Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 301 - 325 of 412

Summary of Latent Fingerprint work at NIST

November 20, 2006
Author(s)
Vladimir N. Dvornychenko, Michael D. Garris
This paper describes past and present fingerprint activity at NIST. While the primary focus is on latent fingerprints, the paper also surveys relevant general biometrics activity. The central focus of the paper is on the Latent Testing Workshop, held on

Smart Card Authentication for Mobile Devices

September 1, 2006
Author(s)
Wayne Jansen, Serban I. Gavrila, Clement Seveillac
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device¿s contents. This paper describes two novel types of smart card with

Personal Identity Verification Demonstration Summary

August 31, 2006
Author(s)
Erika McCallister, Hildegard Ferraiolo
This paper provides a summary of the NIST Personal Identity Verification (PIV) Demonstration. The PIV Demonstration took place from May 15 to June 14, 2006. Forty-four companies voluntarily participated through a Cooperative Research and Development

Correlation Filters for Elastic-Distorted Live-Scan Fingerprint Recognition

August 15, 2006
Author(s)
D P. Casasent, Craig I. Watson
This is a summary of a multi-year study of the use of distortion-invariant filters for recognition of live-scan dab fingerprints with elastic distortions. These fingerprints are characterized by elastic distortions. NIST special database 24 is used; it

PIV Data Model Test Guidelines

July 31, 2006
Author(s)
Ramaswamy Chandramouli, Ketan Mehta, Pius A. Uzamere, Davie Simon, Nabil Ghadiali, Andrew P. Founds
In order to build the necessary PIV infrastructure to support common unified processes and government-wide use of identity credentials, NIST developed this test guidance document that ensures interoperability of PIV data. This document provides test

When to Fuse Two Biometrics?

June 13, 2006
Author(s)
Elham Tabassi, Patrick J. Grother, George W. Quinn
Biometric fusion, acquisition and combination of multiple pieces of evidence of identity, can achieve higher accuracy of biometric recognition than using a single biometric. However, fusion increases the cost or throughput of the system since it requires

Forensic Tools for Mobile Phone Subscriber Identity Modules

May 31, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

Forensic Software Tools for Cell Phone Subscriber Identity Modules

April 3, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

MINEX Performance and Interoperability of the INCITS 378 Fingerprint Template

March 2, 2006
Author(s)
Patrick Grother, R. McCabe, Craig I. Watson, Michael D. Indovina, Wayne J. Salamon, Patricia A. Flanagan, Elham Tabassi, Elaine M. Newton, Charles L. Wilson
While the interchange of fingerprint image data provides the greatest interoperability between dissimilar fingerprint recognition systems, standards exist that specify the location and formatting of processed minutiae locations data, or templates. Minutiae

Preliminary Face Recognition Grand Challenge Results

February 15, 2006
Author(s)
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, W Worek
The goal of the Face Recognition Grand Challenge (FRGC) is to improve the performance of face recognition algorithms by an order of magnitude over the best results in Face Recognition Vendor Test (FRVT) 2002. The FRGC is designed to achieve this

Summary of April 2005 ANSI/NIST Fingerprint Standard Update Workshop

January 30, 2006
Author(s)
R. McCabe, Michael D. Garris
This workshop was convened to chart the future of the ANSI/NIST-ITL 1-2000 fingerprint data exchange standard. This report is intended to provide a summary of that workshop. The current and future requirements and capabilities of existing stakeholders were

Personal Identity Verification Card Management Report

January 6, 2006
Author(s)
James F. Dray Jr., David Corcoran
NIST Special Publication 800-73 (http://piv.nist.gov) provides technical specifications for Personal Identity Verification (PIV) cards. However, it does not contain a complete card management specification for PIV systems. This Report provides an overview

Face Recognition Based on Frontal Views Generated from Non-Frontal Images

October 1, 2005
Author(s)
V Blanz, Patrick Grother, P. Jonathon Phillips, T Vetter
This paper presents a method for face recognition across large changes in viewpoint. Our method is based on a Morphable Model of 3D faces that represents face-specific information extracted from a dataset of 3D scans. For non-frontal face recognition in 2D

Overview of the Face Recognition Grand Challenge

October 1, 2005
Author(s)
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, J S. Chang, K Hoffman, J Marques, J Min, W Worek
Over the last couple of years, face recognition researchers have been developing new techniques, such as recognition from three-dimensional and high resolution imagery. These developments are being fueled by advances in computer vision techniques, computer
Was this page helpful?