Project |
Short Descrption |
Impact |
Positive Personal Identification (PPID) |
The key requirements in a largescale benefit or voting enrollment system requires human enrollment that can’t
be fooled to takin duplicate entries. Many government systems have this basic need. In our PPID system, fingerprint based duplicate
checking was deployed using a scalable system. The key innovation was around a sub-linear search algorithm for fingerprint matching
using minutia-triple in the lines of geometric hashing. |
Code delivery, Papers and IP |
Large scale fingerprint indexing |
A follow-on FOAK years later was approved to improve the system designed through PPID.
We introduced many textural features around minutia to improve the system performance.
As a result, a novel registration free method of fingerprint verification was also developed. |
Code delivery, Papers and IP |
Fusion of Biometrics and Biography |
Often in large biometrics enrollment systems (e.g., DMV, passport, visa) a large amount of biographical details is available.
In fact, the biographical matching is also quite in exact as names are spelt differently and addresses are written differently.
In addition to fusion of several biometrics modalities, we introduced inclusion of
biographic engine in the mix of biometrics to extend the utility of biographic information into the de-duplication process. |
Code delivery, Papers and IP |
Bodycam based analytics |
It is perceived that the ultimate truth can be collected in videos in many law enforcement encounters.
The bodycam and similar devices used in civil applications as well collect video that is often very noisy due to the environment they operate.
We developed human detection and processing algorithms including face and human attributes from video frames for indexing and recognition.
A research issues in this area is how to protect the privacy of entities such as face, cars and other identifiable information.
Using blockchain technology, we have show how multiple version of the video can be generated while ensuring that no tampering happened to the core video. |
Code delivery, Papers and IP |
Face recognition in video and Face analytics as services API |
Face is ubiquitous in almost all videos. Many applications need matching faces and classify different facial attributes beyond typical law enforcement use.
In fact, most deep learning methods get applied invariably to face analytics.
We have shown how to learn a face embedding network based on small learning dataset based on the physics of the problem.
Once a reliable embedding is available, we can use it for several attribute prediction including gender, age, and expression to name a few.
These innovations made into API based services for internal and external clients. |
Code delivery, Papers and IP |
Smarter Planet: analytic integration and better the news |
In a complex system involving multiple analytics it is not known how to make the outcome consumable to the use.
Based on a basic sports videos, we analyzed different models to understand how to interpret starting line-up differences and player identification.
In social media, often the crowd sourcing of information makes us possible to understand the pattern of a story based on how quickly it becomes
viral by spreading in the social networks and thus almost creating and substantiating news items that can be created by new agencies.
The multi-modal perception helps validate the content as well as shows us the trend. This is an external government funded project. |
Code delivery and IP |
Confidence interval estimation |
In a pattern recognition system, performance reporting is fundamental way to describe how the system behaves.
Often ROC has been used for this purpose. However, without a confidence interval around the error measurements, it is not meaningful.
We reported a non-parametric bootstrap based technique called subset bootstrap to compute confidence interval in biometrics system performance reporting. |
Papers and standard |
eSentry |
Secure authentication: Biometrics attack model and spoofing: Authentication of identity must be secure in all applications.
Biometrics systems need to defend against many attacks starting with presentation attacks.
We developed a threat model for biometrics systems highlighting the dangers that the designers need to handle.
In the process, the template secure storage is an important component.
In a personal smartcard, one can store the template and often the parts of matching can be carried out in a collaborative fashion to provide security.
An extension of the similar approach can be to match in a secure environment using hardware secure modules.
However, if the presentation attacks are not detected using novel methods, the backend security can be rendered useless.
We have proposed techniques for replay attack detection by using data hiding methods and face and iris presentation attacks
using 3-d sensing from 2-d video.
|
Papers, Standards and IP |
Cancelable biometrics |
A biometrics measurement while provides a non-repudiable connection to the person behind a transaction, often it can be misused violating privacy of the person.
For example, two databases can be matched and links established using biometrics since it is a unique descriptor of the person.
A second issue related to the non-repudiablity is that if the data is lost due to mishandling the data can be replaced.
In order to address these two issues, we introduced cancelable biometrics by transforming the original biometrics using a non-invertible,
repeatable transform during enrolment. During verification the same transform is applied to the input to match against the transformed template.
Since each database can use a different transform, matching across databases becomes difficult and the enrollment data can be revoked by reenrolling
the person with a new transform. This technique is popular even today in the biometrics research community first introduced by us decades ago. |
Papers, IP and Media coverage |
Trusted secure authentication on mobile devices (Usable Multi-Factor Authentication and Risk-Based Authorization) |
ABiometrics authentication on mobile devices is an interesting paradigm since the mobile devices house a set of sophisticated sensors that are
typically not associated with a biometrics sensor. For example, GPS, proximity sensor, altitude sensor, accelerometer can provide context that can
help with establishing the transaction environment. Thus, suitable biometrics can be selected for authentication depending on the situations.
Along with different biometrics modalities, contextual sensing can be added to define the authentication policy.
These techniques initiated from our FOAK project entitled “TSAM” ended up being useful in a DHS funded project for establishing financial industry secure
transaction methods. |
Code delivery, Papers and IP |
Anonymous Biometrics Matching |
Many a times, biometrics search methods needs not be linked the persons behind the biometrics until needed.
For example, the airline industry needs match the passengers against a law-enforcement watch list.
However, the law-enforcement agencies can not reveal the watchlist to airlines.
In order to facilitate a solution for this, we proposed anonymous biometrics matching based on our cancelable biometrics.
With the watchlist available as a transformed version, the airline passenger biometrics can be transformed by a service provider and match against the watchlist. When there is a need to go behind strong matches from the list, the law enforcement can go back to the airlines to reveal the persons of interest.
Thus the overall privacy of the travelers is not compromised. |
papers and IP |
Fully Homomorphic encryption |
AWe believe that if computations can be carried out on encrypted domain, there will less concerns about sharing
data across many domains where data is protected by local compliance regulations. In order to facilitate learning in encrypted domain,
we have shown that FHE can be deployed to produce near similar results. However, this is a baby step towards addressing the larger machine
learning issues in encrypted domain. We continue to evolve our research in this area. |
Papers and IP |