Description of Biometric Data Interchange Format Standards
|
|
- Benedict Craig
- 7 years ago
- Views:
Transcription
1 Description of Biometric Data Interchange Format Standards INCITS M1 Technical Editors: Creed Jones, Colin Soutar, Jim Cambier, Michael McCabe, Paul Griffin, Rod Beatson, Samir Tamer 1
2 Introduction International Committee for Information Technology Standards (INCITS) is the standards-developing body for US IT standards. M1 is the INCITS committee for biometrics, established November M1 serves as the US TAG (Technical Advisory Group) for ISO/IEC JTC1/SC37 Biometrics subcommittee, established June
3 M1 Program of Work data interchange formats common file formats application program interfaces application profiles performance testing and reporting 3
4 Motivation for Interchange Standards Exchange of biometric data in nonproprietary format among multiple vendors/applications Compile biometric databases for use in evaluating multiple algorithms Produce enrollment databases that enable re-enrollment using future algorithms or algorithm enhancements 4
5 Relationship to Other Standards Data compliant with interchange formats are embedded in CBEFF (NISTIR 6529-A) Biometric Data Block Certain of the formats reference ANSI/NIST-ITL Standard Data Format for the Interchange of Fingerprint, Facial, & Scar mark & Tattoo (SMT) Information Compliance assured with ANSI/INCITS standard (the BioAPI Specification) 5
6 M1.1 Task Group on Biometric Data Interchange Formats Finger Minutiae Format for Data Interchange Finger Pattern Based Interchange Format Iris Interchange Format Finger Image Based Interchange Format Face Recognition Format for Data Interchange Signature/Sign Image Based Interchange Format Hand Geometry Interchange Format 6
7 Project 1564-D - Finger Minutiae Format for Data Interchange - INCITS 378 Creed Jones Associate Professor of Computer Science, Seattle Pacific University Strategic Engineer, Sagem Morpho Inc., INCITS M1.1 Task Group Chairman 7
8 Finger Minutiae Format for Data Interchange Represents a fingerprint in terms of the ridge endings and splits these are called minutiae Standard contains: Precise definitions of minutiae Data Format Definition Agrees in concept with most law enforcement and AFIS fingerprint technologies Backward-compatible with AAMVA fingerprint format 8
9 Minutia Location Placement is defined carefully for compatibility with ANSI/NIST standard Bifurcation Ridge Endings 9
10 Finger Minutiae Data Format Allows more than one finger per record Allows more than one view per finger CBEFF-compliant Minutia location, angle and quality Optional Extended Data area for: Core / delta information Ridge count information Opaque data and future use 10
11 Finger Minutiae Data Format Compact size Example a two-finger record with 27 & 22 minutiae occupies 342 bytes Extensible Extended data area Designed for Interoperability 11
12 Project 1563-D - Finger Pattern-Based Interchange Format - INCITS 377 Colin Soutar, Ph.D. Chief Technology Officer, Bioscrypt Inc., INCITS M1 Vice-Chairman 12
13 Finger Pattern Based Data Interchange Format Based on Robust Commercial Algorithm Implementations Small Area/Slide Format Sensors Data Reduction Reduction in Resolution Cellular Representation Data Format Definition 13
14 Cellular Representation -1 Pattern broken down into cells Sample Cell Finger Pattern 14
15 Cellular Representation - 2 Each Cell represented by a sinusoidal waveform. Sample Cell θ δ λ 15
16 Example Original Image 128x128 x 8 bits Reduction in resolution to 200 dpi (96x96 x 8 bits) Cellular Representation 14x16 x 10 bits (280 bytes + 28 bytes of quality information) ~ 50:1 reduction in data storage requirements (would be 200:1 for 500 dpi image). Header Overhead - 43 bytes 16
17 Project 1576-D - Iris Interchange Format - INCITS 379 James L. Cambier, Ph.D. VP Engineering and Chief Technology Officer, Iridian Technologies Inc. INCITS M1.1 Vice-Chair 17
18 Iris Image Interchange Scope Image capture requirements (informative) Data formats Cartesian (rectilinear) image Polar Image Compliance Conformity to data format Multiple image quality levels (per CBEFF) 18
19 Iris Image Capture Recommendations Resolution Grayscale Density Illumination Contrast Visible Iris Pixel Aspect Ratio Image Scale Optical Distortion Noise Image Orientation Presentation Image Storage Format...to assure consistent performance and interoperability 19
20 Iris Format Options Data Storage Options Compressed/uncompressed Variable image size Lossy/lossless compression Variable intensity depth Monochrome/color Multiple quality levels Orientation Cartesian Format Polar Format Scan type Occlusions Expected iris diameter Boundary extraction Rotation angle Transformation type 20
21 Iris Image Formats Pupil Boundary + + r=0 r=n Cartesian 20K (compressed) θ=0 r=0 M θ= Iris Boundary θ=m r=n Polar 2K (uncompressed) 21
22 Project 1577-D - Finger Image Based Data Format for Data Interchange - INCITS 378 R. Michael McCabe Computer Scientist, Information Technology Laboratory, National Institute of Standards and Technology 22
23 Finger Image Based Data Interchange Format Standard Developer: INCITS M1 BIOMETRICS & JTC1/SC 37 Generic Image standard for applications requiring: Exchange of raw or processed fingerprint images Not limited by the amount of resources Computer identification and verification functions Human comparison of fingerprint image details Non-proprietary storage technique for processed image data Does not rely on pre-established definitions to reduce data to features 23
24 Image Standard Features Storing, recording, and transmitting information from one or more fingers or palm image areas Defines the content, format, and units of measurement for the image data CBEFF compliant structure Consists of a variety of mandatory/optional items Scanning resolution ( ppi) Grayscale levels ( 2-256) Compressed / uncompressed images Certification (EFTS/F) 24
25 Order of Scanned Lines 25
26 Finger/Palm Image Record Format Fixed-length general record header Single Record for each finger/multifinger or palm Fixed-length finger header Compressed / uncompressed image data Features: Multiple fingers / palms in a record Fourteen Finger Position codes / 16 Palm codes Multiple views Provisions for four compression approaches 26
27 Project 1565-D - Face Recognition Format for Data Interchange Paul Griffin, Ph.D. Chief Technology Officer, Identix Inc. Kirsten Nobel, Ph.D. Sales Engineer, Identix Inc. 27
28 Facial Data Interchange Format Preamble: 5 Objectives of Draft Facial Standard By establishing standard formats for facial images, we will: Allow interoperability among facial recognition vendors Minimize the amount of data necessary to store and thereby encourage adoption of biometrics in applications where interoperability is vital Facilitate the use of face information with applications that have limited storage Ensure that enrolled images will meet a quality standard needed for face recognition Improve system throughput by saving the intermediate data instead of the raw data 28
29 Facial Data Interchange Format Overview Paul Griffin, CTO - Technical Editor Work began March, 2002 National INCITS M1 doc quite mature. Mirrored in ISO SC37 draft standard, developed in collaboration with Passports Australia and the ICAO NTWG. Specifies standard interchange format for facial image (as opposed to template). Goal: interoperability at level of a human readable image, no larger than necessary to preserve information needed for optimal biometric match performance if image later used to create template. Through SC37, solicited comments from face vendor community and card manufacturers/id system vendors. Beginning to receive input. Encourage others interested parties to contribute. 29
30 Facial Data Interchange Format Highlights: Specifies format of CBEFF-compliant header and data blob. Deals with compression level and type (JPEG, JPEG2000), plus specifics related to facial image quality, including resolution, pose, expression, lighting, etc. Informative Annexes outline an example format, the FaceIt canonical image and provide quantitative analyses of effects of various compression methods on resultant facial match performance included in another Annex. 30
31 Facial Data Interchange Format Document Outline 1. Introduction scope, related standards activities, normative references, definitions, etc. 2. General record format Header - CBEFF compliant Landmarks text info. associated with face, plus pose angle Image data ( blob ) supported image formats, compression types, data conventions. Definitions of (a) full (b) canonical and (c) cropped image types. 3. Image Acquisition Requirements (e.g. pixel aspect ratio, depth, image resolution, scanner resolution, color profile, etc.) 31
32 Facial Data Interchange Format Informative Annexes Document Outline (cont d.) A. Photography Best Practices B. Digital Attributes of Full and FaceIt Canonical Image C. Image Compression (for color and grayscale; JPEG vs. JPEG2K) Contact for any questions, technical contributions, etc.: Kirsten R. Nobel Sales Engineer, Prof. Services Group 32
33 Project 1603-D - Signature/Sign Image Interchange Format Rod Beatson President, Transaction Security Inc 33
34 Typical Signature/Sign Biometric Enrollment Process Digitizer - n samples for Enrollment Form N Template Feature Data Values At Least Three Samples No Compatible? Yes Fj:- ( j = 1..N ) (Mj, Sj) are Mean & Standard Deviation of Feature j Typically: Template Data Values Consist of Means & Standard Deviations So The Template Data Format Is Different From The Feature Data Format 34
35 Typical Signature/Sign Biometric Matching Process One Sample: Form N Feature Data Values Typically: Digitizer One Sample For Matching No Compare With Template Data OK? Yes Update Template Feature Data Values Fj:- ( j = 1..N ) (Mj, Sj) are Mean & Standard Deviation of Feature j Sample Feature Data Values Are Compared with The Template Using Means & Standard Deviations 35
36 Objective Of Signature/Sign Biometric Interchange Data #Standard Data From Many Different Digitizers With Different Resolutions And Drivers:- Off-The-Shelf Digitizers, Tablet PC, POS Signature Capture Devices, Pocket PC s, Palms, Phone Enabled PDA s etc. Send/Receive! Template From System A"System B! Sample Feature Data From System A"System B! Raw Sample And Sample Feature Data! Raw Sample, Feature Data & Template Data! Combinations Of the Above! Compare Sample from Vendor A Algorithms With Template Created By Vendor B Algorithms 36
37 Signature Sign/Biometric Interchange Data Format! Record Header (14 Bytes) e.g. Format Identifer Total Record Length CBEFF PID No. of Templates in Record! Feature Data (Mandatory For Most Applications) Digitizer Data (ID, Resolution, etc.) Common Feature Sample Data Private Feature Sample Data! Template Data (If Present) Means/SD s Common Feature Template Data Private Feature Template Data! Raw Signature/Sign Data (If Present) Number of Bytes in Image N samples of (X,Y,T,P) Data 37
38 Comparing Vendor A Feature Data With Vendor B Template Signature/ Sign Sample Capture Algorithm A Template Generation Standard Header Common Algorithm A Template Proprietary Data Data Signature/ Sign Sample Capture Algorithm A Matching Matching Results Signature/Sign Sample Capture Algorithm B Matching Matching Results 38
39 Hand Geometry Interchange Format Samir Tamer Technology Physicist, Recognition Systems 39
40 Hand Geometry New M1 project, approved August 2003 Hand geometry measures the size and shape of the hand Most widely deployed biometric in Access Control and Time & Attendance markets (Frost&Sullivan World Biometric Report 2002) 40
41 Hand Geometry Project goals Vendor independence Extensibility Small dataset size Proposed interchange format Hand silhouette (not image) Compressed x,y data 41
42 Hand Geometry 42
43 Summary of Project Status Project 1564-D 1563-D 1576-D 1577-D 1565-D 1603-D Topic Finger Minutia Format Finger Pattern Format Iris Image Format Finger Image Format Face Image Format Signature/Sign Format Hand Geometry Format Status Public Review Public Review Public Review Committee Draft Committee Draft Committee Draft Proposed Project 43
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
More informationUnderstanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
More informationFingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco mprudentet9@ipn.mx Linda Karina Toscano-Medina ltoscano@ipn.mx Gualberto
More informationSWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
More informationBIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
More informationBiometrics for public sector applications
Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:
More informationConformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
More informationBiSPI Conformance Testing
Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt
More informationSpanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008
Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New
More informationEmbedded and mobile fingerprint. technology. FingerCell EDK
Embedded and mobile fingerprint identification technology FingerCell EDK FingerCell EDK Embedded and mobile fingerprint identification technology Document updated on August 30, 2010 CONTENTS FingerCell Algorithm
More informationDocument #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)
Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent) 1. Preamble 1.1. When friction ridge detail is examined using the ACE-V methodology, examiners
More informationGuidelines concerning Fingerprint Transmission
Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been
More informationBiometrics for public sector applications
Technical Guideline TR-03121-2 Biometrics for public sector applications Part 2: Software Architecture Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany
More informationProduct Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationFull page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
More informationVECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and
More informationBIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from
More information22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
More informationNIST Special Publication 500-245
NIST Special Publication 500-245 ANSI/NIST-ITL 1-2000 Revision of ANSI/NIST-CSL 1-1993 & ANSI/NIST-ITL 1a-1997 Information Technology: American National Standard for Information Systems Data Format for
More informationPersonal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES
Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES 1.0 SCOPE AND PURPOSE These specifications apply to fingerprint capture devices which scan and capture
More informationBiometric Template Protection & Usage
Protection & Usage September 23, 2002 Colin Soutar, CTO Bioscrypt Inc. Consortium Conference (BC2002) Company Overview Definition of Terms User Identifier Protection Conclusions 2 Mytec Technologies Inc.
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationUIDAI. Biometrics Design Standards For UID Applications. Version 1.0 December 2009. Prepared by: UIDAI Committee on Biometrics
UIDAI Unique Identification Authority of India Planning Commission, Yojana Bhavan, Sansad Marg, New Delhi 110001 Biometrics Design Standards For UID Applications Version 1.0 December 2009 Prepared by:
More informationMOBILE IDENTIFICATION:
MOBILE IDENTIFICATION: FROM FUNCTIONAL REQUIREMENTS, TO TESTING FOR INTEROPERABILITY AND SECURITY Antonia Rana*, Alessandro Alessandroni** *Joint Research Centre, **DigitPA EUR 25037 EN - 2011 The mission
More informationSecurity and Privacy Challenges of Biometric Authentication for Online Transactions
Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532
More informationFSC Group 63: Alarm and Security
General Services Administration Federal Supply Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and the option
More informationPalmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationBIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS USER BIOMETRIC DATA ACQUISITION OPERATOR BIOMETRIC IDENTIFICATION OPERATOR DOCUMENT VERIFICATION OPERATOR VIDEO ANALYTICS OPERATOR FINGERPRINT AND FACE EXPERTS
More informationModular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
More informationIs the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013
Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013 Rod Beatson President, Transaction Security, Inc. Rod.Beatson@crypto-sign.com
More informationBest Practice Procedures for The Exchange of Latent Identification Services
Best Practice Procedures for The Exchange of Latent Identification Services The Texas Experience Mike Lesko Texas DPS Addressing the Needs of the Texas Latent User Latent exchange must: Be Inexpensive
More informationApplication-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
More informationEuropean Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
More informationKentucky Department for Libraries and Archives Public Records Division
Introduction Kentucky Department for Libraries and Archives Public Records Division Ensuring Long-term Accessibility and Usability of Textual Records Stored as Digital Images: Guidelines for State and
More informationPart 1: Overview of Biometric Technology and Verification Systems
Part 1: Overview of Biometric Technology and Verification Systems What Is Biometrics? 1 Once a tool primarily used by law enforcement, biometric technologies increasingly are being used by government
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationPOSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
More informationPIV Data Model Test Guidelines
NIST Special Publication 800-85B PIV Data Model Test Guidelines Ramaswamy Chandramouli Ketan Mehta Pius A. Uzamere II David Simon Nabil Ghadiali Andrew P. Founds I N F O R M A T I O N S E C U R I T Y Computer
More informationState of Michigan Records Management Services Best Practices for the Capture of Digital Images from Paper or Microfilm
State of Michigan Records Management Services Best Practices for the Capture of Digital Images from Paper or Microfilm 1.0 Introduction The Records Reproduction Act (MCL 24.401-24.406) regulates the reproduction
More informationBiometrics Technology and Standards Overview
Biometrics Technology and Standards Overview Biometrics General term used alternatively to describe a characteristic or a process As a Characteristic it is a measurable biological (anatomical and physiological)
More informationDoc. Machine. authority
Doc 93033 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in emrtds Approved by the Secretary General and published
More informationFingerprint Recognition
Introduction Fingerprint identification is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification for
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationegov.bids:03 Version: 1.0 March, 2011 Iris Image Data Standard For e-governance Applications in India
Version: 1.0 March, 2011 Iris Image Data Standard For e-governance Applications in India Government of India Department of Information Technology Ministry of Communications and Information Technology New
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationHigh Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
More informationBiometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
More informationKeywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
More informationOperational Testing of Biometric Access Control Systems. National Safe Skies Alliance (NSSA)
Operational Testing of Biometric Access Control Systems by the National Safe Skies Alliance (NSSA) Presented By: Valerie M. Lively, TSA Biometric Consortium Conference September 22 24, 2003 Transportation
More informationDigital Image Requirements for New Online US Visa Application
Digital Image Requirements for New Online US Visa Application As part of the electronic submission of your DS-160 application, you will be asked to provide an electronic copy of your photo. The photo must
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationBiometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
More informationMegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
More informationA SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING
A SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING ANKITA KANTESH 1, SUPRIYA S. BEHERA 2, JYOTI BHOITE 3, ANAMIKA KUMARI 4 1,2,3,4 B.E, University of Pune Abstract- As technology advances,
More informationOn the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationA. Scan to PDF Instructions
Revised 08/17/11 Scan to PDF Instructions (Epson scanner example) Scan to PDF Adobe Acrobat 9.0 A. Scan to PDF Instructions Refer to the user manual for your scanner. These instructions are for an Epson
More informationWHITE PAPER DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION
DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION TABLE OF CONTENTS 1 Introduction...3 2 Printed bar codes vs. mobile bar codes...3 3 What can go wrong?...5 3.1 Bar code Quiet Zones...5
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationSecured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationDigitisation Disposal Policy Toolkit
Digitisation Disposal Policy Toolkit Glossary of Digitisation Terms August 2014 Department of Science, Information Technology, Innovation and the Arts Document details Security Classification Date of review
More informationCT RADIATION DOSE REPORT FROM DICOM. Frank Dong, PhD, DABR Diagnostic Physicist Imaging Institute Cleveland Clinic Foundation Cleveland, OH
CT RADIATION DOSE REPORT FROM DICOM Frank Dong, PhD, DABR Diagnostic Physicist Imaging Institute Cleveland Clinic Foundation Cleveland, OH CT Patient comes out... Patient goes in... Big Black Box Radiology
More informationRealScan-S. Fingerprint Scanner RealScan-S
Fingerprint Scanner RealScan-S Outline A fingerprint scanner used by the police or prosecution for collecting a suspect s rolled fingerprints or acquiring a person s flat fingerprints for identification.
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationIntroduction DEFINITIONS
Pennsylvania Commission on Crime and Delinquency Guidelines and Technology Standards for the Collection and Transmission of Booking Center Captured Offenders' Identification Information Table of Contents
More informationAADHAAR BIOMETRIC SDK API SPECIFICATION - VERSION 2.0 MAY
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR BIOMETRIC SDK API SPECIFICATION
More informationAdvances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
More informationID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
More informationBest Practice Fingerprint Enrolment Standards European Visa Information System
Best Practice Fingerprint Enrolment Standards European Visa Information System Improving performance by improving fingerprint image quality Experiences from pilot project BioDEVII 1 Agenda BioDEVII Phase
More informationStandards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
More informationMississippi Department of Archives and History. Reformatting Standards
Mississippi Department of Archives and History Reformatting Standards STANDARDS FOR DIGITAL IMAGING MDAH approves the following standards for reproduction of public records using digital imaging systems:
More informationOverview of NDNP Technical Specifications
Overview of NDNP Technical Specifications and Philosophy Digitization from preservation microfilm print negatives (2n) provides the most cost-efficient approach for large-scale digitization Distributed
More informationCorrecting the Lateral Response Artifact in Radiochromic Film Images from Flatbed Scanners
Correcting the Lateral Response Artifact in Radiochromic Film Images from Flatbed Scanners Background The lateral response artifact (LRA) in radiochromic film images from flatbed scanners was first pointed
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationReduce File Size. Compatibility. Contents
Reduce File Size Revu provides a mechanism for reducing the size of some PDFs to make them more suitable for email or a Document Management System. This tool works by compressing bitmap images and removing
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationChildren Fingerprinting Intermediary report to the European Commission. Table of contents. 05 September 2008
BIODEV II Experiment concerning the capture, storage and verification of biometric data for visa applicants conducted by Austria, Belgium, France, Germany, Luxemburg, Portugal, Spain and United Kingdom
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationExamples of Large Scale Biometrics Systems:
Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian
More informationPARCA Certified PACS Interface Analyst (CPIA) Requirements
PARCA Certified PACS Interface Analyst (CPIA) Requirements Copyright notice: Copyright 2005 PACS Administrators in Radiology Certification Association (PARCA). All rights reserved. All rights reserved.
More informationIWS EPI Builder Technical White Paper
What is IWS EPI Builder? IWS EPI Builder is an easy-to-use, yet powerful software developer s kit (SDK) to build virtually any type of secure ID document application or incorporate identification capabilities
More informationExcursion Report. Applications of Image Processing Winter semester 08/09. Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem
Excursion Report Applications of Image Processing Winter semester 08/09 Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem Contents AIP - Excursion Introduction Baggage handling at Vienna airport
More informationMORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
More informationThe ASTM E57 File Format for 3D Imaging Data Exchange
The ASTM E57 File Format for 3D Imaging Data Exchange Image courtesy Intelisum, Inc. Daniel Huber The Robotics Institute Carnegie Mellon University Member of the ASTM E57 Committee on 3D Imaging Systems
More informationBiometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationProcedure for obtaining Biometric Device Certification (Authentication)
Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationIntroduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More informationPalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
More informationSeema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire
Seema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire {Seema.Sundara, Timothy.Chorma, Ying.Hu, Jagannathan.Srinivasan}@oracle.com
More informationMACHINE VISION MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com
MACHINE VISION by MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com Overview A visual information processing company with over 25 years experience
More informationMultimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
More informationImage quality issues in digitization projects of historical documents
Istituto di Fisica Applicata Nello Carrara (CNR) Firenze, Italy - www.ifac.cnr.it Image quality issues in digitization projects of historical documents Franco Lotti IAPR Int. Workshop on Document Analysis
More information