An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Hildegard Ferraiolo, Ketan L. Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
This recommendation provides a technical guideline to use Personal Identity Verification (PIV) Cards in facility access; enabling federal agencies to operate as government-wide interoperable enterprises. These guidelines cover the risk-based strategy to
Seyed Omid Sadjadi, Timothee N. Kheyrkhah, Audrey N. Tong, Craig S. Greenberg, Douglas Reynolds, Elliot Singer, Lisa Mason, Jaime Hernandez-Cordero
In 2017, NIST conducted the most recent in an ongoing series of Language Recognition Evaluations (LRE) meant to foster research in robust text- and speaker-independent language recognition, as well as measure performance of current state-of-the-art systems
Gregory P. Fiumara, Patricia A. Flanagan, John D. Grantham, Bruce Bandini, Kenneth Ko, John M. Libert
A new collection of legacy inked rolled and plain fingerprint card scans are being released to the public. The cards were scanned at three resolutions in the 8 bit grayscale colorspace. The data is available as lossless images for free.
Gregory P. Fiumara, Elham Tabassi, Patricia A. Flanagan, John D. Grantham, Kenneth Ko, Karen Marshall, Matthew Schwarz, Bryan Woodgate, Christopher Boehnen
In September 2017, the Intelligence Advanced Research Projects Activity held a fingerprint data collection as part of the Nail to Nail Fingerprint Challenge. Participating Challengers deployed devices designed to collect an image of the full nail to nail
George W. Quinn, James R. Matey, Patrick J. Grother
Iris Exchange (IREX) IX is an evaluation of automated iris recognition algorithms. The first part of the evaluation is a performance test of both verification (one-to-one) and identification (one-to-many) recognition algorithms over operational test data
The new NIST database comes from the FBI which contains live-scan and rescanned ink images from deceased subjects. The database offers the user American National Standards Institute- Information Technology Laboratory/National Institute of Standards and
Existing statistical methods for estimating the log- likelihood ratio from biometric scores include parametric estimation, kernel density estimation, and recently adopted logistic regression estimation. There has been a growing in- terest to study the
Elham Tabassi, Anil K. Jain, Tarang Chugh, Kai Cao, Jiayu Zhou
Latent fingerprints are one of the most crucial sources of evidence in forensic investigations. As such, devel- opment of automatic latent fingerprint recognition systems to quickly and accurately identify the suspects is one of the most pressing problems
Patrick J. Grother, Mei L. Ngan, Lars Ericson, Kayee K. Hanaoka, Christopher Boehnen
This report documents NISTs execution of the Intelligence Advanced Research Projects Activity (IARPA) Face Recognition Prize Challenge 2017. The (FRPC) was conducted to assess the capability of contemporary face recognition algorithms to recognize faces
Bengt Borgstrom, Elliot Singer, Douglas Reynolds, Omid Sadjadi, Gregory A. Sanders
This paper addresses speaker verification domain adaptation with inadequate in-domain data. Specifically, we explore he cases where in-domain data sets do not include speaker labels, contain speakers with few samples, or contain speakers with low channel