SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Multi-biometrics for identification and de-duplication for ID issuance at a national scale Multi-biometrics for identification and de-duplication for ID issuance at a national scale Sandeep MohantaHead-Business Development Fulcrum Biometrics
Technical Architecture: BW and ADK Integration Challenges: Is De-duplication a simple process? 3. Result Checking & Reporting 1. Data Collection 2. Biometrics Matching Result Checking & Reporting N:N Biometrics Matching Data Collection N:N
Challenges Person identification and de-duplication in huge population sizes Immediate Response Text High Accuracy Text Robustness Text Text
Solutions Multi-Biometrics –  for accuracy Very fast matching speed – millions of records per second ,[object Object]
Multi-Biometrics fusion helps increase accuracy.
If one biometrics modality data is low quality or not available, other modality can help identify person.,[object Object]
3-D Pie Chart MegaMatcher Accelerator 100M fingerprints or ... 200M irises  per second on one unit ... TEXT TEXT One unit capacity  30M fingerprints  or 50M irises Scalable TEX TEXT Proven in National Scale applications:  ... Users de-duplication, massive user identification
Table MegaMatcher on card Match-on-card is the concept of storing and matching a biometric template inside the secure environment of a smartcard chip.
MegaMatcher on card Main advantages of Match-On-Card: ,[object Object]
Security
ConvenienceTEXT TEXT
MegaMatcher on card Additionally MegaMatcher On Card offers: ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014sybiantech
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iotChintan Patel
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET Journal
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 

Was ist angesagt? (20)

Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Sideband_SB_020316
Sideband_SB_020316Sideband_SB_020316
Sideband_SB_020316
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health Records
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 

Andere mochten auch

Vol17 nº1 2014 4
Vol17 nº1 2014 4Vol17 nº1 2014 4
Vol17 nº1 2014 4meduca
 
Kost og adfærd med fokus på hyperaktivitet randers
Kost og adfærd med fokus på hyperaktivitet   randersKost og adfærd med fokus på hyperaktivitet   randers
Kost og adfærd med fokus på hyperaktivitet randersguest46fe211
 
Diatomeas de canada
Diatomeas de canadaDiatomeas de canada
Diatomeas de canadameduca
 
Seven tips to better comment writing
Seven tips to better comment writingSeven tips to better comment writing
Seven tips to better comment writingKeith Boniface
 
Diatomeas de australia
Diatomeas de australiaDiatomeas de australia
Diatomeas de australiameduca
 
CMG LLP Presentation
CMG LLP PresentationCMG LLP Presentation
CMG LLP Presentationguest66cd8d
 
Grades and Grading Nov 07
Grades and Grading Nov 07Grades and Grading Nov 07
Grades and Grading Nov 07Keith Boniface
 
Offre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignOffre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignGini Concept Design
 
inflation rate
inflation rate inflation rate
inflation rate Tooba Khan
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba Tooba Khan
 

Andere mochten auch (14)

David Paoli
David PaoliDavid Paoli
David Paoli
 
Vol17 nº1 2014 4
Vol17 nº1 2014 4Vol17 nº1 2014 4
Vol17 nº1 2014 4
 
Kost og adfærd med fokus på hyperaktivitet randers
Kost og adfærd med fokus på hyperaktivitet   randersKost og adfærd med fokus på hyperaktivitet   randers
Kost og adfærd med fokus på hyperaktivitet randers
 
FMD | Alguns trampos
FMD | Alguns tramposFMD | Alguns trampos
FMD | Alguns trampos
 
Ning guidelines
Ning guidelinesNing guidelines
Ning guidelines
 
Diatomeas de canada
Diatomeas de canadaDiatomeas de canada
Diatomeas de canada
 
Ipl 2012
Ipl 2012Ipl 2012
Ipl 2012
 
Seven tips to better comment writing
Seven tips to better comment writingSeven tips to better comment writing
Seven tips to better comment writing
 
Diatomeas de australia
Diatomeas de australiaDiatomeas de australia
Diatomeas de australia
 
CMG LLP Presentation
CMG LLP PresentationCMG LLP Presentation
CMG LLP Presentation
 
Grades and Grading Nov 07
Grades and Grading Nov 07Grades and Grading Nov 07
Grades and Grading Nov 07
 
Offre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept DesignOffre Création de site Internet Wordpress Gini Concept Design
Offre Création de site Internet Wordpress Gini Concept Design
 
inflation rate
inflation rate inflation rate
inflation rate
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba
 

Ähnlich wie De-Duplication-01-03-2011

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfJuan Ben
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Custom Software Development with Advanced Tech
Custom Software Development with Advanced TechCustom Software Development with Advanced Tech
Custom Software Development with Advanced TechRosemaryGeorge6
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010Nazmul
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfBahaa Abdulhadi
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Bogdan Bocse
 

Ähnlich wie De-Duplication-01-03-2011 (20)

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdf
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Loqr
LoqrLoqr
Loqr
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Custom Software Development with Advanced Tech
Custom Software Development with Advanced TechCustom Software Development with Advanced Tech
Custom Software Development with Advanced Tech
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
 
Seetu
SeetuSeetu
Seetu
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?Computer Vision - The New Renaissance or 1983?
Computer Vision - The New Renaissance or 1983?
 
Embedded system
Embedded systemEmbedded system
Embedded system
 

Kürzlich hochgeladen

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

De-Duplication-01-03-2011

  • 1. Multi-biometrics for identification and de-duplication for ID issuance at a national scale Multi-biometrics for identification and de-duplication for ID issuance at a national scale Sandeep MohantaHead-Business Development Fulcrum Biometrics
  • 2. Technical Architecture: BW and ADK Integration Challenges: Is De-duplication a simple process? 3. Result Checking & Reporting 1. Data Collection 2. Biometrics Matching Result Checking & Reporting N:N Biometrics Matching Data Collection N:N
  • 3. Challenges Person identification and de-duplication in huge population sizes Immediate Response Text High Accuracy Text Robustness Text Text
  • 4.
  • 5. Multi-Biometrics fusion helps increase accuracy.
  • 6.
  • 7. 3-D Pie Chart MegaMatcher Accelerator 100M fingerprints or ... 200M irises per second on one unit ... TEXT TEXT One unit capacity 30M fingerprints or 50M irises Scalable TEX TEXT Proven in National Scale applications: ... Users de-duplication, massive user identification
  • 8. Table MegaMatcher on card Match-on-card is the concept of storing and matching a biometric template inside the secure environment of a smartcard chip.
  • 9.
  • 12.
  • 13. Enhanced convenience due to adaptability on a range of different chips
  • 14. Benefits from being a complementary product in the MegaMatcher line but also interoperable with existing systemsTEXT TEXT
  • 15. References: Our References Bangladesh Voter Registration Indonesia Biometrics Passport System Poland Biometrics Passport System Bosnia and Herzegovina Biometric Passport and ID System El Salvador's National Passport System Border control systems in Spanish airports Mexico local tax payment agency (SAT) project
  • 16. References: Mexico local tax payment agency (SAT) project Based on MegaMatcher Accelerator technology Implemented by Vangent with cooperation with Biometría Aplicada (our Mexico distributor). Dimensioned to support 4 million people (with 10 fingerprints per person, face and iris is also collected for the future usage). Real-time search inside database