An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jack Chuang, Raied Caromi, Jelena Senic, Samuel Berweger, Neeraj Varshney, Jian Wang, Anuraag Bodi, Camillo Gentile, Nada Golmie
We describe a quasi-determinstic channel propagation model for human gesture recognition reduced from real-time measurements with our context aware channel sounder, considering four human subjects and 20 distinct body motions, for a total of 120,000
Shahram Orandi, Kenneth Ko, John M. Libert, Craig I. Watson
This study examines quality related issues for seemingly high-quality fingerprint submissions in an operational setting that were resulting in submission failures and determined that the predominant root cause of most failures were improper packaging of
Shahram Orandi, Craig I. Watson, Jennifer Stathakis, John M. Libert, Gregory Fiumara, John Grantham
While contactless fingerprint capture devices stand to provide for many benefits, images from this nascent technology are sufficiently different than traditional contact-collected images thereby warranting the separation of these new contactless
Jihoon Bang, Jack Chuang, Jelena Senic, Samuel Berweger, Steve Blandino, Camillo Gentile
Monitoring vital signs such as breathing or heart rates as well as other physical movements in complex environments is the basis for many emerging applications spanning from healthcare to autonomous vehicles. Designing Radar systems capable of remotely
This document describes a new approach to localizing the iris boundaries in non-ideal iris images. The proposed algorithm starts by applying a series of morphological operations to enhance the salience of the iris boundaries while mitigating the impact of
This report quantifies the accuracy of passive purely software-based face presentation attack detection (PAD) algorithms operating on conventional 2D imagery of various presentation attack instruments (PAI). The algorithms were submitted to the
John M. Libert, Shahram Orandi, John Grantham, Kenneth Ko, Bruce Bandini
A new generation of contactless fingerprint capture devices has recently emerged. These devices provide the ability to capture a fingerprint without making physical contact with the finger. There is anecdotal evidence that the process of capturing a
Jim Filliben has inspired many scientists in a variety of domains across the National Institute of Standard and Technology (NIST) with his statistical data analysis. In our talk we will highlight the impact of his insights and methodologies on our projects
John M. Libert, Shahram Orandi, Kenneth Ko, Bruce Bandini, John Grantham, Craig I. Watson
Nascent technologies show promise in collecting 500 ppi fingerprints in a contactless fashion while yielding various improvements in the collection process over legacy contact collection methods currently in use throughout the world. While it has been
Shahram Orandi, John M. Libert, John Grantham, Kenneth Ko, Bruce Bandini, Craig I. Watson
This specification builds upon the protocols and metrics established in NIST Special Publication 500-336 and defines procedures for the evaluation and certification of contactless fingerprint acquisition devices with respect to certified legacy contact
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how
Melissa Taylor, William Chapman, R. Austin Hicklin
This document is designed to help researchers in the United States navigate and comply with requirements and best practices for human subjects research, with specific emphasis on biometric and forensic research. The purpose of this document is to summarize
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic
Yooyoung Lee, Craig Greenberg, Lisa Mason, Elliot Singer
The 2022 NIST language recognition evaluation (LRE22) is the 9th cycle in an on-going language recognition evaluation series that began in 1996. The objectives of the evaluation series are (1) to advance technologies in language recognition with innovative
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and methods to aid in detecting morphs. Expanding on concepts introduced in a study conducted by
John Daugman correctly summarized the state of forensic iris recognition circa 2006 for the book Forensic Human Identification: an Introduction [1]: Iris recognition has limited forensic value, because (unlike fingerprints or DNA, for example) (1) iris
John M. Libert, Shahram Orandi, Bruce Bandini, Kenneth Ko, Craig I. Watson, Christopher Stafford, Matthew E. Staymates, John Grantham
This guidance specifies a protocol and associated metrics for the evaluation of contactless fingerprint acquisition device, and their interoperability with legacy devices. This protocol enables contactless fingerprint developers seeking certification of
Gregory Fiumara, Matthew Schwarz, Jessica Heising, Jennifer Peterson, Patricia A. Flanagan, Karen Marshall
The National Institute of Standards and Technology (NIST) released a collection of latent fingerprint images as part of Special Database (SD) 302 in December 2019. While the dataset included 10 000 never-before-seen operational quality images from 200
Shahram Orandi, John M. Libert, Bruce Bandini, Kenneth Ko, John Grantham, Brian J. Cochran, Craig I. Watson
Observations in previous studies have shown that contactless capture devices may be prone to capturing superfluous data (e.g., fingernail or finger background), distortion and imaging artifacts especially around the periphery of the captured fingerprint
Voice has become woven into the fabric of everyday human-computer interactions via ubiquitous assistants like Siri, Alexa, Google, Bixby, Viv, etc. The use of voice will only accelerate as speech interfaces move to wearables \citestarner2002role}, vehicles
George W. Quinn, James Matey, Patrick J. Grother, Edward Watters
In most current applications of iris recognition, matching is done by computer algorithms. The dominant algorithms are based on the work of John Daugman and are well understood because of the extensive analysis in the literature of iris2pi (the shorthand
Patrick J. Grother, Austin Hom, Mei Lee Ngan, Kayee Hanaoka
One-to-many biometric search systems are discussed in their role of positive and negative identification - the former refers to the expectation that person in a probe sample is present in the database (as in access to an office) while the latter presumes