Transcript Biometrics for Border Control
Slide 1
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 2
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 3
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 4
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 5
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 6
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 7
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 8
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 9
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 10
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 11
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 12
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 13
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 14
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 15
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 16
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 17
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 18
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 19
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 20
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 21
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 22
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 23
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 24
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 25
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 26
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 27
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 28
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 29
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 30
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 31
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 32
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 33
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 34
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 2
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 3
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 4
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 5
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 6
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 7
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 8
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 9
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 10
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 11
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 12
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 13
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 14
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 15
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 16
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 17
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 18
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 19
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 20
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 21
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 22
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 23
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 24
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 25
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 26
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 27
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 28
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 29
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 30
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 31
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 32
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 33
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.
Slide 34
FaceIt®:
Enabling
Technology for
Airports and
Border Control
Copyright © 2001 Visionics Corporation
Presentation Overview
– Corporate Snapshot
– Choosing a Biometric
– Benefits of Facial Biometrics
– Border Control Applications
– Sample Installations
– Biometric Performance
– Biometric Fusion
RECENT ANNOUNCEMENT
VISIONICS & IDENTIX AGREE TO A
MERGER OF EQUALS
• Merger Announced 2/22/02
• Now, World’s Largest Multi-Biometric
Provider of Facial Recognition and Fingerprint
technologies
• Will Enable the Offering of Complete,
Integrated Biometric Solutions
Visionics: Quick Facts
Nasdaq Symbol VSNX
~ 200 employees
FY01 (E): $30M revenue
Worldwide biometrics industry leader
Founding
member of the
International
Minnesota
Biometric
Industry
Association
California
(IBIA)
UK
New Jersey
Lines of Business
Lines of Business
1.FaceIt
Face
recognition
software
technology
3. Live
2. BNA
Scan
Hardware
appliances Electronic
& modules capture of
that
forensic
encapsulate quality
biometric fingerprint
capabilities
images
4. IBIS
Mobile
identificatio
n systems
for law
enforcement
Leaders in Face Recognition
• Developer of FaceIt®
engines.
Revenue leaders
• Focused on building cutting in facial
edge technology modules
recognition
that are used by System
Most
integrators, product
developers and OEMs.
deployments
• Founded by scientists who Most partners
discovered the basic
algorithms. Formerly at
Princeton and Rockefeller
Universities.
Worldwide brand
name recognition
Biometrics
Face recognition is a special
example of a
Biometric
Technology
Biometrics
Computerized methods for
automatically recognizing a
person based on a physical trait
or attribute.
Biometric
Technology
The Biometrics Family
I. High Intrinsic
Accuracy
II. Limited Intrinsic
Accuracy
III. Commercially
Nonviable
...
The Facial Promise
A photograph-- whether static or a live image---contains the
information necessary to distinguish one person among millions of
others—FaceIt® Faceprint.
Why Face?
Different Reasons in Different Apps:
I. Familiar
IDs have used photos for years.
II. Compatible
Works with existing ID dbases..
III. Simple
Easy to use. User does nothing!
IV. Human-backup
Humans read face not finger or iris
Security with a
Human Face™
A powerful
software tool!
Why Face?
V. Audit trail
Human-Readable
VI. ID at a
Distance
Surveillance
How Does Face
Recognition
Work?
Making faces
Most fundamental element in face recognition is
the representation used to build the digital code
(i.e. faceprint).
Local Feature Analysis:
Approach used by Visionics.
Local Analysis.
Principal Component Analysis:
Approach used by competition (Eigenfaces).
Global Analysis.
Another approach that was considered is Neural Networks but was
rapidly discredited within the scientific community as very
inaccurate.
Local Feature Analysis
Nodal Points:
Identity:
Faces, like finger prints, possess Nodal Points that
can be automatically detected.
Geometry of constellation of Nodal Points is
unique to a given face and is over redundant.
Local Feature Analysis
Left…
Right…
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
Frontotemporale
Glabella
Sellion
Pupila
Zygofrontale
Zygion
Infraorbitale
Ectocanthus
Infrazygion
Inframalar
Tragion
Gonion
Pronasale
MIM
Promenton
Menton
…
…
Properties of LFA
Color Blind:
Does not use color
information. Increased
robustness with respect to
changes in skin tone.
Racially Blind:
Performance is independent
of race. Facial structure is
universal across races.
Versatile Input:
Can work from any image
source including nearinfrared or night vision.
Robust with Aging:
The faceprint maintains a
significant portion of its
structure as the face ages.
Visionics technology can provide
three key applications within the
airport and border crossing
environment…
1. Background Checking: Already in Place
Livescan biometric systems
Capture NIST records
Electronic submission to
IAFIS /NCIC
Channeling Agencies
Office of Personnel
Management
AAAE
Indian Gaming
Commission
Nuclear Regulatory
Commission
40 million
Records
System Example: Airport
Applicant Systems: Feb 02
Pre 9/11
Post 9/11
Visionics and Identix are currently installed in over 100 US Airports.
Visionics provides over 600 live scan systems at INS Applicant
Support Centers across the US
2. Privileged Access: One-to-One Matching
Granting of access for a variety of privileges:
Expedited border clearance
Expedited airplane boarding - SPT
Secure access: facilities
Trusted Identity data need NOT reside in a
national database
Entity administering privilege—commercial &
government—can maintain, separate archives
(privacy concerns)
Dual or multi-use tokens (i.e. smart cards)
Example: Basel – Border Control Application
•System Integrator EDS was
awarded a contract by the Israeli
Government for a Biometric
facilitated Border Control
application.
40,000 daily workers to enter and
exit the Gaza Strip via 42 routing
passages in “terminal-like”
environment.
The project will introduce the use
of Fusion Module for the use of
two biometrics.
Privileged Access: One-to Many
1. At enrollment,
automatically check
uniqueness of Identity.
2. Eliminates duplicates &
Aliases.
Additional System Examples:
Colorado State, DMV
West Virginia, DMV
Mexican National Voter
Election System
A Task that
Cannot be done
Manually.
3. Watch-List Detection
Terror and crime are not faceless
Improved intelligence is yielding the identities
of perpetrators
Three Primary Applications:
ID-document surveillance
Checkpoint surveillance
On-Demand surveillance
ID-Document Surveillance
Uses standard existing
travel documents
Creates manifest: entryexit
System Example:
Dominican Republic First large scale
implementation
120 points of entry
Facial images from ID
documents scanned
upon entry & checked
against centralized
terrorist, drug traffickers
& criminals watchlists
Alert
Checkpoint Surveillance
Typical BNA Configuration: FaceIt® ARGUS
FaceIt® Bio Capture
FaceIt® Bio Capture
FaceIt® Bio Logic
FaceIt® Bio Capture
FaceIt® Bio Template
Capable of
Wireless alerts
closest guards
FaceIt® Bio Template
FaceIt® Bio Template
User Workstation Control,
review, administration
FaceIt® Bio Search
Sample Surveillance Installations
Current Airport Installations:
Fresno Yosemite Airport
Keflavik International Airport,
Iceland
Dallas Ft. Worth
Palm Beach Airport
Boston Logan (Testing Complete)
Several unnamed airports &
border crossing (under
installation)
Also installed in:
Newham, London, UK
Birmingham, UK
Ybor City, Tampa, Florida
On-Demand Surveillance: IBIS
System Examples:
West Valley, Utah
Hennepin County, MN
Redlands, CA
Ontario, CA
Golden Question: How Accurate is it?
The accuracy of all biometrics can be assessed via:
False Accept Rate (FAR),
False Reject Rate (FRR),
Failure to Acquire (FTA).
FAR = Risk
FTA = Liability
Managing Customer/User Expectations
Technology has limitations,
must build systems that take
them into accounts
Setting realistic
expectations: (will never do
FRR=0, FAR=0, FTA=0,
cost=0)
Exception Handling:
Secondary screening
with human backup
Fusion approach
Fusion versus Layering
Biometrics
Module 1
Decision One
Biometrics
Module 2
Decision Two
Biometrics
Module 1
Score One
Biometrics
Module 2
Score Two
Layering:
AND
OR
Final Decision
Score Fusion
(statistical
properties of
multiple
biometrics)
Decision
Fusion: Improvements in Accuracy
FAR
0.1%
0.5%
1%
FRR: B1
3.6%
2.0%
0.6%
FRR: B2
0.23%
0.11%
0.08%
FRR: “OR”
2.5%
1%
0.63%
FRR: “AND”
0.9%
0.56%
0.048%
FRR: FUSION
0.004%
0.001%
0.0007%
Recently Passed Legislation
• Aviation and Transportation Security Act of 2001
Established the Transportation Security Administration
(TSA). Mandates background checks on all airport
employees. Also mandates upgraded access control
systems for secure areas at airports.
• USA Patriot Act of 2001
Expands government surveillance powers. Requires
technology standard for tracking entry and exit of aliens.
Suggests the use of biometric technology to conduct
background checks prior to issuance of visas.
Currently Pending Legislation
• Drivers License Modernization Act of 2002
Would require a biometric to be embedded on an
individual's driver's license. Requires that the Department
of Transportation develop a technology standard in
conjunction with other governing bodies
• Enhanced Border Security and Visa Entry Reform Act
Mandates the creation of a watch-list database, made
available to all agencies involved in determining the
admissibility and the identification of aliens. Mandates the
issuance of machine-readable, tamper-resistant travel
documents with biometric identifiers and the installation of
equipment and software capable of reading the new
documents at all U.S. ports of entry by October 26, 2003.
Thank You
For Your
Attention.
For further information, please
contact:
Vaughn J. Barber
Business Development
(201) 332 – 9213 x202
[email protected]
Copyright, 2001 © Visionics Corporation.