International Standardization on Face Recognition Technology
|
|
- Charlotte Barrett
- 7 years ago
- Views:
Transcription
1 International Standardization on Face Recognition Technology Wonjun Hwang 1, Seok Cheol Kee 1 1 Computing Lab., Samsung Advanced Institute of Technology Mt. 14-1, Noengseo-Ri, Giheung-Eup, Yonging-Si, Gyeonggi-Do, Korea , {wj.hwang, sckee}@samsung.com Abstract. This paper details the international standard works on biometrics, especially face recognition, for example, which groups have an interest, what kind of works has been done, and why the standard works are needed. Moreover, the history of MPEG-7 Advanced Face Recognition descriptor and current situations are described. 1 Introduction Biometrics is automatic person recognition method using physiological characteristics. The features in biometrics, for example, are face, iris, fingerprints, voice, retinal, vein, voice and etc. The main reason why the biometric technology is becoming apparent is because the need for the high security is increased these days. Commercially speaking, the recent biometrics is leaded by governments and military which have an ability to make a big market on each purpose. The driver s license with fingerprint is a good example. As the corresponding law is amended, all licenses will be replaced. In biometric technology, face is the most important feature because the face image is remarkably familiar to human beings. When you meet another man in real life, firstly you look at his face and know who he is. The face picture is already in most of identification cards, ex. passport, driving license, and national ID card, which is used to verify user s identity. To give another example, the face image has been a mandatory part in MRTD [1] (Machine Readable Travel Documents), a document containing eye- and machine-readable data and developed by ICAO (International Civil Aviation Organization). Face recognition technology [2] is still developing and many papers are being published. Utilizing face recognition for personal authentication is convenient and more accurate than current method. This is because it is not necessary for user to carry or remember something. In case of old method such as PIN (Personal Identification Number), it is possible that a password can be used by unauthorized person for criminal purpose. Face recognition is no touch biometric technology and does not need expensive equipments. The good example using face recognition is the passport based on encrypted face templates which have an owner s personal characteristic.
2 In a point of view on the performance of face recognition, it is not easy problem which method are the best and which experimental scenarios should be used to measure. FERET [3] and FRVT [4] are useful samples to aim at independent and blind testing the performance of system, but in case of standard work, the one of important things is the interoperability. For this reason the standard works should be opened to the public, but we can not clearly know the operating principles from the result of such blind tests, even though the performance was assured. In this paper we detail foreign organizations which have taking an interest in biometrics as standard works in Section 2. MPEG-7 Advanced Face Recognition descriptor contributed by us and the brief state of affairs is explained in Section 3. 2 Standardization Organizations on Biometrics 2.1 Korean Standardization Organizations In Korea, the representative organizations related to biometrics are TTA (Telecommunications Technology Association) and KATS (Korean Agency for Technology and Standards), the purpose of TTA is to contribute to the advancement of technology and the promotion of information and telecommunications services by effectively establishing and providing technical standards, especially ITU-T and ITU-R, which reflect the latest domestic and international technological advances. Sub Groups 3 (SG3) which focuses on network and system security has a lot of interests in Biometrics. On the other hand, KATS establishes and distributes Korean Industrial Standards (KS) for the provision of industrial technology infrastructure and the protection of consumers. KATS explores and develops standards for new technologies and products according to market demands. They have been supporting a Korean expert group for ISO/IEC JTC1 SC27, SC37 and ISO TC68, relating to Biometrics. Korean standard works already established are K-X9.84, specifying the minimum requirements of security for management of biometric information, and K-BioAPI. 2.2 American Standardization Organization After the tragic events of September 11, demands of biometrics standards are increased in America. NIST (National Institute of Standards and Technology) has played a leading role in biometrics standards and each group supported by NIST has been going to achieve the standard works organically for own purpose. For example, the work of M1-Biometrics Technical Committee in INCITS (InterNational Committee for Information Technology Standards) is to accelerate the deployment of standards-based security solutions for homeland defense and the prevention of identity theft. ANSI/X9F4 Working Group (WG) deals with standardization to reduce financial data security risk and vulnerability and they is developing ANSI X Biometrics Management and Security for the Financial Services Industry which
3 specifies the minimum security requirements for effective management of biometrics data for the financial services industry. BioAPI Consortium, non-governmental group, was formed to develop a widely available and widely accepted API that will serve for various biometric technologies. The remarked standard works are CBEFF (Common Biometric Exchange File Format) defines a common set of data elements necessary to support multiple biometric technologies and BioAPI V1.1, developed by BioAPI Consortium, defines an open system standard API that allows software applications to communicate with a broad range of biometric technologies in a common way. 2.2 International Standardization Organization ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) form the specialized system for worldwide standardization. National Bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. For standardization in the field of Information Technology, ISO and IEC have established a Joint Technical Committee 1: ISO/IEC JTC 1 on Information Technology whose missions are develop, maintain, promote and facilitate IT standards required by global markets meeting business and user requirements concerning. In this time, there are total 17 subcommittees and SC17, SC27 and SC37 are a close relationship with biometrics. Moreover, SC29- WG11, described in detail afterward, is the only group that has been achieved the standard template on face recognition. (1) ISO/IEC JTC1/SC17 has responsibility for developing standards for identification cards and personal identification. WG (Working Group) 10, motor vehicle driver license and related documents, has been arguing on standards based on biometric information and recently WG11 is organized for biometric standard work in cards. (2) ISO/IEC JTC1/SC27 has been related to standardization of generic methods and techniques for IT Security. The works are biometric data protections techniques, biometric security testing, evaluations, and evaluations methodologies. They has been standardizing on Protection Profile (PP) with Biometrics and Biometrics Evaluation Methodology (BEM). (3) ISO/IEC JTC1/SC37 In June 2002, JTC 1 established a new Subcommittee 37 on Biometrics. The goal of this new JTC 1 SC is to ensure a high priority, focused, and comprehensive approach worldwide for the rapid development and approval of formal international biometric standards. These standards are necessary to support the rapid deployment of significantly better, open systems standard-based security solutions for purposes such as homeland defense and the prevention of ID theft. The scope of SC37 is the standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems. Generic human biometric standards include: common file frameworks; biometric application programming interfaces; biometric data interchange formats; related biometric profiles; application of evaluation criteria to bio-
4 metric technologies; methodologies for performance testing and reporting and cross jurisdictional and societal aspects. Several fields of SC17, SC27, and SC37 overlap each other in some places and so they have been briskly collaborating in the biometric standard works. SC37 consists of total 6 Working Groups and each mission is as follows; WG1 - Harmonized Biometric Vocabulary, WG2 - Biometric Technical Interfaces, WG3 - Biometric Data Interchange Formats, WG4 - Biometric Functional Architecture and Related Profiles, WG5 - Biometric Testing and Reporting, and WG6 - Cross-Jurisdictional and Societal Aspects. WG3 especially considers the standardization of the content, meaning and representation of biometric data formats which are specific to a particular biometric technology and has been working to ensure a common look and feel for Biometric Data Structure standards, with notation and transfer formats that provide platform independence and separation of transfer syntax from content definition. Such being the case, we are interest in the standard work of WG3 as a scope of face recognition technology. In this time the common format of face picture is a raw image by itself but we can add more the standard format such as the template extracted by face recognition algorithm with a compact size and high performance. In this point, the MPEG-7 Advanced Face Recognition descriptor has been considering now. 3 ISO/IEC JTC1/SC29 WG11 - The Moving Picture Experts Group (MPEG) 3.1 Outline of MPEG The Moving Picture Experts Group (MPEG) [5] is a Working Group (WG11) of ISO/IEC JTC1/SC29 in charge of the development of standards for coded representation of digital audio and video. MPEG-7, the Committee Draft (CD) of the Multimedia Content Description Interface, was issued at the October meeting in This MPEG-7 CD provides a rich source of core technologies which allow the description of audio-visual data content in multimedia environments. During the development of MPEG-7 it was realized that face recognition would be a vital part of the MPEG-7 standard and provide many important functionalities. For this reason it was decided to investigate the extension of the existing face recognition technology in the MPEG-7 CD. 3.2 Objectives of MPEG-7 Face Descriptor There are many applications in which it is desirable to automatically identify a person with MPEG-7 Face Descriptor (FD). Some example applications are: (1) automatic login control by matching an image taken from a built-in camera with a database of users who have authorized access to a computer, (2) using an image taken from a surveillance camera to find any possible matches in a database of known criminals,
5 (3) automatic generation of metadata for creation of personal media libraries, and (4) automatic summarization of video clips based on the identity of the people in the scene. There are also many applications of search and retrieval by face; for example using a frame of a movie which contains a particular actor to locate all other scenes in the movie which contain this same actor. These applications usually involve three stages: location of the face region in the query image, extraction of the face descriptor from the located region and matching the descriptor extracted from the query image with face descriptors present in a database. To determine which method coincides with objectives of face descriptor, participants should submit the document of Core Experiments (CE) at each MPEG meeting. The objectives of CE are (1) to evaluate the retrieval performance of the proposed face descriptors, (2) to evaluate the identification performance of the proposed face descriptors, (3) to evaluate size and computational complexity of the proposed technology (both extraction and matching), (4) to provide cross verification of all results. Thus we should develop a face descriptor with a balance of performance and complexity. 3.3 MPEG-7 Face Descriptor versions 1.0 In the beginning, the 2nd-order eigenfaces [6] is standardized as MPEG-7 FD version 1.0 in The effective features are extracted by 2nd-order eigenface. Selecting different eigen sets made from a residual image, the method can be used for viewangle-invariant and lighting-invariant face description. The 2nd-order eigenfeatures are effective in describing high-passed face image and the 1st-order eigenfeatures are useful in describing the low-passed image. Considering the computing order, the method has the same computational complexity compared with the regular eigenface method [7]. The database is the important fact in face recognition because the performance of face recognition depends on the constitution of the database. In experiments of the 2nd-order eigenface, 1,355 face images of 271 persons are used to examine the performance of lighting-invariant and view-angle-invariant face description. The images are selected from AR (Purdue), AT&T, Yale, UMIST, University of Berne, and some face images obtained from the MPEG-7 news videos. The database is divided into two sections in conformity with CE conditions: One section is to be used for training and the other section is to be used for evaluating the retrieval performance of the algorithms. As a measure of retrieval performance and identification performance, we use ANMRR [8] (Average Normalized Modified Retrieval Rate) and ASR [9] (Average Success Rate), respectively. ANMRR is 0 when all ground truth images are ranked on top, and it is 1 when all ground images are ranked out of the first m images.
6 Fig. 1. Increasing ratios (a) of recognition accuracy and (b) of feature extraction complexity for one year 3.4 MPEG-7 Advanced Face Recognition Descriptor After promotion of MPEG-7 FD version 1.0, MPEG-7 visual group held new CE competition to set up the new FD because the 2nd-order eigenface has not shown the good performance in the extended database. MPEG-7 visual group enlarged the number of face images from 1,355 to 11,845 - it consists of five databases: the extended version 1 MPEG-7 face database, Altkom database, MPEG-7 test set in XM2VTS database, FERET database, and MPEG-7 test set in the BANCA database and also made 8 experimental scenarios - one for Face retrieval, seven for Person Identification. In total, 32 experiments should be performed, which means 8 scenarios (1 Face Image Retrieval+7 Person Identification)*2 training and testing definitions (1:1 and 1:4)*2 clipping sets (manual/automatic eyes detection). Therefore, the condition of new CE is more strict and complex than that of old CE. For one year, 14 or more face recognition algorithms, ex., PCA, ICA, LDA, GDA, NDA and HMM 1, were competed with the extended database and experiments. The performances of new FDs were increased by stages at each MPEG meeting as shown in Fig The reference book on the basic descriptions of recognition algorithms is Pattern Classification written by Duda and etc (John Wiley&Sons).
7 Fig. 2. Extraction of CompositeFeature and CentralCompositeFeature in MPEG-7 AFR. In 2004 we successfully promoted our face recognition algorithm to International Standardization [13] and the recursive matching scheme [10] were also achieved as informative part [11]. The new standardized MPEG-7 Advanced Face Recognition descriptor (AFR) [12] is using Fourier and Intensity LDA features. The descriptor consists of two major parts as shown in Fig. 2; (a) Fourier features of a facial image, (b) extended component features which are enhanced by merging the Fourier features with pose-compensated image intensity features. Twenty four elements of each Fourier feature are mandatory to extract for keeping interoperability in guaranteeing the minimum accuracy at low computational complexity and small memory consumption.
8 The extended features are also defined to achieve the maximum accuracy under unlimited condition of computational complexity and memory consumption. Fig. 3 shows dependency on the number of feature elements to determine the optimal number of each feature. Fig. 3. Dependency on the number of the feature elements in MPEG-7 AFR. 3.5 The Current Issues between SC29 and SC37 on MPEG-7 Advanced Face Recognition Descriptor The MPEG-7 AFR works is a process of defining facial descriptors for searching multimedia contents, but it is not exactly intended to be used for matching and access control as high security. The SC37 biometrics standard work has converged upon a vendor independent face image representation. Because the SC37 group agreed that there does not exist a mature template representation that can be used, in a globally interoperable manner, with the security/access application profiles being developed by ISO and IEC. As a result, the face image format allows for virtually any photo of a face to be captured and stored. And furthermore, the photo image is specific to the frontal face with high quality and under restricted environments [14]. SC37 was not in existence when SC29 began its face recognition work. However, the face recognition work performed by SC29 does clearly fall into the mandate of SC37 as a facial template defined for the purposes of biometric identification. After exchanging the liaison statements between SC29 and SC37, the cooperation has been achieved in July 2004 and we will hope to achieve fruitful results.
9 4 Conclusions This paper presents an introduction of international standardization organization related to biometrics and standard works for facial template, especially MPEG-7 Advanced Face Recognition. An indication of the current substantial growth and interest in biometrics is the emergence of biometrics industry standards and related activities. Standards, especially on face recognition, have become strategic business issues. For any given technology, industry standards assure the availability of multiple sources for comparable products and of competitive products in the marketplace. Standards will support the expansion of the marketplace for biometrics and it will awake many customers interesting in standard works on biometrics. References 1. Biometrics Deployment of Machine Readable Travel Documents, ICAO TAG MRTD/NTWG, May, W. Zhao, R. Chellapa, A. Rosenfeld, and P. Phillips, Face recognition: A literature survey, UMD CfAR Technical Report CAR-TR-948, P. J. Phillips, H. Moon, P. J. Rauss, and S. Rizvi, The FERET evaluation methodology for face recognition algo-rithms, IEEE Transactions on Pattern Analysis and Ma-chine Intelligence, Vol. 22, No. 10, Oct., Face Recognition Vendor Test, 5. R. Koenen, From MPEG-1 to MPEG-21: Creating an Interoperable Multimedia Infrastructure, ISO/IEC JTC1/SC29/WG11 N4518, Dec., L. Wang and T. K. Tan, Experimental results of face description based on the 2nd-order eigenface method, ISO/IEC JTC1/SC29/WG11 M6001, May, M. A. Turk and A. P. Pentland, Eigenfaces for recogni-tion, Journal of Cognitive Neuroscience, Vol. 3, No. 1, pp , B.S. Manjunath, P. Salembier, and T. Sikora, Introduc-tion to MPEG-7: Multimedia Content Description Inter-face, John Wiley & Sons Ltd., M. Bober, Description of MPEG-7 Visual Core Experi-ments, ISO/IEC JTC1/SC29/WG11 N5166, Oct., H. Kim, T. Kim, W. Hwang, S. Kee, "A Recursive Match-ing Method for Content-based Image Retrieval," WIAMIS2004, Portugal, Apr, A. Yamada and L. Cieplinski, MPEG-7 Visual part of experimentation Model Version 18.0, ISO/IEC JTC1/SC29/WG11 N5552, Mar., T. Kamei, A. Yamada, H. Kim, T. Kim, W. Hwang, S. Kee, Advanced Face Descriptor Using Fourier and Inten-sity LDA Features, ISO/IEC JTC1/SC29/WG11 M8998, Oct., L. Cieplinski and A. Yamada, Text of ISO/IEC /FPDAM1, ISO/IEC JTC1/SC29/WG11 N5695, Jul., Biometrics Data Interchange Formats Part 5: Face Image Data, ISO/IEC JTC1/SC37 N506, Mar., 2004.
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationBIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationM3039 MPEG 97/ January 1998
INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationISO 24745 - Biometric Template Protection
ISO 24745 - Biometric Template Protection Hochschule Darmstadt / Gjøvik University College / Fraunhofer IGD IBPC 2010 -Satellite Workshop II NIST March 5, 2010 PET for the Protection of Biometric data
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationBiometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationWorking Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques
Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques Joint Workshop of ISO/IEC JTC 1/SC 27/WG 5, ITU-T SG17/Q.6, and FIDIS on Identity Management
More informationDescription of Biometric Data Interchange Format Standards
Description of Biometric Data Interchange Format Standards INCITS M1 Technical Editors: Creed Jones, Colin Soutar, Jim Cambier, Michael McCabe, Paul Griffin, Rod Beatson, Samir Tamer 1 Introduction International
More informationDevelopment of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver
, pp.161-165 http://dx.doi.org/10.14257/astl.205.98.41 Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver Jeong MyeongSu 1, Moon ChangSoo 1, Gwon DaeHyeok 1 and Cho
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationSmart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
More informationInternational Software & Systems Engineering. Standards. Jim Moore The MITRE Corporation Chair, US TAG to ISO/IEC JTC1/SC7 James.W.Moore@ieee.
This presentation represents the opinion of the author and does not present positions of The MITRE Corporation or of the U.S. Department of Defense. Prepared for the 4th Annual PSM Users Group Conference
More informationBiSPI Conformance Testing
Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt
More informationBig Data Systems and Interoperability
Big Data Systems and Interoperability Emerging Standards for Systems Engineering David Boyd VP, Data Solutions Email: dboyd@incadencecorp.com Topics Shameless plugs and denials What is Big Data and Why
More informationStandardization Requirements Analysis on Big Data in Public Sector based on Potential Business Models
, pp. 165-172 http://dx.doi.org/10.14257/ijseia.2014.8.11.15 Standardization Requirements Analysis on Big Data in Public Sector based on Potential Business Models Suwook Ha 1, Seungyun Lee 2 and Kangchan
More informationConformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
More informationBiometrics for public sector applications
Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:
More informationUnderstanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
More informationDe Nieuwe Code voor Informatiebeveiliging
De Nieuwe Code voor Informatiebeveiliging Piet Donga, ING Voorzitter NEN NC 27 - IT Security 1 Agenda Standardisation of Information security The new Code of Practice for Information Security The Code
More informationInformation and documentation The Dublin Core metadata element set
ISO TC 46/SC 4 N515 Date: 2003-02-26 ISO 15836:2003(E) ISO TC 46/SC 4 Secretariat: ANSI Information and documentation The Dublin Core metadata element set Information et documentation Éléments fondamentaux
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 27033-1 Second edition 2015-08-15 Information technology Security techniques Network security Part 1: Overview and concepts Technologies de l information Techniques de sécurité
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationMART-MAF: Media file format for AR tour guide service
MART-MAF: Media file format for AR tour guide service The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationIs the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013
Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013 Rod Beatson President, Transaction Security, Inc. Rod.Beatson@crypto-sign.com
More informationSAM Standards: A Review of ISO 19770-1 1 and 2
SAM Standards: A Review of ISO 19770-1 1 and 2 David Déry Agenda SAM problems Looking for guidance ISO: the organization ISO: the SAM initiative ISO: The outcome: ISO/IEC 19770-1 and 19770-2 Conclusion
More informationKEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
More informationPart 1: Overview of Biometric Technology and Verification Systems
Part 1: Overview of Biometric Technology and Verification Systems What Is Biometrics? 1 Once a tool primarily used by law enforcement, biometric technologies increasingly are being used by government
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationISO/IEC/IEEE 29119 The New International Software Testing Standards
ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationOVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL
OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL Frédéric Dufaux, Michael Ansorge, and Touradj Ebrahimi Institut de Traitement des Signaux Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationStandards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
More informationSecurely Connecting the World with Cyber Security Standards
Securely Connecting the World with Cyber Security Standards by Alicia Clay and Michael D. Hogan National Institute of Standards and Technology 1 Introduction "Over the course of a few years, a new communications
More informationImplementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT
ISO/IEC Information & ICT Security and Governance Standards in practice Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT June 4, 2009 ISO and IEC ISO (the International Organization for Standardization)
More informationAn Efficient Knowledge Base Management Scheme for Context Aware Surveillance
An Efficient Knowledge Base Management Scheme for Context Aware Surveillance Soomi Yang Department of Information Security, The University of Suwon, San 2-2, Wau-ri, Bongdam-eup, Hwangseong-si, Gyeonggi-do,
More informationBiometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry ruchirchoudhry@cint.co.in; Abstract. J2EE based Web applications have largely spread over our multiple
More informationThis is a preview - click here to buy the full publication TECHNICAL REPORT INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL
TECHNICAL REPORT ISO/IEC TR 15067-4 First edition 2001-06 INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL Part 4: Security system for HES ISO/IEC 2001 All rights reserved. Unless
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationUsing Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
More informationReviewers of proposed revision to ISO/IEC 19770 1:2006 SAM Processes. Call for feedback on draft of revised 19770 1 Tiered SAM Processes
To: From: Reviewers of proposed revision to ISO/IEC 19770 1:2006 SAM ISO/IEC JTC1 SC7 WG21 Software Date: 30 November 2010 Re: Call for feedback on draft of revised 19770 1 ed SAM On 30 November 2010,
More informationINTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG1 CODING OF STILL PICTURES
INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1//WG1 CODING OF STILL PICTURES TITLE: Meeting Report, 50 th Meeting of ISO/IEC JTC 1/SC 29/WG 1 2009-10-26
More informationBiometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationGood Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More information3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company
3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has
More informationDynamic Adaptive Streaming over HTTP Design Principles and Standards
DASH Dynamic Adaptive Streaming over HTTP Design Principles and Standards Thomas Stockhammer, Qualcomm 2 3 User Frustration in Internet Video Video not accessible Behind a firewall Plugin not available
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationUNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
More informationASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA
International Civil Aviation Organization WORKING PAPER A38-WP/273 9/9/13 (Information paper) English only Agenda Item 13: Aviation Security Policy ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE
More informationA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution Christian Timmerer 1, Michael Eberhard 1, Michael Grafl 1, Keith Mitchell 2, Sam Dutton 3, and Hermann Hellwagner 1 1 Klagenfurt University, Multimedia
More information1 Building a metadata schema where to start 1
1 Building a metadata schema where to start 1 1.1 Introduction Purpose Metadata has been defined as data describing the context, content and structure of records and their management through time 2. It
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationUser Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
More informationXML for Manufacturing Systems Integration
Information Technology for Engineering & Manufacturing XML for Manufacturing Systems Integration Tom Rhodes Information Technology Laboratory Overview of presentation Introductory material on XML NIST
More informationApplication-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
More informationPROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationEvidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 14662 First edition Information Technologies - Open-edi reference model Technologie de l'information - Modèle de référence EDI-ouvert Reference number Page 2 Contents Foreword...
More informationCloud computing based big data ecosystem and requirements
Cloud computing based big data ecosystem and requirements Yongshun Cai ( 蔡 永 顺 ) Associate Rapporteur of ITU T SG13 Q17 China Telecom Dong Wang ( 王 东 ) Rapporteur of ITU T SG13 Q18 ZTE Corporation Agenda
More informationOnline Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers
Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information
More informationFace Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
More informationStatistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results
Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results Kresimir Delac 1, Mislav Grgic 2 and Sonja Grgic 2 1 Croatian Telecom, Savska 32, Zagreb, Croatia,
More informationHow To Understand The Concept Of A Modern Telecom
Metadata requirements in telecommunications cloud computing 15th International Open Forum on Metadata Ewelina Szczekocka, Telekomunikacja Polska Telecommunication in the past and now Past Voice fixed line
More informationIdentity Verification Program Guide
Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system
More informationModular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
More informationAdvances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
More informationISO/IEC JTC 1 Information technology. Business plan 2014
Information technology Business plan 2014 Our vision To be the world s leading provider of high quality, globally relevant International Standards through its members and stakeholders. Our mission ISO
More informationReal Time Vehicle Theft Identity and Control System Based on ARM 9
Real Time Vehicle Theft Identity and Control System Based on ARM 9 D.Narendar Singh Associate Professor, M.tech,Ph.d Department of Electronics and Communication Engineering Anurag group of Institutions,
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More information