or reflected in evaluation criteria. Some earlier projects specified FBI PIV standard Was the only NIST / FBI standard related to mobile handheld devices. Since 2010 we have: NIST Mobile ID best practices and SAP levels. Under Appendix F certification, specifically for Mobile Identification scenarios. 8
9 Milestones of Image quality at FBI (FBI / NIST EBTS standard) the FBI has developed this standard for electronically encoding and transmitting biometric image, identification, and arrest data Major milestones for image quality evaluation FBI Appendix G 1995 FBI Appendix F 1999 FBI PIV 2006 FBI Mobile ID 2010 Interim image quality specifications Final image quality specifications with increased requirements Lower-level standard for one-to-one fingerprint verification New category within App. F for Mobile Identification 9
10 Mobile ID: PIV and Appendix F Standards What are the standards? There are two standards currently in use for fingerprints: Appendix F and PIV Appendix F has stringent image quality conditions, focusing on the human fingerprint comparison and facilitating large scale machine manyto-many matching operation. PIV is a lower-level standard designed to support one-to-one fingerprint verification. Certification is available for devices intended for use in the FIPS 201 PIV program. Reference: 10
11 FBI scanner certification categories PIV (Personal Identity Verification) For enrolment and ID authentication (mainly single finger scanners) Mobile ID For scanners capturing flat and rolled fingers in a portable acquisition station FBI scanner certification categories ID FLATS For scanners capturing flat fingers only in a 3.2 x 3.0 image capture area. Livescan For scanners capturing flat and rolled fingers in a 3.2 x 3.0 image capture area ID Verification = 1:1 Match Identification = 1:n Match 11
12 Mobile ID: FBI image quality requirements 4 Cert. Categories 2 Image Quality Standards PIV Appendix F PIV Identification Flats Livescan Mobile ID 12
13 Mobile ID: NIST Best Practice Recommendation NIST NIST stands for National Institute of Standards and Technology Body of standards recognized not only in the USA, but also worldwide In August 2009, NIST published «Mobile ID Device Best Practice Recommendation» Cross Cross Match Match Technologies 13
14 Mobile ID: Understanding SAP / FAP levels A mobile identification device is a livescanner viewed in the context of a portable biometric acquisition station SAP means Subject Acquisition Profile FAP = is the SAP for Fingerprint Set of characteristics concerning the capture of a biometric sample. Device capture dimensions It is Applicable to 3 biometric modalities: fingerprint (FAP), face and iris. The higher the SAP/FAP level value, the stronger the acquisition requirements FAP Levels Number of fingers Image quality specification 14
15 Mobile ID: SAP / FAP levels Verification Mobile ID Minimum SAP Level Source: Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information from NIST Cross Cross Match Match Technologies 15
16 Mobile ID: Operational Environment & Risk Level Risk levels according to NIST Severe risk levels imply that loss of life and/or property can result if accurate identification or verification is not made. A moderate risk environment is defined for those encounters with a subject with no or questionable identification. An officer cannot detain a subject for more than a limited amount of time without making an arrest. In this situation, it is necessary to quickly identify the subject or retain biometric information sufficient to verify the subject s identity at a later date. A mild risk environment is defined for those encounters where enrollment and identification data will be used at a later date. At that time the subject would be available for comparison to the data previously retained. Examples of mild enrollments include preparing for future logical or physical access control for a subject, or retaining one or more biometric images for verification in court while the subject is available. Verification examples include tracking a subject through the jail or court system using the retained biometric images. In these cases a failure to match would result in additional action to verify the subject s identity, primarily inconveniencing no one but the subject Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 16
17 Mobile ID: Understanding the function Enrollment (example: a complete civil or criminal booking) Identification (trying to determine the identity of someone): 1:n comparaison Verification (trying to validate the identity of someone): 1:1 comparaison 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 17
18 Mobile ID: SAP level for police work The case for SAP 30 We can safely assume that the risk factor would be moderate We also know what we are trying to achieve: identification So what do NIST Best Practices recommend for such a scenario? 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 18
19 19
20 Mobile ID: Capture dimensions of FAP levels Rolled impressions FAP 10 FAP 20 FAP 30 Flat impressions FAP 10 FAP 20 FAP 30 20
21 FAP Level Mobile ID: Conclusion on Size Compromise Certification category Specification Capture dimension (WxH) Number of simultaneous captured flat fingers FAP 10 PIV x mm x 16.5mm 1 FAP 20 PIV x mm x 20,3mm 1 FAP 30 PIV x ,3mm x 25,4mm 1 Direct correlation between Scanner Size and device FAP Level. The > the size, the > FAP level FAP 30 > and Image Quality level than FAP 10 or FAP 20 (Apx F vs. PIV) The > size = > Quality = > weight = > $ Size/Weight/Costs 21
22 UID study: Determining best authentication accuracy using fingerprints > 620 million people enrolled 22
23 The UID study The Size Compromise: 3 rd Party tests Unique ID Authority of India (UIDAI) overseeing largest biometric deployment in the history of mankind Stringent requirements + a certification authority to authorize devices + technologies UIDIA published study evaluating SAP levels corrolation to matching accuracy Results: «Amongst the 26 devices studies, the single finger unlabeled FRR (False Rejection Rate) for up to 3 attempts varied from 2% to 23%! Concretely, we have: SAP10 SAP20 FRR FAR FRR FAR FRR FAR FRR FAR Single finger, 3 attempts Which led UIDIA to conclude: «Larger sensors provided better accuracy than smaller sensors» 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 23
24 The Size Compromise: UID Fingerprint accuracy study Test setup Proof-of-Concept studies in 8 states Period: Apr Jan Aadhaar holders (mixed by gender, age and place of living) 15 scanner models Factors investigated Different sensor technologies Different minutiae extractors Number of fingers Fingerprint quality Best finger analysis Network (availability, bandwidth, service provider, landline vs. mobile, reliability & latency factors across networks) 24
25 The Size Compromise: UID study results 25
26 The Size Compromise: UID study results Device impact on matching accuracy Large sensors (FAP 20 compliant) provide better accuraccy than smaller sensors (FAP10 compliant) Other findings Highlights Using Best Finger for authentication, FRR is much lower (up to 6 times) than using any specific finger Residents in years age group showed the best authentication accuracy. Senior residents (60+) had the highest rejection rates. Enrolment NFIQ is poor a indicator to determine the best finger 26
27 NIST study: Impact of fingerprint capture dimension on matching performance Test setup A. Probe set: randomly selected images from FBI platinum repository images with mated record images with non-mated record B. Cut images according to FAP levels 10, 20 and 30 (+ control image) Gallery of images
28 The Size Compromise: NIST, FAP level vs. accuracy FAP 10 FAP 20 FAP 30 FNIR / FPIR: False Non-Identification Rate / False Positive-Identification Rate FNIR false non-identification rate with FAP 10 almost double that of FAP 20 FAP 30 excels over all FAP levels FPIR not impacted by different FAP levels 28
29 The Size Compromise: NIST, 2-finger combinations The more fingers the better the matching performance Except for two thumbs, FAP 20/30 with two fingers better matching performance than FAP 10 with four fingers Two thumbs lowest performance across all FAP levels 29
30 NIST study results (4) Optimization strategy for given systems All test cases against (FAP10/20/30 and finger combinations) against all gallery configurations (flats, rolled, ten-prints) FAP 30 with two index fingers best combination FAP 10 with two index and two middle fingers as alternative Two thumbs lowest performance (all FAP levels) 30
31 The Size Compromise: 3 rd Party tests Capture dimensions vs. matching performance
32 The Size Compromise: NIST study conclusions The larger the capture size dimensions, the better the matching performance FAP 30 excels in matching performance over all 3 FAP levels For legacy FAP 10 systems: A combination of 2 index + 2 middle fingers can be an alternative to 2 FAP 30 index fingers. Ten flat fingers provide best matching performance compared to other flat only combinations Using only two fingers: Two index finger provides best and two thumbs provides lowest matching performance Attention: Sequence issues to be considered 32
33 In the End; Lessons learned: The Size Compromise: Conclusions PIV SAP 10 and SAP 20 = Made for verification, not Identification Better than nothing but not recommended for Mobile ID against AFIS. SAP 30 (PIV and Appendix F certified) = Minimum recommended level for sufficient Identification accuracy against an AFIS. 3 rd party tests show significant % of IDs missed using FAP 10 or FAP 20 (PIV) devices that would have been hits with FAP 30 devices. Scanner Size / weight / cost should be minimized, while avoiding to significantly compromise on matching accuracy (SAP level). Flash new! (of ): PSNI concluded initial trial of SAP 30 mobile ID devices in Belfast. One (1) single weekend transactions. 8 Hits. 8 arrested. 1 jailed. 1 st SAP 30 Mobile ID deployment in UK. Past = SAP
34 THANK YOU! QUESTIONS? Carl Gohringer, 34
FBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationBiometric Use Case Models for Personal Identity Verification
Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationLarge-scale AFIS and multi-biometric identification. MegaMatcher SDK
Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm
More informationBiometric Technology
Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to
More informationMobile Fingerprint Authentication Solution
Mobile Fingerprint Authentication Solution 1 BioSign 2.0 I WHY BioSign 2.0? WORLD S FASTEST SPEED WORLD S MOST ACCURATE ALGORITHM ROBUST PERFORMANCE OVER TIME FLEXIBILITY IN DESIGN 50ms* authentication
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationWorld s Best Mobile Fingerprint Authentication Algorithm
World s Best Mobile Fingerprint Authentication Algorithm Mobile Fingerprint Authentication Algorithm l 1 I WHY? I Performance The world s fastest, most accurate mobile fingerprint technology ever provides
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More information6 facts about GenKey s ABIS
6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every
More informationRole of Biometric Technology in Aadhaar Authentication
UIDAI h Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 Role of Biometric Technology
More informationAWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card
AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution
More informationSUPREMA LiveScan Solutions. June 2009
SUPREMA LiveScan Solutions June 2009 Live Scan System Suprema Live-scanner Solution based on advanced optical technology and state-of-the-art software technology for fast capture and high quality is an
More informationEU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationQuantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management
Quantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United
More informationAdvances in Stand-off Biometrics
Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported
More informationGuidelines for Capturing Palmprints and Supplementals
Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals General Overview: The FBI will implement palmprint and supplemental print search capabilities
More informationBiometric Offender Movement
Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric
More informationBiometric Enrolment for the European Visa Informationsystem (VIS)
Biometric Enrolment for the European Visa Informationsystem (VIS) German Experiences 1 EU Visa Information System (VIS) Federal Foreign Office Visa Application EU VIS Border Police Border Control Territory
More informationCOUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM
COUNTY OF LOS ANGELES REQUEST FOR INFORMATION RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM RFI NO. 414-SH COUNTY OF LOS ANGELES SHERIFF S DEPARTMENT Request for Information (RFI) Project No. 414-SH
More informationAadhaar enabled Public Distribution System in Haryana
DIRI Data Brief Aadhaar enabled Public Distribution System in Haryana Siddharth Sekhar Singh and Ashwini Chhatre January 2019 Key Facts Authentication failure rates in the State declined to.5% of all Active
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationUNCLASSIFIED / FOUO UNCLASSIFIED / FOUO
1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it
More informationWestern Identification Network Service Strategy (January, 2008)
Western Identification Network Service Strategy (January, 2008) The purpose of this paper is to help members and other interested parties understand the unique nature of services provided by WIN that no
More informationTHE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE
THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration
More informationMORPHOSMART CBM SERIES
MORPHOSMART CBM SERIES COMPACT BIOMETRIC MODULES FOR OEM INTEGRATION The best, most compact optical modules on the market Easy integration of biometric functions into multiple applications High quality
More informationMatching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson
Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR 7110 C. L. Wilson, M. D. Garris, & C. I. Watson MAY 2004 Matching Performance for the US-VISIT IDENT System Using Flat
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data
INTERNATIONAL STANDARD ISO/IEC 19794-4 First edition 2005-06-01 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données
More informationREDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS
W H I T E PA P E R H a r d w a r e O b s o l e s c e n c e M a n a g e m e n t i n t h e B i o m e t r i c s I n d u s t r y REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS Copyright
More informationNISTIR 7249 Two Finger Matching With Vendor SDK Matchers
NISTIR 7249 Two Finger Matching With Vendor SDK Matchers C. Watson C. Wilson M. Indovina B. Cochran NISTIR 7249 Two Finger Matching With Vendor SDK Matchers C. Watson C. Wilson M. Indovina B. Cochran Image
More informationREAL-TIME IDENTIFICATION USING MOBILE HAND-HELD DEVICE : PROOF OF CONCEPT SYSTEM TEST REPORT
REAL-TIME IDENTIFICATION USING MOBILE HAND-HELD DEVICE : PROOF OF CONCEPT SYSTEM TEST REPORT Prepared by: C/M Tien Vo Royal Canadian Mounted Police Scientific authority: Pierre Meunier DRDC Centre for
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data
INTERNATIONAL STANDARD ISO/IEC 19794-4 Second edition 2011-12-15 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationNIST Tests Supporting Biometric Identification Applications
NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationComputer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();
More informationI I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:
From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find
More informationComputer Security 4/15/18
Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)
More informationDemographic Update through Update Client Lite (UCL)
CSC e-governance Services India Limited, Ministry of Communications & Information Technology, Electronics Niketan, 3rd Floor, DeitY, 6 CGO Complex, Lodhi Road, New Delhi 110003 Phone : - 011-24301349 Operator
More information2016 Global Identity Summit Pre-Conference Paper. Fingerprints
2016 Global Identity Summit Pre-Conference Paper Fingerprints This is a community-developed document. Information and viewpoints provided within are not necessarily the opinions of the paper coordinators
More information16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E
www.supremainc.com 16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, 463-863, Korea T +82 31 783 4502 F +82 31 783 4503 E sales@supremainc.com 2014 Suprema, Inc. Suprema and identifying product names and
More informationCoesys Enrollment Solutions for Government Programs
Coesys Enrollment Solutions for Government Programs Enrollment processes you can trust Enrollment is a first and critical step to ensure secure and reliable citizen registration before issuing trusted
More informationAadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI
Aadhaar Scalability & Data Management Challenges Dr. Pramod K. Varma Chief Architect, UIDAI twitter.com/pramodkvarma pramodkvarma.com Understanding Aadhaar System 2 Establishing ID is a Challenge Issue
More informationBiometric Sample Quality Standards Importance, Status, and Direction
Biometric Sample Quality Standards Importance, Status, and Direction David Benini Aware, Inc. INCITS M1 Project Editor Biometric Sample Quality ISO/IEC SC 37 Project Editor Biometric Sample Quality Standard
More informationAadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh
DIRI Data Brief: 01 Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh Siddharth Sekhar Singh and Ashwini Chhatre April 2018 Key Facts The average Aadhaar authentication
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationPhase I: Technical Capability of Biometric Systems to Perform 1:300m Identification
AAMVA UID9 Biometric Identification Report Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification Final Report Copyright 2003 International Biometric Group Version Description
More informationFRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC)
FRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC) Version 1.1 Approved 1.1 Certification Department 24 th October 2018. PUBLIC Introduction This document covers the requirements for
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationOverview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005
Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format Robert Yen DoD Biometrics Management Office October, 005 Agenda Biometric Standards ANSI INCITS Fingerprint Standards vs. SC 37
More informationNeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe
NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time
More informationmobichk powered by White Paper address 345 Plainfield Avenue, Suite 204 Edison, New Jersey, phone
White Paper TM Mobile Biometric Capture, Look-up, and Identification, Mobizent's mobile identification integrated hardware and software solution provides public safety with a better way to conduct Personal
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationRecommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division
Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately
More informationLumidigm Frequently Asked Questions
Lumidigm Frequently Asked Questions PLT-02335, Rev. A.1 July 2015 Software Version 5.30 hidglobal.com Copyright 2014-2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. This document may not
More informationOnline and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic
More informationExtremely-Large-Scale Biometric Authentication System - Its Practical Implementation
Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to
More informationSolution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator
Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationFIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies
FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up
More informationPersonelID and PositiveID An Executive Summary
PersonelID and PositiveID An Executive Summary Homeland Security Are you who you say you are? 8010 Windwood Beach, Suite 200 Linden, MI 48451 888-248-3908 www.consultkinetic.com About Kinetic Group Designs
More informationLatent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Jianjiang Feng, Soweon Yoon, and Anil K. Jain Department of Computer Science and Engineering Michigan State University {jfeng,yoonsowo,jain}@cse.msu.edu
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationThe National Biometrics Challenge 2011 Update
The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationLeading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.
S a Whe en identification matters s Leading Innovation in Biometrics & Security SUPREMA Biometric Solutions for Mobile Contact: C t t Sales@supremainc.com 2016 a Rightsreserved Reserved 2016 a Inc. Inc.
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationSecure Web Fingerprint Transaction (SWFT) Frequently Asked Questions
Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationToward a Manageable Criminal History System
BJS/SEARCH Web Seminar Toward a Manageable Criminal History System BJS/SEARCH, The National Consortium for Justice Information and Statistics 1 Sponsored by The Bureau of Justice Statistics (BJS), U.S.
More informationBIOFLEX. Applications
HARDWARE BIOFLEX Bioflex is an essential tool for identity verification operations of a modern state. This identification device for persons is guarantor for population census, polling offices or police
More informationFace recognition algorithms: performance evaluation
Face recognition algorithms: performance evaluation Project Report Marco Del Coco - Pierluigi Carcagnì Institute of Applied Sciences and Intelligent systems c/o Dhitech scarl Campus Universitario via Monteroni
More informationFINGERPRINT BIOMETRICS
FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...
More informationFINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2
Review Article FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1.A.Imam 2 Address for Correspondence 1 Asst. Prof, ECE Deptt, Ajay Kumar Garg Engineering College, Ghaziabad 2 Asst. Prof,
More informationStandard CIP-006-3c Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security
More informationSecure Lightweight Activation and Lifecycle Management
Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution
More informationUnderstanding Fingerprint Biometrics
TECHNICAL SPECIFICATIONS Understanding Fingerprint Biometrics A brief look at fingerprints, how they are processed and how the accuracy of a biometric system is measured. ipulse Systems 7/1/2014 CONTENTS
More informationThe European Union approach to Biometrics
The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1
More informationRegistry of USG Recommended Biometric Standards
Registry of USG Biometric Standards Version 1.0 DRAFT for Public Comment NSTC Subcommittee on Biometrics and Identity Management February 4,2008 1. Introduction This Registry of USG Biometric Standards
More informationStandard CIP-006-4c Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security
More informationBiometric Specifications for Personal Identity Verification
NIST Special Publication 800-76-2 Biometric Specifications for Personal Identity Verification Patrick Grother Wayne Salamon Ramaswamy Chandramouli I N F O R M A T I O N S E C U R I T Y NIST Special Publication
More informationBio-FactsFigures.docx Page 1
Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationMatch On Card MINEX 2
Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card
More informationForensics: The Next Frontier for Biometrics. Anil K. Jain Michigan State University October 27, 2015
Forensics: The Next Frontier for Biometrics Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 27, 2015 Bertillon System (1882) Habitual Criminal Act (1869): Identify repeat offenders
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationSpiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP
Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos
More informationStandardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions
Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions Zia Saquib Executive Director, C-DAC Mumbai & Elec. City saquib@cdac.in Santosh Kumar Soni Sr. Staff Scientist,
More informationSolution. Imagine... a New World of Authentication.
A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure
More informationIMPLEMENTING AN HSPD-12 SOLUTION
IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com
More informationBase Access. Smart Identity Card Program. November 16, Jay Orgeron. BISA Program Manager
Base Access Smart Identity Card Program November 16, 2010 Jay Orgeron BISA Program Manager 2004-2006 Mark pages according to the proprietary level of information as described in Company Procedure J103
More informationNeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest
NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationPalmprint Recognition using Novel Fusion Algorithm
Palmprint Recognition using Novel Fusion Algorithm Kannan Subramanian Dept. of MCA, Bharath University, Chennai-600073, India ABSTRACT: Palmprint is a promising biometric feature for use in access control
More informationVersion 1.4. Cogent VDM and Device Guide
Version 1.4 Cogent VDM and Device Guide 2010 Cogent, Inc. All rights reserved. This document contains commercial information and trade secrets of Cogent, Inc. which are confidential and proprietary in
More information