Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2001 Visionics Corporation FaceIt®: Enabling Technology for Airports and Border Control.

Similar presentations


Presentation on theme: "Copyright © 2001 Visionics Corporation FaceIt®: Enabling Technology for Airports and Border Control."— Presentation transcript:

1 Copyright © 2001 Visionics Corporation FaceIt®: Enabling Technology for Airports and Border Control

2 Presentation Overview –Corporate Snapshot –Choosing a Biometric –Benefits of Facial Biometrics –Border Control Applications –Sample Installations –Biometric Performance –Biometric Fusion

3 VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS Merger Announced 2/22/02 Now, Worlds Largest Multi-Biometric Provider of Facial Recognition and Fingerprint technologies Will Enable the Offering of Complete, Integrated Biometric Solutions RECENT ANNOUNCEMENT

4 Visionics: Quick Facts UK California New Jersey Minnesota Nasdaq Symbol VSNX ~ 200 employees FY01 (E): $30M revenue Worldwide biometrics industry leader Founding member of the International Biometric Industry Association (IBIA)

5 Lines of Business Lines of Business 4. IBIS Mobile identificatio n systems for law enforcement 3. Live Scan Electronic capture of forensic quality fingerprint images 2. BNA Hardware appliances & modules that encapsulate biometric capabilities 1.FaceIt Face recognition software technology

6 Developer of FaceIt® engines. Developer of FaceIt® engines. Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs. Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs. Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities. Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities. Revenue leaders in facial recognition Most deployments Most partners Worldwide brand name recognition Leaders in Face Recognition

7 Biometrics Face recognition is a special example of a Biometrics Biometric Technology

8 Biometrics Biometric Technology Computerized methods for automatically recognizing a person based on a physical trait or attribute.

9 The Biometrics Family I. High Intrinsic Accuracy II. Limited Intrinsic Accuracy III. Commercially Nonviable... The Biometrics Family The Facial Promise A photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of othersFaceIt® Faceprint. The Facial Promise A photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of othersFaceIt® Faceprint.

10 Security with a Human Face A powerful software tool! Why Face? I. Familiar IDs have used photos for years. II. Compatible Works with existing ID dbases.. III. Simple Easy to use. User does nothing! IV. Human-backup Humans read face not finger or iris Why Face? Different Reasons in Different Apps:

11 Why Face? V. Audit trail Human-Readable VI. ID at a Distance Surveillance

12 How Does Face Recognition Work?

13 Making faces Local Feature Analysis: ä Approach used by Visionics. ä Local Analysis. Principal Component Analysis: ä Approach used by competition (Eigenfaces). ä Global Analysis. Most fundamental element in face recognition is the representation used to build the digital code (i.e. faceprint). Making faces Another approach that was considered is Neural Networks but was rapidly discredited within the scientific community as very inaccurate.

14 Local Feature Analysis Nodal Points: Faces, like finger prints, possess Nodal Points that can be automatically detected. Identity: Geometry of constellation of Nodal Points is unique to a given face and is over redundant. Local Feature Analysis

15 Right… Frontotemporale Glabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton … Left… Frontotemporale Glabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton … Local Feature Analysis

16 Properties of LFA Color Blind:Does not use color information. Increased robustness with respect to changes in skin tone. Racially Blind:Performance is independent of race. Facial structure is universal across races. Versatile Input:Can work from any image source including near- infrared or night vision. Robust with Aging:The faceprint maintains a significant portion of its structure as the face ages. Properties of LFA

17 Visionics technology can provide three key applications within the airport and border crossing environment…

18 Livescan biometric systems Livescan biometric systems Capture NIST records Electronic submission to IAFIS /NCIC Channeling Agencies Channeling Agencies Office of Personnel Management AAAE Indian Gaming Commission Nuclear Regulatory Commission 40 million Records 1. Background Checking: Already in Place

19 System Example: Airport Applicant Systems: Feb 02 Visionics and Identix are currently installed in over 100 US Airports. Visionics provides over 600 live scan systems at INS Applicant Support Centers across the US Pre 9/11 Post 9/11

20 Granting of access for a variety of privileges: Expedited border clearance Expedited airplane boarding - SPT Secure access: facilities Trusted Identity data need NOT reside in a national database Entity administering privilegecommercial & governmentcan maintain, separate archives (privacy concerns) Dual or multi-use tokens (i.e. smart cards) 2. Privileged Access: One-to-One Matching

21 System Integrator EDS was awarded a contract by the Israeli Government for a Biometric facilitated Border Control application. 40,000 daily workers to enter and exit the Gaza Strip via 42 routing passages in terminal-like environment. The project will introduce the use of Fusion Module for the use of two biometrics. Example: Basel – Border Control Application

22 Privileged Access: One-to Many A Task that Cannot be done Manually. 1.At enrollment, automatically check uniqueness of Identity. 2.Eliminates duplicates & Aliases. Additional System Examples: Colorado State, DMV West Virginia, DMV Mexican National Voter Election System

23 Terror and crime are not faceless Improved intelligence is yielding the identities of perpetrators Three Primary Applications: ID-document surveillance Checkpoint surveillance On-Demand surveillance 3. Watch-List Detection

24 ID-Document Surveillance Uses standard existing travel documents Creates manifest: entry- exit System Example: Dominican Republic - First large scale implementation 120 points of entry Facial images from ID documents scanned upon entry & checked against centralized terrorist, drug traffickers & criminals watchlists Alert

25 Typical BNA Configuration: FaceIt® ARGUS Checkpoint Surveillance FaceIt® Bio Template FaceIt® Bio Capture FaceIt® Bio Template FaceIt® Bio Logic FaceIt® Bio Search Capable of Wireless alerts closest guards User Workstation Control, review, administration review, administration

26 Current Airport Installations: Fresno Yosemite Airport Keflavik International Airport, Iceland Dallas Ft. Worth Palm Beach Airport Boston Logan (Testing Complete) Several unnamed airports & border crossing (under installation) Also installed in: Newham, London, UK Birmingham, UK Ybor City, Tampa, Florida Sample Surveillance Installations

27 On-Demand Surveillance: IBIS System Examples: West Valley, Utah West Valley, Utah Hennepin County, MN Hennepin County, MN Redlands, CA Redlands, CA Ontario, CA Ontario, CA

28 The accuracy of all biometrics can be assessed via: äFalse Accept Rate (FAR), äFalse Reject Rate (FRR), äFailure to Acquire (FTA). FAR = Risk FTA = Liability Golden Question: How Accurate is it?

29 Technology has limitations, must build systems that take them into accounts Setting realistic expectations: (will never do FRR=0, FAR=0, FTA=0, cost=0) Exception Handling: Secondary screening with human backup Fusion approach Managing Customer/User Expectations

30 Fusion versus Layering Score Fusion (statistical properties of multiple biometrics) Layering: AND OR Biometrics Module 1 Decision One Biometrics Module 2 Decision Two Biometrics Module 1 Biometrics Module 2 Score One Score Two Decision Final Decision

31 FAR0.1%0.5%1% FRR: B1 3.6%2.0%0.6% FRR: B2 0.23%0.11%0.08% FRR: OR 2.5%1%0.63% FRR: AND 0.9%0.56%0.048% FRR: FUSION 0.004%0.001%0.0007% Fusion: Improvements in Accuracy

32 Recently Passed Legislation Aviation and Transportation Security Act of 2001 Established the Transportation Security Administration (TSA). Mandates background checks on all airport employees. Also mandates upgraded access control systems for secure areas at airports. USA Patriot Act of 2001 Expands government surveillance powers. Requires technology standard for tracking entry and exit of aliens. Suggests the use of biometric technology to conduct background checks prior to issuance of visas.

33 Currently Pending Legislation Drivers License Modernization Act of 2002 Would require a biometric to be embedded on an individual's driver's license. Requires that the Department of Transportation develop a technology standard in conjunction with other governing bodies Enhanced Border Security and Visa Entry Reform Act Mandates the creation of a watch-list database, made available to all agencies involved in determining the admissibility and the identification of aliens. Mandates the issuance of machine-readable, tamper-resistant travel documents with biometric identifiers and the installation of equipment and software capable of reading the new documents at all U.S. ports of entry by October 26, 2003.

34 Copyright, 2001 © Visionics Corporation. Thank You For Your Attention. For further information, please contact: Vaughn J. Barber Business Development (201) 332 – 9213 x202


Download ppt "Copyright © 2001 Visionics Corporation FaceIt®: Enabling Technology for Airports and Border Control."

Similar presentations


Ads by Google