Biometrics for Border Control

Download Report

Transcript Biometrics for Border Control

Slide 1

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 2

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 3

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 4

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 5

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 6

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 7

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 8

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 9

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 10

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 11

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 12

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 13

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 14

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 15

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 16

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 17

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 18

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 19

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 20

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 21

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 22

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 23

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 24

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 25

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 26

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 27

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 28

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 29

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 30

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 31

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 32

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 33

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.


Slide 34

FaceIt®:
Enabling
Technology for
Airports and
Border Control

Copyright © 2001 Visionics Corporation

Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion

RECENT ANNOUNCEMENT

VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions

Visionics: Quick Facts
Nasdaq Symbol VSNX

~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader

Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)

UK

New Jersey

Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology

3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images

4. IBIS
Mobile
identificatio
n systems
for law
enforcement

Leaders in Face Recognition
• Developer of FaceIt®
engines.

Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments

• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.

Worldwide brand
name recognition

Biometrics

Face recognition is a special
example of a

Biometric
Technology

Biometrics

Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.

Biometric
Technology

The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable

...

The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.

Why Face?
Different Reasons in Different Apps:

I. Familiar
IDs have used photos for years.

II. Compatible
Works with existing ID dbases..

III. Simple
Easy to use. User does nothing!

IV. Human-backup
Humans read face not finger or iris

Security with a
Human Face™
A powerful
software tool!

Why Face?

V. Audit trail
Human-Readable

VI. ID at a
Distance
Surveillance

How Does Face
Recognition
Work?

Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).

Local Feature Analysis:


Approach used by Visionics.



Local Analysis.

Principal Component Analysis:


Approach used by competition (Eigenfaces).



Global Analysis.

Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.

Local Feature Analysis

Nodal Points:
Identity:

Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.

Local Feature Analysis
Left…

Right…

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton

Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton





Properties of LFA


Color Blind:

Does not use color
information. Increased
robustness with respect to
changes in skin tone.



Racially Blind:

Performance is independent
of race. Facial structure is
universal across races.



Versatile Input:

Can work from any image
source including nearinfrared or night vision.



Robust with Aging:

The faceprint maintains a
significant portion of its
structure as the face ages.

Visionics technology can provide
three key applications within the
airport and border crossing
environment…

1. Background Checking: Already in Place


Livescan biometric systems
 Capture NIST records

 Electronic submission to
IAFIS /NCIC


Channeling Agencies

 Office of Personnel
Management
 AAAE

 Indian Gaming
Commission
 Nuclear Regulatory
Commission

40 million

Records

System Example: Airport
Applicant Systems: Feb 02

Pre 9/11
Post 9/11

Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US

2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:

Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database

Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)

Example: Basel – Border Control Application

•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.

Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
 Colorado State, DMV
 West Virginia, DMV
 Mexican National Voter
Election System

A Task that
Cannot be done
Manually.

3. Watch-List Detection
Terror and crime are not faceless

Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
 ID-document surveillance
 Checkpoint surveillance

 On-Demand surveillance

ID-Document Surveillance


Uses standard existing
travel documents



Creates manifest: entryexit



System Example:
Dominican Republic First large scale
implementation



120 points of entry



Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists

Alert

Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture

FaceIt® Bio Capture

FaceIt® Bio Logic

FaceIt® Bio Capture

FaceIt® Bio Template

Capable of
Wireless alerts
closest guards

FaceIt® Bio Template

FaceIt® Bio Template

User Workstation Control,
review, administration

FaceIt® Bio Search

Sample Surveillance Installations
Current Airport Installations:
 Fresno Yosemite Airport
 Keflavik International Airport,
Iceland
 Dallas Ft. Worth
 Palm Beach Airport
 Boston Logan (Testing Complete)
 Several unnamed airports &
border crossing (under
installation)
Also installed in:
 Newham, London, UK
 Birmingham, UK
 Ybor City, Tampa, Florida

On-Demand Surveillance: IBIS

System Examples:
West Valley, Utah

Hennepin County, MN
Redlands, CA
Ontario, CA

Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:


False Accept Rate (FAR),



False Reject Rate (FRR),



Failure to Acquire (FTA).



FAR = Risk



FTA = Liability

Managing Customer/User Expectations
 Technology has limitations,
must build systems that take
them into accounts
 Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
 Exception Handling:

Secondary screening
with human backup
Fusion approach

Fusion versus Layering

Biometrics
Module 1

Decision One

Biometrics
Module 2

Decision Two

Biometrics
Module 1

Score One

Biometrics
Module 2

Score Two

Layering:

AND
OR

Final Decision

Score Fusion
(statistical
properties of
multiple
biometrics)

Decision

Fusion: Improvements in Accuracy
FAR

0.1%

0.5%

1%

FRR: B1

3.6%

2.0%

0.6%

FRR: B2

0.23%

0.11%

0.08%

FRR: “OR”

2.5%

1%

0.63%

FRR: “AND”

0.9%

0.56%

0.048%

FRR: FUSION

0.004%

0.001%

0.0007%

Recently Passed Legislation
• Aviation and Transportation Security Act of 2001

 Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
 Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.

Currently Pending Legislation
• Drivers License Modernization Act of 2002
 Would require a biometric to be embedded on an

individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
 Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.

Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.