2017
DOI: 10.1049/iet-bmt.2017.0036
|View full text |Cite
|
Sign up to set email alerts
|

Biometric‐enabled watchlists technology

Abstract: For Entry-Exit technologies, such as US VISIT and Smart Borders (e-borders), a watchlist normally contains highquality biometric traits and is checked only against visitors. The situation can change drastically if low-quality images are added into the watchlist. Motivated by this fact, we introduce a systematic approach to assessing the risk of travellers using a biometric-enabled watchlist where some latency of the biometric traits is allowed. The main results presented herein include: (1) a taxonomical view … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 67 publications
0
9
0
Order By: Relevance
“…-Authentication and risk assessment machines for masstransit hubs and large public events. These machines operate under the umbrella of specific supporting infrastructure [96], [99], [100]. -Ambient assistants aims at social issues of critical importance: care management based on new cognitive paradigms [77].…”
Section: Frontiers In Applicationsmentioning
confidence: 99%
“…-Authentication and risk assessment machines for masstransit hubs and large public events. These machines operate under the umbrella of specific supporting infrastructure [96], [99], [100]. -Ambient assistants aims at social issues of critical importance: care management based on new cognitive paradigms [77].…”
Section: Frontiers In Applicationsmentioning
confidence: 99%
“…We use the term "weakly controlled" to indicate the most difficult part of the watchlist check that addresses the weaknesses of contemporary biometric technologies. For example, typical sources of image degradation include harsh ambient illumination conditions, mug-shots of facial images taken from passports, low-quality imaging devices, image compression and down sampling, out-of-focus acquisition, device or transmission noise, and motion blur [44], [49], [50], [51].…”
Section: Why Watchlist Is An Open Research Issue?mentioning
confidence: 99%
“…Misidentification remains a common occurrence due to shortcomings in current watchlist technologies and provides the principal motivation for this paper. Contemporary checkpoint is a cyber-physical computational platform that includes traveler authentication [23], [29], [48] using e-passport/ID [5], watchlist screening [9], [51], [86], concealed object detection [32], [60], interviewing [1], [4], [61], and risk assessment [49], [74], [76], [78], [91] under umbrella of justice and privacy issues [10], [15], [19]. In the International Air Transport Association (IATA) roadmap [36], four pillars of the checkpoint of the future are identified: computation intelligence, operations, infrastructure, and economic measures.…”
Section: Introductionmentioning
confidence: 99%
“…So that improve an automated border control algorithm is made for capturing the data clearly with modified comparative components. Kenneth Lai et.al [11], typically, watchlist have contained high quality images when compare of visitors either genuine or not in border control. Sometimes if watch-list own low quality images, them may happen a incidents drastically.…”
Section: Related Studymentioning
confidence: 99%