April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
368 Synthesis and Analysis in Biometrics
in applications where high confidentiality and reliable decision making are
critical.
Most of today’s physical access control systems extensively utilize the
information collected during the authorization check itself, but make limited
or no use of the information gained in the conversation with individual
during the authorizing procedure. The officer must make a decision in a
limited time based on authorization documents, personal data from the
databases, and his/her own experience. This may not be sufficient to
minimize the probability of mistakes in decision making.
Consider, for example, the Defense Advanced Research Projects Agency
(DARPA) research program, HumanID, which is aimed at the detection,
recognition and identification of humans at a distance in early warning
support systems for force protection and homeland defense
[
45
]
.Existing
screening systems exclusively utilize visual appearance to compare against
“lookout checklists” or suspected activity, and do not effectively use the
time slot before/during registration to collect biometric information (body
temperature, surgical changes) about an individual. In addition, they do
not arm the officer with decision-making support (such as modeling of
the aging face, artificial facial accessories, and other features, for further
comparison against the information available in databases.
The job of a customs or security officer becomes complicated if
submitted documents do not match the appearance of an individual. In
order to draw firm conclusions, additional information is needed. This
information is available in the next-generation PASS system, which uses
both pre-screening and check-point biometric information. The skilled
PASS user possesses an ability to manipulate and efficiently utilize various
sources of information in the decision making process. Hence, a training
system is needed to implement the PASS in practice
[
51,52
]
. However,
personnel training cannot keep pace with rapid changes in technology for
physical access control systems. This is the driving force behind developing
novel training paradigms to meet the requirements of security policy.
Traditionally, training is implemented on a specifically desqigned
training system. For example, training methodologies are well developed for
pilots
[
13
]
, astronauts, surgical applications
[
27
]
, and in military systems.
These are expensive professional simulation systems, which are difficult
to modify or extend, since they are unique in architecture and functions.
For example, the traditional flight simulator is a large domelike structure
placed on a motion platform and housing an identical replica of an airplane
cockpit. Such training is very realistic (including effects such as engine
sounds, airflow turbulence, and others) but expensive. An example of the
newer generation of simulators is the networked simulation environment
in
[
7
]
. Mission team level training is based on networked nodes of several