M2-FuseID™ “Smart” Biometric Finger Scanner Training Video

M2-FuseID is a multimodal biometrics fingerprint reader and finger scanner

The M2-FuseID™ “smart” multimodal finger reader simultaneously captures the fingerprint and finger vein patterns of an end user.

You may have heard earlier this year that we released details about our brand new, innovative, next-generation M2-FuseID™ “smart” finger scanner that simultaneously captures both a fingerprint image and the finger vein pattern delivering the highest level of security, reliability, and accuracy than any other fingerprint scanner on the market. A few weeks ago, we released a general overview video that provides general information about the design and functionality of this innovative finger scanner featuring revolutionary liveness detection to prevent spoofing.

We went a step further and created a video that explains how to use the reader including proper and improper finger placement that helps to ensure quality scans, use and care of the device, and details on the finger scanner features. This video is perfectly suited for end users who have just adopted the finger scanner for their own use or for those who may be curious about how it works.

Here is a copy of the video:

 

What You Need to Know About Dental Biometrics

dental biometrics is the science of establishing identity through human teeth

Human teeth are often the only identifiable biometric attribute in forensic science. (Photo courtesy of Wikipedia, David Shankbone)

Dental biometrics is the use of dental radiography (x-rays) in the identification of otherwise unidentifiable human remains. This forensic use has earned dental biometrics great fame, as its use has appeared as much in crime novels and television shows as in the real world of the crime lab. Tooth size, tooth contours and shapes, distance between teeth, and crowns, fillings, and other dental work all factor into the positive identification of persons from mere skeletal remains, or in cases of corpses badly burnt or disfigured. Thus biometric analysis of dentistry is a last resort method of identification when other more usual methods fail.

Modern Methods of Computer-aided Dental Biometrics

Before the development of mathematical algorithms and image sharpening and extraction methods that allowed highly reliable analysis of dental radiographs on computer, the process was more slow and tedious. The basics still apply: two radiographs of equivalent areas of the victim’s and a proposed candidate’s teeth must be compared meticulously. To do this, pre-existing records, probably from the match candidate’s dentist, must be obtained, and a new post-mortem image must be taken of the remains of the victim’s teeth. Written dental records will also contribute to the identification. In rare cases where an assailant has lost a tooth or crown or has left bite marks on a victim, dental biometrics can also be used to track down the killer.

There are four steps necessary in using modern technology to perform accurate biometric analysis of dentistry:

  • A dental radiograph must be obtained from the victim’s remains
  • That image must be pre-processed to enhance visibility of image features
  • Features must be individually extracted from the full x-ray
  • A pre-existing image that has undergone the same process (steps one through three above) must be compared with the extracted features to seek a match

Image Pre-processing

Once a radiograph exists and has been uploaded into the software system, some initial processing is necessary. Radiographs may be one of three types: bitewing, covering mainly the above gum section of teeth; periapical, showing also the full root; or Panoramic, giving the broad view of teeth and jaws. Periapical is preferred for its close up view with all the tooth included. The software will take out unneeded background and focus up-close on the particular tooth, dental work, etc. that is in question.

Feature Extraction

A biometric is a physical feature or behavior that is measurable. Behaviors such as handwriting styles, gait of walk, and voice quality, along with characteristics like eye retinas, fingerprints, or the shape of a tooth are biometrics. Dental biometric software shades teeth, bone, dental work, and background differently so as to help isolate individual items and features for later comparison. Size, shape, and position of teeth relative to other nearby teeth are targeted along with crowns, fillings, and all artificial dental fixtures. By increasing contrast and finding edges, the software works at isolating each important element. Binary distinction often works best for dental work, whereas a three-way color scheme is usually used for teeth.

Feature Matching

Pre- and post- mortem radiographs must now be carefully compared. A good software program can compute the relative alikeness or difference between database stored images and present them in number form. Size, distance measured between objects, and faltness vs. peakedness are taken into account. The degree of skewing of the pre-death x-ray away from the post-death x-ray will determine if a match is had. As a person’s teeth is constantly changing, it cannot be expected to ever obtain a 100% match, but matches that are within a narrow margin of skewing are “counted as” matches.

Conclusion

Dental biometrics is an old but now revolutionized science that continues to aid in the identification of unknown human remains. By pre-processing radiographs, extracting desired features, and comparing pre- and post- mortem snapshots of a person’s teeth and dental work, identification is often possible where otherwise it would not be.

dental biometrics biometric identification managementAuthor Bio: This post comes courtesy of Sarah, a writer at the Underwood Dental blog. You can find more of her writing on that blog, and at various other outlets on the web.

 

M2SYS – Biometric Identification Management for Over a Decade

M2SYS has been active in the biometric identification management industry for over a decade.

We look back at the last decade of our accomplishments in biometric identification management on our latest video.

Like most companies, there are times when we pause to take a look back and reflect on our accomplishments in order to help keep our perspective and frame our vision and strategy moving forward. We created a short video that encapsulates the past 11 years of our history in biometric identification management and how we have helped to pioneer advancements in the biometric industry through creativity, innovation, and perseverance.

We have been instrumental in the effort to help spread the use of biometric identification management across all corners of the globe through both large and small scale deployments and take pride in our ability to use a strategic blend of ingenuity and science to ensure that our biometric identification management solutions address real world problems and are designed in a user-friendly way using techniques such as human factor engineering that advance it’s acceptance. Plus, at M2SYS Technology we are consistently working hard to help educate the public about the benefits of biometric identification and address concerns about privacy, irrecovability, and safe storage of biometric profile information.

We are proud of our accomplishments and optimistic about the future possibilities of biometric identification management. Please take a moment to watch this video and share in our success!

Biometric Identification Management and the Department of Defense

biometric identification management technology

Can we attribute the success of biometric identification management technology in part on the Department of Defense? (photo courtesy of Shutterstock)

The following is a guest post written by Russel Cooke.

Observe any human being and the attributes that make us unique. The measurement and analysis of physical characteristics as a means of identification has always been easy to imagine and to some extent, easy to implement - as long as the user was resigned to the fact that the method of verification was qualitative and not quantitative. Even with this limitation, the technology could be used quite broadly as a way of developing an educated guess as to who someone was. It’s that quantitative measure of certainty that becomes the breakthrough which dramatically advances the technology and makes it indispensable as a tool for security and investigation.

The journey to achieving quantitative and automated biometrics developed into a specialized knowledge base which later became it’s own branch of scientific research. The list of attributes from which biometrics could be measured expanded to include one’s signature, palm, hand geometry, fingerprint, face, vascular pattern, speech, iris, and DNA from multiple sources on the body.

It’s the Department of Defense, sometimes working in collaboration with the FBI and other agencies, that made intense and concerted efforts to bring this technology to fruition.

Biometrics Milestones:

In 1993 the Department of Defense initiates the Face Recognition Technology program known as FERET. It was sponsored through 1997 by the Defense Advanced Research Products Agency (DARPA) and the DoD Counterdrug Technology Development Program Office in an effort to encourage the development of face recognition algorithms and technology. During that same period, both military and civilian advancements in biometrics were made:

  • Development of an iris prototype unit begins
  • FacE REcognition Technology (FERET) program is initiated
  • First iris recognition algorithm is patented (US5291560 A)
  • Integrated Automated Fingerprint Identification System (IAFIS) competition is held
  • Palm System is benchmarked
  • INSPASS is implemented
  • Iris prototype becomes available as a commercial product
  • Hand geometry is implemented at the Olympic Games
  • NIST begins hosting annual speaker recognition evaluations

In 2004, there was a flurry of activity, as many of the advancement made during the 1990’s matured and could be put to use. In that year, the Department of Defense implements the Automated Biometric Identification System (ABIS).  Designed to improve the US Government’s ability to track and identify national security threats, the system included methods of collecting and storing fingerprint, mug shot, voice, iris, and DNA data from enemy combatants, captured insurgents, and various persons of interest. Also in that year, a presidential directive calls for mandatory identification card for all federal employees and contractors and a palm print database is deployed in the US.
The implementation of biometrics has been increasingly active, if not especially overt. In the case of facial recognition, the technology is software-based, and can be adapted to cameras that have already been installed.

On the Horizon: Some of the technologies under development include “Field-Deployable Rapid DNA Analysis” and international collaborations for automated biometric upgrades. Adaptations of (“soft biometrics”) to social media (for example) are also receiving attention as part of the next generation of biometric technologies. This includes ear recognition, which is now being considered by some to be more effective than facial recognition.

biometric identification management and new biometric modalities on the horizonRussel Cooke is a journalist and business consultant. His fascination with technology often leads him away from his business, and he considers writing about it as a passion. You can follow him on Twitter @RusselCooke2.

Yemen Deploys M2SYS TrueVoter™ Biometric Voter Registration Solution

TrueVoter biometric voter registration solution from M2SYS Technology

Yemen’s decision to deploy the TrueVoter™ biometric voter registration system will require all citizens to register their biometric credentials to vote in the upcoming elections.

Today, we were excited to announce that the country of Yemen has deployed our TrueVoter™ biometric voter registration solution that allows for the fast, accurate, and uncontested enrollment and identification of voters for the upcoming constitutional referendum and national elections. Working in partnership with the International Foundation for Electoral Systems (IFES), Yemen’s Supreme Commission for Elections and Referendum (SCER) chose the TrueVoter™ biometric voter registration solution to help reduce the number of electoral disputes, support the legitimacy of the voting process, and, by extension, boost public confidence in Yemen’s democratic institutions.

TrueVoter™ is a unique biometric voting registration solution broken down into four components:

  1. Easy Capture – a highly configurable voter data capture solution for enrollment
  2. Voter Information Manager – this is the central application that manages all voter records
  3. ABIS matching – a fast matching search engine that delivers accurate and secure results
  4. ABIS de-duplication and adjudication – the fastest and most powerful de-duplication software in the world and powerful back end tool to help quickly and fairly resolve any election disputes

Furthermore, the TrueVoter™ system has the ability be easily configured to support the English, Arabic, French, Spanish and Portuguese languages, plus it provides the SCER with a comprehensive and secure system to register voters and de-duplicate biometric data within the database, providing a clean and accurate voter registry that prevents citizens from registering multiple times and voting under different aliases.

Take a look at our video covering the deployment:

We proudly support Yemen’s government in their proactive step to establish election legitimacy through the use of a biometric voter registration platform. We also hope that additional countries seeking to stem election fraud and establish more faith in democratically elected governments will also consider deploying biometric voter registration solutions!