Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 276 - 300 of 804

Effects of JPEG 2000 Lossy Image Compression on 1000 ppi Latent Fingerprint Casework

October 25, 2013
Author(s)
Shahram Orandi, John M. Libert, John D. Grantham, Frederick R. Byers, Lindsay M. Petersen, Michael D. Garris
This paper presents the findings of a study conducted to measure the impact of JPEG 2000 lossy compression on the comparison of 1000 ppi latent fingerprint imagery and 1000 ppi exemplar fingerprint imagery. Combinations of image pairs that vary by the

On the Existence of Face Quality Measures

September 30, 2013
Author(s)
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Su L. Cheng, Mohammad N. Teli, Hao Zhang
We address the problem of the existence of quality measures for face recognition. We introduce the concept of an oracle quality measure, which is an optimal quality measure. We approximate oracle quality measures by greedy pruned ordering (GPO). GPO

Propagation of Facial Identities in a Social Network

September 30, 2013
Author(s)
P J. Phillips, Tao Wu, Rama Chellappa
We address the problem of automated face recognition on a social network using a loopy belief propagation frame- work. The proposed approach propagates the identities of faces in photos across social graphs. We characterize performance in terms of

SNoW: Understanding the Causes of Strong, Neutral, and Weak Face Impostor Pairs

September 27, 2013
Author(s)
P J. Phillips, Amanda Sgroi, Patrick J. Flynn, Kevin W. Bowyer
The Strong, Neutral, or Weak Face Impostor Pairs problem was generated to explore the causes and impact of impostor face pairs that span varying strengths of nonmatch. We develop three partitions within the impostor distribution of a given algorithm. The

Biometric Face Recognition: From Classical Statistics to Future Challenges

August 13, 2013
Author(s)
P J. Phillips, Geof H. Givens, J. R. Beveridge, Bruce A. Draper, David Bolme, Yui M. Lui
Automated face recognition has moved from science fiction to reality during the last twenty years. For high quality frontal face images, recognition errors have been cut in half every two years as more sophisticated algorithms are developed. Algorithms and

Initial ACT-R Extensions for User Modeling in the Mobile Touchscreen Domain

July 12, 2013
Author(s)
Kristen Greene, Franklin Tamborello
Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architecture
Displaying 276 - 300 of 804