Educational Resources

Biometrics Frequently Asked Questions September 7, 2006,National Science and Technology Council,
This set of frequently asked questions includes the top ten biometric FAQs, background, implementation, performance statistics, security, modality-specific, and government-specific.

BioPrivacy FAQs and Definitions International Biometric Group BioPrivacy Initiative

Biometrics Overview August 7, 2006, National Science and Technology Council. 

This basic overview includes the following discussions:  introduction to biometrics, biometric modalities (fingerprint recognition, face recognition, iris recognition, hand/finger geometry, and other systems), testing and statistics, standards, and conclusion.

Biometrics 101 – U.S. Department of Defense (DoD) Biometrics Task Force,
This tutorial provides a high-level overview of biometric technologies and is offered courtesy of the National Defense University, Fort McNair, Washington, DC. Note that this tutorial does not necessarily represent an official DoD position on biometric technologies or the implementation of such technologies. The cited advantages of using biometrics and descriptions of certain modalities should not be construed as DoD policy or an endorsement of any given technology or implementation approach.

Privacy and Biometrics: Building a Conceptual Foundation September 15, 2006, National Science and Technology Council, Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics,
This paper seeks to connect privacy and biometrics at a structural level so that both fields can be understood within a common framework. The paper provides a general overview of both privacy and biometrics and offers a perspective through which to view the convergence of both. The paper is organized into three sections: (1) a high-level introduction of biometrics; (2) a review of privacy, multiple definitions of the term “privacy,” and highlights of the conceptual foundation underlying the full scope of privacy as applied to technology; and (3) discussions of the first two sections together, applying the functional architecture of privacy to the functional architecture of biometrics.