National Academies Press: OpenBook

Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium (2006)

Chapter:ID AND VERIFICATION TECHNOLOGIES: Introduction

« Previous: Front Matter
Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×

ID AND VERIFICATION TECHNOLOGIES

Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×

This page intentionally left blank.

Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×

Introduction

STEPHEN S. INTILLE

Massachusetts Institute of Technology

Cambridge, Massachusetts


VISVANATHAN RAMESH

Siemens Corporate Research, Inc.

Princeton, New Jersey


The profileration of cheaper, novel sensors, faster computers, and intelligent algorithms has made the effective monitoring, identifying, and tracking of objects and persons much more feasible. Modalities for identifying and tracking objects include: radio-frequency identification devices (RFIDs), bar codes, and so on. Modalities for the biometric identification of people include facial-recognition systems, fingerprint analysis, hand-geometry analysis, iris recognition, and many others. The combination of biometrics and digital passports will enable the tracking of individuals and their whereabouts. Moreover, video surveillance systems, which are being increasingly used in public areas, will be able to detect, track, capture, and log faces of individuals and, potentially, match them to faces in databases.

The presentations in this session will provide an overview of the trends and research challenges in technologies in this field. As the capability to identify, track, and monitor individuals improves, we will need safeguards against the misuse of these capabilities. Thus, privacy issues related to the deployment of these technologies will also be discussed.

The presentations will focus on the following topics: (1) an overview of research challenges and face-recognition technology by Peter Belhumeur; (2) an evaluation of biometrics for face recognition by Jonathon Phillips; and (3) the practical use of RFIDs for activity recognition by Matthai Philipose.

Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×

This page intentionally left blank.

Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×
Page1
Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×
Page2
Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×
Page3
Suggested Citation:"ID AND VERIFICATION TECHNOLOGIES: Introduction." National Academy of Engineering. 2006. Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium. Washington, DC: The National Academies Press. doi: 10.17226/11577.
×
Page4
Next: Ongoing Challenges in Face Recognition »
Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2005 Symposium Get This Book
×
Buy Paperback | $50.00 Buy Ebook | $40.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

This volume includes 16 papers from the National Academy of Engineering's 2005 U.S. Frontiers of Engineering (USFOE) Symposium held in September 2005. USFOE meetings bring together 100 outstanding engineers (ages 30 to 45) to exchange information about leading-edge technologies in a range of engineering fields. The 2005 symposium covered four topic areas: ID and verification technologies, engineering for developing communities, engineering complex systems, and energy resources for the future. A paper by dinner speaker Dr. Shirley Ann Jackson, president of Rensselaer Polytechnic Institute, is also included. The papers describe leading-edge research on face and human activity recognition, challenges in implementing appropriate technology projects in developing countries, complex networks, engineering bacteria for drug production, organic-based solar cells, and current status and future challenges in fuel cells, among other topics. Appendixes include information about contributors, the symposium program, and a list of meeting participants. This is the eleventh volume in the USFOE series.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!