An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This paper describes past and present fingerprint activity at NIST. While the primary focus is on latent fingerprints, the paper also surveys relevant general biometrics activity. The central focus of the paper is on the Latent Testing Workshop, held on
Biometric systems designed to detect or verify a persons identity are widely used in homeland security. A variety of commercially available biometric systems are now in existence; current technological progress makes it possible to evaluate these systems
Wayne Jansen, Serban I. Gavrila, Clement Seveillac
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device¿s contents. This paper describes two novel types of smart card with
This paper provides a summary of the NIST Personal Identity Verification (PIV) Demonstration. The PIV Demonstration took place from May 15 to June 14, 2006. Forty-four companies voluntarily participated through a Cooperative Research and Development
This is a summary of a multi-year study of the use of distortion-invariant filters for recognition of live-scan dab fingerprints with elastic distortions. These fingerprints are characterized by elastic distortions. NIST special database 24 is used; it
Ramaswamy Chandramouli, Ketan Mehta, Pius A. Uzamere, Davie Simon, Nabil Ghadiali, Andrew P. Founds
In order to build the necessary PIV infrastructure to support common unified processes and government-wide use of identity credentials, NIST developed this test guidance document that ensures interoperability of PIV data. This document provides test
Elham Tabassi, Patrick J. Grother, George W. Quinn
Biometric fusion, acquisition and combination of multiple pieces of evidence of identity, can achieve higher accuracy of biometric recognition than using a single biometric. However, fusion increases the cost or throughput of the system since it requires
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones
Patrick Grother, R. McCabe, Craig I. Watson, Michael D. Indovina, Wayne J. Salamon, Patricia A. Flanagan, Elham Tabassi, Elaine M. Newton, Charles L. Wilson
While the interchange of fingerprint image data provides the greatest interoperability between dissimilar fingerprint recognition systems, standards exist that specify the location and formatting of processed minutiae locations data, or templates. Minutiae
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, W Worek
The goal of the Face Recognition Grand Challenge (FRGC) is to improve the performance of face recognition algorithms by an order of magnitude over the best results in Face Recognition Vendor Test (FRVT) 2002. The FRGC is designed to achieve this
This workshop was convened to chart the future of the ANSI/NIST-ITL 1-2000 fingerprint data exchange standard. This report is intended to provide a summary of that workshop. The current and future requirements and capabilities of existing stakeholders were
This bulletin provides information about testing and validation of personal identity verification (PIV) components and subsystems for conformance to Federal Information Processing Standard 201, Personal Identification Verification of Federal Employees and
NIST Special Publication 800-73 (http://piv.nist.gov) provides technical specifications for Personal Identity Verification (PIV) cards. However, it does not contain a complete card management specification for PIV systems. This Report provides an overview
For fingerprint dataset, which in many cases may exceed a million samples, the underlying distribution function with respect to similarity scores is unknown. The size of biometric evaluation test sample in these cases is an important question. In this
V Blanz, Patrick Grother, P. Jonathon Phillips, T Vetter
This paper presents a method for face recognition across large changes in viewpoint. Our method is based on a Morphable Model of 3D faces that represents face-specific information extracted from a dataset of 3D scans. For non-frontal face recognition in 2D
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, J S. Chang, K Hoffman, J Marques, J Min, W Worek
Over the last couple of years, face recognition researchers have been developing new techniques, such as recognition from three-dimensional and high resolution imagery. These developments are being fueled by advances in computer vision techniques, computer
With the mass deploy of cameras, concern has risen about protecting a person's privacy as he goes about his daily life. Many of the cameras are installed to perform surveillance tasks that do not require the identity of a person. In the context of