Enabling Technology for Airports and Border Control FaceIt®: Enabling Technology for Airports and Border Control Copyright © 2001 Visionics Corporation
Presentation Overview Corporate Snapshot Choosing a Biometric Benefits of Facial Biometrics Border Control Applications Sample Installations Biometric Performance Biometric Fusion
VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS RECENT ANNOUNCEMENT VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS Merger Announced 2/22/02 Now, World’s Largest Multi-Biometric Provider of Facial Recognition and Fingerprint technologies Will Enable the Offering of Complete, Integrated Biometric Solutions
Visionics: Quick Facts Nasdaq Symbol VSNX ~ 200 employees FY01 (E): $30M revenue Worldwide biometrics industry leader Founding member of the International Biometric Industry Association (IBIA) UK California New Jersey Minnesota
Lines of Business Lines of Business Lines of Business 1.FaceIt Face recognition software technology 2. BNA Hardware appliances & modules that encapsulate biometric capabilities 3. Live Scan Electronic capture of forensic quality fingerprint images 4. IBIS Mobile identification systems for law enforcement
Leaders in Face Recognition Developer of FaceIt® engines. Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs. Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities. Revenue leaders in facial recognition Most deployments Most partners Worldwide brand name recognition
Face recognition is a special example of a Biometrics Biometrics Face recognition is a special example of a Biometric Technology
Biometric Technology Biometrics Biometrics Computerized methods for automatically recognizing a person based on a physical trait or attribute. Biometric Technology
The Biometrics Family The Biometrics Family . . . I. High Intrinsic Accuracy II. Limited Intrinsic Accuracy III. Commercially Nonviable . . . The Facial Promise A photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of others—FaceIt® Faceprint.
IV. Human-backup I. Familiar II. Compatible III. Simple Why Face? Security with a Human Face™ A powerful software tool! Different Reasons in Different Apps: I. Familiar IDs have used photos for years. II. Compatible Works with existing ID dbases.. III. Simple Easy to use. User does nothing! IV. Human-backup Humans read face not finger or iris
V. Audit trail VI. ID at a Distance Why Face? Surveillance Human-Readable VI. ID at a Distance Surveillance
How Does Face Recognition Work?
Making faces Making faces Local Feature Analysis: Most fundamental element in face recognition is the representation used to build the digital code (i.e. faceprint). Local Feature Analysis: Approach used by Visionics. Local Analysis. Principal Component Analysis: Approach used by competition (Eigenfaces). Global Analysis. Another approach that was considered is Neural Networks but was rapidly discredited within the scientific community as very inaccurate.
Local Feature Analysis Local Feature Analysis Nodal Points: Faces, like finger prints, possess Nodal Points that can be automatically detected. Identity: Geometry of constellation of Nodal Points is unique to a given face and is over redundant.
Local Feature Analysis Left… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton … Right… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton …
Properties of LFA Properties of LFA Color Blind: Does not use color information. Increased robustness with respect to changes in skin tone. Racially Blind: Performance is independent of race. Facial structure is universal across races. Versatile Input: Can work from any image source including near- infrared or night vision. Robust with Aging: The faceprint maintains a significant portion of its structure as the face ages.
Visionics technology can provide three key applications within the airport and border crossing environment…
1. Background Checking: Already in Place Livescan biometric systems Capture NIST records Electronic submission to IAFIS /NCIC Channeling Agencies Office of Personnel Management AAAE Indian Gaming Commission Nuclear Regulatory Commission 40 million Records
Visionics and Identix are currently installed in over 100 US Airports. System Example: Airport Applicant Systems: Feb 02 Pre 9/11 Post 9/11 Visionics and Identix are currently installed in over 100 US Airports. Visionics provides over 600 live scan systems at INS Applicant Support Centers across the US
2. Privileged Access: One-to-One Matching Granting of access for a variety of privileges: Expedited border clearance Expedited airplane boarding - SPT Secure access: facilities Trusted Identity data need NOT reside in a national database Entity administering privilege—commercial & government—can maintain, separate archives (privacy concerns) Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application System Integrator EDS was awarded a contract by the Israeli Government for a Biometric facilitated Border Control application. 40,000 daily workers to enter and exit the Gaza Strip via 42 routing passages in “terminal-like” environment. The project will introduce the use of Fusion Module for the use of two biometrics.
A Task that Cannot be done Manually. Privileged Access: One-to Many A Task that Cannot be done Manually. At enrollment, automatically check uniqueness of Identity. Eliminates duplicates & Aliases. Additional System Examples: Colorado State, DMV West Virginia, DMV Mexican National Voter Election System
3. Watch-List Detection Terror and crime are not faceless Improved intelligence is yielding the identities of perpetrators Three Primary Applications: ID-document surveillance Checkpoint surveillance On-Demand surveillance
ID-Document Surveillance Uses standard existing travel documents Creates manifest: entry-exit System Example: Dominican Republic - First large scale implementation 120 points of entry Facial images from ID documents scanned upon entry & checked against centralized terrorist, drug traffickers & criminals watchlists Alert
Typical BNA Configuration: FaceIt® ARGUS Checkpoint Surveillance Typical BNA Configuration: FaceIt® ARGUS FaceIt® Bio Capture FaceIt® Bio Capture FaceIt® Bio Logic FaceIt® Bio Capture FaceIt® Bio Template Capable of Wireless alerts closest guards FaceIt® Bio Template This diagram represents what a fully deployed Enterprise system might consist of. Additionally it shows the layers where either a partner or the FaceIt® Solutions group would apply resources. FaceIt® Bio Template User Workstation Control, review, administration FaceIt® Bio Search
Sample Surveillance Installations Current Airport Installations: Fresno Yosemite Airport Keflavik International Airport, Iceland Dallas Ft. Worth Palm Beach Airport Boston Logan (Testing Complete) Several unnamed airports & border crossing (under installation) Also installed in: Newham, London, UK Birmingham, UK Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS System Examples: West Valley, Utah Hennepin County, MN Redlands, CA Ontario, CA
Golden Question: How Accurate is it? The accuracy of all biometrics can be assessed via: False Accept Rate (FAR), False Reject Rate (FRR), Failure to Acquire (FTA). FAR = Risk FTA = Liability
Managing Customer/User Expectations Technology has limitations, must build systems that take them into accounts Setting realistic expectations: (will never do FRR=0, FAR=0, FTA=0, cost=0) Exception Handling: Secondary screening with human backup Fusion approach
(statistical properties of multiple biometrics) Fusion versus Layering Score Fusion (statistical properties of multiple biometrics) Layering: AND OR Biometrics Module 1 Decision One Module 2 Decision Two Score One Score Two Decision Final Decision
Fusion: Improvements in Accuracy FAR 0.1% 0.5% 1% FRR: B1 3.6% 2.0% 0.6% FRR: B2 0.23% 0.11% 0.08% FRR: “OR” 2.5% 0.63% FRR: “AND” 0.9% 0.56% 0.048% FRR: FUSION 0.004% 0.001% 0.0007%
Recently Passed Legislation Aviation and Transportation Security Act of 2001 Established the Transportation Security Administration (TSA). Mandates background checks on all airport employees. Also mandates upgraded access control systems for secure areas at airports. USA Patriot Act of 2001 Expands government surveillance powers. Requires technology standard for tracking entry and exit of aliens. Suggests the use of biometric technology to conduct background checks prior to issuance of visas.
Currently Pending Legislation Drivers License Modernization Act of 2002 Would require a biometric to be embedded on an individual's driver's license. Requires that the Department of Transportation develop a technology standard in conjunction with other governing bodies Enhanced Border Security and Visa Entry Reform Act Mandates the creation of a watch-list database, made available to all agencies involved in determining the admissibility and the identification of aliens. Mandates the issuance of machine-readable, tamper-resistant travel documents with biometric identifiers and the installation of equipment and software capable of reading the new documents at all U.S. ports of entry by October 26, 2003.
Thank You For Your Attention. For further information, please contact: Vaughn J. Barber Business Development (201) 332 – 9213 x202 Vaughn.Barber@Visionics.com Copyright, 2001 © Visionics Corporation.