NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We address the problem of automated face recognition on a social network using a loopy belief propagation frame- work. The proposed approach propagates the identities of faces in photos across social graphs. We characterize performance in terms of
P J. Phillips, Amanda Sgroi, Patrick J. Flynn, Kevin W. Bowyer
The Strong, Neutral, or Weak Face Impostor Pairs problem was generated to explore the causes and impact of impostor face pairs that span varying strengths of nonmatch. We develop three partitions within the impostor distribution of a given algorithm. The
Adele P. Peskin, Joe Chalfoun, John T. Elliott, Karen Kafadar
We propose a new strategy for estimating the number of cellular objects that should be manually segmented for evaluating the segmentation accuracy of an algorithm. The strategy uses geometric and edge quality measurements that are directly related to
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
The latest version of the ANSI/NIST-ITL standard was published in November 2011 (AN-2011). In addition to specifying Record Types in traditional encoding, the standard includes the specification of National Information Exchange Model (NIEM) Extensible
John M. Libert, Shahram Orandi, Michael D. Garris, John D. Grantham
As part of NISTs investigative efforts to support development of the FBI Next Generation Identification (NGI) systems, this investigation evaluates effects on image fidelity of wavelet transform decomposition and quality layer options for JPEG 2000
P J. Phillips, Geof H. Givens, J. R. Beveridge, Bruce A. Draper, David Bolme, Yui M. Lui
Automated face recognition has moved from science fiction to reality during the last twenty years. For high quality frontal face images, recognition errors have been cut in half every two years as more sophisticated algorithms are developed. Algorithms and
NIST has been at the forefront of information technology in its application to biometrics for almost 50 years. Early work revolved around developing hardware and software to perform automated analysis of fingerprint images and development of voice
Kristen Greene, Ross J. Micheals, Franklin Tamborello
As technology continues to evolve, so too must our modeling and simulation techniques. While formal engineering models of cognitive and perceptual-motor processes are well-developed and extensively validated in the traditional desktop computing environment
Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architecture
Patrick J. Grother, Wayne J. Salamon, Ramaswamy Chandramouli
Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new standards to be adopted governing interoperable use of identity credentials to allow physical and
George W. Quinn, Patrick J. Grother, Mei L. Ngan, James R. Matey
IREX IV aims to provide a fair and balanced scientific evaluation of the performance of automated iris recognition algorithms. IREX IV evaluated the performance of 66 identification (i.e. one-to-many matching) algorithms submitted by 12 companies and
Patrick J. Grother, James R. Matey, Elham Tabassi, George W. Quinn, Michael Chumakov
Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they dictate re-enrollment schedules e.g. of a face on a passport. Ophthalmologists consider the
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su L. Cheng
Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. This
Mary Frances Theofanos, Andrew Dienstfrey, Brian Stanton, Haiying Guan
Although fingerprint recognition is a well-studied area, forensic fingerprint preprocessing based on computational theory is still a relatively new domain in need of further scientific study and development of standards of best practice. Latent fingerprint
Fernando L. Podio, Dylan Yaga, Christofer J. McGinnis
The Computer Security Division (CSD) of NIST/ITL develops conformance test architectures (CTAs) and test suites (CTSs) to support users that require conformance to selected biometric standards. Product developers as well as testing laboratories can also
Karen Marshall, Ross J. Micheals, Kevin C. Mangold, Kayee K. Hanaoka
Biometric devices have emerged as pervasive and indispensable tools in facilitating security in many industries and governments worldwidethe use of these devices has consistently increased and advanced. However, advancement of the methodologies used to
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Sumit Shekar, Rama Chellappa
In video-based face recognition, a key challenge is in exploiting the extra information available in a video; e.g., face, body, and motion identity cues. In addition, different video sequences of the same subject may contain variations in resolution
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips
The performance of iris recognition systems is frequently affected by input image quality, which in turn is vulnerable to less-than-optimal conditions due to illuminations, environments, and subject characteristics (e.g., distance, movement, face/body
Michelle P. Steves, Brian C. Stanton, Mary F. Theofanos, Dana E. Chisnell, Hannah Wald
The Department of Homeland Securitys (DHS) United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program is a biometrically-enhanced identification system primarily situated at border points of entry such as airports and seaports. In
Yooyoung Lee, James J. Filliben, Ross J. Micheals, P J. Phillips
The purpose of this paper is to introduce an effective and structured methodology for carrying out a biometric system sensitivity analysis. The goal of sensitivity analysis is to provide the researcher/developer with the insight and understanding of the
Shahram Orandi, John M. Libert, John D. Grantham, Lepley Margaret, Bruce Bandini, Kenneth Ko, Lindsay M. Petersen, Stephen S. Wood, Stephen G. Harvey
Currently the bulk of fingerprint data in operational is captured, processed and stored at 500 ppi using the WSQ compressed digital format. With the transition to 1000 ppi, some systems will unavoidably contain an overlap between 500 ppi and 1000 ppi
P J. Phillips, Vishal M. Patel, Yi-Chen Chen, Rama Chellappa
In video-based face recognition, a key challenge is in exploiting the extra information available in a video. In addition, different video sequences of the same subject may contain variations in resolution, illumination, pose, and facial expressions. These
The paper discusses the current status of biometric standards development activities, with a focus on international standards developments. Published standards, as well as standards under development or planned for the near future, are addressed. The work