NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
The main challenge in recognizing faces in video is effec- tively exploiting the multiple frames of a face and the accompanying dynamic signature. One prominent method is based on extracting joint appearance and behavioral features. A second method models
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Yui M. Lui
Face recognition has made significant advances over the last twenty years. State-of-the-art algorithms push the performanceenvelope to near perfect recognition rates on many face databases. Recently, the Good, the Bad, and the Ugly (GBU) face challenge
P J. Phillips, Alice J. O'Toole, Xiaobo An, Joseph Dunlop
The intended applications of automatic face recognition systems include venues that vary widely in demographic diversity. Formal evaluations of algorithms do not commonly consider the effects of population diversity on performance. We document the effects
P J. Phillips, Jingjing Zheng, Ming-Yu Liu, Rama Chellappa
Domain adaptation algorithms that handle shifts in the distribution between training and testing data are receiving much attention in computer vision. Recently, a Grassmann manifold-based domain adaptation algorithm that models the domain shift using
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes that occur in still frontal faces. The Good, the Bad, & the Ugly consists of three partitions. The
P J. Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial
The performance of a biometric system depends on the quality of interaction of the biometric subject and the system. Past research has shown that fingerprint image quality is improved when the subjects received feedback from the system. However, the
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
The Computer Security Division of NIST/ITL supports the development of biometric conformance testing methodology standards and other conformity assessment efforts through active technical participation in the development of these standards and the
P J. Phillips, Jingjing Zheng, Zhuolin Jiang, Rama Chellappa
Discriminative appearance features are effective for recognizing actions in a fixed view, but generalize poorly to changes in viewpoint. We present a method for view- invariant action recognition based on sparse representations using a transferable dictio-
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
Conformance testing measures whether an implementation faithfully implements the technical requirements defined in a standard. Conformance testing provides developers, users, and purchasers with increased levels of confidence in product quality and
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery at various levels of compression, but later expanded to include lossless compression. Lossless
Michael D. Indovina, Vladimir N. Dvornychenko, R. A. Hicklin, G I. Kiebuzinski
The National Institute of Standards and Technology (NIST) Evaluation of Latent Fingerprint Technologies - Extended Feature Sets (ELFT-EFS) consists of multiple ongoing latent algorithm evaluations. This report describes the results and conclusions of ELFT-
This article describes the ANSI/NIST-ITL standard: its origin, contents, and how it is used and updated. It is the principal standard used for the formatting and encoding of biometric data and related textual information for law enforcement, homeland
Yooyoung Lee, James J. Filliben, Ross J. Micheals, P J. Phillips
The purpose of this paper is to introduce an effective and structured methodology for carrying out a biometric system sensitivity analysis. The goal of sensitivity analysis is to provide the researcher/developer with the insight and understanding of the
This paper presents the findings of a study conducted to compare the effects of WSQ and JPEG 2000 compression on 500 ppi fingerprint imagery at a typical operational compression rate of 0.55 bpp (bits per pixel), corresponding to an effective compression
Iris recognition has the potential to be extremely accurate, but it is highly dependent on the quality of the input data. Iris occlusion, off-axis gaze, blurred images, and iris rotation are common problems that can make recognizing individuals more
Patrick J. Grother, George W. Quinn, James R. Matey, Mei L. Ngan, Wayne J. Salamon, Gregory P. Fiumara, Craig I. Watson
Iris recognition has long been held as an accurate and fast biometric. In the first public evaluation of one-to-many iris identification technologies, this third activity in the Iris Exchange (IREX) program has measured the core algorithmic efficacy and
Eddy Simoens, Bian Yang, Xuebing Zhou, Filipe Beato, Christoph Busch, Elaine M. Newton, Bart Preneel
Traditional criteria used in biometric performance evaluation do not cover all the performance aspects of biometric template protection (BTP) and the lack of well-defined metrics inhibits the proper evaluation of such methods. Previous work in the
This report provides a comprehensive assessment of the ability of face recognition algorithms to compare compressed standard face images. Six well performing algorithms from the Multiple Biometric Evaluation (MBE) 2010 Still Face Track are used to compare
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips, Hassan A. Sahibzada
Due to its distinctiveness, the human eye is a popular biometricv feature used to identity a person with high accuracy. The Grand Challenge in biometrics is to have an effective algorithm for subject verification or identification under a broad range of
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) has been conducting an ongoing series of Speaker Recognition Evaluations (SRE). Speaker detection performance is measured using a detection cost function defined as a weighted sum of the