NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Shannan Williams, Melissa Taylor, Kiebuzinski George
On January 26th and 27th, 2015, the National Institute of Standards and Technology (NIST), in collaboration with the National Institute of Justice (NIJ), held a workshop entitled: Improving Biometric and Forensic Technology: The Future of Research Datasets
Brian C. Stanton, Mary F. Theofanos, Susanne M. Furman, John M. Libert, Shahram Orandi, John D. Grantham
The use of biometrics to identify individuals has become an important component of efforts to ensure U.S. national security, and has also grown rapidly. Biometrics are, for example, an integral part of the United States Visitor and Immigrant Status
On January 12-13, 2016 the National Institute of Standards and Technology's (NIST) Applied Cybersecurity Division (ACD) hosted the "Applying Measurement Science in the Identity Ecosystem" workshop to discuss the application of measurement science to
The document describes the procedure by which fingerprint image downsampling procedures will be evaluated with respect to conformance to the NIST guidance for sample rate reduction of 1000 ppi friction ridge images to 500 ppi as specified in NIST Special
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan L. Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
This document provides a common XML-based data representation of a chain-of-trust record to facilitate the exchange of PIV Card enrollment data. The exchanged record is the basis to personalize a PIV Card for a transferred employee and also for service
Hildegard Ferraiolo, David Cooper, Andrew R. Regenscheid, Karen Scarfone, Murugiah P. Souppaya
The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged users
John M. Libert, Shahram Orandi, Michael D. Garris, Frederick R. Byers, John D. Grantham
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
NIST Special Publication (SP) 800-73 contains the technical specifications to interface with the smart card to retrieve and use the Personal Identity Verification (PIV) identity credentials. This document, SP 800-85A, contains the test assertions and test
This document, along with a supplementary poster and a set of instructional slides, provides best practice guidelines for the collection of good quality tattoo images. As an outcome of the Tatt-C 2015 activity, algorithm failure to correctly match a tattoo
Bowyer and Ortiz, in their paper "A Critical Examination of the IREX VI Results", make seven criticisms of our application of linear mixed-effects models to longitudinally collected iris recognition Hamming Distances. We reject these as either irrelevant