An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Bowyer and Ortiz, in their paper "A Critical Examination of the IREX VI Results", make seven criticisms of our application of linear mixed-effects models to longitudinally collected iris recognition Hamming Distances. We reject these as either irrelevant
Tattoos have been used for many years to assist law enforcement in investigations leading to the identification of both criminals and victims. A tattoo is an elective biometric trait that contains additional discriminative information to support person
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
The main challenge in recognizing people in uncon- strained video is exploiting the identity information in multiple frames and the accompanying dynamic signature. These identity cues include face, body, and motion. Our approach is based on video
P. Jonathon Phillips, David White, Alice O'Toole, Carina A. Hahn, Matthew Hill
Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and out- come of criminal
James R. Matey, George W. Quinn, Patrick J. Grother, Elham Tabassi, Craig I. Watson, James L. Wayman
We present practical recommendations for improving the clarity, transparency, and usefulness of many biometric papers. Several of the recommendations can be enabled by preparing a publicly available library of state of the art Receiver Operating
Gregory P. Fiumara, Wayne J. Salamon, Craig I. Watson
With the proliferation of biometric-based identity management solutions, biometric algorithms need to be tested now more than ever. Independent biometric technology evaluations are needed to perform this testing, but are not trivial to run, as demonstrated
Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
The purpose of this Special Publication is to provide appropriate and useful guidelines for assessing the reliability of issuers of Personal Identity Verification (PIV) Cards and Derived PIV Credentials. These issuers store personal information and issue
Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits
Conformance testing is the method that is used to determine if a product, process or system (known as an implementation under test) satisfies the requirements specified in the base standard. The goal of conformance testing is to capture enough of the
Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). While the uniqueness of fingerprints has been
Christofer J. McGinnis, Dylan J. Yaga, Fernando L. Podio
Conformance testing measures whether an implementation faithfully implements the technical requirements defined in a standard. Conformance testing provides developers, users, and purchasers with increased levels of confidence in product quality and