An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John M. Libert, Shahram Orandi
The requirements necessary for taking a successful face picture are arguably the least constrained of any biometric. The camera must be operational, and the subject must be illuminated sufficiently and facing the camera. Yet, a significant portion of the
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals
Abstract The requirements necessary for taking a successful face picture are arguably the least constrained of any biometric. The camera must be operational, and the subject must be illuminated sufficiently & facing the camera. Yet, a significant portion
This complement to the ANSI/NIST-ITL 1-2007 standard establishes an equivalent XML format. This format defines the content, format, and units of measurement for the exchange of fingerprint, palmprint, facial/mugshot, scar, mark, & tattoo (SMT), iris, and
The National Institute of Standards and Technology (NIST)Visualization and Usability Gropu initiated a Usability and Biometrics effort to focus on the users and human factors of biometric systems. The goal of this effort has been to conduct research to
In this correspondence, we describe a holistic face recognition method based on subspace Linear Discriminant Analysis (LDA). Like existing methods, this method consists of two steps: first, the face image is projected into a face subspace via Principal
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John W. Wydler II, Nien F. Zhang, Lawrence Nadel, William Rubin
As the deployment of biometric technologies such as fingerprints has become more widespread in government applications there is an increased awareness of the human-computer interaction that such technologies involve. User behavior can impact operational
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system
Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operation are quite different in certain areas. For example, most cell phones do not
This paper describes aspects of work done at NIST, in concert with the latent fingerprint community, toward achieving a partial lights-out latent fingerprint processing capability. The initial steps are to quantify performance over a cross-section of
Wayne Jansen, Serban I. Gavrila, Clement Seveillac
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorised use and access to a device¿s contents. This paper describes two novel types of Smart Card (SC)
David A. Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into a
Subscriber Identity Modules (SIMs) are a fundamental standardized component of most cell phones used worldwide. A SIM can be removed from a phone handset and inserted into another, allowing users to port identity, personal information, and service between