NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Compact face photographs, stored and digitally signed in 2D barcodes, form a low-cost tamper-resistant identity credential. The cryptographic signature allows binding of the 2D barcode to the issuer, and bio- metric authentication binds a live photograph
Seungmin Seo, Oleg Aulov, Afzal Godil, Kevin Mangold
Speaker de-identification aims to conceal a speaker's identity while preserving intelligibility of the underlying speech. We introduce a benchmark that quantifies residual identity leak- age with three complementary error rates: equal error rate (EER)
Morphing of face photographs present a threat to identity processes; for example, two people being able to use one passport. The threat exists in applications that allow users to submit their own photos where digital history is unknown. The threat can be
Jack Chuang, Raied Caromi, Jelena Senic, Samuel Berweger, Neeraj Varshney, Jian Wang, Anuraag Bodi, Camillo Gentile, Nada Golmie
We describe a quasi-determinstic channel propagation model for human gesture recognition reduced from real-time measurements with our context aware channel sounder, considering four human subjects and 20 distinct body motions, for a total of 120,000
Shahram Orandi, Kenneth Ko, John M. Libert, Craig I. Watson
This study examines quality related issues for seemingly high-quality fingerprint submissions in an operational setting that were resulting in submission failures and determined that the predominant root cause of most failures were improper packaging of
Shahram Orandi, Craig I. Watson, Jennifer Stathakis, John M. Libert, Gregory Fiumara, John Grantham
While contactless fingerprint capture devices stand to provide for many benefits, images from this nascent technology are sufficiently different than traditional contact-collected images thereby warranting the separation of these new contactless
Jihoon Bang, Jack Chuang, Jelena Senic, Samuel Berweger, Steve Blandino, Camillo Gentile
Monitoring vital signs such as breathing or heart rates as well as other physical movements in complex environments is the basis for many emerging applications spanning from healthcare to autonomous vehicles. Designing Radar systems capable of remotely
This document describes a new approach to localizing the iris boundaries in non-ideal iris images. The proposed algorithm starts by applying a series of morphological operations to enhance the salience of the iris boundaries while mitigating the impact of
This report quantifies the accuracy of passive purely software-based face presentation attack detection (PAD) algorithms operating on conventional 2D imagery of various presentation attack instruments (PAI). The algorithms were submitted to the
John M. Libert, Shahram Orandi, John Grantham, Kenneth Ko, Bruce Bandini
A new generation of contactless fingerprint capture devices has recently emerged. These devices provide the ability to capture a fingerprint without making physical contact with the finger. There is anecdotal evidence that the process of capturing a
Jim Filliben has inspired many scientists in a variety of domains across the National Institute of Standard and Technology (NIST) with his statistical data analysis. In our talk we will highlight the impact of his insights and methodologies on our projects
John M. Libert, Shahram Orandi, Kenneth Ko, Bruce Bandini, John Grantham, Craig I. Watson
Nascent technologies show promise in collecting 500 ppi fingerprints in a contactless fashion while yielding various improvements in the collection process over legacy contact collection methods currently in use throughout the world. While it has been
Shahram Orandi, John M. Libert, John Grantham, Kenneth Ko, Bruce Bandini, Craig I. Watson
This specification builds upon the protocols and metrics established in NIST Special Publication 500-336 and defines procedures for the evaluation and certification of contactless fingerprint acquisition devices with respect to certified legacy contact
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how
Melissa Taylor, William Chapman, R. Austin Hicklin
This document is designed to help researchers in the United States navigate and comply with requirements and best practices for human subjects research, with specific emphasis on biometric and forensic research. The purpose of this document is to summarize
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic
Yooyoung Lee, Craig Greenberg, Lisa Mason, Elliot Singer
The 2022 NIST language recognition evaluation (LRE22) is the 9th cycle in an on-going language recognition evaluation series that began in 1996. The objectives of the evaluation series are (1) to advance technologies in language recognition with innovative
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and methods to aid in detecting morphs. Expanding on concepts introduced in a study conducted by
John Daugman correctly summarized the state of forensic iris recognition circa 2006 for the book Forensic Human Identification: an Introduction [1]: Iris recognition has limited forensic value, because (unlike fingerprints or DNA, for example) (1) iris
John M. Libert, Shahram Orandi, Bruce Bandini, Kenneth Ko, Craig I. Watson, Christopher Stafford, Matthew E. Staymates, John Grantham
This guidance specifies a protocol and associated metrics for the evaluation of contactless fingerprint acquisition device, and their interoperability with legacy devices. This protocol enables contactless fingerprint developers seeking certification of
Gregory Fiumara, Matthew Schwarz, Jessica Heising, Jennifer Peterson, Patricia A. Flanagan, Karen Marshall
The National Institute of Standards and Technology (NIST) released a collection of latent fingerprint images as part of Special Database (SD) 302 in December 2019. While the dataset included 10 000 never-before-seen operational quality images from 200
Shahram Orandi, John M. Libert, Bruce Bandini, Kenneth Ko, John Grantham, Brian J. Cochran, Craig I. Watson
Observations in previous studies have shown that contactless capture devices may be prone to capturing superfluous data (e.g., fingernail or finger background), distortion and imaging artifacts especially around the periphery of the captured fingerprint