An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology (NIST)Visualization and Usability Gropu initiated a Usability and Biometrics effort to focus on the users and human factors of biometric systems. The goal of this effort has been to conduct research to
In this correspondence, we describe a holistic face recognition method based on subspace Linear Discriminant Analysis (LDA). Like existing methods, this method consists of two steps: first, the face image is projected into a face subspace via Principal
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John W. Wydler II, Nien F. Zhang, Lawrence Nadel, William Rubin
As the deployment of biometric technologies such as fingerprints has become more widespread in government applications there is an increased awareness of the human-computer interaction that such technologies involve. User behavior can impact operational
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system
Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operation are quite different in certain areas. For example, most cell phones do not
This paper describes aspects of work done at NIST, in concert with the latent fingerprint community, toward achieving a partial lights-out latent fingerprint processing capability. The initial steps are to quantify performance over a cross-section of
Wayne Jansen, Serban I. Gavrila, Clement Seveillac
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorised use and access to a device¿s contents. This paper describes two novel types of Smart Card (SC)
David A. Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into a
Subscriber Identity Modules (SIMs) are a fundamental standardized component of most cell phones used worldwide. A SIM can be removed from a phone handset and inserted into another, allowing users to port identity, personal information, and service between
Biometric technologies are able to establish or verify personal identity against previously enrolled individuals. Used alone, or together with other authentication technologies such as tokens and passwords, they can provide higher degrees of security than
From the operational perspective, for large-size fingerprint data, a receiver operating characteristic (ROC) curve is usually measured by the true accept rate (TAR) of the genuine scores given a specified false accept rate (FAR) of the impostor scores. The
Biometric technologies are able to establish or verify personal identity against previously enrolled individuals. The importance of these technologies has dramatically increased. Homeland defense is now the highest of priorities for many countries. These
Iris recognition has long been widely regarded as a highly accurate biometric, despite the lack of independent, large-scale testing of its performance. Recently, however, three third-party evaluations of iris recognition were performed. This paper compares
The MINEX II evaluation plan instantiates a complete mechanism for the measure of speed and the core algorithmic capabilities of fingerprint matching algorithms running on standardized ISO/IEC 7816 smart cards. The document includes an ISO 9899 "C" API
Vladimir N. Dvornychenko, Brian J. Cochran, Patrick J. Grother, Michael D. Indovina, Craig I. Watson
The National Institute of Standards and Technology (NIST) is conducting a series of tests for evaluating the state of the art in Automated Latent Fingerprint matching. The intent of the testing is to quantify the core algorithmic capability of contemporary
This document is a set of recommendations to users of biometric quality assessment algorithms. In particular it is concerned with aggregation of quality values across an enterprise appropriate to quantify estimated relative error rates.
Defines the content, format, and units of measurement for the exchange of fingerprint, palmprint, facial/mugshot, scar, mark, & tattoo (SMT), iris, and other biometric sample information that may be used in the identification or verification process of a
We document methods for the quantitative evaluation of systems that produce a scalar summary of a biometric sample¿s quality. We predicate this on the idea that the quality measure predicts performance, whether by design or correlation. We do this
P J. Phillips, K W. Bowyer, P J. Flynn, Alice J. O'Toole, W T. Scruggs, Cathy L. Schott, Matthew Sharpe
The Face Recognition Vendor Test (FRVT) 2006 and Iris Challenge Evaluation (ICE) 2006 are independent U.S. Government evaluations of face and iris recognition performance. These evaluations were conducted simultaneously at NIST using the same test
The paper by Ma et al. [1] made a number of contributions to iris recognition including a novel iris recognition algorithm, a benchmark of standard approaches to iris recognition, and the establishment of an iris data set. The data set, Chinese Academy of
This document (User's Guide to NIST Biometric Image Software (NBIS)) is renamed from the User's Guide to NIST Fingerprint Image Software (NFIS). In other word, this document is a replacement for the User's Guide to NIST Fingerprint Image software (NFIS)
A nonparametric inferential statistical data analysis is presented. The utility of this method is demonstrated through analyzing results from minutiae exchange with two-finger fusion. High-accuracy vendors are selected and mean error rates are compared
Ross J. Micheals, Brian C. Stanton, Mary F. Theofanos, Shahram Orandi
Historically, usability research strives to focus on user behavior in a manner that is as system independent as possible. Although ¿ISO/IEC JTC 1/SC 37 Standing Document 2 ¿ Harmonized Biometric Vocabulary, Draft N1779¿ provides a foundation towards common