Patrick Grother
YOU?
Author Swipe
View article: Face Analysis Technology Evaluation: Age Estimation and Verification
Face Analysis Technology Evaluation: Age Estimation and Verification Open
The report documents technical performance of prototype age estimation algorithms submittedto the Age Estimation and Verification (AEV) track of the Face Analysis Technology Evaluation(FATE) executed by the National Institute of Standards …
View article: Face analysis technology evaluation (FATE) :
Face analysis technology evaluation (FATE) : Open
This report quantifes the accuracy of passive face presentation attack detection (PAD) algorithms (software only, no hardware solutions) operating on conventional 2D imagery of various presentation attack instruments (PAI). The algorithms …
View article: Face analysis technology evaluation (FATE) part 11 :
Face analysis technology evaluation (FATE) part 11 : Open
This report summarizes the results of the FATE Quality Vector assessment track, which tests face image quality algorithms’ ability to detect specific defects such as non-frontal pose and background non-uniformity in the context of facial i…
View article: Ongoing Face Recognition Vendor Test (FRVT) part 9a :
Ongoing Face Recognition Vendor Test (FRVT) part 9a : Open
This report documents the ability of face recognition algorithms to correctly distinguish face images of identical and fraternal twins. The algorithms were submitted to the ongoing one-to-one verifcation track of the Face Recognition Vendo…
View article: FRVT Part 4A:
FRVT Part 4A: Open
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and methods to aid in detecting morphs. Expanding on concepts introduced in a stud…
View article: Statistics of visual features in the human iris
Statistics of visual features in the human iris Open
In most current applications of iris recognition, matching is done by computer algorithms. The dominant algorithms are based on the work of John Daugman and are well understood because of the extensive analysis in the literature of iris2pi…
View article: Face recognition vendor test (FRVT) part 7 :
Face recognition vendor test (FRVT) part 7 : Open
One-to-many biometric search systems are discussed in their role of positive and negative identification - the former refers to the expectation that person in a probe sample is present in the database (as in access to an office) while the …
View article: Ongoing Face Recognition Vendor Test (FRVT) part 6B :
Ongoing Face Recognition Vendor Test (FRVT) part 6B : Open
This is the second of a series of reports on the performance of face recognition algorithms on faces occluded by protective face masks commonly worn to reduce inhalation and exhalation of viruses. This is a continuous study is being run un…
View article: Analysis of iris images in Nicholas Nixon: the Brown sisters
Analysis of iris images in Nicholas Nixon: the Brown sisters Open
In this paper we present results that expand on the Afghan Girl study by Daugman using gray-scale photographs of 4 subjects taken every year for 40 years: The Brown Sisters photographic project by Nicholas Nixon.We extracted iris images fr…
View article: Analysis of Iris images from Twins Day--2010
Analysis of Iris images from Twins Day--2010 Open
Each year since 1976, the town of Twinsburg, Ohio has held a Twins Days Festival 1 .Over the past 43 years over 77, 000 sets of twins and multiples have attended -with many repeat visits over the years.Prof. Jeremy Dawson and other staff f…
View article: Face Recognition Vendor Test (FRVT) part 4:
Face Recognition Vendor Test (FRVT) part 4: Open
This report includes results for a new dataset of morphs provided by the University of Lincoln.See Section 4.4.3.• This report includes results for a new dataset of bona fide images, which includes 1) a set of high quality visa portraits f…
View article: Face recognition vendor test part 3:
Face recognition vendor test part 3: Open
This is the third in a series of reports on ongoing face recognition vendor tests (FRVT) executed by the National Institute of Standards and Technology (NIST).The first two reports cover, respectively, the performance of one-to-one face re…
View article: IREX validation dataset 2019
IREX validation dataset 2019 Open
The IRis EXchange (IREX) program at the National Institute of Standards & Technology (NIST) employs best measurement practices to support the development, standardization, and interoperability of iris-based technology through ongoing evalu…
View article: IREX IX part two:
IREX IX part two: Open
Principle testing was performed over the Consolidated Multispectral Iris Dataset (CMID) which was provided to NIST by the Southern Methodist University.Collected in well controlled laboratory settings, the dataset is ideal for multispectra…
View article: Tattoo Recognition Technology - Evaluation (Tatt-E) performance of tattoo identification algorithms
Tattoo Recognition Technology - Evaluation (Tatt-E) performance of tattoo identification algorithms Open
BackgroundThe Tattoo Recognition Technology -Evaluation (Tatt-E) was organized by the National Institute of Standards and Technology (NIST) in collaboration with law enforcement to assess and measure the capability of algorithms to perform…
View article: Iris cameras: standards relevant for camera selection - 2018
Iris cameras: standards relevant for camera selection - 2018 Open
5 Issues Not Yet Fully Addressed by Standards 5.1 Capture Sequence and Cardinality Issues:
View article: IREX IX part one, performance of iris recognition algorithms
IREX IX part one, performance of iris recognition algorithms Open
Specifc hardware and software products identifed in this report were used in order to perform the evaluations described in this document.In no case does identifcation of any commercial product, trade name, or vendor, imply recommendation o…
View article: The text recognition algorithm independent evaluation (TRAIT)
The text recognition algorithm independent evaluation (TRAIT) Open
Specifc hardware and software products identifed in this report were used in order to perform the evaluations described in this document.In no case does identifcation of any commercial product, trade name, or vendor, imply recommendation o…
View article: The 2017 IARPA face recognition prize challenge (FRPC)
The 2017 IARPA face recognition prize challenge (FRPC) Open
Specifc hardware and software products identifed in this report were used in order to perform the evaluations described in this document.In no case does identifcation of any commercial product, trade name, or vendor, imply recommendation o…
View article: Tattoo Recognition Technology – Best Practices (Tatt-BP) Guidelines for Tattoo Image Collection
Tattoo Recognition Technology – Best Practices (Tatt-BP) Guidelines for Tattoo Image Collection Open
While this guide provides recommendations on handling acquisition issues commonly seen in operations, there may exist a small fraction of circumstances that are not covered in this document.
View article: IREX VI: mixed‐effects longitudinal models for iris ageing: response to Bowyer and Ortiz
IREX VI: mixed‐effects longitudinal models for iris ageing: response to Bowyer and Ortiz Open
Bowyer and Ortiz, in their study ‘A Critical Examination of the IREX VI Results’, make seven criticisms of the authors application of linear mixed‐effects models to longitudinally collected iris recognition Hamming distances. We reject the…
View article: Tattoo Recognition Technology -- Challenge (Tatt-C) Outcomes and Recommendations
Tattoo Recognition Technology -- Challenge (Tatt-C) Outcomes and Recommendations Open
BackgroundTattoos have been used for many years to assist law enforcement in investigations leading to the identification of both criminals and victims.A tattoo is an elective biometric trait that contains discriminative information to sup…