ACT-IAC Igniting Innovation 2014 February 6, 2014.

Slides:



Advertisements
Similar presentations
International Workshop on Usability and Biometrics: NIST Welcome
Advertisements

1 N EW M EXICO AFIS F AST ID U PGRADE C HANGE R EQUEST C ERTIFICATION N EW M EXICO AFIS F AST ID U PGRADE C HANGE R EQUEST C ERTIFICATION Executive Summary.
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
New Developments in the Use of Standards to Exchange Biometric Data Brad Wing National Institute of Standards and Technology.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
STI, Part of Al Falasi Group UAE
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Department of Labor HSPD-12
National Fraud Prevention Program: Analytics in Medicare and Medicaid Center for Program Integrity Centers for Medicare & Medicaid Services Department.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Biometrics.
Bombing of Dining Facility in Mosul, Iraq, in Dec 2004 Murder of US Contractors in March 2004 led to 2 major operations for control of Fallujah, Iraq.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Introduction to Fingerprint Biometrics By Tamar Bar.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
FBI Science & Technology Branch MISSION To facilitate the application of innovative scientific, engineering, and technical solutions in support.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Office of Science and Technology NCITS Technical Committee M1 Biometrics Standards Chris Miles Senior Program Manager Crime Prevention.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Privacy issues By: Joshua Junious Date: December 4, 2012 Course: CpSc 420 Instructor: Dr. Grossman.
Biometric Measures for Human Identification
BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
Background established on June 18, 1951 Universal Bank since 1994 publicly listed as “SECB” has one of the lowest non- performing loan ratios (NPL) capital.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
BIOMETRICS.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
PoC Learnings Jai Bannur. PoC Goals Capture biometrics of rural Indians Capture biometrics of rural Indians – Assess the best biometric quality and accuracy.
Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,
Post translational modification n- acetylation Peptide Mass Fingerprinting (PMF) is an analytical technique for identifying unknown protein. Proteins to.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometrics.
Biometric technology.
How the Biometrics Works
A SEMINAR REPORT ON BIOMETRICS
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
15-5 Automated Fingerprint Identification System
Presentation transcript:

ACT-IAC Igniting Innovation 2014 February 6, 2014

Biometrics are critical for law enforcement Fingerprints are the most frequently used for identification purposes – Can be worn down over time – Intentionally damaged to avoid identification – Fingerprint alteration cases have increased since 2006 Iris is becoming more widely used in US government databases for identification purposes – Unique and changes very little with age – Provides more unique matching features for quick identification – Still has drawbacks—diseases of the eye can cause pupil damage and changes Using more than one biometric increases the likelihood of an accurate identification

Border Patrol currently collects 10 rolled fingerprints & facial photo – Search & enroll against IDENT database (OBIM) – Search & enroll against IAFIS (FBI/CJIS) – Search against ABIS database (DOD) Iris Pilot adds multi-modal biometrics for the best possible identification and verification – Fingerprints – Iris – High-quality photographs Iris Pilot currently in use at one of the busiest Border Patrol Stations – Increases accuracy of identification – Enables vetting with multiple sources – Improves reporting & metrics—better decision making

Fully scalable solution to be deployed nationwide GOTS solution can be applied to other agencies Building a multi-modal biometric database – Collecting high-resolution facial images for future use – Valuable to users across government – Enable more rapid and accurate identification Multiple agency interfaces – OBIM – DOD Biometrics Identity Management Agency (BIMA) – FBI Next Generation Identification (NGI)

Risk & Novelty Collaboration & Engagement Efficiency & Effectiveness Transferability & Scalability  Biometrics are critical—dependency on one type is not sufficient  Multi-modal biometrics provide the best coverage for identification & verification  Many agencies use biometrics—very few combine multiple types to increase accuracy  First of its kind in use at DHS  Increases accuracy of identification  Reduces cost—can be repeated and used by other programs  Improves collaboration—enables vetting with multiple sources  Improved reporting & metrics— better decision making  Collaborative effort—DHS, DOD, FBI, and Dev Technology Group  Multiple agency interfaces—OBIM, DOD Biometrics Identity Management Agency (BIMA), FBI Next Generation Identification (NGI)  Supports HSPD 24—improved screening protects against known and suspected terrorists  Fully scalable solution will be deployed nationwide  GOTS solution can be applied to other agencies  Multi-modal biometric data is valuable to users across government  Standards based—NIST and NIEM provide a common language