2 Presentation Overview Corporate SnapshotChoosing a BiometricBenefits of Facial BiometricsBorder Control ApplicationsSample InstallationsBiometric PerformanceBiometric Fusion
3 VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS RECENT ANNOUNCEMENTVISIONICS & IDENTIX AGREE TO A MERGER OF EQUALSMerger Announced 2/22/02Now, World’s Largest Multi-Biometric Provider of Facial Recognition and Fingerprint technologiesWill Enable the Offering of Complete, Integrated Biometric Solutions
4 Visionics: Quick Facts Nasdaq Symbol VSNX~ 200 employeesFY01 (E): $30M revenueWorldwide biometrics industry leaderFounding member of the International Biometric Industry Association (IBIA)UKCaliforniaNew JerseyMinnesota
5 Lines of Business Lines of Business Lines of Business 1.FaceIt Face recognition software technology2. BNAHardware appliances & modules that encapsulate biometric capabilities3. Live ScanElectronic capture of forensic quality fingerprint images4. IBISMobile identification systems for law enforcement
6 Leaders in Face Recognition Developer of FaceIt® engines.Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs.Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities.Revenue leaders in facial recognitionMost deploymentsMost partnersWorldwide brand name recognition
7 Face recognition is a special example of a BiometricsBiometricsFace recognition is a special example of aBiometric Technology
8 Biometric Technology Biometrics Biometrics Computerized methods for automatically recognizing a person based on a physical trait or attribute.Biometric Technology
9 The Biometrics Family The Biometrics Family . . . I. High Intrinsic AccuracyII. Limited Intrinsic AccuracyIII. Commercially Nonviable. . .The Facial PromiseA photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of others—FaceIt® Faceprint.
10 IV. Human-backup I. Familiar II. Compatible III. Simple Why Face? Security with a Human Face™A powerful software tool!Different Reasons in Different Apps:I. FamiliarIDs have used photos for years.II. CompatibleWorks with existing ID dbases..III. SimpleEasy to use. User does nothing!IV. Human-backupHumans read face not finger or iris
11 V. Audit trail VI. ID at a Distance Why Face? Surveillance Human-ReadableVI. ID at a DistanceSurveillance
13 Making faces Making faces Local Feature Analysis: Most fundamental element in face recognition is the representation used to build the digital code (i.e. faceprint).Local Feature Analysis:Approach used by Visionics.Local Analysis.Principal Component Analysis:Approach used by competition (Eigenfaces).Global Analysis.Another approach that was considered is Neural Networks but was rapidly discredited within the scientific community as very inaccurate.
14 Local Feature Analysis Local Feature Analysis Nodal Points: Faces, like finger prints, possess Nodal Points that can be automatically detected.Identity: Geometry of constellation of Nodal Points is unique to a given face and is over redundant.
16 Properties of LFA Properties of LFA Color Blind: Does not use color information. Increased robustness with respect to changes in skin tone.Racially Blind: Performance is independent of race. Facial structure is universal across races.Versatile Input: Can work from any image source including near- infrared or night vision.Robust with Aging: The faceprint maintains a significant portion of its structure as the face ages.
17 Visionics technology can provide three key applications within the airport and border crossing environment…
18 1. Background Checking: Already in Place Livescan biometric systemsCapture NIST recordsElectronic submission to IAFIS /NCICChanneling AgenciesOffice of Personnel ManagementAAAEIndian Gaming CommissionNuclear Regulatory Commission40 millionRecords
19 Visionics and Identix are currently installed in over 100 US Airports. System Example: Airport Applicant Systems: Feb 02Pre 9/11Post 9/11Visionics and Identix are currently installed in over 100 US Airports.Visionics provides over 600 live scan systems at INS Applicant Support Centers across the US
20 2. Privileged Access: One-to-One Matching Granting of access for a variety of privileges:Expedited border clearanceExpedited airplane boarding - SPTSecure access: facilitiesTrusted Identity data need NOT reside in a national databaseEntity administering privilege—commercial & government—can maintain, separate archives (privacy concerns)Dual or multi-use tokens (i.e. smart cards)
21 Example: Basel – Border Control Application System Integrator EDS was awarded a contract by the Israeli Government for a Biometric facilitated Border Control application.40,000 daily workers to enter and exit the Gaza Strip via 42 routing passages in “terminal-like” environment.The project will introduce the use of Fusion Module for the use of two biometrics.
22 A Task that Cannot be done Manually. Privileged Access: One-to ManyA Task that Cannot be done Manually.At enrollment, automatically check uniqueness of Identity.Eliminates duplicates & Aliases.Additional System Examples:Colorado State, DMVWest Virginia, DMVMexican National Voter Election System
23 3. Watch-List DetectionTerror and crime are not facelessImproved intelligence is yielding the identities of perpetratorsThree Primary Applications:ID-document surveillanceCheckpoint surveillanceOn-Demand surveillance
24 ID-Document Surveillance Uses standard existing travel documentsCreates manifest: entry-exitSystem Example:Dominican Republic - First large scale implementation120 points of entryFacial images from ID documents scanned upon entry & checked against centralized terrorist, drug traffickers & criminals watchlistsAlert
25 Typical BNA Configuration: FaceIt® ARGUS Checkpoint SurveillanceTypical BNA Configuration: FaceIt® ARGUSFaceIt® Bio CaptureFaceIt® Bio CaptureFaceIt® Bio LogicFaceIt® Bio CaptureFaceIt® Bio TemplateCapable ofWireless alertsclosest guardsFaceIt® Bio TemplateThis diagram represents what a fully deployed Enterprise system might consist of. Additionally it shows the layers where either a partner or the FaceIt® Solutions group would apply resources.FaceIt® Bio TemplateUser Workstation Control,review, administrationFaceIt® Bio Search
26 Sample Surveillance Installations Current Airport Installations:Fresno Yosemite AirportKeflavik International Airport, IcelandDallas Ft. WorthPalm Beach AirportBoston Logan (Testing Complete)Several unnamed airports & border crossing (under installation)Also installed in:Newham, London, UKBirmingham, UKYbor City, Tampa, Florida
27 On-Demand Surveillance: IBIS System Examples:West Valley, UtahHennepin County, MNRedlands, CAOntario, CA
28 Golden Question: How Accurate is it? The accuracy of all biometrics can be assessed via:False Accept Rate (FAR),False Reject Rate (FRR),Failure to Acquire (FTA).FAR = RiskFTA = Liability
29 Managing Customer/User Expectations Technology has limitations, must build systems that take them into accountsSetting realistic expectations: (will never do FRR=0, FAR=0, FTA=0, cost=0)Exception Handling:Secondary screening with human backupFusion approach
30 (statistical properties of multiple biometrics) Fusion versus LayeringScore Fusion(statistical properties of multiple biometrics)Layering:ANDORBiometricsModule 1Decision OneModule 2Decision TwoScore OneScore TwoDecisionFinal Decision
32 Recently Passed Legislation Aviation and Transportation Security Act of 2001Established the Transportation Security Administration (TSA). Mandates background checks on all airport employees. Also mandates upgraded access control systems for secure areas at airports.USA Patriot Act of 2001Expands government surveillance powers. Requires technology standard for tracking entry and exit of aliens. Suggests the use of biometric technology to conduct background checks prior to issuance of visas.
33 Currently Pending Legislation Drivers License Modernization Act of 2002Would require a biometric to be embedded on an individual's driver's license. Requires that the Department of Transportation develop a technology standard in conjunction with other governing bodiesEnhanced Border Security and Visa Entry Reform ActMandates the creation of a watch-list database, made available to all agencies involved in determining the admissibility and the identification of aliens. Mandates the issuance of machine-readable, tamper-resistant travel documents with biometric identifiers and the installation of equipment and software capable of reading the new documents at all U.S. ports of entry by October 26, 2003.