SlideShare uma empresa Scribd logo
1 de 12
Multi-biometrics for identification and de-duplication for ID issuance at a national scale Multi-biometrics for identification and de-duplication for ID issuance at a national scale Sandeep MohantaHead-Business Development Fulcrum Biometrics
Technical Architecture: BW and ADK Integration Challenges: Is De-duplication a simple process? 3. Result Checking & Reporting 1. Data Collection 2. Biometrics Matching Result Checking & Reporting N:N Biometrics Matching Data Collection N:N
Challenges Person identification and de-duplication in huge population sizes Immediate Response Text High Accuracy Text Robustness Text Text
Solutions Multi-Biometrics –  for accuracy Very fast matching speed – millions of records per second ,[object Object]
Multi-Biometrics fusion helps increase accuracy.
If one biometrics modality data is low quality or not available, other modality can help identify person.,[object Object]
3-D Pie Chart MegaMatcher Accelerator 100M fingerprints or ... 200M irises  per second on one unit ... TEXT TEXT One unit capacity  30M fingerprints  or 50M irises Scalable TEX TEXT Proven in National Scale applications:  ... Users de-duplication, massive user identification
Table MegaMatcher on card Match-on-card is the concept of storing and matching a biometric template inside the secure environment of a smartcard chip.
MegaMatcher on card Main advantages of Match-On-Card: ,[object Object]
Security
ConvenienceTEXT TEXT
MegaMatcher on card Additionally MegaMatcher On Card offers: ,[object Object]

Mais conteúdo relacionado

Mais procurados

Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014sybiantech
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iotChintan Patel
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET Journal
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 

Mais procurados (20)

Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Sideband_SB_020316
Sideband_SB_020316Sideband_SB_020316
Sideband_SB_020316
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health Records
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 

Destaque

Vol17 nº1 2014 4
Vol17 nº1 2014 4Vol17 nº1 2014 4
Vol17 nº1 2014 4meduca
 
Kost og adfærd med fokus på hyperaktivitet randers
Kost og adfærd med fokus på hyperaktivitet   randersKost og adfærd med fokus på hyperaktivitet   randers
Kost og adfærd med fokus på hyperaktivitet randersguest46fe211
 
Diatomeas de canada
Diatomeas de canadaDiatomeas de canada
Diatomeas de canadameduca
 
Seven tips to better comment writing
Seven tips to better comment writingSeven tips to better comment writing
Seven tips to better comment writingKeith Boniface
 
Diatomeas de australia
Diatomeas de australiaDiatomeas de australia
Diatomeas de australiameduca
 
CMG LLP Presentation
CMG LLP PresentationCMG LLP Presentation
CMG LLP Presentationguest66cd8d
 
Grades and Grading Nov 07
Grades and Grading Nov 07Grades and Grading Nov 07
Grades and Grading Nov 07Keith Boniface
 
Offre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignOffre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignGini Concept Design
 
inflation rate
inflation rate inflation rate
inflation rate Tooba Khan
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba Tooba Khan
 

Destaque (14)

David Paoli
David PaoliDavid Paoli
David Paoli
 
Vol17 nº1 2014 4
Vol17 nº1 2014 4Vol17 nº1 2014 4
Vol17 nº1 2014 4
 
Kost og adfærd med fokus på hyperaktivitet randers
Kost og adfærd med fokus på hyperaktivitet   randersKost og adfærd med fokus på hyperaktivitet   randers
Kost og adfærd med fokus på hyperaktivitet randers
 
FMD | Alguns trampos
FMD | Alguns tramposFMD | Alguns trampos
FMD | Alguns trampos
 
Ning guidelines
Ning guidelinesNing guidelines
Ning guidelines
 
Diatomeas de canada
Diatomeas de canadaDiatomeas de canada
Diatomeas de canada
 
Ipl 2012
Ipl 2012Ipl 2012
Ipl 2012
 
Seven tips to better comment writing
Seven tips to better comment writingSeven tips to better comment writing
Seven tips to better comment writing
 
Diatomeas de australia
Diatomeas de australiaDiatomeas de australia
Diatomeas de australia
 
CMG LLP Presentation
CMG LLP PresentationCMG LLP Presentation
CMG LLP Presentation
 
Grades and Grading Nov 07
Grades and Grading Nov 07Grades and Grading Nov 07
Grades and Grading Nov 07
 
Offre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignOffre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept Design
 
inflation rate
inflation rate inflation rate
inflation rate
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba
 

Semelhante a De-Duplication-01-03-2011

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfJuan Ben
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Custom Software Development with Advanced Tech
Custom Software Development with Advanced TechCustom Software Development with Advanced Tech
Custom Software Development with Advanced TechRosemaryGeorge6
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010Nazmul
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfBahaa Abdulhadi
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Bogdan Bocse
 

Semelhante a De-Duplication-01-03-2011 (20)

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdf
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Loqr
LoqrLoqr
Loqr
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Custom Software Development with Advanced Tech
Custom Software Development with Advanced TechCustom Software Development with Advanced Tech
Custom Software Development with Advanced Tech
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
 
Seetu
SeetuSeetu
Seetu
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?
 
Embedded system
Embedded systemEmbedded system
Embedded system
 

Último

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 

Último (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 

De-Duplication-01-03-2011

  • 1. Multi-biometrics for identification and de-duplication for ID issuance at a national scale Multi-biometrics for identification and de-duplication for ID issuance at a national scale Sandeep MohantaHead-Business Development Fulcrum Biometrics
  • 2. Technical Architecture: BW and ADK Integration Challenges: Is De-duplication a simple process? 3. Result Checking & Reporting 1. Data Collection 2. Biometrics Matching Result Checking & Reporting N:N Biometrics Matching Data Collection N:N
  • 3. Challenges Person identification and de-duplication in huge population sizes Immediate Response Text High Accuracy Text Robustness Text Text
  • 4.
  • 5. Multi-Biometrics fusion helps increase accuracy.
  • 6.
  • 7. 3-D Pie Chart MegaMatcher Accelerator 100M fingerprints or ... 200M irises per second on one unit ... TEXT TEXT One unit capacity 30M fingerprints or 50M irises Scalable TEX TEXT Proven in National Scale applications: ... Users de-duplication, massive user identification
  • 8. Table MegaMatcher on card Match-on-card is the concept of storing and matching a biometric template inside the secure environment of a smartcard chip.
  • 9.
  • 12.
  • 13. Enhanced convenience due to adaptability on a range of different chips
  • 14. Benefits from being a complementary product in the MegaMatcher line but also interoperable with existing systemsTEXT TEXT
  • 15. References: Our References Bangladesh Voter Registration Indonesia Biometrics Passport System Poland Biometrics Passport System Bosnia and Herzegovina Biometric Passport and ID System El Salvador's National Passport System Border control systems in Spanish airports Mexico local tax payment agency (SAT) project
  • 16. References: Mexico local tax payment agency (SAT) project Based on MegaMatcher Accelerator technology Implemented by Vangent with cooperation with Biometría Aplicada (our Mexico distributor). Dimensioned to support 4 million people (with 10 fingerprints per person, face and iris is also collected for the future usage). Real-time search inside database