Science.gov

Sample records for biometric identification cards

  1. A bimodal biometric identification system

    NASA Astrophysics Data System (ADS)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  2. Biometrics and ID Cards — Enablers for Personal Security

    NASA Astrophysics Data System (ADS)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  3. Biometrics and smart cards combine to offer high security

    SciTech Connect

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued.

  4. Biometric identification systems: the science of transaction facilitation

    NASA Astrophysics Data System (ADS)

    Rogers, Robert R.

    1994-10-01

    The future ofthe "secure transaction" and the success ofall undertakings that depend on absolute certainty that the individuals involved really are who and what they represent themselves to be is dependent upon the successful development of absolutely accurate, low-cost and easy-to-operate Biometric Identification Systems. Whether these transactions are political, military, financial or administrative (e.g. health cards, drivers licenses, welfare entitlement, national identification cards, credit card transactions, etc.), the need for such secure and positive identification has never been greater -and yet we are only at the beginning ofan era in which we will see the emergence and proliferation of Biometric Identification Systems in nearly every field ofhuman endeavor. Proper application ofthese systems will change the way the world operates, and that is precisely the goal ofComparator Systems Corporation. Just as with the photo-copier 40 years ago and the personal computer 20 years ago, the potential applications for positive personal identification are going to make the Biometric Identification System a commonplace component in the standard practice ofbusiness, and in interhuman relationships ofall kinds. The development of new and specific application hardware, as well as the necessary algorithms and related software required for integration into existing operating procedures and newly developed systems alike, has been a more-than-a-decade-long process at Comparator -and we are now on the verge of delivering these systems to the world markets so urgently in need of them. An individual could feel extremely confident and satisfied ifhe could present his credit, debit, or ATM card at any point of sale and, after inserting his card, could simply place his finger on a glass panel and in less than a second be positively accepted as being the person that the card purported him to be; not to mention the security and satisfaction of the vendor involved in knowing that

  5. Biometric identification: a holistic perspective

    NASA Astrophysics Data System (ADS)

    Nadel, Lawrence D.

    2007-04-01

    Significant advances continue to be made in biometric technology. However, the global war on terrorism and our increasingly electronic society have created the societal need for large-scale, interoperable biometric capabilities that challenge the capabilities of current off-the-shelf technology. At the same time, there are concerns that large-scale implementation of biometrics will infringe our civil liberties and offer increased opportunities for identity theft. This paper looks beyond the basic science and engineering of biometric sensors and fundamental matching algorithms and offers approaches for achieving greater performance and acceptability of applications enabled with currently available biometric technologies. The discussion focuses on three primary biometric system aspects: performance and scalability, interoperability, and cost benefit. Significant improvements in system performance and scalability can be achieved through careful consideration of the following elements: biometric data quality, human factors, operational environment, workflow, multibiometric fusion, and integrated performance modeling. Application interoperability hinges upon some of the factors noted above as well as adherence to interface, data, and performance standards. However, there are times when the price of conforming to such standards can be decreased local system performance. The development of biometric performance-based cost benefit models can help determine realistic requirements and acceptable designs.

  6. Biometric identification using local iterated function

    NASA Astrophysics Data System (ADS)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  7. [Personal identification with biometric and genetic methods].

    PubMed

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  8. On enabling secure applications through off-line biometric identification

    SciTech Connect

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  9. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper. PMID:22547926

  10. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  11. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  12. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  13. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  14. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  15. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  16. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  17. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  18. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Identification cards. 101.8 Section 101.8 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that...

  19. Privacy-protected biometric templates: acoustic ear identification

    NASA Astrophysics Data System (ADS)

    Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.

    2004-08-01

    Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].

  20. Biometric template revocation

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  1. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Identification cards. 101.8 Section 101.8 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an...

  2. Modeling of Biometric Identification System Using the Colored Petri Nets

    NASA Astrophysics Data System (ADS)

    Petrosyan, G. R.; Ter-Vardanyan, L. A.; Gaboutchian, A. V.

    2015-05-01

    In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The main objective of this paper is to introduce the fundamental concepts of Petri Nets to the researchers and practitioners, both from identification systems, who are involved in the work in the areas of modelling and analysis of biometric identification types of systems, as well as those who may potentially be involved in these areas. In addition, the paper introduces high-level Petri Nets, as Colored Petri Nets (CPN). In this paper the model of Colored Petri Net describes the identification process much simpler.

  3. European securitization and biometric identification: the uses of genetic profiling.

    PubMed

    Johnson, Paul; Williams, Robin

    2007-01-01

    The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. One significant source for this growth has been the "securitization" agendas of nation states that attempt the greater control and monitoring of population movement across geographical borders. Among the wide variety of available biometric schemes, DNA profiling is regarded as a key method for discerning and recording embodied individuality. This paper discusses the current limitations on the use of DNA profiling in civil identification practices and speculates on future uses of the technology with regard to its interoperability with other biometric databasing systems. PMID:17536152

  4. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  5. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  6. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  7. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  8. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  9. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  10. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  11. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  12. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  13. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  14. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  15. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  16. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  17. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  18. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  19. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  20. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  1. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  2. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued...

  3. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall...

  4. Biometric Identification Using Holographic Radar Imaging Techniques

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.; Kennedy, Mike O.; Foote, Harlan P.

    2007-04-01

    Pacific Northwest National Laboratory researchers have been at the forefront of developing innovative screening systems to enhance security and a novel imaging system to provide custom-fit clothing using holographic radar imaging techniques. First-of-a-kind cylindrical holographic imaging systems have been developed to screen people at security checkpoints for the detection of concealed, body worn, non-metallic threats such as plastic and liquid explosives, knifes and contraband. Another embodiment of this technology is capable of obtaining full sized body measurements in near real time without the person under surveillance removing their outer garments. Radar signals readily penetrate clothing and reflect off the water in skin. This full body measurement system is commercially available for best fitting ready to wear clothing, which was the first “biometric” application for this technology. One compelling feature of this technology for security biometric applications is that it can see effectively through disguises, appliances and body hair.

  5. ECG biometric identification: A compression based approach.

    PubMed

    Bras, Susana; Pinho, Armando J

    2015-08-01

    Using the electrocardiogram signal (ECG) to identify and/or authenticate persons are problems still lacking satisfactory solutions. Yet, ECG possesses characteristics that are unique or difficult to get from other signals used in biometrics: (1) it requires contact and liveliness for acquisition (2) it changes under stress, rendering it potentially useless if acquired under threatening. Our main objective is to present an innovative and robust solution to the above-mentioned problem. To successfully conduct this goal, we rely on information-theoretic data models for data compression and on similarity metrics related to the approximation of the Kolmogorov complexity. The proposed measure allows the comparison of two (or more) ECG segments, without having to follow traditional approaches that require heartbeat segmentation (described as highly influenced by external or internal interferences). As a first approach, the method was able to cluster the data in three groups: identical record, same participant, different participant, by the stratification of the proposed measure with values near 0 for the same participant and closer to 1 for different participants. A leave-one-out strategy was implemented in order to identify the participant in the database based on his/her ECG. A 1NN classifier was implemented, using as distance measure the method proposed in this work. The classifier was able to identify correctly almost all participants, with an accuracy of 99% in the database used. PMID:26737619

  6. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  7. Body identification, biometrics and medicine: ethical and social considerations.

    PubMed

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny. PMID:17536154

  8. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  9. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  10. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  11. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  12. Biometric identification devices -- Laboratory testing vs. real life

    SciTech Connect

    Ahrens, J.S.

    1997-05-01

    For over fifteen years Sandia National Laboratories has been involved in laboratory testing of biometric identification devices. The key concept of biometric identification devices is the ability for the system to identify some unique aspect of the individual rather than some object a person may be carrying or some password they are required to know. Tests were conducted to verify manufacturer`s performance claims, to determine strengths/weaknesses of devices, and to determine devices that meet the US Department of energy`s needs. However, during recent field installation, significantly different performance was observed than was predicted by laboratory tests. Although most people using the device believed it operated adequately, the performance observed was over an order of magnitude worse than predicted. The search for reasons behind this gap between the predicted and the actual performance has revealed many possible contributing factors. As engineers, the most valuable lesson to be learned from this experience is the value of scientists and engineers with (1) common sense, (2) knowledge of human behavior, (3) the ability to observe the real world, and (4) the capability to realize the significant differences between controlled experiments and actual installations.

  13. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  14. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  15. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  16. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  17. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  18. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  19. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  20. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  1. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  2. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Temporary identification cards. 112.49 Section 112.49 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an...

  3. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for...

  4. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Identification cards required. 112.41 Section 112.41 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may require each...

  5. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... published a proposed rule in the Federal Register (74 FR 48892) for a 60-day public comment period. The... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part 1254 RIN 3095-AB59 Researcher Identification Card AGENCY:...

  6. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border...

  7. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border...

  8. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism. PMID:20703779

  9. Facial recognition trial: biometric identification of non-compliant subjects using CCTV

    NASA Astrophysics Data System (ADS)

    Best, Tim

    2007-10-01

    LogicaCMG were provided with an opportunity to deploy a facial recognition system in a realistic scenario. 12 cameras were installed at an international airport covering all entrances to the immigration hall. The evaluation took place over several months with numerous adjustments to both the hardware (i.e. cameras, servers and capture cards) and software. The learning curve has been very steep but a stage has now been reached where both LogicaCMG and the client are confident that, subject to the right environmental conditions (lighting and camera location) an effective system can be defined with a high probability of successful detection of the target individual, with minimal false alarms. To the best of our knowledge, results with a >90% detection rate, of non-compliant subjects 'at range' has not been achieved anywhere else. This puts this location at the forefront of capability in this area. The results achieved demonstrate that, given optimised conditions, it is possible to achieve a long range biometric identification of a non compliant subject, with a high rate of success.

  10. Systems and methods for remote long standoff biometric identification using microwave cardiac signals

    NASA Technical Reports Server (NTRS)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2012-01-01

    Systems and methods for remote, long standoff biometric identification using microwave cardiac signals are provided. In one embodiment, the invention relates to a method for remote biometric identification using microwave cardiac signals, the method including generating and directing first microwave energy in a direction of a person, receiving microwave energy reflected from the person, the reflected microwave energy indicative of cardiac characteristics of the person, segmenting a signal indicative of the reflected microwave energy into a waveform including a plurality of heart beats, identifying patterns in the microwave heart beats waveform, and identifying the person based on the identified patterns and a stored microwave heart beats waveform.

  11. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  12. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  13. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  14. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  15. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    PubMed Central

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar. PMID:16390976

  16. Ethical and social implications of biometric identification technology.

    PubMed

    Mordini, Emilio; Petrini, Carlo

    2007-01-01

    This paper discusses the social and ethical aspects of biometrics, using mainly a historical approach. A description is provided as regards the origins and development of the word. Reference is made to the various ways in which it has been interpreted, sometimes very different one from another, and finally to the meaning currently attached to it. The most relevant ethical and social implications are highlighted by giving a brief overview of the contents of the main institutional documents produced both on an international and domestic level in the various countries. The analyses contained in these reports also bring to the fore the main challenges which society shall have to deal with, in the near future and on a long-term basis, as a consequence of the extremely rapid diffusion of those technologies which use biometric data request. PMID:17536148

  17. Methods for using a biometric parameter in the identification of persons

    DOEpatents

    Hively, Lee M.

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  18. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  19. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  20. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  1. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    NASA Astrophysics Data System (ADS)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  2. Dynamic biometric identification from multiple views using the GLBP-TOP method.

    PubMed

    Wang, Yu; Shen, Xuanjing; Chen, Haipeng; Zhai, Yujie

    2014-01-01

    To realize effective and rapid dynamic biometric identification with low computational complexity, a video-based facial texture program that extracts local binary patterns from three orthogonal planes in the frequency domain of the Gabor transform (GLBP-TOP) was proposed. Firstly, each normalized face was transformed by Gabor wavelet to get the enhanced Gabor magnitude map, and then the LBP-TOP operator was applied to the maps to extract video texture. Finally, weighted Chi square statistics based on the Fisher Criterion were used to realize the identification. The proposed algorithm was proved effective through the biometric experiments using the Honda/UCSD database, and was robust against changes of illumination and expressions. PMID:25226976

  3. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  4. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  5. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  6. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  7. Protection of Biometric Information

    NASA Astrophysics Data System (ADS)

    Kevenaar, Tom

    The field of biometrics is concerned with recognizing individuals by means of unique physiological or behavioral characteristics. In practical systems, several biometric modalities are used, such as fingerprint, face, iris, hand geometry, and so forth. Recently, biometric systems are becoming increasingly popular because they potentially offer more secure solutions than other identification means such as PIN codes and security badges because a biometric is tightly linked to an individual. For the same reason, biometrics can prevent the use of several identities by a single individual. Finally, biometrics are also more convenient because, unlike passwords and PIN codes, they cannot be forgotten and are always at hand.

  8. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    NASA Astrophysics Data System (ADS)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  9. Resting State EEG-based biometrics for individual identification using convolutional neural networks.

    PubMed

    Lan Ma; Minett, James W; Blu, Thierry; Wang, William S-Y

    2015-08-01

    Biometrics is a growing field, which permits identification of individuals by means of unique physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra-personal differences and large inter-personal differences between individuals' brainwave patterns. In the past, such methods have used features derived from manually-designed procedures for this purpose. Another possibility is to use convolutional neural networks (CNN) to automatically extract an individual's best and most unique neural features and conduct classification, using EEG data derived from both Resting State with Open Eyes (REO) and Resting State with Closed Eyes (REC). Results indicate that this CNN-based joint-optimized EEG-based Biometric System yields a high degree of accuracy of identification (88%) for 10-class classification. Furthermore, rich inter-personal difference can be found using a very low frequency band (0-2Hz). Additionally, results suggest that the temporal portions over which subjects can be individualized is less than 200 ms. PMID:26736885

  10. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  11. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  12. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  13. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  14. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  15. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  16. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  17. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  18. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  19. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  20. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  1. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  2. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  3. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  4. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  5. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  6. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Revocation or suspension of identification cards. 112.48 Section 112.48 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards....

  7. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Changes in information on identification cards. 112.44 Section 112.44 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards....

  8. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.9 Northern...

  9. The application of a biometric identification technique for linking community and hospital data in rural Ghana

    PubMed Central

    Odei-Lartey, Eliezer Ofori; Boateng, Dennis; Danso, Samuel; Kwarteng, Anthony; Abokyi, Livesy; Amenga-Etego, Seeba; Gyaase, Stephaney; Asante, Kwaku Poku; Owusu-Agyei, Seth

    2016-01-01

    Background The reliability of counts for estimating population dynamics and disease burdens in communities depends on the availability of a common unique identifier for matching general population data with health facility data. Biometric data has been explored as a feasible common identifier between the health data and sociocultural data of resident members in rural communities within the Kintampo Health and Demographic Surveillance System located in the central part of Ghana. Objective Our goal was to assess the feasibility of using fingerprint identification to link community data and hospital data in a rural African setting. Design A combination of biometrics and other personal identification techniques were used to identify individual's resident within a surveillance population seeking care in two district hospitals. Visits from resident individuals were successfully recorded and categorized by the success of the techniques applied during identification. The successes of visits that involved identification by fingerprint were further examined by age. Results A total of 27,662 hospital visits were linked to resident individuals. Over 85% of those visits were successfully identified using at least one identification method. Over 65% were successfully identified and linked using their fingerprints. Supervisory support from the hospital administration was critical in integrating this identification system into its routine activities. No concerns were expressed by community members about the fingerprint registration and identification processes. Conclusions Fingerprint identification should be combined with other methods to be feasible in identifying community members in African rural settings. This can be enhanced in communities with some basic Demographic Surveillance System or census information. PMID:26993473

  10. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Physical security features for the driver's license or identification card. 37.15 Section 37.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements §...

  11. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  12. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  13. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  14. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  15. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  16. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  17. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  18. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  19. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  20. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Renewal of REAL ID driver's licenses and identification cards. 37.25 Section 37.25 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal...

  1. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Temporary or limited-term driver's licenses and identification cards. 37.21 Section 37.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements §...

  2. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Reissued REAL ID driver's licenses and identification cards. 37.23 Section 37.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued...

  3. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  4. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  5. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  6. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  7. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  8. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  9. Biometric identification of capillariid eggs from archaeological sites in Patagonia.

    PubMed

    Taglioretti, V; Fugassa, M H; Beltrame, M O; Sardella, N H

    2014-06-01

    Numerous eggs of capillariid nematodes have been found in coprolites from a wide range of hosts and in raptor pellets in archaeological samples from Patagonia. The structure and sculpture of the eggshell of these nematodes and their biometry are commonly used for identification. The aim of this study was to determine whether eggs of the genus Calodium with similar morphology, found in different archaeological samples from Patagonia, belong to the same species. For this purpose, capillariid eggs (N= 843) with thick walls and radial striations were studied by permutational multivariate analysis of variance (PERMANOVA). Eggs exhibiting similar shape and structure also showed similar biometry, regardless of the zoological origin of coprolites (P= 0.84), host diet (P= 0.19), character of the archaeological sites (P= 0.67) and chronology (P= 0.66). Thus, they were attributed to the same species. We suggest that an unidentified zoonotic species of the genus Calodium occurred in the digestive tract of a wide range of hosts in Patagonia during the Holocene and that both human and animal populations were exposed to this parasite during the Holocene in the study area. PMID:23388621

  10. FLIR biometrics

    NASA Astrophysics Data System (ADS)

    O'Kane, Barbara L.; Krzywicki, Alan T.

    2009-04-01

    Biometrics are generally thought of as anatomical features that allow positive identification of a person. This paper describes biometrics that are also physiological in nature. The differences between anatomy and physiology have to do with the fact that physiology is dynamic, functioning, and changing with the state or actions of a person whereas anatomy is generally more stable. Biometrics in general usually refers to a trait, whereas the new type of biometrics discussed in this paper refer to a state, which is temporary, and often even transitory. By state, what is meant is the condition of a person at a particular time relative to their psychological, physical, medical, or physiological status. The present paper describes metrics that are cues to the state of a functioning individual observable through a thermal camera video system. An inferred state might then be tied to the positive identification of the person. Using thermal for this purpose is significant because the thermal signature of a human is dynamic and changes with physical and emotional state, while also revealing underlying anatomical structures. A new method involving the counting of open pores on the skin is discussed as a way of observing the Electrodermal Activity (EDA) of the skin, a primary component of the polygraph.

  11. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these..., OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation... identification card. For the machine readable portion of the REAL ID driver's license or identification...

  12. 48 CFR 652.204-70 - Department of State Personal Identification Card Issuance Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Personal Identification Card Issuance Procedures. 652.204-70 Section 652.204-70 Federal Acquisition... Provisions and Clauses 652.204-70 Department of State Personal Identification Card Issuance Procedures. As prescribed in 604.1301-70, insert the following clause: Department of State Personal Identification...

  13. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  14. Transformation of hand-shape features for a biometric identification approach.

    PubMed

    Travieso, Carlos M; Briceño, Juan Carlos; Alonso, Jesús B

    2012-01-01

    The present work presents a biometric identification system for hand shape identification. The different contours have been coded based on angular descriptions forming a Markov chain descriptor. Discrete Hidden Markov Models (DHMM), each representing a target identification class, have been trained with such chains. Features have been calculated from a kernel based on the HMM parameter descriptors. Finally, supervised Support Vector Machines were used to classify parameters from the DHMM kernel. First, the system was modelled using 60 users to tune the DHMM and DHMM_kernel+SVM configuration parameters and finally, the system was checked with the whole database (GPDS database, 144 users with 10 samples per class). Our experiments have obtained similar results in both cases, demonstrating a scalable, stable and robust system. Our experiments have achieved an upper success rate of 99.87% for the GPDS database using three hand samples per class in training mode, and seven hand samples in test mode. Secondly, the authors have verified their algorithms using another independent and public database (the UST database). Our approach has reached 100% and 99.92% success for right and left hand, respectively; showing the robustness and independence of our algorithms. This success was found using as features the transformation of 100 points hand shape with our DHMM kernel, and as classifier Support Vector Machines with linear separating functions, with similar success. PMID:22368506

  15. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  16. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  17. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  18. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  19. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  20. 77 FR 60134 - Agency Information Collection Activities; Application for Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Federal Register (77 FR 42753) on June 20, 2012, allowing for a 60-day comment period. This notice allows... Identification Card AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day... accordance with the Paperwork Reduction Act: Application for ] Identification Card (CBP Form 3078). This is...

  1. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Restrictions on the use of identification cards. 2.18 Section 2.18 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.18 Restrictions on the use of identification cards....

  2. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false U.S. Citizen Identification Card. 235.10 Section 235.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form...

  3. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false U.S. Citizen Identification Card. 235.10 Section 235.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form...

  4. Random patterns and biometrics for counterfeit deterrence

    SciTech Connect

    Tolk, K.M.

    1993-12-31

    Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. The resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.

  5. EEG biometric identification: a thorough exploration of the time-frequency domain

    NASA Astrophysics Data System (ADS)

    DelPozo-Banos, Marcos; Travieso, Carlos M.; Weidemann, Christoph T.; Alonso, Jesús B.

    2015-10-01

    Objective. Although interest in using electroencephalogram (EEG) activity for subject identification has grown in recent years, the state of the art still lacks a comprehensive exploration of the discriminant information within it. This work aims to fill this gap, and in particular, it focuses on the time-frequency representation of the EEG. Approach. We executed qualitative and quantitative analyses of six publicly available data sets following a sequential experimentation approach. This approach was divided in three blocks analysing the configuration of the power spectrum density, the representation of the data and the properties of the discriminant information. A total of ten experiments were applied. Main results. Results show that EEG information below 40 Hz is unique enough to discriminate across subjects (a maximum of 100 subjects were evaluated here), regardless of the recorded cognitive task or the sensor location. Moreover, the discriminative power of rhythms follows a W-like shape between 1 and 40 Hz, with the central peak located at the posterior rhythm (around 10 Hz). This information is maximized with segments of around 2 s, and it proved to be moderately constant across montages and time. Significance. Therefore, we characterize how EEG activity differs across individuals and detail the optimal conditions to detect subject-specific information. This work helps to clarify the results of previous studies and to solve some unanswered questions. Ultimately, it will serve as guide for the design of future biometric systems.

  6. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost. PMID:25371272

  7. [On the use of the spectral speech characteristics for the determination of biometric parameters of the vocal tract in forensic medical identification of the speaker's personality].

    PubMed

    Kaganov, A Sh

    2014-01-01

    The objective of the present study was to elucidate the relationship between the spectral speech characteristics and the biometric parameters of the speaker's vocal tract. The secondary objective was to consider the theoretical basis behind the medico-criminalistic personality identification from the biometric parameters of the speaker's vocal tract. The article is based on the results of real forensic medical investigations and the literature data. PMID:25275181

  8. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification

    PubMed Central

    Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-01-01

    Introduction The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. Aim To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. Materials and Methods The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier’s caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson’s coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Results Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. Conclusion The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations. PMID:27437349

  9. Teaching Number Identification to Students with Severe Disabilities Using Response Cards

    ERIC Educational Resources Information Center

    Skibo, Holly; Mims, Pamela; Spooner, Fred

    2011-01-01

    Active student responding (ASR) has been shown to be an effective way to improve the mathematical skills of students. One specific method of ASR is the use of response cards. In this study, a system of least prompts combined with response cards was used to increase mathematical knowledge, and number identification, of three elementary students…

  10. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Driver's licenses and identification cards issued during the age-based enrollment period. 37.27 Section 37.27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card...

  11. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  12. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  13. MALDI-TOF MS versus VITEK 2 ANC card for identification of anaerobic bacteria

    PubMed Central

    Li, Yang; Gu, Bing; Xia, Wenying; Fan, Kun; Mei, Yaning; Huang, Peijun; Pan, Shiyang

    2014-01-01

    Background Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) is an accurate, rapid and inexpensive technique that has initiated a revolution in the clinical microbiology laboratory for identification of pathogens. The Vitek 2 anaerobe and Corynebacterium (ANC) identification card is a newly developed method for identification of corynebacteria and anaerobic species. The aim of this study was to evaluate the effectiveness of the ANC card and MALDI-TOF MS techniques for identification of clinical anaerobic isolates. Methods Five reference strains and a total of 50 anaerobic bacteria clinical isolates comprising ten different genera and 14 species were identified and analyzed by the ANC card together with Vitek 2 identification system and Vitek MS together with version 2.0 database respectively. 16S rRNA gene sequencing was used as reference method for accuracy in the identification. Results Vitek 2 ANC card and Vitek MS provided comparable results at species level for the five reference strains. Of 50 clinical strains, the Vitek MS provided identification for 46 strains (92%) to the species level, 47 (94%) to genus level, one (2%) low discrimination, two (4%) no identification and one (2%) misidentification. The Vitek 2 ANC card provided identification for 43 strains (86%) correct to the species level, 47 (94%) correct to the genus level, three (6%) low discrimination, three (6%) no identification and one (2%) misidentification. Conclusions Both Vitek MS and Vitek 2 ANC card can be used for accurate routine clinical anaerobe identification. Comparing to the Vitek 2 ANC card, Vitek MS is easier, faster and more economic for each test. The databases currently available for both systems should be updated and further developed to enhance performance. PMID:24822113

  14. Biometric verification with correlation filters.

    PubMed

    Vijaya Kumar, B V K; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-10

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification. PMID:14735958

  15. Biometric verification with correlation filters

    NASA Astrophysics Data System (ADS)

    Vijaya Kumar, B. V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification.

  16. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border crossing... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... expedited removal in accordance with 8 CFR part 235, the applicant shall be advised in writing that he...

  17. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border crossing... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... expedited removal in accordance with 8 CFR part 235, the applicant shall be advised in writing that he...

  18. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... apply for a new card as provided for in the DOS regulations found at 22 CFR 41.32 and 22 CFR 41.103. ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person...

  19. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    PubMed

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed. PMID:27309026

  20. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  1. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  2. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  3. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  4. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Captain of the Port Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) WATERFRONT FACILITIES IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR VESSELS § 125.13...

  5. Micro secure digital card: A novel method for denture identification

    PubMed Central

    Colvenkar, Shreya S.; Gopal, Sujatha

    2014-01-01

    Aim: Denture labeling is of vital significance in social and forensic scenario. Numerous published work have attempted to present best method for denture marking, however not all satisfy crucial requirement either in terms of cost or storage of large amount of information. Hence, this paper describes a simple, cheap, and feasible denture marking system using portable Micro Secure Digital (MicroSD) card. These cards are created to store, modify, and view large amount of information with mobile phones, which forms an important part in majority of household in India. Materials and Methods: After try-in make a depression slightly wider than the size of the MicroSD card on the external lingual flange of the trial mandibular denture. Process the denture together with acrylic wax flap according to manufacturer's instructions. The acrylic flap is planned in such a way that it is well-flushed with surrounding areas and can be lifted on one side to access the card. MicroSD card is placed in the denture and flap is closed. Conclusion: The proposed method is simple, cheap, and can store large amount of information. PMID:25177141

  6. Body, biometrics and identity.

    PubMed

    Mordini, Emilio; Massari, Sonia

    2008-11-01

    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, narratives and meanings. Certainly there are reasons for the ethical and political concerns surrounding biometrics but these reasons are probably quite different from those usually alleged. PMID:18959731

  7. Explosives trace detection in the process of biometrical fingerprint identification for access control

    NASA Astrophysics Data System (ADS)

    Bertseva, Elena V.; Savin, Andrey V.

    2007-02-01

    A method for trace detection of explosives on the surface of biometric fingerprint scanner is proposed and its sensitivity explored. The method is based on attenuated total reflection mid-infrared spectroscopy. The detection limit is about several microgram and the detectivity increases with the wavelength used for scanning. The advantages of the proposed method include high selectivity and thus low false alarm level, applicability to low vapor pressure explosives and low cost.

  8. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  9. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Validity periods and deadlines for REAL ID driver's licenses and identification cards. 37.5 Section 37.5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID...

  10. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  11. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  12. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  13. Anatomy of biometric passports.

    PubMed

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  14. Anatomy of Biometric Passports

    PubMed Central

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  15. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued...

  16. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 1235.10 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.10 U.S. Citizen Identification... Card is void if the person to whom it was issued admits in a statement signed before an...

  17. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  18. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  19. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  20. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  1. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... satisfactory to the Indian Health Service of tribal membership and residence within a Health Service Delivery... 42 Public Health 1 2011-10-01 2011-10-01 false Beneficiary Identification Cards and verification of tribal membership. 136a.16 Section 136a.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT...

  2. State-Issued Identification Cards Reveal Patterns in Adult Weight Status

    PubMed Central

    Morris, Daniel S.; Main, Eric C.; Harris, Jenine K.; Moland, Abraham; Cude, Curtis

    2015-01-01

    Background: State-issued identification cards are a promising data source for neighborhood-level obesity estimates. Methods: We used information from three million Oregon state-issued identification cards to compute age-adjusted estimates of average adult body mass index (BMI) for each census tract in the state. We used multivariate linear regression to identify associations between weight status and population characteristics, food access, commuting behavior, and geography. Results: Together, home values, education, race, ethnicity, car commuting, and rural-urban commuting area (RUCA) explained 86% of the variation in BMI among tracts. BMI was lower in areas with higher home values and greater educational attainment, and higher in areas with more workers commuting by car. Discussion: Our findings are consistent with other research on socioeconomic disparities in obesity. This demonstrates state-issued identification cards are a promising data source for BMI surveillance and may offer new insight into the association between weight status and economic and environmental factors. Public health agencies should explore options for developing their own obesity estimates from identification card data. PMID:26062036

  3. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  4. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  5. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Restrictions on the use of identification cards and public signs. 1.467 Section 1.467 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS GENERAL PROVISIONS Release of Information from Department of Veterans Affairs (va) Records Relating to Drug...

  6. 77 FR 42753 - Agency Information Collection Activities: Application for Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ...As part of its continuing effort to reduce paperwork and respondent burden, CBP invites the general public and other Federal agencies to comment on an information collection requirement concerning the Application for Identification Card (CBP Form 3078). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995 (Pub. L....

  7. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Beneficiary Identification Cards and verification of tribal membership. 136a.16 Section 136a.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH What Services Are Available and Who Is Eligible...

  8. 36 CFR 1254.10 - For how long and where is my researcher identification card valid?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false For how long and where is my researcher identification card valid? 1254.10 Section 1254.10 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS General Information §...

  9. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Identification card or document in possession. 930.112 Section 930.112 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PROGRAMS FOR SPECIFIC POSITIONS AND EXAMINATIONS (MISCELLANEOUS) Motor Vehicle Operators § 930.112...

  10. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  11. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  12. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  13. Improving the recognition of fingerprint biometric system using enhanced image fusion

    NASA Astrophysics Data System (ADS)

    Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma

    2010-04-01

    Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.

  14. Review of modern biometric user authentication and their development prospects

    NASA Astrophysics Data System (ADS)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  15. Campus Card Tricks.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1999-01-01

    Examines the development of an innovative student identification card system that includes off-campus banking and credit card functions. Finding solutions to bank objections, credit card company rule problems, and software difficulties are discussed. (GR)

  16. 3D combinational curves for accuracy and performance analysis of positive biometrics identification

    NASA Astrophysics Data System (ADS)

    Du, Yingzi; Chang, Chein-I.

    2008-06-01

    The receiver operating characteristic (ROC) curve has been widely used as an evaluation criterion to measure the accuracy of biometrics system. Unfortunately, such an ROC curve provides no indication of the optimum threshold and cost function. In this paper, two kinds of 3D combinational curves are proposed: the 3D combinational accuracy curve and the 3D combinational performance curve. The 3D combinational accuracy curve gives a balanced view of the relationships among FAR (false alarm rate), FRR (false rejection rate), threshold t, and Cost. Six 2D curves can be derived from the 3D combinational accuracy curve: the conventional 2D ROC curve, 2D curve of (FRR, t), 2D curve of (FAR, t), 2D curve of (FRR, Cost), 2D curve of (FAR, Cost), and 2D curve of ( t, Cost). The 3D combinational performance curve can be derived from the 3D combinational accuracy curve which can give a balanced view among Security, Convenience, threshold t, and Cost. The advantages of using the proposed 3D combinational curves are demonstrated by iris recognition systems where the experimental results show that the proposed 3D combinational curves can provide more comprehensive information of the system accuracy and performance.

  17. Modular biometric system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Viazanko, Michael; O'Looney, Jimmy; Szu, Harold

    2009-04-01

    Modularity Biometric System (MBS) is an approach to support AiTR of the cooperated and/or non-cooperated standoff biometric in an area persistent surveillance. Advanced active and passive EOIR and RF sensor suite is not considered here. Neither will we consider the ROC, PD vs. FAR, versus the standoff POT in this paper. Our goal is to catch the "most wanted (MW)" two dozens, separately furthermore ad hoc woman MW class from man MW class, given their archrivals sparse front face data basis, by means of various new instantaneous input called probing faces. We present an advanced algorithm: mini-Max classifier, a sparse sample realization of Cramer-Rao Fisher bound of the Maximum Likelihood classifier that minimize the dispersions among the same woman classes and maximize the separation among different man-woman classes, based on the simple feature space of MIT Petland eigen-faces. The original aspect consists of a modular structured design approach at the system-level with multi-level architectures, multiple computing paradigms, and adaptable/evolvable techniques to allow for achieving a scalable structure in terms of biometric algorithms, identification quality, sensors, database complexity, database integration, and component heterogenity. MBS consist of a number of biometric technologies including fingerprints, vein maps, voice and face recognitions with innovative DSP algorithm, and their hardware implementations such as using Field Programmable Gate arrays (FPGAs). Biometric technologies and the composed modularity biometric system are significant for governmental agencies, enterprises, banks and all other organizations to protect people or control access to critical resources.

  18. A lightweight approach for biometric template protection

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  19. Performances of VITEK 2 Colorimetric Cards for Identification of Gram-Positive and Gram-Negative Bacteria

    PubMed Central

    Wallet, Frédéric; Loïez, Caroline; Renaux, Emilie; Lemaitre, Nadine; Courcol, René J.

    2005-01-01

    Thepurpose of this study was to evaluate the new VITEK 2 identification cards that use colorimetric reading to identify gram-positive and gram-negative bacteria (GP and GN cards, respectively) in comparison to fluorimetric cards (ID-GPC and ID-GNB, respectively). A total of 580 clinical isolates and stock collection strains belonging to 116 taxa were included in the study. Of the 249 gram-positive strains tested with both the ID-GPC and GP cards, 218 (87.5%) and 235 (94.4%) strains were correctly identified (to the genus and species level), respectively. Of the 331 gram-negative strains tested with the ID-GNB and GN cards, 295 (89.1%) and 321 (97%) strains were correctly identified, respectively. Another focus of the study was to apply the percentages of correct identifications obtained in this study to the list of bacteria isolated in our laboratory (32,739 isolates) in the year 2004. We obtained 97.9% correct identifications with the colorimetric cards and 93.9% with fluorescent cards. PMID:16145083

  20. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    NASA Astrophysics Data System (ADS)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  1. Biometrics for electronic health records.

    PubMed

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment. PMID:20703610

  2. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  3. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  4. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  5. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  6. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  7. 7 CFR 274.10 - Use of identification cards and redemption of coupons by eligible households.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... household's issuance. In areas not designated by FNS as requiring Photo ID cards, the ID card shall contain... same envelope with authorization documents or coupons. (b) Photo ID cards. (1) Photo ID cards shall be... beginning of each fiscal year of any areas that either require or no longer require the use of Photo...

  8. Efficient search and retrieval in biometric databases

    NASA Astrophysics Data System (ADS)

    Mhatre, Amit J.; Palla, Srinivas; Chikkerur, Sharat; Govindaraju, Venu

    2005-03-01

    Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. Fingerprints, face and voice biometrics are being increasingly used as alternatives to passwords, PINs and visual verification. In spite of the rapid proliferation of large-scale databases, the research has thus far been focused only on accuracy within small databases. In larger applications, response time and retrieval efficiency also become important in addition to accuracy. Unlike structured information such as text or numeric data that can be sorted, biometric data does not have any natural sorting order. Therefore indexing and binning of biometric databases represents a challenging problem. We present results using parallel combination of multiple biometrics to bin the database. Using hand geometry and signature features we show that the search space can be reduced to just 5% of the entire database.

  9. 36 CFR 1254.6 - Do I need a researcher identification card to use archival materials at a NARA facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Do I need a researcher identification card to use archival materials at a NARA facility? 1254.6 Section 1254.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS...

  10. 36 CFR 1254.8 - What information do I need to provide when applying for a researcher identification card?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What information do I need to provide when applying for a researcher identification card? 1254.8 Section 1254.8 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS...

  11. New biometric modalities using internal physical characteristics

    NASA Astrophysics Data System (ADS)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  12. Biometric template transformation: a security analysis

    NASA Astrophysics Data System (ADS)

    Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.

    2010-01-01

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

  13. Identification of genetic variation and putative regulatory regions in bovine CARD15

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Mutations in caspase recruitment domain 15 (CARD15) are associated with susceptibility to Crohn's disease and Blau Syndrome. We performed comparative analyses of the bovine, murine, and human CARD15 transcripts to elucidate functionality of bovine CARD15 and examine its potential role in bovine dise...

  14. Recent research results in iris biometrics

    NASA Astrophysics Data System (ADS)

    Hollingsworth, Karen; Baker, Sarah; Ring, Sarah; Bowyer, Kevin W.; Flynn, Patrick J.

    2009-05-01

    Many security applications require accurate identification of people, and research has shown that iris biometrics can be a powerful identification tool. However, in order for iris biometrics to be used on larger populations, error rates in the iris biometrics algorithms must be as low as possible. Furthermore, these algorithms need to be tested in a number of different environments and configurations. In order to facilitate such testing, we have collected more than 100,000 iris images for use in iris biometrics research. Using this data, we have developed a number of techniques for improving recognition rates. These techniques include fragile bit masking, signal-level fusion of iris images, and detecting local distortions in iris texture. Additionally, we have shown that large degrees of dilation and long lapses of time between image acquisitions negatively impact performance.

  15. Biometric recognition via fixation density maps

    NASA Astrophysics Data System (ADS)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  16. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Department of Defense (DoD) proposes to establish policy, assign responsibilities, and provide procedures for the issuing of distinct DoD ID cards. The ID cards shall be issued to uniformed service members, their dependents, and other eligible individuals and will be used as proof of identity and DoD...

  17. Protein identification from dried nipple aspirate fluid on Guthrie cards using mass spectrometry.

    PubMed

    Delmonico, Lucas; Areias, Vivian Rabello; Pinto, Rodrigo César; Matos, Cintia Da Silva; Rosa, Marco Felipe Franco; De Azevedo, Carolina Maria; Alves, Gilda

    2015-07-01

    Nipple aspirate fluid (NAF) requires investigation as a potential source of biomarkers for early diagnosis or risk assessment in breast cancer and other breast disorders. The present study demonstrated that proteins were easily extracted from dried NAF spots on Guthrie cards and were suitable for mass spectrometry analysis. NAF was obtained from 80 women, collected on Guthrie cards, between 2007 and 2010. The NAF-proteins were extracted from the card by incubating the card in water. These proteins were then quantified and separated using one-dimensional, 12% SDS-PAGE, gel electrophoresis and on high-resolution gradient gels at different concentrations (4-12, 8-16 and 4-20%). The bands with the most abundant proteins were excised from the gradient gels and the proteins were identified by liquid chromatography quadrupole time of flight. Immunoglobulins, Zn-α2-glicoprotein, apoliprotein D and prolactin inducible protein were among those identified. The NAF-Guthrie card collection method has not been applied previously, however, NAF proteins have been identified using other collecting techniques, confirming the feasibility of the NAF Guthrie card collection method for analyzing the proteins within NAF. The NAF-Guthrie card collecting method has multiple advantages, including being inexpensive, non-invasive, reliable and painless, and the cards can be stored at room temperature. Examining NAF may assist in identifying individuals at a higher risk of breast cancer and in improving patient prognosis. PMID:25760982

  18. A MEMS-based, wireless, biometric-like security system

    NASA Astrophysics Data System (ADS)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  19. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  20. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George

    2013-01-01

    Hand-based biometric analysis systems and techniques provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an input image. Additionally, the analysis uses re-use of commonly seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  1. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  2. Corneal topography measurements for biometric applications

    NASA Astrophysics Data System (ADS)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  3. Mathematical and information maintenance of biometric systems

    NASA Astrophysics Data System (ADS)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  4. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... of transaction. (d) Date of birth. (e) Gender. (f) Address as listed on the card pursuant to §...

  5. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... 6 Domestic Security 1 2014-01-01 2014-01-01 false Machine readable technology on the driver's..., Verification, and Card Issuance Requirements § 37.19 Machine readable technology on the driver's license...

  6. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... 6 Domestic Security 1 2013-01-01 2013-01-01 false Machine readable technology on the driver's..., Verification, and Card Issuance Requirements § 37.19 Machine readable technology on the driver's license...

  7. Biometrics and international migration.

    PubMed

    Redpath, Jillyanne

    2007-01-01

    This paper will focus on the impact of the rapid expansion in the use of biometric systems in migration management on the rights of individuals; it seeks to highlight legal issues for consideration in implementing such systems, taking as the starting point that the security interests of the state and the rights of the individual are not, and should not be, mutually exclusive. The first part of this paper briefly describes the type of biometric applications available, how biometric systems function, and those used in migration management. The second part examines the potential offered by biometrics for greater security in migration management, and focuses on developments in the use of biometrics as a result of September 11. The third part discusses the impact of the use of biometrics in the management of migration on the individual's right to privacy and ability to move freely and lawfully. The paper highlights the increasing need for domestic and international frameworks to govern the use of biometric applications in the migration/security context, and proposes a number of issues that such frameworks could address. PMID:17536151

  8. 3D face analysis for demographic biometrics

    SciTech Connect

    Tokola, Ryan A; Mikkilineni, Aravind K; Boehnen, Chris Bensing

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  9. On the Design of Forgiving Biometric Security Systems

    NASA Astrophysics Data System (ADS)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  10. Biometrics and Security

    NASA Astrophysics Data System (ADS)

    Govindaraju, Venu

    The science of Biometrics is concerned with recognizing people based on their physiological or behavioral characteristics. It has emerged as a vibrant field of research in today's security conscious society. In this talk we will introduce the important research challenges in Biometrics and specifically address the following topics: i) unobtrusive people tracking using a novel evolutionary recognition paradigm, ii) efficient indexing and searching of large fingerprint databases, iii) cancelability of templates where the task is to ensure that enrolled biometric templates can be revoked and new templates issued, and iv) fusion of fingerprints with other biometric modalities such as face where we will explore optimal trainable functions that operate on the scores returned by individual matchers.

  11. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  12. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  13. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  14. Live biometric authenticity check

    NASA Astrophysics Data System (ADS)

    Szu, Harold H.; Hsu, Charles C.; Szu, Clifford; Wang, Shoujue

    2003-04-01

    This research defined the underpinning concepts of a system that was highly secure, yet was efficient and non-invasive enough for everyday use. The live biometric authenticity check augmented invariant fingerprints with variable live features offered superior security by combining physical characteristics of the user"s with a passcode (numerical PIN) or passphrase (a string of words), and might also easily be augmented with other biometric video imaging devices for the utmost security.

  15. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  16. Identification of inorganic pigments used in porcelain cards based on fusing Raman and X-ray fluorescence (XRF) data.

    PubMed

    Deneckere, Annelien; de Vries, Lieke; Vekemans, Bart; Van de Voorde, Lien; Ariese, Freek; Vincze, Laszlo; Moens, Luc; Vandenabeele, Peter

    2011-11-01

    Raman spectroscopy and X-ray fluorescence (XRF) spectroscopy are often used as complementary techniques that are well suited for the analysis of art objects because both techniques are fast, sensitive, and noninvasive and measurements can take place in situ. In most of these studies, both techniques are used separately, in the sense that the spectra are evaluated independently and single conclusions are obtained, considering both results. This paper presents a data fusion procedure for Raman and XRF data for the characterization of pigments used in porcelain cards. For the classification of the analyzed points of the porcelain cards principal component analysis (PCA) was used. A first attempt was made to develop a new procedure for the identification of the pigments using a database containing the fused Raman-XRF data of 24 reference pigments. The results show that the classification based on the fused Raman-XRF data is significantly better than the classifications based on the Raman data or the XRF data separately. PMID:22054088

  17. Developing a multimodal biometric authentication system using soft computing methods.

    PubMed

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision. PMID:25502384

  18. Geometrical features of transformed phase masks in the optical/digital device for identification of credit cards

    NASA Astrophysics Data System (ADS)

    Muravsky, Leonid I.; Kulynych, Yaroslav P.; Maksymenko, Olexander P.; Voronyak, Taras I.; Kostyukevych, Sergey A.

    2002-04-01

    The new method for identification of optical marks containing transformed phase masks (TPMs) is considered. A TPM placed in an optical correlator produces several sharp correlation peaks on its output. We choose the distances between peaks as basic geometrical features of a TPM. The increase of quantity of basic features leads to the increase of security level of documents and valuable papers. However, the amount of such features is limited and is depending from many factors. We picked the probability of false identification of the nearest feature as the criterion of separation of features on independent classes. The optical/digital device for identification of credit cards based on a joint transform correlator architecture was used for the study of TPMs. To estimate the law of distribution of basic features inherent to the same class, we carried out experiments with the series of TPMs. We have shown, that the additional features allow to increase the number of basic features, separated on different classes. These experiments also have allowed to estimate the error of features measurements

  19. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  20. Improved reader for magnetically-encoded ID cards

    NASA Technical Reports Server (NTRS)

    Wu, T. T.

    1979-01-01

    Hybrid demodulator in electronic card reader for magnetically encoded identification cards, accommodates variations in insertion speeds, yet is simpler and less expensive than equivalent all-digital circuits.

  1. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  2. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  3. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  4. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  5. Unconstrained and contactless hand geometry biometrics.

    PubMed

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices. PMID:22346634

  6. Extracting forensic evidence from biometric devices

    NASA Astrophysics Data System (ADS)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  7. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols. PMID:27462493

  8. Genetics, biometrics and the informatization of the body.

    PubMed

    van der Ploeg, Irma

    2007-01-01

    "Genetics" is a term covering a wide set of theories, practices, and technologies, only some of which overlap with the practices and technologies of biometrics. In this paper some current technological developments relating to biometric applications of genetics will be highlighted. Next, the author will elaborate the notion of the informatization of the body, by means of a brief philosophical detour on the dualisms of language and reality, words and things. In the subsequent sections she will then draw out some of the questions relevant to the purposes of Biometrics Identification Technology Ethics (BITE), and discuss the ethical problems associated with the informatization of the body. There are, however some problems and limitations to the currently dominant ethical discourse to deal with all things ethical in relation to information technology in general, and biometrics or genetics in particular. The final section will discuss some of these meta-problems. PMID:17536153

  9. Smart card multiple function badge

    SciTech Connect

    Nelson, R.A.

    1993-06-01

    Smart cards are credit card-sized computers with integrated data storage, an operating system to manage the data, and built-in security features that protect the data. They are used to distribute information to remote sites, providing the same or greater reliability, data integrity, and information security than a network system. However, smart cards may provide greater functionality at a lower cost than network systems. The US Department of Energy Hanford Site is developing the smart card to be used as a multiple function identification badge that will service various data management requirements on the Site. This paper discusses smart card technology and the proposed Hanford Site applications.

  10. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ...To implement DoD Instruction 8520.2, dated April 1, 2004, SDDC required all commercial accounts accessing transportation systems and applications to use a commercial PKI certificate or Transportation Workers Identification Credential (TWIC). TWIC does not meet DOD security standards and cannot be used as of January 29,...

  11. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    NASA Astrophysics Data System (ADS)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  12. Sensor-fusion-based biometric identity verification

    SciTech Connect

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person`s identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm.

  13. Cognitive Biometrics: Challenges for the Future

    NASA Astrophysics Data System (ADS)

    Revett, Kenneth; de Magalhães, Sergio Tenreiro

    Cognitive biometrics is a novel approach to user authentication/identification which utilises a biosignal based approach. Specifically, current implementations rely on the use of the electroencephalogram (EEG), electrocardiogram (ECG), and the electrodermal response (EDR) as inputs into a traditional authentication scheme. The scientific basis for the deployment of biosignals resides principally on their uniqueness -for instance the theta power band in adults presents a phenotypic/genetic correlation of approximately 75%. The numbers are roughly the same for ECG, with an heritability correlation for the peak-to-peak (R-R interval) times of over 77%. For EDR, the results indicate that there is approximately a 50% heritability score (h2). The challenge with respect to cognitive biometrics based on biosignals is to enhance the information content of the acquired data.

  14. Analysis of Human Electrocardiogram for Biometric Recognition

    NASA Astrophysics Data System (ADS)

    Wang, Yongjin; Agrafioti, Foteini; Hatzinakos, Dimitrios; Plataniotis, Konstantinos N.

    2007-12-01

    Security concerns increase as the technology for falsification advances. There are strong evidences that a difficult to falsify biometric trait, the human heartbeat, can be used for identity recognition. Existing solutions for biometric recognition from electrocardiogram (ECG) signals are based on temporal and amplitude distances between detected fiducial points. Such methods rely heavily on the accuracy of fiducial detection, which is still an open problem due to the difficulty in exact localization of wave boundaries. This paper presents a systematic analysis for human identification from ECG data. A fiducial-detection-based framework that incorporates analytic and appearance attributes is first introduced. The appearance-based approach needs detection of one fiducial point only. Further, to completely relax the detection of fiducial points, a new approach based on autocorrelation (AC) in conjunction with discrete cosine transform (DCT) is proposed. Experimentation demonstrates that the AC/DCT method produces comparable recognition accuracy with the fiducial-detection-based approach.

  15. Bartus Iris biometrics

    SciTech Connect

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  16. Multimodal biometric approach for cancelable face template generation

    NASA Astrophysics Data System (ADS)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  17. Soft biometrics in conjunction with optics based biohashing

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2011-02-01

    Biometric systems are gaining importance because of increased reliability for authentication and identification. A biometric recognition technique has been proposed earlier, in which biohashing code has been generated by using a joint transform correlator. The main drawback of the base biohashing method is the low performance of the technique when an "impostor" steals the pseudo-random numbers of the genuine and tries to authenticate as genuine. In the proposed technique, soft biometrics of the same person has been used to improve the discrimination between the genuine and the impostor populations. The soft biometrics are those characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate between any two individuals. In the enrolment process, biohash code of the target face images has been integrated with the different soft biometrics of the same person. The obtained code has been stored for verification. In the verification process, biohash code of the face image to be verified is again diffused with the soft biometric of the person. The obtained code is matched with the stored code of the target. The receiving operating characteristic (ROC) curve and the equal error rate (EER) have been used to evaluate the performance of the technique. A detailed study has been carried out to find out the optimum values of the weighting factor for the diffusion process.

  18. Biometrics Go Mainstream

    ERIC Educational Resources Information Center

    Gale, Doug

    2006-01-01

    Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…

  19. Mouse Curve Biometrics

    SciTech Connect

    Schulz, Douglas A.

    2007-10-08

    A biometric system suitable for validating user identity using only mouse movements and no specialized equipment is presented. Mouse curves (mouse movements with little or no pause between them) are individually classied and used to develop classication histograms, which are representative of an individual's typical mouse use. These classication histograms can then be compared to validate identity. This classication approach is suitable for providing continuous identity validation during an entire user session.

  20. Privacy and biometric passports.

    PubMed

    Vakalis, Ioannis

    2011-01-01

    This work deals with privacy implications and threats that can emerge with the large-scale use of electronic biometric documents, such the recently introduced electronic passport (e-Passport). A brief introduction to privacy and personal data protection is followed by a presentation of the technical characteristics of the e-Passport. The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack. PMID:21380483

  1. 36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., debit card, or credit card. Your researcher identification card number as encoded on the card forms the... chapter, you may use cash or credit card to purchase a debit card from the vending machines located in the... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true How may I use a debit card...

  2. Optical coherence tomography used for internal biometrics

    NASA Astrophysics Data System (ADS)

    Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel

    2007-06-01

    Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.

  3. Biometric Communication Research for Television.

    ERIC Educational Resources Information Center

    Malik, M. F.

    Biometric communication research is defined as research dealing with the information impact of a film or television show, photographic picture, painting, exhibition, display, or any literary or functional texts or verbal stimuli on human beings, both as individuals and in groups (mass audiences). Biometric communication research consists of a…

  4. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  5. Playing the Smart Card.

    ERIC Educational Resources Information Center

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit cards;…

  6. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    PubMed

    Nouskalis, G

    2011-01-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity. PMID:21380482

  7. Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases

    NASA Astrophysics Data System (ADS)

    Hernando, David; Gómez, David; Saeta, Javier Rodríguez; Ejarque, Pascual; Hernando, Javier

    Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sectors, and forensic applications have climbed to the top of the list when talking about biometrics. However, some problems still remain as cornerstones in identification processes, all of them linked to the length of the databases in which the individual is supposed to be. The speed and the error are parameters that depend on the number of users in the database and measure the quality of the whole system.

  8. A method of ECG template extraction for biometrics applications.

    PubMed

    Zhou, Xiang; Lu, Yang; Chen, Meng; Bao, Shu-Di; Miao, Fen

    2014-01-01

    ECG has attracted widespread attention as one of the most important non-invasive physiological signals in healthcare-system related biometrics for its characteristics like ease-of-monitoring, individual uniqueness as well as important clinical value. This study proposes a method of dynamic threshold setting to extract the most stable ECG waveform as the template for the consequent ECG identification process. With the proposed method, the accuracy of ECG biometrics using the dynamic time wraping for difference measures has been significantly improved. Analysis results with the self-built electrocardiogram database show that the deployment of the proposed method was able to reduce the half total error rate of the ECG biometric system from 3.35% to 1.45%. Its average running time on the platform of android mobile terminal was around 0.06 seconds, and thus demonstrates acceptable real-time performance. PMID:25570031

  9. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  10. Improving Speaker Recognition by Biometric Voice Deconstruction

    PubMed Central

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  11. Improving Speaker Recognition by Biometric Voice Deconstruction.

    PubMed

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  12. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    NASA Astrophysics Data System (ADS)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the

  13. Modulated digital images for biometric and other security applications

    NASA Astrophysics Data System (ADS)

    McCarthy, Lawry D.; Lee, Robert A.; Swiegers, Gerhard F.

    2004-06-01

    There are, in general, two ways for an observer to deal with light that is incorrect in some way (e.g. which is partially out of focus). One approach is to correct the error (e.g. by using a lens to selectively bend the light). Another approach employs selective masking to block those portions of the light which are unwanted (e.g. out of focus). The principle of selective masking is used in a number of important industries. However it has not found widespread application in the field of optical security devices. This work describes the selective masking, or modulation, of digital images as a means of creating documents and transparent media containing overt or covert biometric and other images. In particular, we show how animation effects, flash-illumination features, color-shifting patches, information concealment devices, and biometric portraiture in various settings can be incorporated in transparent media like plastic packaging materials, credit cards, and plastic banknotes. We also demonstrate the application of modulated digital images to the preparation of optically variable diffractive foils which are readily customized to display biometric portraits and information. Selective masking is shown to be an important means of creating a diverse range of effects useful in authentication. Such effects can be readily and inexpensively produced without the need, for example, to fabricate lenses on materials which may not be conducive in this respect.

  14. Gaze as a biometric

    NASA Astrophysics Data System (ADS)

    Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia

    2014-03-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing still images with different spatial relationships. Specifically, we created 5 visual "dotpattern" tests to be shown on a standard computer monitor. These tests challenged the viewer's capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users' average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  15. Gaze as a biometric

    SciTech Connect

    Yoon, Hong-Jun; Carmichael, Tandy; Tourassi, Georgia

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  16. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  17. Can soft biometric traits assist user recognition?

    NASA Astrophysics Data System (ADS)

    Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik

    2004-08-01

    Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.

  18. Template aging in eye movement-driven biometrics

    NASA Astrophysics Data System (ADS)

    Komogortsev, Oleg V.; Holland, Corey D.; Karpov, Alex

    2014-05-01

    This paper presents a template aging study of eye movement biometrics, considering three distinct biometric techniques on multiple stimuli and eye tracking systems. Short-to-midterm aging effects are examined over two-weeks, on a highresolution eye tracking system, and seven-months, on a low-resolution eye tracking system. We find that, in all cases, aging effects are evident as early as two weeks after initial template collection, with an average 28% (±19%) increase in equal error rates and 34% (±12%) reduction in rank-1 identification rates. At seven months, we observe an average 18% (±8%) increase in equal error rates and 44% (±20%) reduction in rank-1 identification rates. The comparative results at two-weeks and seven-months suggests that there is little difference in aging effects between the two intervals; however, whether the rate of decay increases more drastically in the long-term remains to be seen.

  19. Heart Sound Biometric System Based on Marginal Spectrum Analysis

    PubMed Central

    Zhao, Zhidong; Shen, Qinqin; Ren, Fangqin

    2013-01-01

    This work presents a heart sound biometric system based on marginal spectrum analysis, which is a new feature extraction technique for identification purposes. This heart sound identification system is comprised of signal acquisition, pre-processing, feature extraction, training, and identification. Experiments on the selection of the optimal values for the system parameters are conducted. The results indicate that the new spectrum coefficients result in a significant increase in the recognition rate of 94.40% compared with that of the traditional Fourier spectrum (84.32%) based on a database of 280 heart sounds from 40 participants. PMID:23429515

  20. 32 CFR 161.7 - ID card life-cycle procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false ID card life-cycle procedures. 161.7 Section 161.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY IDENTIFICATION (ID) CARDS FOR MEMBERS OF THE UNIFORMED SERVICES, THEIR DEPENDENTS, AND OTHER ELIGIBLE INDIVIDUALS DoD Identification (ID) Cards: ID Card...

  1. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  2. Laboratory evaluation of the IriScan prototype biometric identifier

    SciTech Connect

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    1996-04-01

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometric device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.

  3. Secure authentication system that generates seed from biometric information.

    PubMed

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics. PMID:15751854

  4. NCI: DCTD: Biometric Research Program

    Cancer.gov

    The Biometric Research Program (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  5. NCI: DCTD: Biometric Research Branch

    Cancer.gov

    The Biometric Research Branch (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  6. NCI: DCTD: Biometric Research Program

    Cancer.gov

    The Biometric Research Program (BRB) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  7. NCI: DCTD: Biometric Research Branch

    Cancer.gov

    The Biometric Research Branch (BRB) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  8. Age of Majority Cards and Drinking among Young People.

    ERIC Educational Resources Information Center

    Smart, Reginald G.; Adlaf, Edward M.

    1987-01-01

    Examined use of age of majority cards (identification indicating legal drinking age status in Ontario) among 3,395 secondary school students. Found card status to be significantly related to frequency of alcohol use, problems, and place of drinking. Found little evidence that age of majority cards are an effective device for limiting access of…

  9. 36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., money order, debit card, or credit card. Your researcher identification card number as encoded on the... 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false How may I use a debit...

  10. 36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., money order, debit card, or credit card. Your researcher identification card number as encoded on the... 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false How may I use a debit...

  11. 36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., money order, debit card, or credit card. Your researcher identification card number as encoded on the... 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false How may I use a debit...

  12. Spotting and tracking good biometrics with the human visual system

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Jenkins, Jeffrey; Hsu, Charles

    2011-06-01

    We mathematically model the mammalian Visual System's (VS) capability of spotting objects. How can a hawk see a tiny running rabbit from miles above ground? How could that rabbit see the approaching hawk? This predatorprey interaction draws parallels with spotting a familiar person in a crowd. We assume that mammal eyes use peripheral vision to perceive unexpected changes from our memory, and then use our central vision (fovea) to pay attention. The difference between an image and our memory of that image is usually small, mathematically known as a 'sparse representation'. The VS communicates with the brain using a finite reservoir of neurotransmittents, which produces an on-center and thus off-surround Hubel/Wiesel Mexican hat receptive field. This is the basis of our model. This change detection mechanism could drive our attention, allowing us to hit a curveball. If we are about to hit a baseball, what information extracted by our HVS tells us where to swing? Physical human features such as faces, irises, and fingerprints have been successfully used for identification (Biometrics) for decades, recently including voice and walking style for identification from further away. Biologically, humans must use a change detection strategy to achieve an ordered sparseness and use a sigmoid threshold for noisy measurements in our Hetero-Associative Memory [HAM] classifier for fault tolerant recall. Human biometrics is dynamic, and therefore involves more than just the surface, requiring a 3 dimensional measurement (i.e. Daugman/Gabor iris features). Such a measurement can be achieved using the partial coherence of a laser's reflection from a 3-D biometric surface, creating more degrees of freedom (d.o.f.) to meet the Army's challenge of distant Biometrics. Thus, one might be able to increase the standoff loss of less distinguished degrees of freedom (DOF).

  13. Transfer Function Control for Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodinsky, Carlos M. (Inventor)

    2015-01-01

    A modular apparatus for acquiring biometric data may include circuitry operative to receive an input signal indicative of a biometric condition, the circuitry being configured to process the input signal according to a transfer function thereof and to provide a corresponding processed input signal. A controller is configured to provide at least one control signal to the circuitry to programmatically modify the transfer function of the modular system to facilitate acquisition of the biometric data.

  14. Biometrics between opacity and transparency.

    PubMed

    Gutwirth, Serge

    2007-01-01

    The overall aim of the democratic constitutional state is to protect a social order in which the individual liberty of the citizen is a major concern. As a consequence the democratic constitutional state should guarantee simultaneously and paradoxically a high level of individual freedom and an order in which such freedom is made possible and guaranteed. Biometrics provide a strong and expressive example both of the necessity to address the issue of opacity and transparency and the complexity of the process. Indeed, the large scale use of biometrics does not only question the position of the individual in society, but it also alters the architecture or nature of this society as such. PMID:17536155

  15. Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics

    PubMed Central

    Kostyuk, Nataliya; Cole, Phyadragren; Meghanathan, Natarajan; Isokpehi, Raphael D.; Cohly, Hari H. P.

    2011-01-01

    The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases. PMID:21747817

  16. Emerging Biometric Modalities: Challenges and Opportunities

    NASA Astrophysics Data System (ADS)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  17. Ear biometric recognition using local texture descriptors

    NASA Astrophysics Data System (ADS)

    Benzaoui, Amir; Hadid, Abdenour; Boukrouche, Abdelhani

    2014-09-01

    Automated personal identification using the shape of the human ear is emerging as an appealing modality in biometric and forensic domains. This is mainly due to the fact that the ear pattern can provide rich and stable information to differentiate and recognize people. In the literature, there are many approaches and descriptors that achieve relatively good results in constrained environments. The recognition performance tends, however, to significantly decrease under illumination variation, pose variation, and partial occlusion. In this work, we investigate the use of local texture descriptors, namely local binary patterns, local phase quantization, and binarized statistical image features for robust human identification from two-dimensional ear imaging. In contrast to global image descriptors which compute features directly from the entire image, local descriptors representing the features in small local image patches have proven to be more effective in real-world conditions. Our extensive experimental results on the benchmarks IIT Delhi-1, IIT Delhi-2, and USTB ear databases show that local texture features in general and BSIF in particular provide a significant performance improvement compared to the state-of-the-art.

  18. Adaptive and distributed cryptography for signature biometrics protection

    NASA Astrophysics Data System (ADS)

    Campisi, Patrizio; Maiorana, Emanuele; Gonzalez Prats, Miguel; Neri, Alessandro

    2007-02-01

    The most emerging technology for people identification and authentication is biometrics. In contrast with traditional recognition approaches, biometric authentication relies on who a person is or what a person does, being based on strictly personal traits, much more difficult to be forgotten, lost, stolen, copied or forged than traditional data. In this paper, we focus on two vulnerable points of biometric systems: the database where the templates are stored and the communication channel between the stored templates and the matcher. Specifically, we propose a method, based on user adaptive error correction codes, to achieve securitization and cancelability of the stored templates applied to dynamic signature features. More in detail, the employed error correction code is tailored to the intra-class variability of each user's signature features. This leads to an enhancement of the system performance expressed in terms of false acceptance rate. Moreover, in order to avoid corruption or interception of the stored templates in the transmission channels, we propose a scheme based on threshold cryptography: the distribution of the certificate authority functionality among a number of nodes provides distributed, fault-tolerant, and hierarchical key management services. Experimental results show the effectiveness of our approach, when compared to traditional non-secure correlation-based classifiers.

  19. Cancelable biometrics realization with multispace random projections.

    PubMed

    Teoh, Andrew Beng Jin; Yuang, Chong Tze

    2007-10-01

    Biometric characteristics cannot be changed; therefore, the loss of privacy is permanent if they are ever compromised. This paper presents a two-factor cancelable formulation, where the biometric data are distorted in a revocable but non-reversible manner by first transforming the raw biometric data into a fixed-length feature vector and then projecting the feature vector onto a sequence of random subspaces that were derived from a user-specific pseudorandom number (PRN). This process is revocable and makes replacing biometrics as easy as replacing PRNs. The formulation has been verified under a number of scenarios (normal, stolen PRN, and compromised biometrics scenarios) using 2400 Facial Recognition Technology face images. The diversity property is also examined. PMID:17926694

  20. Bridging the gap: from biometrics to forensics.

    PubMed

    Jain, Anil K; Ross, Arun

    2015-08-01

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. PMID:26101280

  1. Bridging the gap: from biometrics to forensics

    PubMed Central

    Jain, Anil K.; Ross, Arun

    2015-01-01

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. PMID:26101280

  2. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  3. Data Acquisition for Modular Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodsinsky, Carlos M. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  4. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  5. SU-E-T-502: Biometrically Accepted Patient Records

    SciTech Connect

    Basavatia, A; Kalnicki, S; Garg, M; Lukaj, A; Hong, L; Fret, J; Yaparpalvi, R; Tome, W

    2014-06-01

    Purpose: To implement a clinically useful palm vein pattern recognition biometric system to treat the correct treatment plan to the correct patient each and every time and to check-in the patient into the department to access the correct medical record. Methods: A commercially available hand vein scanning system was paired to Aria and utilized an ADT interface from the hospital electronic health system. Integration at two points in Aria, version 11 MR2, first at the appointment tracker screen for the front desk medical record access and second at the queue screen on the 4D treatment console took place for patient daily time-out. A test patient was utilized to check accuracy of identification as well as to check that no unintended interactions take place between the 4D treatment console and the hand vein scanning system. This system has been in clinical use since December 2013. Results: Since implementation, 445 patients have been enrolled into our biometric system. 95% of patients learn the correct methodology of hand placement on the scanner in the first try. We have had two instances of patient not found because of a bad initial scan. We simply erased the scanned metric and the patient enrolled again in those cases. The accuracy of the match is 100% for each patient, we have not had one patient misidentified. We can state this because we still use patient photo and date of birth as identifiers. A QA test patient is run monthly to check the integrity of the system. Conclusion: By utilizing palm vein scans along with the date of birth and patient photo, another means of patient identification now exits. This work indicates the successful implementation of technology in the area of patient safety by closing the gap of treating the wrong plan to a patient in radiation oncology. FOJP Service Corporation covered some of the costs of the hardware and software of the palm vein pattern recognition biometric system.

  6. Continuous verification using multimodal biometrics.

    PubMed

    Sim, Terence; Zhang, Sheng; Janakiraman, Rajkumar; Kumar, Sandeep

    2007-04-01

    Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system. PMID:17299225

  7. SCAN secure processor and its biometric capabilities

    NASA Astrophysics Data System (ADS)

    Kannavara, Raghudeep; Mertoguno, Sukarno; Bourbakis, Nikolaos

    2011-04-01

    This paper presents the design of the SCAN secure processor and its extended instruction set to enable secure biometric authentication. The SCAN secure processor is a modified SparcV8 processor architecture with a new instruction set to handle voice, iris, and fingerprint-based biometric authentication. The algorithms for processing biometric data are based on the local global graph methodology. The biometric modules are synthesized in reconfigurable logic and the results of the field-programmable gate array (FPGA) synthesis are presented. We propose to implement the above-mentioned modules in an off-chip FPGA co-processor. Further, the SCAN-secure processor will offer a SCAN-based encryption and decryption of 32 bit instructions and data.

  8. Transfer learning for bimodal biometrics recognition

    NASA Astrophysics Data System (ADS)

    Dan, Zhiping; Sun, Shuifa; Chen, Yanfei; Gan, Haitao

    2013-10-01

    Biometrics recognition aims to identify and predict new personal identities based on their existing knowledge. As the use of multiple biometric traits of the individual may enables more information to be used for recognition, it has been proved that multi-biometrics can produce higher accuracy than single biometrics. However, a common problem with traditional machine learning is that the training and test data should be in the same feature space, and have the same underlying distribution. If the distributions and features are different between training and future data, the model performance often drops. In this paper, we propose a transfer learning method for face recognition on bimodal biometrics. The training and test samples of bimodal biometric images are composed of the visible light face images and the infrared face images. Our algorithm transfers the knowledge across feature spaces, relaxing the assumption of same feature space as well as same underlying distribution by automatically learning a mapping between two different but somewhat similar face images. According to the experiments in the face images, the results show that the accuracy of face recognition has been greatly improved by the proposed method compared with the other previous methods. It demonstrates the effectiveness and robustness of our method.

  9. Biometrics IRB best practices and data protection

    NASA Astrophysics Data System (ADS)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  10. Crop Biometric Maps: The Key to Prediction

    PubMed Central

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-01-01

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed. PMID:24064605

  11. Crop biometric maps: the key to prediction.

    PubMed

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-01-01

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed. PMID:24064605

  12. Methodology of the determination of the uncertainties by using the biometric device the broadway 3D

    NASA Astrophysics Data System (ADS)

    Jasek, Roman; Talandova, Hana; Adamek, Milan

    2016-06-01

    The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structured light scanning and saves the template into the 3D model of face. The obtained data were evaluated by software Turnstile Enrolment Application (TEA). The measurements were used 3D face reader the Broadway 3D. First, the person was scanned and stored in the database. Thereafter person has already been compared with the stored template in the database for each method. Finally, a measure of reliability was evaluated for the Broadway 3D face reader.

  13. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  14. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  15. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  16. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  17. Breastfeeding Report Card 2014

    MedlinePlus

    ... Weight Breastfeeding Micronutrient Malnutrition State and Local Programs Breastfeeding Report Cards Recommend on Facebook Tweet Share Compartir ... National Immunization Survey data from 2014 and 2015. Breastfeeding Report Card, 2016 Download report [PDF-2.72MB] ...

  18. Smart card technology

    SciTech Connect

    Nelson, R.A.

    1992-09-01

    This report describes smart card techonology and applications, including the use of smart cards as smart badges. The paper illustrates that smart cards are designed with security features, which makes them suitable for security applications. But smart cards also provide multiple functions, so they can support additional applications. The goal of this paper is to inform about the technology, and to inspire thought about possible applications that would benefit if a smart badge were implemented.

  19. Conflict Activity Cards.

    ERIC Educational Resources Information Center

    Levy, Margo; Otero, George

    These action oriented activity cards dealing with conflict situations are for use with secondary students. The cards are intended to supplement any course dealing with conflict, including U.S. history, sociology, English, literature, economics, area studies, or political science. The cards are organized by color into certain broad categories which…

  20. Reading the Cards.

    ERIC Educational Resources Information Center

    Grills, Caroline M.

    2001-01-01

    Describes trends in the technology and use of "smart cards," cards embedded with computer chips to store information and thereby speed and simplify various business and administrative transactions. Addresses future applications for colleges and universities, American Express'"Blue" card, military and medical applications, the role of bandwidth,…

  1. Computer circuit card puller

    NASA Technical Reports Server (NTRS)

    Sawyer, R. V.; Szuwalski, B. (Inventor)

    1981-01-01

    The invention generally relates to hand tools, and more particularly to an improved device for facilitating removal of printed circuit cards from a card rack characterized by longitudinal side rails arranged in a mutually spaced parallelism and a plurality of printed circuit cards extended between the rails of the rack.

  2. Biometrics in support of special forces medical operations.

    PubMed

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. PMID:23536454

  3. Ocular Biometric Changes after Trabeculectomy

    PubMed Central

    Alvani, Azam; Pakravan, Mohammad; Esfandiari, Hamed; Safi, Sare; Yaseri, Mehdi; Pakravan, Parastou

    2016-01-01

    This review article aimed to evaluate ocular biometric changes after trabeculectomy. The PubMed database was searched using the keywords “axial length” (AL), “anterior chamber depth” (ACD), “corneal astigmatism,” “corneal topography” and “trabeculectomy.” The extracted studies were categorized based on the evaluated parameters and the biometry method (contact and non-contact). Comparable studies with respect to their sample size were combined for statistical analysis. Twenty-five studies including 690 individuals which met the inclusion criteria were selected. After trabeculectomy, a significant and persistent AL reduction, with a range of 0.1-0.19 and 0.1-0.9 mm measured with contact and non-contact methods, respectively, was observed. With respect to topographic changes, 0.38-1.4 diopters (D) with-the-rule (WTR) astigmatism was induced postoperatively. All studies revealed ACD reduction immediately after surgery, which gradually deepened and approximated its preoperative levels on day 14. ACD reduction was not significant after that period in the majority of cases. In conclusion, changes in ACD is of small amount and of short period, thus it can be ignored; however, reported changes in AL and keratometry are of sufficient magnitude and can affect the refractive prediction of combined cataract surgery and trabeculectomy. PMID:27621788

  4. Ultrasound echoes as biometric navigators.

    PubMed

    Schwartz, Benjamin M; McDannold, Nathan J

    2013-04-01

    We demonstrate a new method of using ultrasound data to achieve prospective motion compensation in MRI, especially for respiratory motion during interventional MRI procedures in moving organs such as the liver. The method relies on fingerprint-like biometrically distinct ultrasound echo patterns produced by different locations in tissue, which are collated with geometrical information from MRI during a training stage to form a mapping table that relates ultrasound measurements to positions. During prospective correction, the system makes frequent ultrasound measurements and uses the map to determine the corresponding position. Results in motorized linear motion phantoms and freely breathing animals indicate that the system performs well. Apparent motion is reduced by up to 97.8%, and motion artifacts are reduced or eliminated in two-dimensional spoiled gradient-echo images. The motion compensation is sufficient to permit MRI thermometry of focused ultrasound heating during respiratory-like motion, with results similar to those obtained in the absence of motion. This new technique may have applications for MRI thermometry and other dynamic imaging in the abdomen during free breathing. PMID:22648783

  5. Ocular Biometric Changes after Trabeculectomy.

    PubMed

    Alvani, Azam; Pakravan, Mohammad; Esfandiari, Hamed; Safi, Sare; Yaseri, Mehdi; Pakravan, Parastou

    2016-01-01

    This review article aimed to evaluate ocular biometric changes after trabeculectomy. The PubMed database was searched using the keywords "axial length" (AL), "anterior chamber depth" (ACD), "corneal astigmatism," "corneal topography" and "trabeculectomy." The extracted studies were categorized based on the evaluated parameters and the biometry method (contact and non-contact). Comparable studies with respect to their sample size were combined for statistical analysis. Twenty-five studies including 690 individuals which met the inclusion criteria were selected. After trabeculectomy, a significant and persistent AL reduction, with a range of 0.1-0.19 and 0.1-0.9 mm measured with contact and non-contact methods, respectively, was observed. With respect to topographic changes, 0.38-1.4 diopters (D) with-the-rule (WTR) astigmatism was induced postoperatively. All studies revealed ACD reduction immediately after surgery, which gradually deepened and approximated its preoperative levels on day 14. ACD reduction was not significant after that period in the majority of cases. In conclusion, changes in ACD is of small amount and of short period, thus it can be ignored; however, reported changes in AL and keratometry are of sufficient magnitude and can affect the refractive prediction of combined cataract surgery and trabeculectomy. PMID:27621788

  6. Incremental fusion of partial biometric information

    NASA Astrophysics Data System (ADS)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    Existing face recognition schemes are mostly based on extracting biometric feature vectors either from whole face images, or from a fixed facial region (e.g., eyes, nose, and mouth). Extreme variation in quality conditions between biometric enrolment and verification stages badly affects the performance of face recognition systems. Such problems have partly motivated several investigations into the use of partial facial features for face recognition. Nevertheless, partial face recognition is potentially useful in several applications, for instance, it used in forensics for detectives to identify individuals after some accidents such as fire or explosion. In this paper, we propose a scheme to fuse the biometric information of partial face images incrementally based on their recognition accuracy (or discriminative power) ranks. Such fusion scheme uses the optimal ratio of full/partial face images in each different quality condition. We found that such scheme is also useful for full face images to enhance authentication accuracy significantly. Nevertheless, it reduces the required storage requirements and processing time of the biometric system. Our experiments show that the required ratio of full/partial facial images to achieve optimal performance varies from (5%) to (80%) according to the quality conditions whereas the authentication accuracy improves significantly for low quality biometric samples.

  7. Entropy Measurement for Biometric Verification Systems.

    PubMed

    Lim, Meng-Hui; Yuen, Pong C

    2016-05-01

    Biometric verification systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter's difficulty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quantifies biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach. PMID:26054080

  8. Implications of applying biometrics to travel documents

    NASA Astrophysics Data System (ADS)

    van Renesse, Rudolf L.

    2002-04-01

    The Dutch government currently considers the decentralized storage of the enrolled template of the document holder on a chip embedded in the travel-document in order to allow biometric verification if the document is presented by the rightful holder. The main purpose of the intended biometric application is combating the misuse of travel-documents by look-alikes. Because travel-documents simultaneously function as identity documents, this misuse not only involves border crossing but also acquiring services from government, municipality and the private sector. This paper recognizes some inherent problems: (1) due to human factors, false reject rates will expectedly be considerable, and look-alikes will claim to be falsely rejected (2) the look-alike may sabotage the biometric functionality of the travel-document and (3) the enrolment process may be fraudulently frustrated. Partial solutions are layered biometrics and centralized storage of personalized templates in the registers of travel-documents or their semi-centralized storage in municipal registers. The usefulness of decentralized storage of biometric templates on travel-documents is discussed.

  9. Unveiling the Biometric Potential of Finger-Based ECG Signals

    PubMed Central

    Lourenço, André; Silva, Hugo; Fred, Ana

    2011-01-01

    The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications. PMID:21837235

  10. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... authentication biometric acquisition specifications, pursuant to NIST SP 800-76-1 as incorporated by reference in... registration) with the biometric data and verify the device ID at the time of authentication to the electronic... biometric as described in § 1311.115, it must comply with the following requirements. (b) The...

  11. A survey of keystroke dynamics biometrics.

    PubMed

    Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions. PMID:24298216

  12. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  13. Remote secure proof of identity using biometrics

    SciTech Connect

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to provide a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.

  14. A Survey of Keystroke Dynamics Biometrics

    PubMed Central

    Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions. PMID:24298216

  15. Identification of Bacterial and Viral Codetections With Mycoplasma pneumoniae Using the TaqMan Array Card in Patients Hospitalized With Community-Acquired Pneumonia.

    PubMed

    Diaz, Maureen H; Cross, Kristen E; Benitez, Alvaro J; Hicks, Lauri A; Kutty, Preeta; Bramley, Anna M; Chappell, James D; Hymas, Weston; Patel, Anami; Qi, Chao; Williams, Derek J; Arnold, Sandra R; Ampofo, Krow; Self, Wesley H; Grijalva, Carlos G; Anderson, Evan J; McCullers, Jonathan A; Pavia, Andrew T; Wunderink, Richard G; Edwards, Kathryn M; Jain, Seema; Winchell, Jonas M

    2016-03-01

    Mycoplasma pneumoniae was detected in a number of patients with community-acquired pneumonia in a recent prospective study. To assess whether other pathogens were also detected in these patients, TaqMan Array Cards were used to test 216 M pneumoniae-positive respiratory specimens for 25 additional viral and bacterial respiratory pathogens. It is interesting to note that 1 or more codetections, predominantly bacterial, were identified in approximately 60% of specimens, with codetections being more common in children. PMID:27191004

  16. Identification of Bacterial and Viral Codetections With Mycoplasma pneumoniae Using the TaqMan Array Card in Patients Hospitalized With Community-Acquired Pneumonia

    PubMed Central

    Diaz, Maureen H.; Cross, Kristen E.; Benitez, Alvaro J.; Hicks, Lauri A.; Kutty, Preeta; Bramley, Anna M.; Chappell, James D.; Hymas, Weston; Patel, Anami; Qi, Chao; Williams, Derek J.; Arnold, Sandra R.; Ampofo, Krow; Self, Wesley H.; Grijalva, Carlos G.; Anderson, Evan J.; McCullers, Jonathan A.; Pavia, Andrew T.; Wunderink, Richard G.; Edwards, Kathryn M.; Jain, Seema; Winchell, Jonas M.

    2016-01-01

    Mycoplasma pneumoniae was detected in a number of patients with community-acquired pneumonia in a recent prospective study. To assess whether other pathogens were also detected in these patients, TaqMan Array Cards were used to test 216 M pneumoniae-positive respiratory specimens for 25 additional viral and bacterial respiratory pathogens. It is interesting to note that 1 or more codetections, predominantly bacterial, were identified in approximately 60% of specimens, with codetections being more common in children. PMID:27191004

  17. Disk space and load time requirements for eye movement biometric databases

    NASA Astrophysics Data System (ADS)

    Kasprowski, Pawel; Harezlak, Katarzyna

    2016-06-01

    Biometric identification is a very popular area of interest nowadays. Problems with the so-called physiological methods like fingerprints or iris recognition resulted in increased attention paid to methods measuring behavioral patterns. Eye movement based biometric (EMB) identification is one of the interesting behavioral methods and due to the intensive development of eye tracking devices it has become possible to define new methods for the eye movement signal processing. Such method should be supported by an efficient storage used to collect eye movement data and provide it for further analysis. The aim of the research was to check various setups enabling such a storage choice. There were various aspects taken into consideration, like disk space usage, time required for loading and saving whole data set or its chosen parts.

  18. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    PubMed Central

    Koong, Chorng-Shiuh; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864

  19. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.

    PubMed

    Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864

  20. Privacy Enhancements for Inexact Biometric Templates

    NASA Astrophysics Data System (ADS)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  1. Generation of artificial biometric data enhanced with contextual information for game strategy-based behavioral biometrics

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-03-01

    For the domain of strategy-based behavioral biometrics we propose the concept of profiles enhanced with spatial, temporal and contextual information. Inclusion of such information leads to a more stable baseline profile and as a result more secure systems. Such enhanced data is not always readily available and often is time consuming and expensive to acquire. One solution to this problem is the use of artificially generated data. In this paper a novel methodology for creation of feature-level synthetic biometric data is presented. Specifically generation of behavioral biometric data represented by game playing strategies is demonstrated. Data validation methods are described and encouraging results are obtained with possibility of expanding proposed methodologies to generation of artificial data in the domains other then behavioral biometrics.

  2. High Resolution Ultrasonic Method for 3D Fingerprint Representation in Biometrics

    NASA Astrophysics Data System (ADS)

    Maev, R. Gr.; Bakulin, E. Y.; Maeva, E. Y.; Severin, F. M.

    Biometrics is an important field which studies different possible ways of personal identification. Among a number of existing biometric techniques fingerprint recognition stands alone - because very large database of fingerprints has already been acquired. Also, fingerprints are an important evidence that can be collected at a crime scene. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. Ultrasonic method of fingerprint imaging was originally introduced over a decade as the mapping of the reflection coefficient at the interface between the finger and a covering plate and has shown very good reliability and free from imperfections of previous two methods. This work introduces a newer development of the ultrasonic fingerprint imaging, focusing on the imaging of the internal structures of fingerprints (including sweat pores) with raw acoustic resolution of about 500 dpi (0.05 mm) using a scanning acoustic microscope to obtain images and acoustic data in the form of 3D data array. C-scans from different depths inside the fingerprint area of fingers of several volunteers were obtained and showed good contrast of ridges-and-valleys patterns and practically exact correspondence to the standard ink-and-paper prints of the same areas. Important feature reveled on the acoustic images was the clear appearance of the sweat pores, which could provide additional means of identification.

  3. Secure Biometrically Based Authentication Protocol for a Public Network Environment

    NASA Astrophysics Data System (ADS)

    Tait, Bobby; von Solms, Basie

    Biometric technology allows a computer system to identify and authenticate a person directly based on physical or behavioral traits [1]. However passwords and tokens that are currently widely used for authentication purposes do not directly authenticate a person; whenever a person offers a password or token the system only authenticates the presented password or token as authentic, but not the actual person presenting it [2], [8]. For this reason a lot of research went into developing a protocol that will allow a person to securely use a biometric token for personal authentication. Biometric technology is an attractive option for authenticating a person as there is a direct link between the person and a person's biometric token. This paper discusses a protocol, named BioVault. BioVault ensures safe transport of biometric tokens over un-secure networked environment without using any encryption technologies. The BioVault protocol also lays the foundation for biometrically based encryption, and biometrically based digital signatures.

  4. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    NASA Astrophysics Data System (ADS)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  5. Multimodal biometric-information fusion using the Radon transform

    NASA Astrophysics Data System (ADS)

    Chaudhari, Jitendra P.; Dixit, Vaibhav V.; Patil, Pradeep M.; Kosta, Yogesh P.

    2015-03-01

    This paper proposes multimodal biometric-based personal identification. Palmprint and fingerprint modalities are utilized in the proposed model due to the availability of more distinctive features and the ease of capture. Principle lines are the main discriminative features in the palmprint, whereas orientations of the ridge and valley structures are the main features by which to identify the fingerprint. To extract these features, the use of the Radon transform is proposed in this work. However, the Radon transform is sensitive to the orientation. In order to make the model rotation invariant and insensitive to noise, a normalization process is generally used. Here, a logarithm-based normalization process has been utilized in the proposed model. A Euclidean-based matching process that is invariant to the rotation has been used. The proposed model is applicable to low resolution images and is invariant to rotation, insensitive to noise, and has less computational complexity as compared to other models.

  6. Bioinformatic and biometric methods in plant morphology1

    PubMed Central

    Punyasena, Surangi W.; Smith, Selena Y.

    2014-01-01

    Recent advances in microscopy, imaging, and data analyses have permitted both the greater application of quantitative methods and the collection of large data sets that can be used to investigate plant morphology. This special issue, the first for Applications in Plant Sciences, presents a collection of papers highlighting recent methods in the quantitative study of plant form. These emerging biometric and bioinformatic approaches to plant sciences are critical for better understanding how morphology relates to ecology, physiology, genotype, and evolutionary and phylogenetic history. From microscopic pollen grains and charcoal particles, to macroscopic leaves and whole root systems, the methods presented include automated classification and identification, geometric morphometrics, and skeleton networks, as well as tests of the limits of human assessment. All demonstrate a clear need for these computational and morphometric approaches in order to increase the consistency, objectivity, and throughput of plant morphological studies.

  7. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  8. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. PMID:22841592

  9. Identity cards help patients identify their doctors.

    PubMed

    Zucco, Liana; Desmond, Gabrielle; Carpenter, Bernadette

    2014-01-01

    Patients admitted to hospital are immediately overloaded with information from staff in A&E, to subsequent acute medical and inpatient wards. Essential details are conveyed to patients at each step, including diagnosis, management and identification of various team members involved in their care. An initial audit within our South London hospital revealed only one third of patients admitted onto a single medical ward could recall the name of a single member of their treating team, and less than 10% retained that information over 5 days. Identification (ID) cards were devised to facilitate clear transfer of information detailing the patient's treating team. These ID cards were piloted through a series of PDSA cycles on one inpatient medical ward following a consultant led ward round. Post intervention, 67% managed to recall a single member of the treating team, with 67% retaining this information 5 days later, a dramatic improvement. ID cards were then trialed on one surgical ward, demonstrating equally impressive results with over 87% of patients recalling their named consultant following ID card implementation, up from 54% initially. Similar trends were demonstrated for recalling other treating team members. This simple measure improved patients ability to recall and retain names of a least a single member of their treating team, encouraged communication between patients and medical team and ultimately improved patient satisfaction and quality of care. ID cards were quick and easy to implement and have been approved by the hospital patient safety committee to implement throughout the Trust. PMID:26734234

  10. NCI: DCTD: Biometric Research Program: Jianwen Fang

    Cancer.gov

    The Biometric Research Program (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  11. The Future of Smart Cards.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  12. Optical security features for plastic card documents

    NASA Astrophysics Data System (ADS)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  13. Monumental Court Cards

    ERIC Educational Resources Information Center

    Long, Caroline

    2010-01-01

    Card playing is a popular pastime in many cultures, including games like bridge, gin rummy, and 52-pickup. In this article, the author describes an art project inspired by the unique designs on the face cards and the intricate art of the overall design. (Contains 1 online resource.)

  14. Grading School Report Cards

    ERIC Educational Resources Information Center

    Jacobson, Rebecca; Saultz, Andrew; Snyder, Jeffrey W.

    2013-01-01

    Recognizing the need for information in public education, Congress mandated in the No Child Left Behind Act (NCLB) that all states create and disseminate annual school performance report cards. A decade after NCLB passed, school report cards are widely available for nearly every school in the country. As the amount of school performance data…

  15. HBS: a novel biometric feature based on heartbeat morphology.

    PubMed

    Islam, Md Saiful; Alajlan, Naif; Bazi, Yakoub; Hichri, Haikel S

    2012-05-01

    In this paper, a new feature named heartbeat shape (HBS) is proposed for ECG-based biometrics. HBS is computed from the morphology of segmented heartbeats. Computation of the feature involves three basic steps: 1) resampling and normalization of a heartbeat; 2) reduction of matching error; and 3) shift invariant transformation. In order to construct both gallery and probe templates, a few consecutive heartbeats which could be captured in a reasonably short period of time are required. Thus, the identification and verification methods become efficient. We have tested the proposed feature independently on two publicly available databases with 76 and 26 subjects, respectively, for identification and verification. The second database contains several subjects having clinically proven cardiac irregularities (atrial premature contraction arrhythmia). Experiments on these two databases yielded high identification accuracy (98% and 99.85%, respectively) and low verification equal error rate (1.88% and 0.38%, respectively). These results were obtained by using templates constructed from five consecutive heartbeats only. This feature compresses the original ECG signal significantly to be useful for efficient communication and access of information in telecardiology scenarios. PMID:22361664

  16. Mobile biometric device (MBD) technology : summary of selected first responder experiences in pilot projects.

    SciTech Connect

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  17. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost. PMID:25795325

  18. Eye safety related to near infrared radiation exposure to biometric devices.

    PubMed

    Kourkoumelis, Nikolaos; Tzaphlidou, Margaret

    2011-01-01

    Biometrics has become an emerging field of technology due to its intrinsic security features concerning the identification of individuals by means of measurable biological characteristics. Two of the most promising biometric modalities are iris and retina recognition, which primarily use nonionizing radiation in the infrared region. Illumination of the eye is achieved by infrared light emitting diodes (LEDs). Even if few LED sources are capable of causing direct eye damage as they emit incoherent light, there is a growing concern about the possible use of LED arrays that might pose a potential threat. Exposure to intense coherent infrared radiation has been proven to have significant effects on living tissues. The purpose of this study is to explore the biological effects arising from exposing the eye to near infrared radiation with reference to international legislation. PMID:21380486

  19. Towards More Secure Biometric Readers for Effective Digital Forensic Investigation

    NASA Astrophysics Data System (ADS)

    Trabelsi, Zouheir; Al-Hemairy, Mohamed; Baggili, Ibrahim; Amin, Saad

    This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device.

  20. On Hunting Animals of the Biometric Menagerie for Online Signature

    PubMed Central

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836

  1. On Hunting Animals of the Biometric Menagerie for Online Signature.

    PubMed

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836

  2. MALDI-TOF MS is more accurate than VITEK II ANC card and API Rapid ID 32 A system for the identification of Clostridium species.

    PubMed

    Kim, Young Jin; Kim, Si Hyun; Park, Hyun-Jung; Park, Hae-Geun; Park, Dongchul; Song, Sae Am; Lee, Hee Joo; Yong, Dongeun; Choi, Jun Yong; Kook, Joong-Ki; Kim, Hye Ran; Shin, Jeong Hwan

    2016-08-01

    All 50 Clostridium difficile strains were definitely identified by Vitek2 system, Rapid ID 32A system, and MALDI-TOF. For 18 non-difficile Clostridium strains, the identification results were correct in 0, 2, and 17 strains by Vitek2, Rapid ID 32A, and MALDI-TOF, respectively. MALDI-TOF could be used as the primary tool for identification of Clostridium species. PMID:27296834

  3. Temporal Stability of Visual Search-Driven Biometrics

    SciTech Connect

    Yoon, Hong-Jun; Carmichael, Tandy; Tourassi, Georgia

    2015-01-01

    Previously, we have shown the potential of using an individual s visual search pattern as a possible biometric. That study focused on viewing images displaying dot-patterns with different spatial relationships to determine which pattern can be more effective in establishing the identity of an individual. In this follow-up study we investigated the temporal stability of this biometric. We performed an experiment with 16 individuals asked to search for a predetermined feature of a random-dot pattern as we tracked their eye movements. Each participant completed four testing sessions consisting of two dot patterns repeated twice. One dot pattern displayed concentric circles shifted to the left or right side of the screen overlaid with visual noise, and participants were asked which side the circles were centered on. The second dot-pattern displayed a number of circles (between 0 and 4) scattered on the screen overlaid with visual noise, and participants were asked how many circles they could identify. Each session contained 5 untracked tutorial questions and 50 tracked test questions (200 total tracked questions per participant). To create each participant s "fingerprint", we constructed a Hidden Markov Model (HMM) from the gaze data representing the underlying visual search and cognitive process. The accuracy of the derived HMM models was evaluated using cross-validation for various time-dependent train-test conditions. Subject identification accuracy ranged from 17.6% to 41.8% for all conditions, which is significantly higher than random guessing (1/16 = 6.25%). The results suggest that visual search pattern is a promising, fairly stable personalized fingerprint of perceptual organization.

  4. Temporal stability of visual search-driven biometrics

    NASA Astrophysics Data System (ADS)

    Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia

    2015-03-01

    Previously, we have shown the potential of using an individual's visual search pattern as a possible biometric. That study focused on viewing images displaying dot-patterns with different spatial relationships to determine which pattern can be more effective in establishing the identity of an individual. In this follow-up study we investigated the temporal stability of this biometric. We performed an experiment with 16 individuals asked to search for a predetermined feature of a random-dot pattern as we tracked their eye movements. Each participant completed four testing sessions consisting of two dot patterns repeated twice. One dot pattern displayed concentric circles shifted to the left or right side of the screen overlaid with visual noise, and participants were asked which side the circles were centered on. The second dot-pattern displayed a number of circles (between 0 and 4) scattered on the screen overlaid with visual noise, and participants were asked how many circles they could identify. Each session contained 5 untracked tutorial questions and 50 tracked test questions (200 total tracked questions per participant). To create each participant's "fingerprint", we constructed a Hidden Markov Model (HMM) from the gaze data representing the underlying visual search and cognitive process. The accuracy of the derived HMM models was evaluated using cross-validation for various time-dependent train-test conditions. Subject identification accuracy ranged from 17.6% to 41.8% for all conditions, which is significantly higher than random guessing (1/16 = 6.25%). The results suggest that visual search pattern is a promising, temporally stable personalized fingerprint of perceptual organization.

  5. Heart Electrical Actions as Biometric Indicia

    NASA Technical Reports Server (NTRS)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  6. Secure access control to hidden data by biometric features

    NASA Astrophysics Data System (ADS)

    Cancellaro, M.; Carli, M.; Egiazarian, K.; Neri, A.

    2007-04-01

    In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of the embedding domain. We propose the use of biometric data, minutiae fingerprint set, for generating the encryption key needed to decompose an image in the Tree structured Haar transform. The uniqueness of the biometrics key together with other, embedded, biometric information guarantee the authentication of the user. Experimental tests show the effectiveness of the proposed system.

  7. Infrared sensing of non-observable human biometrics

    NASA Astrophysics Data System (ADS)

    Willmore, Michael R.

    2005-05-01

    Interest and growth of biometric recognition technologies surged after 9/11. Once a technology mainly used for identity verification in law enforcement, biometrics are now being considered as a secure means of providing identity assurance in security related applications. Biometric recognition in law enforcement must, by necessity, use attributes of human uniqueness that are both observable and vulnerable to compromise. Privacy and protection of an individual's identity is not assured during criminal activity. However, a security system must rely on identity assurance for access control to physical or logical spaces while not being vulnerable to compromise and protecting the privacy of an individual. The solution resides in the use of non-observable attributes of human uniqueness to perform the biometric recognition process. This discussion will begin by presenting some key perspectives about biometric recognition and the characteristic differences between observable and non-observable biometric attributes. An introduction to the design, development, and testing of the Thermo-ID system will follow. The Thermo-ID system is an emerging biometric recognition technology that uses non-observable patterns of infrared energy naturally emanating from within the human body. As with all biometric systems, the infrared patterns recorded and compared within the Thermo-ID system are unique and individually distinguishable permitting a link to be confirmed between an individual and a claimed or previously established identity. The non-observable characteristics of infrared patterns of human uniqueness insure both the privacy and protection of an individual using this type of biometric recognition system.

  8. ID Image Characterization by Entropic Biometric Decomposition

    NASA Astrophysics Data System (ADS)

    Smoaca, Andreea; Coltuc, Daniela; Fournel, Thierry

    2011-03-01

    The paper proposes a statistical-based biometric decomposition for ID image recognition robust to a series of non malicious attacks generated by print/scan operations. Our goal is to label the single face expression by a signature, which is almost invariant to low filtering, noise addition and geometric attacks. The method is based on Independent Component Analysis (ICA) in a configuration which will allow a decomposition into some face characteristics. In this configuration known in literature as Architecture I, the most important coefficients issued from ICA are selected by looking for the independent components with maximum local entropy. A biometric label of fixed length is associated to any ID image to be enrolled, after projection on the learned basis, uniform quantization of the obtained coefficients and binary encoding. Two parameters were tuned: the number of quantization levels and the number of face characteristics. The latter one was modified, either by discarding coefficients after Principal Component Analysis in the beginning of FastICA algorithm, or by selecting the most prominent biometric features by applying an entropic criterion. The suggested method inherits the robustness of a global approach.

  9. Report Cards and Nursing Homes

    ERIC Educational Resources Information Center

    Castle, Nicholas G.; Lowe, Timothy J.

    2005-01-01

    Purpose: We first describe which states have produced nursing home report cards; second, we compare what information is provided in these report cards; third, we identify data sources used to produce the report cards; and, finally, we examine seven factors previously shown to be associated with the usefulness of report-card information and provide…

  10. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  11. Dynamic Virtual Credit Card Numbers

    NASA Astrophysics Data System (ADS)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  12. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prohibition against holding more than one REAL ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card...

  13. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  14. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  15. Credit Card Quiz.

    ERIC Educational Resources Information Center

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  16. Report Card Comments.

    ERIC Educational Resources Information Center

    Jenkins, Hope

    1997-01-01

    Describes how a fifth-grade teacher, who had been sharing evaluation with her students for some time, made the change to writing report card comments together with her students, thus sharing evaluation in one more way. (SR)

  17. Security infrastructure requirements for electronic health cards communication.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-01-01

    Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations, integrity of archives and record systems, and system behaviour. To provide this communication and co-operation in a shared care environment, smart cards are widely used. Serving as storage media and portable application systems, patient data cards enable patient-controlled exchange and use of personal health data bound to specific purposes such as prescription and disease management. Additionally, patient status data such as the emergency data set or immunization may be stored in, and communicated by, patient data cards. Another deployment field of smart cards is their token functionality within a security framework, supporting basic security services such as identification, authentication, integrity, confidentiality, or accountability using cryptographic algorithms. In that context, keys, certificates, and card holder's attributes might be stored in the card as well. As an example, the German activity of introducing patient health cards and health professional cards is presented. Specification and enrolment aspects are on-going processes. PMID:16160291

  18. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  19. Entry control technology biometric field evaluations

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.; Lowe, D.L.

    1995-07-01

    Throughout the years, Sandia National Laboratories (SNL) has performed various laboratory evaluations of entry control devices, including biometric identity verifiers. The reports which resulted from this testing have been very well received by the physical security community. This same community now requires equally informative field study data. To meet this need we have conducted a field study in an effort to develop the tools and methods which our customers can use to translate laboratory data into operational field performance. The field testing described in this report was based on the Recognition Systems Inc.`s (RSI) model ID3D HandKey biometric verifier. This device was selected because it is referenced in DOE documents such as the Guide for Implementation of the DOE Standard Badge and is the de facto biometric standard for the DOE. The ID3D HandKey is currently being used at several DOE sites such as Hanford, Rocky Flats, Pantex, Savannah River, and Idaho Nuclear Engineering Laboratory. The ID3D HandKey was laboratory tested at SNL. It performed very well during this test, exhibiting an equal error point of 0.2 percent. The goals of the field test were to identify operational characteristics and design guidelines to help system engineers translate laboratory data into field performance. A secondary goal was to develop tools which could be used by others to evaluate system effectiveness or improve the performance of their systems. Operational characteristics were determined by installing a working system and studying its operation over a five month period. Throughout this test we developed tools which could be used by others to similarly gauge system effectiveness.

  20. Human lens modeling and biometric measurement technique

    NASA Astrophysics Data System (ADS)

    Huang, Yanqiao

    This dissertation conducts theoretical and instrumental aspects of research aiming at extending knowledge and understanding of the optical design of the human eye. The first part of the thesis describes a newly constructed dynamic eye model that includes a gradient index (GRIN) lens to simulate eye accommodation. The GRIN profile of the crystalline lens is defined by a single continuous GRIN equation with optical power variability. In describing the lens accommodation process, different expansion coefficients are given to the lens nucleus and cortex to mimic lens dynamics. A relaxed state eye, a 4-D accommodated eye and a 10-D accommodated eye are simulated on a computer for studying and analyzing the first order and third order properties. This eye model can be further improved if giving accurate biometric measurement data on accommodating eyes. The second part of the thesis proposes an original interferometric technique that has potential for non-invasive ocular biometric measurements. This technique, termed spatial coherence interferometry, utilizes spatially incoherent monochromatic light as the illumination source, and employs the principle of low coherence interferometry to perform optical sectioning. Generalized coherence function for a multi-layer sample is derived and the theoretical axial longitudinal resolution is formulated. A spatial coherence interferometer with tunable coherence length is built, and detailed instrumental design and specifications are illustrated. Factors affecting system longitudinal resolution are examined. The instrument is first tested on plane mirrors for characterizing the longitudinal resolution. Various experiments are conducted including target searching, curved surface profiling and multi-layer sample sectioning. Finally en face surface profiling is performed on a pair of life size model eyes, and full field interferograms from various ocular surfaces are generated sequentially due to optical sectioning. In future research

  1. IT and SLT characterizations of secured biometric authentication systems

    NASA Astrophysics Data System (ADS)

    Schmid, Natalia A.; Wechsler, Harry

    2010-01-01

    This paper provides an information theoretical description of biometric systems at the system level. A number of basic models to characterize performance of biometric systems are presented. All models compare performance of an automatic biometric recognition system against performance of an ideal biometric system that knows correct decisions. The correct decision can be visualized as an input to a new decision system, and the decision by an automatic recognition system is the output of this decision system. The problem of performance evaluation for a biometric recognition system is formulated as (1) the problem of finding the maximum information that the output of the system has about the input, and (2) the problem of finding the maximum distortion that the output can experience with respect to the input of the system to guarantee a bounded average probability of recognition error. The first formulation brings us to evaluation of capacity of a binary asymmetric and M-ary channels. The second formulation falls under the scope of rate-distortion theory. We further describe the problem of physical signature authentication used to authenticate a biometric acquisition device and state the problem of secured biometric authentication as the problem of joint biometric and physical signature authentication. One novelty of this work is in restating the problem of secured biometric authentication as the problem of finding capacity and rate-distortion curve for a secured biometric authentication system. Another novelty is in application of transductive methods from statistical learning theory to estimate the conditional error probabilities of the system. This set of parameters is used to optimize the system performance.

  2. Biometrics, biomathematics and the morphometric synthesis.

    PubMed

    Bookstein, F L

    1996-03-01

    At the core of contemporary morphometrics--the quantitative study of biological shape variation--is a synthesis of two originally divergent methodological styles. One contributory tradition is the multivariate analysis of covariance matrices originally developed as biometrics and now dominant across a broad expanse of applied statistics. This approach, couched solely in the linear geometry of covariance structures, ignores biomathematical aspects of the original measurements. The other tributary emphasizes the direct visualization of changes in biological form. However, making objective the biological meaning of the features seen in those diagrams was always problematical; also, the representation of variation, as distinct from pairwise difference, proved infeasible. To combine these two variants of biomathematical modeling into a valid praxis for quantitative studies of biological shape was a goal earnestly sought though most of this century. That goal was finally achieved in the 1980s when techniques from mathematical statistics, multivariate biometrics, non-Euclidean geometry and computer graphics were combined in a coherent new system of tools for the complete regionalized quantitative analysis of landmark points together with the biomedical images in which they are seen. In this morphometric synthesis, correspondence of landmarks (biologically labeled geometric points, like "bridge of the nose") across specimens is taken as a biomathematical primitive. The shapes of configurations of landmarks are defined as equivalence classes with respect to the Euclidean similarity group and then represented as single points in David Kendall's shape space, a Riemannian manifold with Procrustes distance as metric. All conventional multivariate strategies carry over to the study of shape variation and covariation when shapes are interpreted in the tangent space to the shape manifold at an average shape. For biomathematical interpretation of such analyses, one needs a basis

  3. Audiovisual Speech Synchrony Measure: Application to Biometrics

    NASA Astrophysics Data System (ADS)

    Bredin, Hervé; Chollet, Gérard

    2007-12-01

    Speech is a means of communication which is intrinsically bimodal: the audio signal originates from the dynamics of the articulators. This paper reviews recent works in the field of audiovisual speech, and more specifically techniques developed to measure the level of correspondence between audio and visual speech. It overviews the most common audio and visual speech front-end processing, transformations performed on audio, visual, or joint audiovisual feature spaces, and the actual measure of correspondence between audio and visual speech. Finally, the use of synchrony measure for biometric identity verification based on talking faces is experimented on the BANCA database.

  4. 20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+), OPPOSITE END - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  5. 19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+). - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  6. Time card entry system

    SciTech Connect

    Montierth, B.S.

    1996-05-01

    The Time Card Entry System was developed to interface with the DOE Headquarters Electronic Time and Attendance (ETA) system. It features pop-up window pick lists for Work Breakdown Structure Numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills US Government/OMB requirements before Timekeepers process the data at the end of the two week payroll cycle using ETA. Tours of Duty (e.g. ten hour day, four day week with Friday through Sunday off), established in the ETA system, are imported into the Time Card Entry System by the Timekeepers. An individual`s Tour of Duty establishes the basis for validation of time of day and number of hours worked per day. At the end of the two week cycle, data is exported by the Timekeepers from the Time Card Entry System into ETA data files.

  7. Educational card games

    NASA Astrophysics Data System (ADS)

    Smith, D. R.; Munro, E.

    2009-09-01

    A number of years have passed since the development of the 'Voyager: Satellites' educational card game reported in Physics Education in 2003. Since then, a large number of copies of the game have been produced and distributed across the UK, to a warm reception from both pupils and teachers. This article reports on some of the feedback received about the game over the five years of the project and gives some examples of how the game has been incorporated into the school curriculum. The recent development of other science-related educational card games that are now available for use in schools is also discussed and it is hoped that this article will give inspiration to others to generate their own educational card games and enjoy some of the positive benefits of 'playing' in the classroom.

  8. ORNL Biometric Eye Model for Iris Recognition

    SciTech Connect

    Santos-Villalobos, Hector J; Barstow, Del R; Karakaya, Mahmut; Chaum, Edward; Boehnen, Chris Bensing

    2012-01-01

    Iris recognition has been proven to be an accurate and reliable biometric. However, the recognition of non-ideal iris images such as off angle images is still an unsolved problem. We propose a new biometric targeted eye model and a method to reconstruct the off-axis eye to its frontal view allowing for recognition using existing methods and algorithms. This allows for existing enterprise level algorithms and approaches to be largely unmodified by using our work as a pre-processor to improve performance. In addition, we describe the `Limbus effect' and its importance for an accurate segmentation of off-axis irides. Our method uses an anatomically accurate human eye model and ray-tracing techniques to compute a transformation function, which reconstructs the iris to its frontal, non-refracted state. Then, the same eye model is used to render a frontal view of the reconstructed iris. The proposed method is fully described and results from synthetic data are shown to establish an upper limit on performance improvement and establish the importance of the proposed approach over traditional linear elliptical unwrapping methods. Our results with synthetic data demonstrate the ability to perform an accurate iris recognition with an image taken as much as 70 degrees off-axis.

  9. Biometric feature embedding using robust steganography technique

    NASA Astrophysics Data System (ADS)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  10. Biometric watermarking based on face recognition

    NASA Astrophysics Data System (ADS)

    Satonaka, Takami

    2002-04-01

    We describe biometric watermarking procedure based on object recognition for accurate facial signature authentication. An adaptive metric learning algorithm incorporating watermark and facial signatures is introduced to separate an arbitrary pattern of unknown intruder classes from that of known true-user ones. The verification rule of multiple signatures is formulated to map a facial signature pattern in the overlapping classes to a separable disjoint one. The watermark signature, which is uniquely assigned to each face image, reduces the uncertainty of modeling missing facial signature patterns of the unknown intruder classes. The adaptive metric learning algorithm proposed improves a recognition error rate from 2.4% to 0.07% using the ORL database, which is better than previously reported numbers using the Karhunen-Loeve transform, convolution network and the hidden Marcov model. The face recognition facilitates generation and distribution of the watermark key. The watermarking approach focuses on using salient facial features to make watermark signatures robust to various attacks and transformation. The coarse-to-fine approach is presented to integrate pyramidal face detection, geometry analysis and face segmentation for watermarking. We conclude with an assessment of the strength and weakness of the chosen approach as well as possible improvements of the biometric watermarking system.

  11. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and...

  12. Modeling biometric systems using the general pareto distribution (GPD)

    NASA Astrophysics Data System (ADS)

    Shi, Zhixin; Kiefer, Frederick; Schneider, John; Govindaraju, Venu

    2008-03-01

    Statistical modeling of biometric systems at the score level is extremely important. It is the foundation of the performance assessment of biometric systems including determination of confidence intervals and test sample size for simulations, and performance prediction of real world systems. Statistical modeling of multimodal biometric systems allows the development of a methodology to integrate information from multiple biometric sources. We present a novel approach for estimating the marginal biometric matching score distributions by using extreme value theory in conjunction with non-parametric methods. Extreme Value Theory (EVT) is based on the modeling of extreme events represented by data which has abnormally low or high values in the tails of the distributions. Our motivation stems from the observation that the tails of the biometric score distributions are often difficult to estimate using other methods due to lack of sufficient numbers of training samples. However, good estimates of the tails of biometric distributions are essential for defining the decision boundaries. We present EVT based novel procedures for fitting a score distribution curve. A general non-parametric method is used for fitting the majority part of the distribution curve, and a parametric EVT model - the general Pareto distribution - is used for fitting the tails of the curve. We also demonstrate the advantage of applying the EVT by experiments.

  13. Follow Up: Credit Card Caution

    ERIC Educational Resources Information Center

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students a lesson they will…

  14. Card Access Know-How.

    ERIC Educational Resources Information Center

    College Planning & Management, 2000

    2000-01-01

    Provides tips for expanding a school's card access system and making it more productive for all concerned. Tips include the use of electronic locks for better security; the need for state-of-the-art card reader system to save money in the long run; selecting vendors to one that manufactures, installs, and supports the card system; and having…

  15. Store Security. Credit Card Fraud.

    ERIC Educational Resources Information Center

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  16. Biometric iris image acquisition system with wavefront coding technology

    NASA Astrophysics Data System (ADS)

    Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao

    2013-09-01

    Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code

  17. Contactless Biometrics in Wireless Sensor Network: A Survey

    NASA Astrophysics Data System (ADS)

    Razzak, Muhammad Imran; Khan, Muhammad Khurram; Alghathbar, Khaled

    Security can be enhanced through wireless sensor network using contactless biometrics and it remains a challenging and demanding task due to several limitations of wireless sensor network. Network life time is very less if it involves image processing task due to heavy energy required for image processing and image communication. Contactless biometrics such as face recognition is most suitable and applicable for wireless sensor network. Distributed face recognition in WSN not only help to reduce the communication overload but it also increase the node life time by distributing the work load on the nodes. This paper presents state-of-art of biometrics in wireless sensor network.

  18. The biometric-based module of smart grid system

    NASA Astrophysics Data System (ADS)

    Engel, E.; Kovalev, I. V.; Ermoshkina, A.

    2015-10-01

    Within Smart Grid concept the flexible biometric-based module base on Principal Component Analysis (PCA) and selective Neural Network is developed. The formation of the selective Neural Network the biometric-based module uses the method which includes three main stages: preliminary processing of the image, face localization and face recognition. Experiments on the Yale face database show that (i) selective Neural Network exhibits promising classification capability for face detection, recognition problems; and (ii) the proposed biometric-based module achieves near real-time face detection, recognition speed and the competitive performance, as compared to some existing subspaces-based methods.

  19. A novel biometric authentication approach using electrocardiogram signals.

    PubMed

    Gürkan, Hakan; Guz, Umit; Yarman, B S

    2013-01-01

    In this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually. PMID:24110673

  20. Educational Card Games

    ERIC Educational Resources Information Center

    Smith, D. R.; Munro, E.

    2009-01-01

    A number of years have passed since the development of the "Voyager: Satellites" educational card game reported in "Physics Education" in 2003. Since then, a large number of copies of the game have been produced and distributed across the UK, to a warm reception from both pupils and teachers. This article reports on some of the feedback received…

  1. The Alumni Credit Card.

    ERIC Educational Resources Information Center

    Clotfelter, Susan C.

    1987-01-01

    One of the hottest movements in banking right now is affinity credit cards. For banks, they mean a new source of credit customers. For institutions and alumni organizations, they can mean an easy, inexpensive way to keep the institutional name in front of alumni. (MLW)

  2. Weyl card diagrams

    SciTech Connect

    Jones, Gregory; Wang, John E.

    2005-06-15

    To capture important physical properties of a spacetime we construct a new diagram, the card diagram, which accurately draws generalized Weyl spacetimes in arbitrary dimensions by encoding their global spacetime structure, singularities, horizons, and some aspects of causal structure including null infinity. Card diagrams draw only nontrivial directions providing a clearer picture of the geometric features of spacetimes as compared to Penrose diagrams, and can change continuously as a function of the geometric parameters. One of our main results is to describe how Weyl rods are traversable horizons and the entirety of the spacetime can be mapped out. We review Weyl techniques and as examples we systematically discuss properties of a variety of solutions including Kerr-Newman black holes, black rings, expanding bubbles, and recent spacelike-brane solutions. Families of solutions will share qualitatively similar cards. In addition we show how card diagrams not only capture information about a geometry but also its analytic continuations by providing a geometric picture of analytic continuation. Weyl techniques are generalized to higher dimensional charged solutions and applied to generate perturbations of bubble and S-brane solutions by Israel-Khan rods.

  3. The Eggen Card Project

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2014-06-01

    (Abstract only) Olin Eggen, noted astronomer (1919-1998), left to us all his raw observation records recorded on 3x5 cards. This project is to make all this data available as an online resource. History and progress of the project will be presented. Project details available at: https://sites.google.com/site/eggencards/home.

  4. Smart Icon Cards

    ERIC Educational Resources Information Center

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  5. Weyl card diagrams

    NASA Astrophysics Data System (ADS)

    Jones, Gregory; Wang, John E.

    2005-06-01

    To capture important physical properties of a spacetime we construct a new diagram, the card diagram, which accurately draws generalized Weyl spacetimes in arbitrary dimensions by encoding their global spacetime structure, singularities, horizons, and some aspects of causal structure including null infinity. Card diagrams draw only nontrivial directions providing a clearer picture of the geometric features of spacetimes as compared to Penrose diagrams, and can change continuously as a function of the geometric parameters. One of our main results is to describe how Weyl rods are traversable horizons and the entirety of the spacetime can be mapped out. We review Weyl techniques and as examples we systematically discuss properties of a variety of solutions including Kerr-Newman black holes, black rings, expanding bubbles, and recent spacelike-brane solutions. Families of solutions will share qualitatively similar cards. In addition we show how card diagrams not only capture information about a geometry but also its analytic continuations by providing a geometric picture of analytic continuation. Weyl techniques are generalized to higher dimensional charged solutions and applied to generate perturbations of bubble and S-brane solutions by Israel-Khan rods.

  6. On using gait in forensic biometrics.

    PubMed

    Bouchrika, Imed; Goffredo, Michaela; Carter, John; Nixon, Mark

    2011-07-01

    Given the continuing advances in gait biometrics, it appears prudent to investigate the translation of these techniques for forensic use. We address the question as to the confidence that might be given between any two such measurements. We use the locations of ankle, knee, and hip to derive a measure of the match between walking subjects in image sequences. The Instantaneous Posture Match algorithm, using Harr templates, kinematics, and anthropomorphic knowledge is used to determine their location. This is demonstrated using real CCTV recorded at Gatwick International Airport, laboratory images from the multiview CASIA-B data set, and an example of real scene of crime video. To access the measurement confidence, we study the mean intra- and inter-match scores as a function of database size. These measures converge to constant and separate values, indicating that the match measure derived from individual comparisons is considerably smaller than the average match measure from a population. PMID:21554307

  7. An Exercise in Biometrical Genetics Based on a Computer Simulation.

    ERIC Educational Resources Information Center

    Murphy, P. J.

    1983-01-01

    Describes an exercise in biometrical genetics based on the noninteractive use of a computer simulation of a wheat hydridization program. Advantages of using the material in this way are also discussed. (Author/JN)

  8. Joint sparse representation for robust multimodal biometrics recognition.

    PubMed

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods. PMID:24231870

  9. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  10. Biometric Attendance and Big Data Analysis for Optimizing Work Processes.

    PubMed

    Verma, Neetu; Xavier, Teenu; Agrawal, Deepak

    2016-01-01

    Although biometric attendance management is available, large healthcare organizations have difficulty in big data analysis for optimization of work processes. The aim of this project was to assess the implementation of a biometric attendance system and its utility following big data analysis. In this prospective study the implementation of biometric system was evaluated over 3 month period at our institution. Software integration with other existing systems for data analysis was also evaluated. Implementation of the biometric system could be successfully done over a two month period with enrollment of 10,000 employees into the system. However generating reports and taking action this large number of staff was a challenge. For this purpose software was made for capturing the duty roster of each employee and integrating it with the biometric system and adding an SMS gateway. This helped in automating the process of sending SMSs to each employee who had not signed in. Standalone biometric systems have limited functionality in large organizations unless it is meshed with employee duty roster. PMID:27332164

  11. The biometric recognition on contactless multi-spectrum finger images

    NASA Astrophysics Data System (ADS)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  12. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments. PMID:25900328

  13. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties. PMID:26743628

  14. Time Card Entry System

    Energy Science and Technology Software Center (ESTSC)

    1996-05-07

    The Time Card Entry System was developed for the Department of Enegy, Idaho Operations Office (DOE-ID) to interface with the DOE headquarters (DOE-HQ) Electronic Time and Attendance (ETA) system for payroll. It features pop-up window pick lists for Work Breakdown Structure numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills U.S. Government/OMB requirements before Timekeepers process the data at the end of the two weekmore » payroll cycle using ETA. A tour of duty profile (e.g., ten hour day, four day week with Sunday, friday and Saturday off), previously established in the ETA system, is imported into the Time Card Entry System by the timekeepers. An individual''s profile establishes the basis for validation of time of day and number of hours worked per day. At the end of the two cycle, data is exported by the timekeepers from the Time Card Entry System into ETA files.« less

  15. Time Card Entry System

    SciTech Connect

    Montierth, B. S.

    1996-05-07

    The Time Card Entry System was developed for the Department of Enegy, Idaho Operations Office (DOE-ID) to interface with the DOE headquarters (DOE-HQ) Electronic Time and Attendance (ETA) system for payroll. It features pop-up window pick lists for Work Breakdown Structure numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills U.S. Government/OMB requirements before Timekeepers process the data at the end of the two week payroll cycle using ETA. A tour of duty profile (e.g., ten hour day, four day week with Sunday, friday and Saturday off), previously established in the ETA system, is imported into the Time Card Entry System by the timekeepers. An individual''s profile establishes the basis for validation of time of day and number of hours worked per day. At the end of the two cycle, data is exported by the timekeepers from the Time Card Entry System into ETA files.

  16. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  17. 33 CFR 125.55 - Outstanding Port Security Card Applications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Outstanding Port Security Card Applications. 125.55 Section 125.55 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) WATERFRONT FACILITIES IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR VESSELS §...

  18. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  19. Jefferson Lab's Trim Card II

    SciTech Connect

    Trent Allison; Sarin Philip; C. Higgins; Edward Martin; William Merz

    2005-05-01

    Jefferson Lab's Continuous Electron Beam Accelerator Facility (CEBAF) uses Trim Card I power supplies to drive approximately 1900 correction magnets. These trim cards have had a long and illustrious service record. However, some of the employed technology is now obsolete, making it difficult to maintain the system and retain adequate spares. The Trim Card II is being developed to act as a transparent replacement for its aging predecessor. A modular approach has been taken in its development to facilitate the substitution of sections for future improvements and maintenance. The resulting design has been divided into a motherboard and 7 daughter cards which has also allowed for parallel development. The Trim Card II utilizes modern technologies such as a Field Programmable Gate Array (FPGA) and a microprocessor to embed trim card controls and diagnostics. These reprogrammable devices also provide the versatility to incorporate future requirements.

  20. Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.

    PubMed

    Sidek, Khairul Azami; Khalil, Ibrahim

    2013-01-01

    Electrocardiogram (ECG) based biometric matching suffers from high misclassification error with lower sampling frequency data. This situation may lead to an unreliable and vulnerable identity authentication process in high security applications. In this paper, quality enhancement techniques for ECG data with low sampling frequency has been proposed for person identification based on piecewise cubic Hermite interpolation (PCHIP) and piecewise cubic spline interpolation (SPLINE). A total of 70 ECG recordings from 4 different public ECG databases with 2 different sampling frequencies were applied for development and performance comparison purposes. An analytical method was used for feature extraction. The ECG recordings were segmented into two parts: the enrolment and recognition datasets. Three biometric matching methods, namely, Cross Correlation (CC), Percent Root-Mean-Square Deviation (PRD) and Wavelet Distance Measurement (WDM) were used for performance evaluation before and after applying interpolation techniques. Results of the experiments suggest that biometric matching with interpolated ECG data on average achieved higher matching percentage value of up to 4% for CC, 3% for PRD and 94% for WDM. These results are compared with the existing method when using ECG recordings with lower sampling frequency. Moreover, increasing the sample size from 56 to 70 subjects improves the results of the experiment by 4% for CC, 14.6% for PRD and 0.3% for WDM. Furthermore, higher classification accuracy of up to 99.1% for PCHIP and 99.2% for SPLINE with interpolated ECG data as compared of up to 97.2% without interpolation ECG data verifies the study claim that applying interpolation techniques enhances the quality of the ECG data. PMID:23062461

  1. Newborn screening cards: a legal quagmire.

    PubMed

    Bowman, Diana M; Studdert, David M

    2011-03-21

    Newborn screening (NBS) programs are a well established and cost-effective method for early identification of genetic disorders. However, a raft of legal questions surrounds the collection, storage, ownership and secondary use of NBS cards. The absence of clear legal rules governing NBS programs in Australia means that there are few straightforward answers to these questions. A series of controversial incidents have exposed this uncertainty in Australia, and remarkably similar controversies have occurred in the United States and European Union. We review the situation, using Victoria as a case study. We also make the case for a dedicated regulatory regime for NBS programs, arguing that the lack of such a regime threatens public trust and the robust operation of NBS programs in Australia. New rules would likely introduce stricter requirements for informed consent at the point of blood collection than has been the norm to date. However, the scope for use of cards in research could expand rather than contract, and it may be possible to reduce the risk that vast card archives will need to be destroyed in response to future public outcries. PMID:21426290

  2. 75 FR 70290 - In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-17

    ...''). 75 FR. 34482 (Jun. 17, 2010). Complainant Cross Match Technologies, Inc. of Palm Beach Gardens... COMMISSION In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and... the United States after importation of certain biometric scanning devices, components...

  3. 75 FR 34482 - Certain Biometric Scanning Devices, Components Thereof, Associated Software, and Products...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... COMMISSION Certain Biometric Scanning Devices, Components Thereof, Associated Software, and Products..., associated software, and products containing the same by reason of infringement of certain claims of U.S... certain biometric scanning devices, components thereof, associated software, or products containing...

  4. British and American attitudes toward credit cards.

    PubMed

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries. PMID:16796091

  5. Biometric study using hyperspectral imaging during stress

    NASA Astrophysics Data System (ADS)

    Nagaraj, Sheela; Quoraishee, Shafik; Chan, Gabriel; Short, Kenneth R.

    2010-04-01

    To the casual observer, transient stress results in a variety of physiological changes that can be seen in the face. Although the conditions can be seen visibly, the conditions affect the emissivity and absorption properties of the skin, which imaging spectrometers, commonly referred to as Hyperspectral (HS) cameras, can quantify at every image pixel. The study reported on in this paper, using Hyperspectral cameras, provides a basis for continued study of HS imaging to eventually quantify biometric stress. This study was limited to the visible to near infrared (VNIR) spectral range. Signal processing tools and algorithms have been developed and are described for using HS face data from human subjects. The subjects were placed in psychologically stressful situations and the camera data were analyzed to detect stress through changes in dermal reflectance and emissivity. Results indicate that hyperspectral imaging may potentially serve as a non-invasive tool to measure changes in skin emissivity indicative of a stressful incident. Particular narrow spectral bands in the near-infrared region of the electromagnetic spectrum seem especially important. Further studies need to be performed to determine the optimal spectral bands and to generalize the conclusions. The enormous information available in hyperspectral imaging needs further analysis and more spectral regions need to be exploited. Non-invasive stress detection is a prominent area of research with countless applications for both military and commercial use including border patrol, stand-off interrogation, access control, surveillance, and non-invasive and un-attended patient monitoring.

  6. Atmospheric turbulence and sensor system effects on biometric algorithm performance

    NASA Astrophysics Data System (ADS)

    Espinola, Richard L.; Leonard, Kevin R.; Byrd, Kenneth A.; Potvin, Guy

    2015-05-01

    Biometric technologies composed of electro-optical/infrared (EO/IR) sensor systems and advanced matching algorithms are being used in various force protection/security and tactical surveillance applications. To date, most of these sensor systems have been widely used in controlled conditions with varying success (e.g., short range, uniform illumination, cooperative subjects). However the limiting conditions of such systems have yet to be fully studied for long range applications and degraded imaging environments. Biometric technologies used for long range applications will invariably suffer from the effects of atmospheric turbulence degradation. Atmospheric turbulence causes blur, distortion and intensity fluctuations that can severely degrade image quality of electro-optic and thermal imaging systems and, for the case of biometrics technology, translate to poor matching algorithm performance. In this paper, we evaluate the effects of atmospheric turbulence and sensor resolution on biometric matching algorithm performance. We use a subset of the Facial Recognition Technology (FERET) database and a commercial algorithm to analyze facial recognition performance on turbulence degraded facial images. The goal of this work is to understand the feasibility of long-range facial recognition in degraded imaging conditions, and the utility of camera parameter trade studies to enable the design of the next generation biometrics sensor systems.

  7. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    NASA Astrophysics Data System (ADS)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  8. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  9. 78 FR 44136 - Agency Information Collection Activities: Office of Biometric Identity Management (OBIM...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-23

    ... admission to the United States. See 73 FR 77473 (Dec. 19, 2008). Analysis Agency: Department of Homeland... SECURITY Agency Information Collection Activities: Office of Biometric Identity Management (OBIM) Biometric...), Office of Biometric Identity Management (OBIM), formerly the United States Visitor and Immigrant...

  10. It's All in the Cards.

    ERIC Educational Resources Information Center

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of information.…

  11. PREL Pacific Region Language Cards.

    ERIC Educational Resources Information Center

    Pacific Region Educational Lab., Honolulu, HI.

    This collection of 10 cue cards presents English translations of common English words and expressions into 10 Pacific Region languages: Palauan, Samoan, Chamorro, Hawaiian, Carolinian, Chuukese, Pohnpeian, Marshallese, Yapese, and Kosraean. The cards translate the following: hello, good morning, good afternoon, good night, thank you, you're…

  12. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  13. Applying a Metrics Report Card

    ERIC Educational Resources Information Center

    Klubeck, Martin; Langthorne, Michael

    2008-01-01

    In this article, the authors suggest that providing a report card enables an IT department to check its progress and overall performance; communicate the department's effectiveness to university leadership, IT membership, and customers; and make any necessary adjustments. A report card will not show how efficiently the IT department functions, but…

  14. Estimating body related soft biometric traits in video frames.

    PubMed

    Arigbabu, Olasimbo Ayodeji; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Yussof, Salman; Iranmanesh, Vahab; Malallah, Fahad Layth

    2014-01-01

    Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames. PMID:25121120

  15. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  16. The use of biometrics in the Personal Health Record (PHR).

    PubMed

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR. PMID:21335696

  17. Estimating Body Related Soft Biometric Traits in Video Frames

    PubMed Central

    Arigbabu, Olasimbo Ayodeji; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Yussof, Salman; Iranmanesh, Vahab; Malallah, Fahad Layth

    2014-01-01

    Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames. PMID:25121120

  18. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  19. A novel biometric authentication approach using ECG and EMG signals.

    PubMed

    Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi

    2015-05-01

    Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication. PMID:25836061

  20. Securing Biometric Templates Where Similarity Is Measured with Set Intersection

    NASA Astrophysics Data System (ADS)

    Socek, Daniel; Božović, Vladimir; Ćulibrk, Dubravko

    A novel scheme for securing biometric templates of variable size and order is proposed. The proposed scheme is based on a new similarity measure approach, namely the set intersection, which strongly resembles the methodology used in most of the current state-of-the-art biometrics matching systems. The applicability of the new scheme is compared with that of the existing principal schemes, and it is shown that the new scheme has definite advantages over the existing approaches. The proposed scheme is analyzed both in terms of security and performance.

  1. A new approach for willingness test in biometric systems

    NASA Astrophysics Data System (ADS)

    Yang, Kai; Du, Yingzi; Zhou, Zhi

    2011-06-01

    Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy concerns: biometric based systems can be accessed when users are under threat, reluctant or even unconscious states. In this paper, we introduce a new method which can identify a person and detect his/her willingness. Our experimental results show that the new approach can enhance the security by checking the consent signature while achieving very high recognition accuracy.

  2. Biometric Authentication Using Infrared Imaging of Hand Vein Patterns

    NASA Astrophysics Data System (ADS)

    Bhattacharyya, Debnath; Shrotri, A.; Rethrekar, S. C.; Patil, M. H.; Alisherov, Farkhod A.; Kim, Tai-Hoon

    Hand vein patterns are unique and universal. Vein pattern is used as biometric feature in recent years. But, it is not very much popular biometric system as compared to other systems like fingerprint, iris etc, because of the higher cost. For conventional algorithm, it is necessary to use high quality images, which demand high-priced collection devices. There are two approaches for vein authentication, these are hand dorsa and hand ventral. Currently we are working on hand dorsa vein patterns. Here we are putting forward the new approach for low cost hand dorsa vein pattern acquisition using low cost device and proposing a algorithm to extract features from these low quality images.

  3. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes. PMID:25681101

  4. Punch card programmable microfluidics.

    PubMed

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word "PUNCHCARD MICROFLUIDICS" using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  5. Punch Card Programmable Microfluidics

    PubMed Central

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word “PUNCHCARD MICROFLUIDICS” using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  6. The State and Trends of Barcode, RFID, Biometric and Pharmacy Automation Technologies in US Hospitals.

    PubMed

    Uy, Raymonde Charles Y; Kury, Fabricio P; Fontelo, Paul A

    2015-01-01

    The standard of safe medication practice requires strict observance of the five rights of medication administration: the right patient, drug, time, dose, and route. Despite adherence to these guidelines, medication errors remain a public health concern that has generated health policies and hospital processes that leverage automation and computerization to reduce these errors. Bar code, RFID, biometrics and pharmacy automation technologies have been demonstrated in literature to decrease the incidence of medication errors by minimizing human factors involved in the process. Despite evidence suggesting the effectivity of these technologies, adoption rates and trends vary across hospital systems. The objective of study is to examine the state and adoption trends of automatic identification and data capture (AIDC) methods and pharmacy automation technologies in U.S. hospitals. A retrospective descriptive analysis of survey data from the HIMSS Analytics® Database was done, demonstrating an optimistic growth in the adoption of these patient safety solutions. PMID:26958264

  7. The State and Trends of Barcode, RFID, Biometric and Pharmacy Automation Technologies in US Hospitals

    PubMed Central

    Uy, Raymonde Charles Y.; Kury, Fabricio P.; Fontelo, Paul A.

    2015-01-01

    The standard of safe medication practice requires strict observance of the five rights of medication administration: the right patient, drug, time, dose, and route. Despite adherence to these guidelines, medication errors remain a public health concern that has generated health policies and hospital processes that leverage automation and computerization to reduce these errors. Bar code, RFID, biometrics and pharmacy automation technologies have been demonstrated in literature to decrease the incidence of medication errors by minimizing human factors involved in the process. Despite evidence suggesting the effectivity of these technologies, adoption rates and trends vary across hospital systems. The objective of study is to examine the state and adoption trends of automatic identification and data capture (AIDC) methods and pharmacy automation technologies in U.S. hospitals. A retrospective descriptive analysis of survey data from the HIMSS Analytics® Database was done, demonstrating an optimistic growth in the adoption of these patient safety solutions. PMID:26958264

  8. Credit Cards. Bulletin No. 721. (Revised.)

    ERIC Educational Resources Information Center

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  9. 12 CFR 141.8 - Debit card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Debit card. 141.8 Section 141.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.8 Debit card. The term debit card means a card that enables...

  10. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Enrollment cards. 8.24 Section 8.24... ALCOHOL, TOBACCO AND FIREARMS Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to practice before the Bureau. Each enrollment card...

  11. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Debit card. 541.8 Section 541.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit card means a card that enables...

  12. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Debit card. 541.8 Section 541.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit card means a card that enables...

  13. 12 CFR 141.8 - Debit card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Debit card. 141.8 Section 141.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.8 Debit card. The term debit card means a card that enables...

  14. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Debit card. 541.8 Section 541.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit card means a card that enables...

  15. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Enrollment cards. 8.24 Section 8.24... ALCOHOL, TOBACCO AND FIREARMS Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to practice before the Bureau. Each enrollment card...

  16. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Enrollment cards. 8.24 Section 8.24... ALCOHOL, TOBACCO AND FIREARMS Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to practice before the Bureau. Each enrollment card...

  17. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Debit card. 541.8 Section 541.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit card means a card that enables...

  18. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Debit card. 541.8 Section 541.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit card means a card that enables...

  19. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Enrollment cards. 8.24 Section 8.24... ALCOHOL, TOBACCO AND FIREARMS Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to practice before the Bureau. Each enrollment card...

  20. 12 CFR 141.8 - Debit card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Debit card. 141.8 Section 141.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.8 Debit card. The term debit card means a card that enables...

  1. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 18 2013-04-01 2013-04-01 false Payment by credit card and debit card. 301.6311... (CONTINUED) PROCEDURE AND ADMINISTRATION PROCEDURE AND ADMINISTRATION Collection General Provisions § 301.6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card...

  2. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Payment by credit card and debit card. 301.6311... (CONTINUED) PROCEDURE AND ADMINISTRATION PROCEDURE AND ADMINISTRATION Collection General Provisions § 301.6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card...

  3. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 18 2014-04-01 2014-04-01 false Payment by credit card and debit card. 301.6311... (CONTINUED) PROCEDURE AND ADMINISTRATION PROCEDURE AND ADMINISTRATION Collection General Provisions § 301.6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card...

  4. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 18 2012-04-01 2012-04-01 false Payment by credit card and debit card. 301.6311... (CONTINUED) PROCEDURE AND ADMINISTRATION PROCEDURE AND ADMINISTRATION Collection General Provisions § 301.6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card...

  5. High-speed biometrics ultrasonic system for 3D fingerprint imaging

    NASA Astrophysics Data System (ADS)

    Maev, Roman G.; Severin, Fedar

    2012-10-01

    The objective of this research is to develop a new robust fingerprint identification technology based upon forming surface-subsurface (under skin) ultrasonic 3D images of the finger pads. The presented work aims to create specialized ultrasonic scanning methods for biometric purposes. Preliminary research has demonstrated the applicability of acoustic microscopy for fingerprint reading. The additional information from internal skin layers and dermis structures contained in the scan can essentially improve confidence in the identification. Advantages of this system include high resolution and quick scanning time. Operating in pulse-echo mode provides spatial resolution up to 0.05 mm. Technology advantages of the proposed technology are the following: • Full-range scanning of the fingerprint area "nail to nail" (2.5 x 2.5 cm) can be done in less than 5 sec with a resolution of up to 1000 dpi. • Collection of information about the in-depth structure of the fingerprint realized by the set of spherically focused 50 MHz acoustic lens provide the resolution ~ 0.05 mm or better • In addition to fingerprints, this technology can identify sweat porous at the surface and under the skin • No sensitivity to the contamination of the finger's surface • Detection of blood velocity using Doppler effect can be implemented to distinguish living specimens • Utilization as polygraph device • Simple connectivity to fingerprint databases obtained with other techniques • The digitally interpolated images can then be enhanced allowing for greater resolution • Method can be applied to fingernails and underlying tissues, providing more information • A laboratory prototype of the biometrics system based on these described principles was designed, built and tested. It is the first step toward a practical implementation of this technique.

  6. Phase encryption of biometrics in diffractive optical elements.

    PubMed

    Johnson, E G; Brasher, J D

    1996-08-15

    A new technique for the optical encoding of images is presented. The method of generalized projections is used to design diffractive optical elements for the phase encryption of biometrics for security applications. The encryption algorithm converges rapidly, and the decryption is seen to be secure and tolerant to additive noise. PMID:19876322

  7. An efficient visualization method for analyzing biometric data

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; McGonagle, Mike; Yates, J. Harlan; Henning, Ronda; Hackett, Jay

    2013-05-01

    We introduce a novel application for biometric data analysis. This technology can be used as part of a unique and systematic approach designed to augment existing processing chains. Our system provides image quality control and analysis capabilities. We show how analysis and efficient visualization are used as part of an automated process. The goal of this system is to provide a unified platform for the analysis of biometric images that reduce manual effort and increase the likelihood of a match being brought to an examiner's attention from either a manual or lights-out application. We discuss the functionality of FeatureSCOPE™ which provides an efficient tool for feature analysis and quality control of biometric extracted features. Biometric databases must be checked for accuracy for a large volume of data attributes. Our solution accelerates review of features by a factor of up to 100 times. Review of qualitative results and cost reduction is shown by using efficient parallel visual review for quality control. Our process automatically sorts and filters features for examination, and packs these into a condensed view. An analyst can then rapidly page through screens of features and flag and annotate outliers as necessary.

  8. Unimodal biometric system based on local topology structure preserving projections

    NASA Astrophysics Data System (ADS)

    Liu, Huanxi; Lv, Xiaowei; Li, Xiong; Liu, Yuncai

    2009-11-01

    We propose a unified unimodal biometric system that is suitable for most individual modalities, e.g., face and gait. The proposed system consists of three steps: (1) preprocessing raw biometric data, (2) determining the intrinsic low-dimensional subspace of preprocessed data by local topology structure preserving projections (LTSPP), and (3) performing the classification in the determined subspace using the intraclass distance sum. In the proposed system, LTSPP is a novel subspace algorithm that focuses not only on the class information but also on the local topology structure. In terms of representing the separability of different classes, LTSPP projects the interclass margin data far apart. Meanwhile, LTSPP preserves the intraclass topology structures by using linear reconstruction coefficients. Compared with other subspace methods, LTSPP possesses more discriminant abilities and is more suitable for biometric recognition. In addition, both preprocessing each raw datum into unit and performing the classification using the intraclass distance sum are helpful to improve the recognition rates. We carry out various recognition experiments using the Yale and HumanID gait databases. The encouraging experimental results demonstrate the effectiveness of our unified unimodal biometric system, and the proposed LTSPP algorithm for this system can yield the best recognition rates compared to the other algorithms.

  9. On the feasibility of interoperable schemes in hand biometrics.

    PubMed

    Morales, Aythami; González, Ester; Ferrer, Miguel A

    2012-01-01

    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors. PMID:22438714

  10. Biometrics via IR spectroscopy of the epidermis: potential and difficulties

    NASA Astrophysics Data System (ADS)

    Mackie, David M.

    2012-06-01

    We discuss the potential and difficulties of using infrared (IR) spectroscopy of the human epidermis as a biometric. We present preliminary data on the fingerpads of 9 individuals demonstrating the potential for uniqueness and stability. We also present data on the challenges presented by complications such as sebum changes, intra-individual location variability, and skin care products.

  11. Phase encryption of biometrics in diffractive optical elements

    NASA Astrophysics Data System (ADS)

    Johnson, E. G.; Brasher, J. D.

    1996-08-01

    A new technique for the optical encoding of images is presented. The method of generalized projections is used to design diffractive optical elements for the phase encryption of biometrics for security applications. The encryption algorithm converges rapidly, and the decryption is seen to be secure and tolerant to additive noise.

  12. A biometric authentication model using hand gesture images

    PubMed Central

    2013-01-01

    A novel hand biometric authentication method based on measurements of the user’s stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password ‘iloveu’ in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, ‘i’ , ‘l’ , ‘o’ , ‘v’ , ‘e’ , and ‘u’. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy. PMID:24172288

  13. A biometric authentication model using hand gesture images.

    PubMed

    Fong, Simon; Zhuang, Yan; Fister, Iztok; Fister, Iztok

    2013-01-01

    A novel hand biometric authentication method based on measurements of the user's stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password 'iloveu' in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, 'i' , 'l' , 'o' , 'v' , 'e' , and 'u'. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy. PMID:24172288

  14. Combining two strategies to optimize biometric decisions against spoofing attacks

    NASA Astrophysics Data System (ADS)

    Li, Weifeng; Poh, Norman; Zhou, Yicong

    2014-09-01

    Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds - one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions.

  15. A Biometric Authenticated Key Agreement Protocol for Secure Token

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This letter proposes a robust biometric authenticated key agreement (BAKA) protocol for a secure token to provide strong security and minimize the computation cost of each participant. Compared with other related protocols, the proposed BAKA protocol not only is secure against well-known cryptographical attacks but also provides various functionality and performance requirements.

  16. On the Feasibility of Interoperable Schemes in Hand Biometrics

    PubMed Central

    Morales, Aythami; González, Ester; Ferrer, Miguel A.

    2012-01-01

    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors. PMID:22438714

  17. An Introduction to Biometrics Technology: Its Place in Technology Education

    ERIC Educational Resources Information Center

    Elliott, Stephen J.; Peters, Jerry L.; Rishel, Teresa J.

    2004-01-01

    The increased utilization of biometrics technology in the past few years has contributed to a strong growth pattern as the technology is used in a variety of facilities, including schools. Due to media exposure, students' familiarity with technology will continue to increase proportionately, which will result in an increased curiosity about…

  18. Biometrics in the Medical School Curriculum: Making the Necessary Relevant.

    ERIC Educational Resources Information Center

    Murphy, James R.

    1980-01-01

    Because a student is more likely to learn and retain course content perceived as relevant, an attempt was made to change medical students' perceptions of a biometrics course by introducing statistical methods as a means of solving problems in the interpretation of clinical lab data. Retrospective analysis of student course evaluations indicates a…

  19. [Smart cards in health services].

    PubMed

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management. PMID:11688229

  20. Stream processing health card application.

    PubMed

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data. PMID:22127523

  1. Secure E-Business applications based on the European Citizen Card

    NASA Astrophysics Data System (ADS)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  2. Digital watermarking of biometric speech references: impact to the EER system performance

    NASA Astrophysics Data System (ADS)

    Lang, Andreas; Dittmann, Jana

    2007-02-01

    The evaluation of digital watermarks has grown into an important research area. The usage of profiles for application oriented evaluation provides an efficient and aimed strategy to evaluate and compare watermarking schemes according to a predefined watermark parameter setting. Based on first evaluations in [5, 16], in this paper, we present a new application profile (called Biometrics) and exemplary test results for audio watermarking evaluations. Therefore, we combine digital watermark evaluation and a biometric authentication system. This application scenario is as follows: Audio watermarking schemes are used to embed metadata into the speech reference data of the biometric speaker recognition system. Metadata in our context may consist of feature template representations complementary to the speech modality, such as iris codes or biometric hashes, ancillary information about the social, cultural or biological context of the owner of the biometric data or technical details of the sensor. As during watermark embedding the cover signal is changed, the test results show how different watermarking schemes affect the biometric error rates and speech performance of the biometric system depending on the embedding capacity and embedding transparency. Therefore, the biometric error rates are measured for each watermarking scheme, the effect of embedding is shown, and its influence is analyzed. The transparency of an embedding function is manly measured with subjective or objective tests. In this paper, we introduce a new objective test called Biometric Difference Grade (BDG) to evaluate the quality for biometric speech signal modifications on the example of four audio watermarking algorithms.

  3. 31 CFR 1020.220 - Customer identification programs for banks, savings associations, credit unions, and certain non...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... country of issuance; alien identification card number; or number and country of issuance of any other... taxpayer identification number within a reasonable period of time after the account is opened. (C) Credit card accounts. In connection with a customer who opens a credit card account, a bank may obtain...

  4. 31 CFR 1020.220 - Customer identification programs for banks, savings associations, credit unions, and certain non...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... country of issuance; alien identification card number; or number and country of issuance of any other... taxpayer identification number within a reasonable period of time after the account is opened. (C) Credit card accounts. In connection with a customer who opens a credit card account, a bank may obtain...

  5. 31 CFR 1020.220 - Customer identification programs for banks, savings associations, credit unions, and certain non...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... country of issuance; alien identification card number; or number and country of issuance of any other... taxpayer identification number within a reasonable period of time after the account is opened. (C) Credit card accounts. In connection with a customer who opens a credit card account, a bank may obtain...

  6. ACAA fly ash basics: quick reference card

    SciTech Connect

    2006-07-01

    Fly ash is a fine powdery material created when coal is burned to generate electricity. Before escaping into the environment via the utility stacks, the ash is collected and may be stored for beneficial uses or disposed of, if necessary. The use of fly ash provides environmental benefits, such as the conservation of natural resources, the reduction of greenhouse gas emissions and eliminating the needed for ash disposal in landfills. It is also a valuable mineral resource that is used in construction and manufacturing. Fly ash is used in the production of Portland cement, concrete, mortars and stuccos, manufactured aggregates along with various agricultural applications. As mineral filler, fly ash can be used for paints, shingles, carpet backing, plastics, metal castings and other purposes. This quick reference card is intended to provide the reader basic source, identification and composition, information specifically related to fly ash.

  7. Passive microfluidic array card and reader

    DOEpatents

    Dugan, Lawrence Christopher; Coleman, Matthew A.

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  8. Levels and distribution pattern of polychlorinated biphenyl (PCB) congeners in razor clams Ensis siliqua (Linnaeus, 1758) from Galicia (north-west Spain) in relation to biometric parameters.

    PubMed

    Carro, N; García, I; Ignacio, M; Mouteira, A

    2006-11-01

    To establish polychlorinated biphenyl (PCB) levels and distribution as well as their relationship to biometric parameters in the razor clam Ensis siliqua (Linnaeus, 1758), 15 individual samples collected from two points sited in the Islas Cies, Ría de Vigo in Galicia, Spain, collected monthly between February 2003 and April 2004, were analysed. PCBs (IUPAC No. 31, 28, 52, 101, 118, 153, 105, 138, 156 and 180) were isolated by Soxhlet extraction. Identification and quantification were performed by gas chromatography-mass spectrometry (GC/MS) and gas chromatography (electron capture detector), respectively. The isomer concentrations in E. siliqua were in the order hexachlorobiphenyls > pentachlorobiphenyls > heptachlorobiphenyls > trichlorobiphenyls > tetrachlorbiphenyls. No correlation was observed between the E. siliqua shell length and PCBs levels. The PCBs 31, 101, 105 and 153 levels were statistically related with some biometric parameters (p < 0.05). Multivariate techniques such as principal component analysis (PCA) show clear seasonal differences between samples. PMID:17071525

  9. Adaptive SVM fusion for robust multi-biometrics verification with missing data

    NASA Astrophysics Data System (ADS)

    Zhai, Xiuna; Zhao, Yan; Wang, Jingyan; Li, Yongping

    2013-03-01

    Conventional multimodal biometrics systems usually do not account for missing data (missing modalities or incomplete score lists) that is commonly encountered in real applications. The presence of missing data in multimodal biometric systems can be inconvenient to the client, as the system will reject the submitted biometric data and request for another trial. In such cases, robust multimodal biometric verification is needed. In this paper, we present the criteria, fusion method and performance metrics of a robust multimodal biometrics verification system that verifies the client's identity at any condition of data missing. A novel adaptive SVM classification method is proposed for missing dimensional values, which can handle the missing data in multimodal biometrics. We show that robust multibiometrics imposes additional requirements on multimodal fusion when compared to conventional multibiometrics. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for robust verification and propose new metrics against which we benchmark our system.

  10. Performance evaluation of a biometric system based on acoustic images.

    PubMed

    Izquierdo-Fuente, Alberto; del Val, Lara; Jiménez, María I; Villacorta, Juan J

    2011-01-01

    An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 λ/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications. PMID:22163708

  11. Reliability-Based Decision Fusion in Multimodal Biometric Verification Systems

    NASA Astrophysics Data System (ADS)

    Kryszczuk, Krzysztof; Richiardi, Jonas; Prodanov, Plamen; Drygajlo, Andrzej

    2007-12-01

    We present a methodology of reliability estimation in the multimodal biometric verification scenario. Reliability estimation has shown to be an efficient and accurate way of predicting and correcting erroneous classification decisions in both unimodal (speech, face, online signature) and multimodal (speech and face) systems. While the initial research results indicate the high potential of the proposed methodology, the performance of the reliability estimation in a multimodal setting has not been sufficiently studied or evaluated. In this paper, we demonstrate the advantages of using the unimodal reliability information in order to perform an efficient biometric fusion of two modalities. We further show the presented method to be superior to state-of-the-art multimodal decision-level fusion schemes. The experimental evaluation presented in this paper is based on the popular benchmarking bimodal BANCA database.

  12. Optimization of a Biometric System Based on Acoustic Images

    PubMed Central

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J.; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  13. Biometric identity management for standard mobile medical networks.

    PubMed

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented. PMID:23366356

  14. A Multi-Sample Standoff Multimodal Biometric System

    SciTech Connect

    Barstow, Del R; Patlolla, Dilip Reddy; Mann, Christopher J; Boehnen, Chris Bensing

    2012-01-01

    Abstract The data captured by existing standoff biometric systems typically has lower biometric recognition performance than their close range counterparts due to imaging challenges, pose challenges, and other factors. To assist in overcoming these limitations systems typically perform in a multi-modal capacity such as Honeywell s Combined Face and Iris (CFAIRS) [21] system. While this improves the systems performance, standoff systems have yet to be proven as accurate as their close range equivalents. We will present a standoff system capable of operating up to 7 meters in range. Unlike many systems such as the CFAIRS our system captures high quality 12 MP video allowing for a multi-sample as well as multi-modal comparison. We found that for standoff systems multi-sample improved performance more than multi-modal. For a small test group of 50 subjects we were able to achieve 100% rank one recognition performance with our system.

  15. Performance Evaluation of a Biometric System Based on Acoustic Images

    PubMed Central

    Izquierdo-Fuente, Alberto; del Val, Lara; Jiménez, María I.; Villacorta, Juan J.

    2011-01-01

    An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 λ/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications. PMID:22163708

  16. Optimization of a biometric system based on acoustic images.

    PubMed

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  17. Accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements

    NASA Astrophysics Data System (ADS)

    Alsharif, Salim; El-Saba, Aed; Jagapathi, Rajendarreddy

    2011-06-01

    Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Besides cost, issues related to accuracy, security, and processing time in practical biometric recognition systems represent the most critical factors that makes these systems widely acceptable. Accurate and secure biometric systems often require sophisticated enhancement and encoding techniques that burdens the overall processing time of the system. In this paper we present a comparison between common digital and optical enhancementencoding techniques with respect to their accuracy, security and processing time, when applied to biometric fingerprint systems.

  18. 32 CFR 232.5 - Identification of covered borrower.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Social Security number, and date of birth. (d) This part shall not apply to a consumer credit transaction... earning statement, or a military identification card (DD Form 2 for members, DD Form 1173 for dependents), as described in DoD Instruction 1003.1, Identification (ID) Cards for Members of the...

  19. 32 CFR 232.5 - Identification of covered borrower.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Social Security number, and date of birth. (d) This part shall not apply to a consumer credit transaction... earning statement, or a military identification card (DD Form 2 for members, DD Form 1173 for dependents), as described in DoD Instruction 1003.1, Identification (ID) Cards for Members of the...

  20. 32 CFR 232.5 - Identification of covered borrower.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Social Security number, and date of birth. (d) This part shall not apply to a consumer credit transaction... earning statement, or a military identification card (DD Form 2 for members, DD Form 1173 for dependents), as described in DoD Instruction 1003.1, Identification (ID) Cards for Members of the...