New NIST Biometric Data Standard adds DNA, Footmarks for Enhanced Fingerprint Descriptions

The National Institute of Standards and Technology (NIST) published a revised biometric standard in November 2011 that vastly expands the type and amount of information that forensic scientists can share across their international networks to identify victims or solve crimes. Biometric data is a digital or analog representation of physical attributes that can be used to uniquely identify us.

The new standard is the Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information and is referenced as "ANSI/NIST-ITL 1-2011, NIST Special Publication 500-290." Earlier versions have been used throughout the UnitedStates and six continents to provide a common language and format for the exchange of biometric data and associated metadata—information about the biometric characteristics or how it was collected. The Department of Defense, the Federal Bureau of Investigation, the Department of Homeland Security, the government of Argentina and others are already in the process of adopting the new standard.

"The additions to this version of the standard represent a great leap forward," said Brad Wing, NIST biometrics standards coordinator . The capabilities of the system have been greatly expanded from that of matching a fingerprint, facial image or iris sample collected directly from a live person and comparing it to samples previously stored in a database. New types of biometric data—DNA and plantars/footprints—were added as well as updates to existing record types.

This is the first international standard for the exchange of DNA data. DNA can be used for criminal case identification, such as in a rape case, or in a forensic setting to identify victims, such as those in a plane crash, where it is necessary to have an original DNA sample from the victim, or establish kinship by taking DNA samples from purported relatives. The standard handles both types of cases.

Another new addition is the Extended Feature Set (EFS) for forensic examiner markups that allow for marking and exchanging a very rich set of latent ridge print—fingerprints, palmprints and footprints—information that ensures analysts use the same terminology, references and procedures to describe details such as pores and linear discontinuities. Also new is the capability to share images of all body parts and anthropometric markups of face and iris images.

The standard now defines how to specify and share the geo-positioning coordinates of biometric sample collection. Information concerning the circumstances surrounding the collection of the biometric data can also be included. This includes pictures of items found around the crime scene and audio and video clips. Data handling logs show chain-of-custody of the biometric data for legal purposes, including the steps necessary to prepare the biometric sample for processing in a matching system.

NIST biometric research contributed heavily to the standard. In addition to part of the DNA work, the standard uses a NIST-developed compact format to exchange iris images, and the Mobile ID Best Practice Recommendations.

Researchers already are at work on new additions to the standard, including voice biometrics, traumatic injury imaging and analysis (such as bitemarks), dental forensics (used to identify persons when DNA is not readily available, such as with skeletons) and conformance testing to the standard specifications.

NIST is involved with many standards development organizations (SDO), but the Information Technology Laboratory that produced this standard is NIST's only SDO, and is certified by the American National Standards Institute (ANSI). The standard is developed according to a consensus process and this update involved almost 70 voting organizations participating in 16 working groups over a two-year period.

The new biometric standard may be found at: www.nist.gov/customcf/get_pdf.cfm?pub_id=910136 .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3