Enabling Technology for Airports and Border Control

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Dr. Marc Valliant, VP & CTO
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
IDMarc and Document Inspector. © Digimarc Corporation - Confidential Digimarc Secure ID Leadership Digimarc driver licenses in 30 states and Wash. D.C.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
The Evolution of the Trusted Traveler Concept September 2010.
STI, Part of Al Falasi Group UAE
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Department of Labor HSPD-12
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
BARTEX Your Logo Here BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
Security Controls – What Works
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Hosted by: June 23-26, 2003 New York City ID Card Projects Large Scale ID Projects Based on Biometrics (Specifically Fingerprint)
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Biometrics II CUBS, University at Buffalo
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
FBI Science & Technology Branch MISSION To facilitate the application of innovative scientific, engineering, and technical solutions in support.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
TBWG Data Workshop June 3 rd, 2008 New Technologies for Data Collection Automated License Plate Recognition.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Page 1 Bernard C. Bailey President and CEO 07 September 2005.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
5th Annual International Public Sector Reform Symposium: New Models of Service Delivery for the 21st Century Ian Neill, e-Borders programme, UKBA Wednesday.
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Symbol Technologies Security Forum - Airline Security
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Unified Border Information System - UBIS A Needs Assessment.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
THE MALAYSIAN ELECTRONIC PASSPORT
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Facial Recognition
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Aladdin Security We supply what others can only assure.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Biometrics in the Banking Industry
THE MALAYSIAN ELECTRONIC PASSPORT
SmartCatch Systems Putting Intelligence into Surveillance
FACE RECOGNITION TECHNOLOGY
Facial Recognition in Biometrics
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation transcript:

Enabling Technology for Airports and Border Control FaceIt®: Enabling Technology for Airports and Border Control Copyright © 2001 Visionics Corporation

Presentation Overview Corporate Snapshot Choosing a Biometric Benefits of Facial Biometrics Border Control Applications Sample Installations Biometric Performance Biometric Fusion

VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS RECENT ANNOUNCEMENT VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS Merger Announced 2/22/02 Now, World’s Largest Multi-Biometric Provider of Facial Recognition and Fingerprint technologies Will Enable the Offering of Complete, Integrated Biometric Solutions

Visionics: Quick Facts Nasdaq Symbol VSNX ~ 200 employees FY01 (E): $30M revenue Worldwide biometrics industry leader Founding member of the International Biometric Industry Association (IBIA) UK California New Jersey Minnesota

Lines of Business Lines of Business Lines of Business 1.FaceIt Face recognition software technology 2. BNA Hardware appliances & modules that encapsulate biometric capabilities 3. Live Scan Electronic capture of forensic quality fingerprint images 4. IBIS Mobile identification systems for law enforcement

Leaders in Face Recognition Developer of FaceIt® engines. Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs. Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities. Revenue leaders in facial recognition Most deployments Most partners Worldwide brand name recognition

Face recognition is a special example of a Biometrics Biometrics Face recognition is a special example of a Biometric Technology

Biometric Technology Biometrics Biometrics Computerized methods for automatically recognizing a person based on a physical trait or attribute. Biometric Technology

The Biometrics Family The Biometrics Family . . . I. High Intrinsic Accuracy II. Limited Intrinsic Accuracy III. Commercially Nonviable . . . The Facial Promise A photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of others—FaceIt® Faceprint.

IV. Human-backup I. Familiar II. Compatible III. Simple Why Face? Security with a Human Face™ A powerful software tool! Different Reasons in Different Apps: I. Familiar IDs have used photos for years. II. Compatible Works with existing ID dbases.. III. Simple Easy to use. User does nothing! IV. Human-backup Humans read face not finger or iris

V. Audit trail VI. ID at a Distance Why Face? Surveillance Human-Readable VI. ID at a Distance Surveillance

How Does Face Recognition Work?

Making faces Making faces Local Feature Analysis: Most fundamental element in face recognition is the representation used to build the digital code (i.e. faceprint). Local Feature Analysis: Approach used by Visionics. Local Analysis. Principal Component Analysis: Approach used by competition (Eigenfaces). Global Analysis. Another approach that was considered is Neural Networks but was rapidly discredited within the scientific community as very inaccurate.

Local Feature Analysis Local Feature Analysis Nodal Points: Faces, like finger prints, possess Nodal Points that can be automatically detected. Identity: Geometry of constellation of Nodal Points is unique to a given face and is over redundant.

Local Feature Analysis Left… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton … Right… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton …

Properties of LFA Properties of LFA Color Blind: Does not use color information. Increased robustness with respect to changes in skin tone. Racially Blind: Performance is independent of race. Facial structure is universal across races. Versatile Input: Can work from any image source including near- infrared or night vision. Robust with Aging: The faceprint maintains a significant portion of its structure as the face ages.

Visionics technology can provide three key applications within the airport and border crossing environment…

1. Background Checking: Already in Place Livescan biometric systems Capture NIST records Electronic submission to IAFIS /NCIC Channeling Agencies Office of Personnel Management AAAE Indian Gaming Commission Nuclear Regulatory Commission 40 million Records

Visionics and Identix are currently installed in over 100 US Airports. System Example: Airport Applicant Systems: Feb 02 Pre 9/11 Post 9/11 Visionics and Identix are currently installed in over 100 US Airports. Visionics provides over 600 live scan systems at INS Applicant Support Centers across the US

2. Privileged Access: One-to-One Matching Granting of access for a variety of privileges: Expedited border clearance Expedited airplane boarding - SPT Secure access: facilities Trusted Identity data need NOT reside in a national database Entity administering privilege—commercial & government—can maintain, separate archives (privacy concerns) Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application System Integrator EDS was awarded a contract by the Israeli Government for a Biometric facilitated Border Control application. 40,000 daily workers to enter and exit the Gaza Strip via 42 routing passages in “terminal-like” environment. The project will introduce the use of Fusion Module for the use of two biometrics.

A Task that Cannot be done Manually. Privileged Access: One-to Many A Task that Cannot be done Manually. At enrollment, automatically check uniqueness of Identity. Eliminates duplicates & Aliases. Additional System Examples: Colorado State, DMV West Virginia, DMV Mexican National Voter Election System

3. Watch-List Detection Terror and crime are not faceless Improved intelligence is yielding the identities of perpetrators Three Primary Applications: ID-document surveillance Checkpoint surveillance On-Demand surveillance

ID-Document Surveillance Uses standard existing travel documents Creates manifest: entry-exit System Example: Dominican Republic - First large scale implementation 120 points of entry Facial images from ID documents scanned upon entry & checked against centralized terrorist, drug traffickers & criminals watchlists Alert

Typical BNA Configuration: FaceIt® ARGUS Checkpoint Surveillance Typical BNA Configuration: FaceIt® ARGUS FaceIt® Bio Capture FaceIt® Bio Capture FaceIt® Bio Logic FaceIt® Bio Capture FaceIt® Bio Template Capable of Wireless alerts closest guards FaceIt® Bio Template This diagram represents what a fully deployed Enterprise system might consist of. Additionally it shows the layers where either a partner or the FaceIt® Solutions group would apply resources. FaceIt® Bio Template User Workstation Control, review, administration FaceIt® Bio Search

Sample Surveillance Installations Current Airport Installations: Fresno Yosemite Airport Keflavik International Airport, Iceland Dallas Ft. Worth Palm Beach Airport Boston Logan (Testing Complete) Several unnamed airports & border crossing (under installation) Also installed in: Newham, London, UK Birmingham, UK Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS System Examples: West Valley, Utah Hennepin County, MN Redlands, CA Ontario, CA

Golden Question: How Accurate is it? The accuracy of all biometrics can be assessed via: False Accept Rate (FAR), False Reject Rate (FRR), Failure to Acquire (FTA). FAR = Risk FTA = Liability

Managing Customer/User Expectations Technology has limitations, must build systems that take them into accounts Setting realistic expectations: (will never do FRR=0, FAR=0, FTA=0, cost=0) Exception Handling: Secondary screening with human backup Fusion approach

(statistical properties of multiple biometrics) Fusion versus Layering Score Fusion (statistical properties of multiple biometrics) Layering: AND OR Biometrics Module 1 Decision One Module 2 Decision Two Score One Score Two Decision Final Decision

Fusion: Improvements in Accuracy FAR 0.1% 0.5% 1% FRR: B1 3.6% 2.0% 0.6% FRR: B2 0.23% 0.11% 0.08% FRR: “OR” 2.5% 0.63% FRR: “AND” 0.9% 0.56% 0.048% FRR: FUSION 0.004% 0.001% 0.0007%

Recently Passed Legislation Aviation and Transportation Security Act of 2001 Established the Transportation Security Administration (TSA). Mandates background checks on all airport employees. Also mandates upgraded access control systems for secure areas at airports. USA Patriot Act of 2001 Expands government surveillance powers. Requires technology standard for tracking entry and exit of aliens. Suggests the use of biometric technology to conduct background checks prior to issuance of visas.

Currently Pending Legislation Drivers License Modernization Act of 2002 Would require a biometric to be embedded on an individual's driver's license. Requires that the Department of Transportation develop a technology standard in conjunction with other governing bodies Enhanced Border Security and Visa Entry Reform Act Mandates the creation of a watch-list database, made available to all agencies involved in determining the admissibility and the identification of aliens. Mandates the issuance of machine-readable, tamper-resistant travel documents with biometric identifiers and the installation of equipment and software capable of reading the new documents at all U.S. ports of entry by October 26, 2003.

Thank You For Your Attention. For further information, please contact: Vaughn J. Barber Business Development (201) 332 – 9213 x202 Vaughn.Barber@Visionics.com Copyright, 2001 © Visionics Corporation.