An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Shahram Orandi, Craig I. Watson, Jennifer Stathakis, John M. Libert, Gregory Fiumara, John Grantham
While contactless fingerprint capture devices stand to provide for many benefits, images from this nascent technology are sufficiently different than traditional contact-collected images thereby warranting the separation of these new contactless
This document describes a new approach to localizing the iris boundaries in non-ideal iris images. The proposed algorithm starts by applying a series of morphological operations to enhance the salience of the iris boundaries while mitigating the impact of
This report quantifies the accuracy of passive purely software-based face presentation attack detection (PAD) algorithms operating on conventional 2D imagery of various presentation attack instruments (PAI). The algorithms were submitted to the
John M. Libert, Shahram Orandi, John Grantham, Kenneth Ko, Bruce Bandini
A new generation of contactless fingerprint capture devices has recently emerged. These devices provide the ability to capture a fingerprint without making physical contact with the finger. There is anecdotal evidence that the process of capturing a
Jim Filliben has inspired many scientists in a variety of domains across the National Institute of Standard and Technology (NIST) with his statistical data analysis. In our talk we will highlight the impact of his insights and methodologies on our projects
John M. Libert, Shahram Orandi, Kenneth Ko, Bruce Bandini, John Grantham, Craig I. Watson
Nascent technologies show promise in collecting 500 ppi fingerprints in a contactless fashion while yielding various improvements in the collection process over legacy contact collection methods currently in use throughout the world. While it has been
Shahram Orandi, John M. Libert, John Grantham, Kenneth Ko, Bruce Bandini, Craig I. Watson
This specification builds upon the protocols and metrics established in NIST Special Publication 500-336 and defines procedures for the evaluation and certification of contactless fingerprint acquisition devices with respect to certified legacy contact
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how
Melissa Taylor, William Chapman, R. Austin Hicklin
This document is designed to help researchers in the United States navigate and comply with requirements and best practices for human subjects research, with specific emphasis on biometric and forensic research. The purpose of this document is to summarize
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic
Yooyoung Lee, Craig Greenberg, Lisa Mason, Elliot Singer
The 2022 NIST language recognition evaluation (LRE22) is the 9th cycle in an on-going language recognition evaluation series that began in 1996. The objectives of the evaluation series are (1) to advance technologies in language recognition with innovative
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and methods to aid in detecting morphs. Expanding on concepts introduced in a study conducted by
John Daugman correctly summarized the state of forensic iris recognition circa 2006 for the book Forensic Human Identification: an Introduction [1]: Iris recognition has limited forensic value, because (unlike fingerprints or DNA, for example) (1) iris
John M. Libert, Shahram Orandi, Bruce Bandini, Kenneth Ko, Craig I. Watson, Christopher Stafford, Matthew E. Staymates, John Grantham
This guidance specifies a protocol and associated metrics for the evaluation of contactless fingerprint acquisition device, and their interoperability with legacy devices. This protocol enables contactless fingerprint developers seeking certification of