Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 276 - 300 of 412

Usability and Biometrics: Ensuring Successful Biometric Systems

June 11, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Cari Wolfson
The National Institute of Standards and Technology (NIST)Visualization and Usability Gropu initiated a Usability and Biometrics effort to focus on the users and human factors of biometric systems. The goal of this effort has been to conduct research to

Subspace Linear Discriminant Analysis for Face Recognition

June 10, 2008
Author(s)
W Zhao, R Chellappa, P. Jonathon Phillips
In this correspondence, we describe a holistic face recognition method based on subspace Linear Discriminant Analysis (LDA). Like existing methods, this method consists of two steps: first, the face image is projected into a face subspace via Principal

Usability Testing of Height and Angles of Ten-Print Fingerprint Capture

May 11, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John W. Wydler II, Nien F. Zhang, Lawrence Nadel, William Rubin
As the deployment of biometric technologies such as fingerprints has become more widespread in government applications there is an increased awareness of the human-computer interaction that such technologies involve. User behavior can impact operational

Infrastructure System Design Methodology for Smart ID Cards Deployment

April 19, 2008
Author(s)
Ramaswamy Chandramouli
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system

Overcoming Impediments to Cell Phone Forensics

January 16, 2008
Author(s)
Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operation are quite different in certain areas. For example, most cell phones do not

Latent Fingerprint Performance Modeling

January 14, 2008
Author(s)
Vladimir N. Dvornychenko
This paper describes aspects of work done at NIST, in concert with the latent fingerprint community, toward achieving a partial lights-out latent fingerprint processing capability. The initial steps are to quantify performance over a cross-section of

Smart Cards for Mobile Devices

December 3, 2007
Author(s)
Wayne Jansen, Serban I. Gavrila, Clement Seveillac
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorised use and access to a device¿s contents. This paper describes two novel types of Smart Card (SC)

Secure Biometric Match-on-Card Feasibility Report

November 30, 2007
Author(s)
David A. Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into a

Reference Material for Assessing Forensic SIM Tools

October 1, 2007
Author(s)
Wayne Jansen, Aurelien M. Delaitre
Subscriber Identity Modules (SIMs) are a fundamental standardized component of most cell phones used worldwide. A SIM can be removed from a phone handset and inserted into another, allowing users to port identity, personal information, and service between

Meta-Analysis of Third-Party Evaluations of Iris Recognition

August 24, 2007
Author(s)
Elaine M. Newton, P J. Phillips
Iris recognition has long been widely regarded as a highly accurate biometric, despite the lack of independent, large-scale testing of its performance. Recently, however, three third-party evaluations of iris recognition were performed. This paper compares

Concepts of Operations (CONOPS) for the Evaluation of Latent Fingerprint Technologies (ELFT)

June 12, 2007
Author(s)
Vladimir N. Dvornychenko, Brian J. Cochran, Patrick J. Grother, Michael D. Indovina, Craig I. Watson
The National Institute of Standards and Technology (NIST) is conducting a series of tests for evaluating the state of the art in Automated Latent Fingerprint matching. The intent of the testing is to quantify the core algorithmic capability of contemporary

Performance of Biometric Quality Measures

April 16, 2007
Author(s)
Patrick Grother, Elham Tabassi
We document methods for the quantitative evaluation of systems that produce a scalar summary of a biometric sample¿s quality. We predicate this on the idea that the quality measure predicts performance, whether by design or correlation. We do this

Face Recognition Vendor Test 2006 and Iris Challenge Evaluation 2006 Large-Scale Results

March 29, 2007
Author(s)
P J. Phillips, K W. Bowyer, P J. Flynn, Alice J. O'Toole, W T. Scruggs, Cathy L. Schott, Matthew Sharpe
The Face Recognition Vendor Test (FRVT) 2006 and Iris Challenge Evaluation (ICE) 2006 are independent U.S. Government evaluations of face and iris recognition performance. These evaluations were conducted simultaneously at NIST using the same test

Comment on the CASIA v1 Iris Dataset

March 26, 2007
Author(s)
P J. Phillips, K W. Bowyer, P J. Flynn
The paper by Ma et al. [1] made a number of contributions to iris recognition including a novel iris recognition algorithm, a benchmark of standard approaches to iris recognition, and the establishment of an iris data set. The data set, Chinese Academy of

User's Guide to NIST Biometric Image Software (NBIS)

January 21, 2007
Author(s)
Kenneth Ko
This document (User's Guide to NIST Biometric Image Software (NBIS)) is renamed from the User's Guide to NIST Fingerprint Image Software (NFIS). In other word, this document is a replacement for the User's Guide to NIST Fingerprint Image software (NFIS)

A Taxonomy of Definitions for Usability Studies in Biometrics

November 27, 2006
Author(s)
Ross J. Micheals, Brian C. Stanton, Mary F. Theofanos, Shahram Orandi
Historically, usability research strives to focus on user behavior in a manner that is as system independent as possible. Although ¿ISO/IEC JTC 1/SC 37 Standing Document 2 ¿ Harmonized Biometric Vocabulary, Draft N1779¿ provides a foundation towards common
Was this page helpful?