Defining AFIS Latent Print Lights-Out



Similar documents
SWGFAST. Defining Level Three Detail

High Resolution Fingerprint Matching Using Level 3 Features

Implications of the IDENT/IAFIS Image Quality Study for Visa Fingerprint Processing

Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)

Guidelines concerning Fingerprint Transmission

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance

Product Testing Programs

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Department of Homeland Security

Evidence Technician s School

Data Domain Profiling and Data Masking for Hadoop

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

Examples of Large Scale Biometrics Systems:

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Needs & Applications of Latents at FBI/CJIS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

WebCenter Forms Recognition Learn Sets to the Rescue! August 14, 2014

PRIME IDENTITY MANAGEMENT CORE

INTELLIGENT DEFECT ANALYSIS SOFTWARE

Building A Smart Academic Advising System Using Association Rule Mining

case asset management database software electronic case notes

Conformance test specification for BSI-TR Biometrics for public sector applications

Development of Attendance Management System using Biometrics.

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

case image management database software electronic case notes

A Buyer's Guide to Data Loss Protection Solutions

NIST Special Publication

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Livescan cards, when received, apply electronically to the DCI & FBI records

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

KUMC Spam Firewall: Barracuda Instructions

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

From Chaos to Clarity: Embedding Security into the SDLC

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN SERVICE

PANDA CLOUD PROTECTION User Manual 1

Personal National Identification System National Population Registry Mexico

Our mission is to develop and to offer innovative customer interaction.

PAPER GENERAL. Itiel E. Dror, 1,2 Ph.D.; Kasey Wertheim, 3 M.B.A.; Peter Fraser-Mackenzie, 2,4 Ph.D.; and Jeff Walajtys, 3 B.A.

CHRI User s Manual Criminal History Record Information

Auditing Applications. ISACA Seminar: February 10, 2012

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)

Laterally Reversed Fingerprints Detected in Fake Documents

Salesforce Certified Pardot Consultant Study Guide

Identification of File Integrity Requirement through Severity Analysis

UniFinger Engine SDK Manual (sample) Version 3.0.0

IT2404 Systems Analysis and Design (Compulsory)

ScreenMatch: Providing Context to Software Translators by Displaying Screenshots

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

: RSA 050-V60X-CSEDLPS. : CSE RSA Data Loss Prevention 6.0. Version : R6.1

Questions to Ask When Selecting Your Customer Data Platform

Format OCR ICR. ID Protect From Vanguard Systems, Inc.

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Qualys PC/SCAP Auditor

Procedure for obtaining Biometric Device Certification (Authentication)

A responsive Fingerprint Matching system for a scalable functional agent

Wireless Fingerprint Based Attendance System Using Zigbee Technology

Deposit Identification Utility and Visualization Tool

Oracle Fusion Middleware

An Introduction to Transparent Records Management

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

H11S 04 (CFACC9) Use systems and technology during customer contact in a contact centre

Changes in Schengen visa application process

The Power of Classifying in SharePoint 2010

MegaMatcher Case Study

County of Monterey DISTRICT ATTORNEY INVESTIGATOR I

ELO for SharePoint. More functionality for greater effectiveness. ELO ECM for Microsoft SharePoint 2013

Salesforce Certified Marketing Cloud Specialist Study Guide

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

Novo Mail

AiM User Guide Work Management Module

Under Real Spoofing Attacks

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Spectrum Technology Platform. Version 9.0. Administration Guide

The software can be downloaded from the Spiceworks web site at:

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Teacher Assessment Blueprint. Criminal Justice. Test Code: 5269 / Version: 01. Copyright 2010 NOCTI. All Rights Reserved.

1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?

Best Practices for... "Setting up notifications for alerts"

Transcription:

NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC

AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint capture and transmitted electronically to AFIS 10-Print Operations Central site receives and processes 10-print record with no human intervention; AFIS classifies, filters repository, extracts minutiae and performs search. Automatic Hit/No Hit decision. Record is updated or created. Notification of results is returned to submitting agency Arrest record is available upon request. Booking Officer and 10-print Examiner testify 10-print examiner reviews record, compares all fingerprints, verifies as being same person. Prepares report. Testifies in. Adherence to ANSI/NIST ITL 1-2007 standard Request for records testimony

NIST ELFT Phase II Report Section 1.1, AFIS and Automated Feature Extraction and Matching It is important to distinguish AFEM-based latent fingerprint identification from the general concept of lights-out identification. Lights-out identification refers to a system requiring minimal or zero human assistance in which an image is presented as input, and the output consists of a short candidate list. For ten-print search applications, this list may be: 1) empty, 2) contain a single candidate, or rarely 3) have more than one candidate. Event (3) will occur only in cases when the matcher produces more than one candidate with a significant computed probability of being a true mate. Lights-out matchers are currently in operation for rolled fingerprint search systems, and are emerging for plain impressions. Latent fingerprints are much more difficult, and no lights-out matchers are currently in operational service. Furthermore, the ELFT07 Concept of Operations (CONOPS) asserts that a fully lights-out latent fingerprint matching capability represents too large of a single step from current practices.

AFIS - latent print is searched using LPE s designated criteria against database and a candidate list is generated. LPE enters AFIS search criteria; orientation, image enhancement, filtering, and minutiae. (LPE) performs exam of all evidence, analyzes all latent prints, and decides which latent prints are to be AFIS searched. LPE receives AFIS candidate list and makes comparisons. by a second LPE.

features ( lights-out ) and search is performed latent prints. CSI is trained on how to scan and launch latent prints for AFIS search. AFIS predefined threshold score determines identification decision; no LPE involved ( lights-out ) CSI is not trained on latent print orientation, image enhancement, finger position determination, fingerprint classification, etc. by a second and different AFIS matcher in a 1:1 mode; no LPE involved ( lights-out )

minutiae and search is performed in all rotations and against entire data base.. latent prints. CSI is trained on how to scan and launch latent prints for AFIS search. Latent print expert (LPE) receives AFIS candidate list and makes comparisons. CSI is not trained on latent print orientation, image enhancement, finger position determination, fingerprint classification, etc. by a second LPE.

minutiae and search is performed using LPE s designated orientation, image enhancement, and filtering. (LPE) performs analysis of all latent prints and submits AFIS searches in proper orientation, image enhanced, using search filters but uses automatic minutiae extraction. LPE receives AFIS candidate list and makes comparisons. by a second LPE.

minutiae and search is performed in all rotations and against entire data base. (LPE) performs analysis of all latent prints and submits AFIS searches without regard to proper orientation, no image enhancement, does not use filtering and uses automatic minutiae extraction. Latent print expert (LPE) receives AFIS candidate list and makes comparisons. by a second LPE.

minutiae ( lights-out ) and search is performed using LPE s designated orientation, image enhancement, and filtering. (LPE) performs analysis of all latent prints and submits AFIS searches in proper orientation, image enhanced, using search filters but uses automatic minutiae extraction. AFIS predefined threshold score determines identification decision; no LPE involved ( lights-out ) by an LPE.

minutiae ( lights-out ) and search is performed using LPE s designated orientation, image enhancement, and filtering. (LPE) performs analysis of all latent prints and submits AFIS searches in proper orientation, image enhanced, using search filters but uses automatic minutiae extraction. LPE receives AFIS candidate list and makes comparisons and identification decision. by a second and different AFIS matcher in a 1:1 mode; no LPE involved ( lights-out )

minutiae ( lights-out ) and search is performed using LPE s designated orientation, image enhancement, and filtering. (LPE) performs analysis of all latent prints and submits AFIS searches in proper orientation, image enhanced, using search filters but uses automatic minutiae extraction. AFIS predefined threshold score determines identification decision; no LPE involved ( lights-out ) by a second and different AFIS matcher in a 1:1 mode; no LPE involved ( lights-out )

Which scenario is the ELFT Phase II test?

minutiae and search is performed using LPE s designated orientation, image enhancement, and filtering. (LPE) performs analysis of all latent prints and submits AFIS searches in proper orientation, image enhanced, using search filters but uses automatic minutiae extraction. LPE receives AFIS candidate list and makes comparisons. by a second LPE.

minutiae and search is performed in all rotations and against entire data base. (LPE) performs analysis of all latent prints and submits AFIS searches without regard to proper orientation, no image enhancement, does not use filtering and uses automatic minutiae extraction. Latent print expert (LPE) receives AFIS candidate list and makes comparisons. by a second LPE.

What is the demand for each scenario? Where is the market now? Future? What needs to be tested next?