{"id":2076,"date":"2004-12-10T00:00:00","date_gmt":"2004-12-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/10\/government-looking-to-improve-security-through-3-d-biometrics\/"},"modified":"2021-12-30T11:40:36","modified_gmt":"2021-12-30T11:40:36","slug":"government-looking-to-improve-security-through-3-d-biometrics","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/10\/government-looking-to-improve-security-through-3-d-biometrics\/","title":{"rendered":"Government Looking To Improve Security Through 3-D Biometrics"},"content":{"rendered":"<p>A4Vision and Unisys are working to develop pilot programs for 3-D facial imaging and recognition worldwide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Defense hopes that by the middle of next year it will be able to test at the nation&#8217;s boarders wireless mobile identification technology that can snap three-dimensional images of people moving into and out of the United States and check those images against a database of 3-D mug shots.<\/p>\n<p>The government already has invested $700,000 in the project, which is being run by Unisys Corp. and A4Vision Inc., a provider of 3-D facial-imaging and recognition systems.<\/p>\n<p>Together, Unisys and A4Vision are working to make 3-D biometrics more commonplace as a tool to improve national security and guard against identity theft.  &#8220;The aftereffects of 9\/11 have accelerated demand for and development of biometric technology for security purposes,&#8221; says Ed Schaffner, director of positive-identification and access-control programs for Unisys&#8217; worldwide global public-sector group.<\/p>\n<p>Research firm IDC expects the market for biometric technology will be $887 million next year, while research firm Frost &#038; Sullivan predicts the market will more than double by 2006 to $2.05 billion.<\/p>\n<p>Three-dimensional facial images are captured either using a number of digital cameras positioned around the subject&#8217;s face or by using a structured light grid that captures facial-structure data.  This data is then stored in a back-end database, where it can be retrieved and compared against new facial images.  Although two-dimensional images can be compared today, the accuracy of this process is hindered by lighting and the subject&#8217;s pose, as well as the effects of aging, weight fluctuation, and use of facial ornamentation such as eyeglasses, Schaffner says.<\/p>\n<p>The companies are creating 3-D biometric image standards.<\/p>\n<p>http:\/\/www.informationweek.com\/showArticle.jhtml;jsessionid=W1V2TLCAWMPHIQSNDBNCKHSCJUMEKJVN?articleID=55301179<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2076","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2076"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2076\/revisions"}],"predecessor-version":[{"id":4563,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2076\/revisions\/4563"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}