Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enabling Technology for Airports and Border Control

Similar presentations

Presentation on theme: "Enabling Technology for Airports and Border Control"— Presentation transcript:

1 Enabling Technology for Airports and Border Control
FaceIt®: Enabling Technology for Airports and Border Control Copyright © 2001 Visionics Corporation

2 Presentation Overview
Corporate Snapshot Choosing a Biometric Benefits of Facial Biometrics Border Control Applications Sample Installations Biometric Performance Biometric Fusion

RECENT ANNOUNCEMENT VISIONICS & IDENTIX AGREE TO A MERGER OF EQUALS Merger Announced 2/22/02 Now, World’s Largest Multi-Biometric Provider of Facial Recognition and Fingerprint technologies Will Enable the Offering of Complete, Integrated Biometric Solutions

4 Visionics: Quick Facts
Nasdaq Symbol VSNX ~ 200 employees FY01 (E): $30M revenue Worldwide biometrics industry leader Founding member of the International Biometric Industry Association (IBIA) UK California New Jersey Minnesota

5 Lines of Business Lines of Business Lines of Business 1.FaceIt
Face recognition software technology 2. BNA Hardware appliances & modules that encapsulate biometric capabilities 3. Live Scan Electronic capture of forensic quality fingerprint images 4. IBIS Mobile identification systems for law enforcement

6 Leaders in Face Recognition
Developer of FaceIt® engines. Focused on building cutting edge technology modules that are used by System integrators, product developers and OEMs. Founded by scientists who discovered the basic algorithms. Formerly at Princeton and Rockefeller Universities. Revenue leaders in facial recognition Most deployments Most partners Worldwide brand name recognition

7 Face recognition is a special example of a
Biometrics Biometrics Face recognition is a special example of a Biometric Technology

8 Biometric Technology Biometrics Biometrics
Computerized methods for automatically recognizing a person based on a physical trait or attribute. Biometric Technology

9 The Biometrics Family The Biometrics Family . . .
I. High Intrinsic Accuracy II. Limited Intrinsic Accuracy III. Commercially Nonviable . . . The Facial Promise A photograph-- whether static or a live image---contains the information necessary to distinguish one person among millions of others—FaceIt® Faceprint.

10 IV. Human-backup I. Familiar II. Compatible III. Simple Why Face?
Security with a Human Face™ A powerful software tool! Different Reasons in Different Apps: I. Familiar IDs have used photos for years. II. Compatible Works with existing ID dbases.. III. Simple Easy to use. User does nothing! IV. Human-backup Humans read face not finger or iris

11 V. Audit trail VI. ID at a Distance Why Face? Surveillance
Human-Readable VI. ID at a Distance Surveillance

12 How Does Face Recognition Work?

13 Making faces Making faces Local Feature Analysis:
Most fundamental element in face recognition is the representation used to build the digital code (i.e. faceprint). Local Feature Analysis: Approach used by Visionics. Local Analysis. Principal Component Analysis: Approach used by competition (Eigenfaces). Global Analysis. Another approach that was considered is Neural Networks but was rapidly discredited within the scientific community as very inaccurate.

14 Local Feature Analysis Local Feature Analysis
Nodal Points: Faces, like finger prints, possess Nodal Points that can be automatically detected. Identity: Geometry of constellation of Nodal Points is unique to a given face and is over redundant.

15 Local Feature Analysis
Left… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton … Right… FrontotemporaleGlabella Sellion Pupila Zygofrontale Zygion Infraorbitale Ectocanthus Infrazygion Inframalar Tragion Gonion Pronasale MIM Promenton Menton …

16 Properties of LFA Properties of LFA
Color Blind: Does not use color information. Increased robustness with respect to changes in skin tone. Racially Blind: Performance is independent of race. Facial structure is universal across races. Versatile Input: Can work from any image source including near- infrared or night vision. Robust with Aging: The faceprint maintains a significant portion of its structure as the face ages.

17 Visionics technology can provide three key applications within the airport and border crossing environment…

18 1. Background Checking: Already in Place
Livescan biometric systems Capture NIST records Electronic submission to IAFIS /NCIC Channeling Agencies Office of Personnel Management AAAE Indian Gaming Commission Nuclear Regulatory Commission 40 million Records

19 Visionics and Identix are currently installed in over 100 US Airports.
System Example: Airport Applicant Systems: Feb 02 Pre 9/11 Post 9/11 Visionics and Identix are currently installed in over 100 US Airports. Visionics provides over 600 live scan systems at INS Applicant Support Centers across the US

20 2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges: Expedited border clearance Expedited airplane boarding - SPT Secure access: facilities Trusted Identity data need NOT reside in a national database Entity administering privilege—commercial & government—can maintain, separate archives (privacy concerns) Dual or multi-use tokens (i.e. smart cards)

21 Example: Basel – Border Control Application
System Integrator EDS was awarded a contract by the Israeli Government for a Biometric facilitated Border Control application. 40,000 daily workers to enter and exit the Gaza Strip via 42 routing passages in “terminal-like” environment. The project will introduce the use of Fusion Module for the use of two biometrics.

22 A Task that Cannot be done Manually.
Privileged Access: One-to Many A Task that Cannot be done Manually. At enrollment, automatically check uniqueness of Identity. Eliminates duplicates & Aliases. Additional System Examples: Colorado State, DMV West Virginia, DMV Mexican National Voter Election System

23 3. Watch-List Detection Terror and crime are not faceless Improved intelligence is yielding the identities of perpetrators Three Primary Applications: ID-document surveillance Checkpoint surveillance On-Demand surveillance

24 ID-Document Surveillance
Uses standard existing travel documents Creates manifest: entry-exit System Example: Dominican Republic - First large scale implementation 120 points of entry Facial images from ID documents scanned upon entry & checked against centralized terrorist, drug traffickers & criminals watchlists Alert

25 Typical BNA Configuration: FaceIt® ARGUS
Checkpoint Surveillance Typical BNA Configuration: FaceIt® ARGUS FaceIt® Bio Capture FaceIt® Bio Capture FaceIt® Bio Logic FaceIt® Bio Capture FaceIt® Bio Template Capable of Wireless alerts closest guards FaceIt® Bio Template This diagram represents what a fully deployed Enterprise system might consist of. Additionally it shows the layers where either a partner or the FaceIt® Solutions group would apply resources. FaceIt® Bio Template User Workstation Control, review, administration FaceIt® Bio Search

26 Sample Surveillance Installations
Current Airport Installations: Fresno Yosemite Airport Keflavik International Airport, Iceland Dallas Ft. Worth Palm Beach Airport Boston Logan (Testing Complete) Several unnamed airports & border crossing (under installation) Also installed in: Newham, London, UK Birmingham, UK Ybor City, Tampa, Florida

27 On-Demand Surveillance: IBIS
System Examples: West Valley, Utah Hennepin County, MN Redlands, CA Ontario, CA

28 Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via: False Accept Rate (FAR), False Reject Rate (FRR), Failure to Acquire (FTA). FAR = Risk FTA = Liability

29 Managing Customer/User Expectations
Technology has limitations, must build systems that take them into accounts Setting realistic expectations: (will never do FRR=0, FAR=0, FTA=0, cost=0) Exception Handling: Secondary screening with human backup Fusion approach

30 (statistical properties of multiple biometrics)
Fusion versus Layering Score Fusion (statistical properties of multiple biometrics) Layering: AND OR Biometrics Module 1 Decision One Module 2 Decision Two Score One Score Two Decision Final Decision

31 Fusion: Improvements in Accuracy
FAR 0.1% 0.5% 1% FRR: B1 3.6% 2.0% 0.6% FRR: B2 0.23% 0.11% 0.08% FRR: “OR” 2.5% 0.63% FRR: “AND” 0.9% 0.56% 0.048% FRR: FUSION 0.004% 0.001% 0.0007%

32 Recently Passed Legislation
Aviation and Transportation Security Act of 2001 Established the Transportation Security Administration (TSA). Mandates background checks on all airport employees. Also mandates upgraded access control systems for secure areas at airports. USA Patriot Act of 2001 Expands government surveillance powers. Requires technology standard for tracking entry and exit of aliens. Suggests the use of biometric technology to conduct background checks prior to issuance of visas.

33 Currently Pending Legislation
Drivers License Modernization Act of 2002 Would require a biometric to be embedded on an individual's driver's license. Requires that the Department of Transportation develop a technology standard in conjunction with other governing bodies Enhanced Border Security and Visa Entry Reform Act Mandates the creation of a watch-list database, made available to all agencies involved in determining the admissibility and the identification of aliens. Mandates the issuance of machine-readable, tamper-resistant travel documents with biometric identifiers and the installation of equipment and software capable of reading the new documents at all U.S. ports of entry by October 26, 2003.

34 Thank You For Your Attention.
For further information, please contact: Vaughn J. Barber Business Development (201) 332 – 9213 x202 Copyright, 2001 © Visionics Corporation.

Download ppt "Enabling Technology for Airports and Border Control"

Similar presentations

Ads by Google