Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium (2006)

Chapter: ID AND VERIFICATION TECHNOLOGIES: Introduction

Previous Chapter: Front Matter
Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.

ID AND VERIFICATION TECHNOLOGIES

Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.

This page intentionally left blank.

Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.

Introduction

STEPHEN S. INTILLE

Massachusetts Institute of Technology

Cambridge, Massachusetts


VISVANATHAN RAMESH

Siemens Corporate Research, Inc.

Princeton, New Jersey


The profileration of cheaper, novel sensors, faster computers, and intelligent algorithms has made the effective monitoring, identifying, and tracking of objects and persons much more feasible. Modalities for identifying and tracking objects include: radio-frequency identification devices (RFIDs), bar codes, and so on. Modalities for the biometric identification of people include facial-recognition systems, fingerprint analysis, hand-geometry analysis, iris recognition, and many others. The combination of biometrics and digital passports will enable the tracking of individuals and their whereabouts. Moreover, video surveillance systems, which are being increasingly used in public areas, will be able to detect, track, capture, and log faces of individuals and, potentially, match them to faces in databases.

The presentations in this session will provide an overview of the trends and research challenges in technologies in this field. As the capability to identify, track, and monitor individuals improves, we will need safeguards against the misuse of these capabilities. Thus, privacy issues related to the deployment of these technologies will also be discussed.

The presentations will focus on the following topics: (1) an overview of research challenges and face-recognition technology by Peter Belhumeur; (2) an evaluation of biometrics for face recognition by Jonathon Phillips; and (3) the practical use of RFIDs for activity recognition by Matthai Philipose.

Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.

This page intentionally left blank.

Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
Page 1
Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
Page 2
Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
Page 3
Suggested Citation: "ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
Page 4
Next Chapter: Ongoing Challenges in Face Recognition
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.