0

0

Assessing Biometric Authentication -A Holistic Approach

雪夜

雪夜

发布时间:2025-07-11 08:46:12

|

346人浏览过

|

来源于php中文网

原创

biometric authentication is increasingly capturing the attention of the public. recent announcements, such as the discovery last fall that a russian crime syndicate had amassed over 1 billion stolen passwords, highlight the vulnerabilities in current security systems and the urgent need for new security measures. there is a growing agreement in both government and industry circles (often echoed in hollywood) that biometric methods represent the most promising future direction. the efforts by apple and samsung to integrate fingerprint authentication into their devices are among the most prominent examples of biometric technology in use.

However, evaluating different biometric solutions presents a significant challenge, even for experts in the field, and even more so for the average consumer who desires security without added complexity. The biometrics industry recognizes that various factors are crucial in determining the viability of a biometric application, but it must develop improved methods that allow for a comprehensive and holistic evaluation. The initial step in creating a more effective comparison framework involves defining the elements of such an approach.

Assessing Biometric Authentication -A Holistic Approach

Over-emphasis on False Accepts

The false accept rate (FAR) measures the probability that a biometric system will mistakenly grant access to an unauthorized individual. This metric is typically the most highlighted statistic in corporate documents and media reports on biometric products.

There is occasional mention of the false reject rate (FRR), which indicates the likelihood that the system will wrongly deny access to an authorized user. The FRR is closely linked to the FAR, and adjusting the system to find a balance between these two rates is a matter of fine-tuning. Before delving deeper into the significance of FRR, it's important to address the disproportionate focus on FAR.

FAR is generally calculated by gathering biometric data from a large pool of individuals, then randomly selecting target individuals and comparing them to the rest of the database. This practice has resulted in the development of extensive datasets of fingerprints, irises, faces, and other biometric features, some of which are publicly available. Minimizing FAR while considering its trade-off with FRR is the focus of most research in the biometric fields, leading to competitions organized by NIST and other agencies to compare different solutions.

When the dataset is very clean (e.g., good lighting for face recognition, low noise for voice, clear fingerprints), it provides an indication of the inherent uniqueness of the biometric. Fingerprints, for instance, possess a relatively high inherent uniqueness, which partly explains their widespread use in law enforcement. Yet, this high uniqueness can be counteracted by other factors within the overall system.

The selection of data used to report a system’s performance is largely subjective, except in public competitions. It requires an evaluation of the range and frequency of conditions under which the biometric system will be used.

Furthermore, for most industry products, it's nearly impossible to challenge the claimed accuracies through simple "black box" testing—claims of a 1 in 100,000 FAR cannot be verified by having a few colleagues attempt to access your phone. Consequently, when biometric systems are deployed in the real world, they are often evaluated directly (e.g., by bloggers) and indirectly (e.g., by non-adoption) based on other criteria.

The Importance of False Rejects

The false reject rate (FRR) is crucial for user adoption of a biometric system. No matter how secure the system is against unauthorized access, it will only be widely used if authorized users can access it successfully most of the time.

The FRR should always be reported alongside the FAR; otherwise, the FAR loses its relevance—it's not impressive to design a system that rejects everyone, including authorized users. Surprisingly, it's common to see only FAR reported, not just in company literature but also in media articles.

Like FAR, determining the FRR of a system is highly subjective and depends on the data selected to represent the conditions under which authentication attempts will occur.

There are several standard methods for evaluating the combination of FAR and FRR for a given system. Detection Error Tradeoff (DET) curves plot FRR against FAR, generated by gradually increasing the rejection threshold (see Figure 1 for an example of a DET plot for face recognition).

At lower rejection thresholds, the detection rate (allowing authorized users access) is higher (lower FRR), but the FAR may be relatively high.

Figure 1: Typical DET plot for face recognition

As the rejection threshold increases (becoming more restrictive), false accepts decrease, but at the cost of a lower detection rate (higher FRR). Other variations of this type of plot include ROC (Receiver Operating Characteristic) curves.

A commonly used metric from the DET curve is the Equal Error Rate (EER), the point where FAR and FRR are equal.

While EER can sometimes provide a quick comparison point, it should not be the sole metric for comparing different biometric systems for several reasons. First, the EER often does not reflect the operating point at which the system is intended to function—systems are typically tuned to operate at lower FARs. Second, EER does not capture the other critical information necessary for a more holistic approach as advocated in this article.

FAR and FRR, as described, are laboratory measures of a biometric system's accuracy. What truly matters to users is the real-world likelihood of successful access and the effectiveness of thwarting impostor attacks.

Assessing the True Rate of False Accepts

Biometric systems are typically designed to have very low FARs. Therefore, a straightforward false accept attack, where random individuals attempt to authenticate using the biometric feature of an authorized user, is unlikely to succeed—a single impostor has a low probability of matching.

That single impostor is also unlikely to have thousands of impostor friends to increase the attack's probability. Additionally, most systems implement limits (such as the number of attempts or timeouts) that make it practically impossible to attempt thousands of tries.

Four-digit PINs operate on a similar principle—there are 10,000 combinations, making it theoretically unlikely for an impostor to guess the correct one quickly. In practice, however, a few commonly used PINs increase the likelihood of a successful attack beyond the theoretical 1 in 10,000.

Spoofing as a Key Concern

A more sophisticated impostor attack involves spoofing, where the attacker directly mimics the biometric feature of the authorized user. This is a likely method used by criminals to access someone's device. The specific spoofing technique varies by biometric. For instance, fingerprints can be lifted from device screens and recreated using materials like glue, gelatin, or Play-Doh. Face and iris recognition can be fooled by images, while voice recognition is susceptible to recordings.

A primary defense against spoofing is "liveness" testing, which varies by biometric. For face recognition, motion can be measured to confirm a 3-dimensional face. The challenge-response approach is also common—asking the user to perform a specific action to verify they are a live person, such as winking or speaking a particular phrase.

The downside of a challenge-response system is that it can become cumbersome, potentially reducing user adoption. Many users may feel uncomfortable winking at their device in public to gain access.

Another defense strategy is to require multiple biometrics, which increases the challenge for attackers by necessitating multiple spoofing methods. The downside is that it can be more burdensome for users, requiring multiple biometric verifications for each authentication.

Each spoofing method has its pros and cons, including the availability of the biometric (e.g., fingerprints are left everywhere), the required fidelity (e.g., the quality of a voice recording), the effort needed to create a spoof (e.g., printing a face or iris image), and the likelihood of a successful counterattack (e.g., effectiveness of liveness tests).

Subtxt
Subtxt

生成有意义的文本并编写完整的故事。

下载

All these factors contribute to the actual likelihood of a successful impostor attack. Importantly, these should be directly considered in the overall assessment of the biometric system and are often more relevant than the basic FAR typically cited.

This aspect is often overlooked by biometric system manufacturers but quickly noticed by the media, as seen with fingerprint sensors in Apple and Samsung phones, which were soon followed by reports of spoof attacks that allowed unauthorized access.

Assessing the True Rate of False Rejects

The measured false reject rate heavily depends on the data chosen to represent typical system usage. Unfortunately, this often fails to account for the broader range of real-world conditions. Every biometric has scenarios where authentication can be challenging or impossible.

For fingerprints, dirt and grease can significantly impact system accuracy. Lighting conditions can challenge face or other camera-based biometrics. Background noise complicates voice recognition. Measuring and reporting performance under ideal conditions that don't reflect real-world scenarios creates unrealistic expectations and leads to disappointment when the system underperforms.

For many biometric systems, initial enrollment is critical to performance. A poorly executed or incorrect enrollment can lead to poor results, even if the system is capable of high accuracy. Ensuring the enrollment process is as simple and intuitive as possible is essential.

Some biometrics benefit from adaptive enrollment, where the user's profile can improve over time. This can significantly enhance accuracy by expanding the range of covered environments and mitigating initial enrollment flaws.

The degree to which a biometric changes over time (known as permanence) strongly affects the true false reject rate. As users age, their biometric identity can change. Like environmental and enrollment concerns, this can be addressed through adaptive enrollment when possible. Universality is also crucial—does everyone possess this biometric trait? Fingerprints can be lost over time for people in occupations involving heavy hand use, and certain eye diseases can impair iris recognition.

Thus, the true FRR of a biometric system should account for the full range and expected frequency of environmental conditions, the range of possible enrollment quality, and the permanence and universality of the trait.

Factors Affecting User Adoption

Beyond the inherent accuracy of the biometric system, other factors influence user adoption and should be considered in any assessment. Acceptability and ease-of-use are two critical factors.

Acceptability measures whether users will be willing to use the biometric. If it's embarrassing or invasive, users are unlikely to adopt it.

The required level of acceptability may vary by application—for example, accessing a phone in public requires a minimally invasive system, while boarding an airplane might warrant a more complex process.

Ease-of-use, along with speed, is crucial for areas where biometrics are expanding today. Mobile devices are convenience tools, and users will not adopt systems that complicate their use. This is evident in the low usage rates of basic phone protection with PINs, patterns, or passwords, which many find cumbersome and slow. Widespread biometric use will only happen if it's fast and easy, including both the initial setup and daily use.

Cost and Security

Cost is a significant factor in consumer devices. Adding biometric-specific sensors can substantially increase the retail price. As a result, fingerprint sensors in mobile devices are typically found only in high-end phones and are of lower quality than dedicated fingerprint systems. They are also smaller and capture less of the fingerprint, leading to lower overall accuracy. Sensor longevity also impacts cost considerations.

Data security is crucial for creating a viable biometric solution and depends on the specific biometric used. A key difference among solutions is whether cloud access is required. Cloud-based biometrics can leverage greater computing power, potentially increasing accuracy, but at the cost of connectivity requirements, time delays, and data security concerns. Storing biometric information for many users in the cloud presents an attractive target for hackers.

In the case of biometric theft, revocability is necessary. Just as one can change a password after an account is compromised, some biometrics allow for replacement. Voice recognition, for instance, can easily change the passphrase. Unfortunately, most biometrics do not facilitate easy replacement.

Finding the Right Applications

The concepts discussed in this holistic approach to biometric system assessment—including spoofing, permanence, universality, acceptability, and revocability—are well-known within the biometric research community and industry. However, they are often downplayed in corporate literature and media coverage and are not easily understood by end users.

If these issues are addressed, it is typically in the form of a table with simplistic relative rankings like Low, Medium, and High, with little or no explanation of how those values were determined. These factors should be considered explicitly and quantitatively from the outset.

With a better understanding of the real advantages and disadvantages of a specific biometric system, one can then evaluate the appropriate applications for that system. While high-security applications like banking are often the focus, there are applications across the spectrum of security needs. In all cases, it's important to consider what is currently in use and whether a biometric system adds value, rather than waiting for the perfect biometric system to emerge.

The PIN option for locking a phone provides a good example—it's rarely used and often one of a few common PINs. Replacing the PIN with a relatively tolerant, easy-to-use biometric can significantly enhance security in this context.

Another example is using biometrics as a second factor, which can provide much greater security without being entirely dependent on the biometric itself. In scenarios requiring high security, it may be acceptable to limit the biometric's use to favorable environmental conditions to achieve high accuracy.

It is crucial that the biometric industry drives the conversation toward the actual utility that a biometric system provides and helps set realistic expectations by presenting a holistic framework that fairly represents real-world operations.

About the Authors

Gordon Haupt has nearly 20 years of experience building and leading diverse engineering and operations teams. With a strong background in signal processing and computer vision, he has developed numerous innovative technology products. Gordon is the Senior Director of Vision Technologies at Sensory, focusing on bringing speech and face biometrics to consumer devices.

Todd Mozer has over 20 years of experience in machine learning, speech, and vision and holds dozens of patents in these and related fields. He is the Founder, Chairman, and CEO of Sensory.

Sensory is a leader in speech and vision technology for consumer products. Its award-winning TrulyHandsfree™ technology offers consumers a voice-controlled, completely hands-free experience, found in various popular mobile devices. Sensory has recently introduced its TrulySecure™ technology, which combines face recognition and speaker verification. More information is available at https://www.php.cn/link/530f49aa780e4bb3a605e586094008e7.

相关专题

更多
Sass和less的区别
Sass和less的区别

Sass和less的区别有语法差异、变量和混合器的定义方式、导入方式、运算符的支持、扩展性等。本专题为大家提供Sass和less相关的文章、下载、课程内容,供大家免费下载体验。

196

2023.10.12

if什么意思
if什么意思

if的意思是“如果”的条件。它是一个用于引导条件语句的关键词,用于根据特定条件的真假情况来执行不同的代码块。本专题提供if什么意思的相关文章,供大家免费阅读。

698

2023.08.22

while的用法
while的用法

while的用法是“while 条件: 代码块”,条件是一个表达式,当条件为真时,执行代码块,然后再次判断条件是否为真,如果为真则继续执行代码块,直到条件为假为止。本专题为大家提供while相关的文章、下载、课程内容,供大家免费下载体验。

79

2023.09.25

require的用法
require的用法

require的用法有引入模块、导入类或方法、执行特定任务。想了解更多require的相关内容,可以阅读本专题下面的文章。

454

2023.11.27

scripterror怎么解决
scripterror怎么解决

scripterror的解决办法有检查语法、文件路径、检查网络连接、浏览器兼容性、使用try-catch语句、使用开发者工具进行调试、更新浏览器和JavaScript库或寻求专业帮助等。本专题为大家提供相关的文章、下载、课程内容,供大家免费下载体验。

184

2023.10.18

500error怎么解决
500error怎么解决

500error的解决办法有检查服务器日志、检查代码、检查服务器配置、更新软件版本、重新启动服务、调试代码和寻求帮助等。本专题为大家提供相关的文章、下载、课程内容,供大家免费下载体验。

255

2023.10.25

function是什么
function是什么

function是函数的意思,是一段具有特定功能的可重复使用的代码块,是程序的基本组成单元之一,可以接受输入参数,执行特定的操作,并返回结果。本专题为大家提供function是什么的相关的文章、下载、课程内容,供大家免费下载体验。

466

2023.08.04

js函数function用法
js函数function用法

js函数function用法有:1、声明函数;2、调用函数;3、函数参数;4、函数返回值;5、匿名函数;6、函数作为参数;7、函数作用域;8、递归函数。本专题提供js函数function用法的相关文章内容,大家可以免费阅读。

158

2023.10.07

苹果官网入口直接访问
苹果官网入口直接访问

苹果官网直接访问入口是https://www.apple.com/cn/,该页面具备0.8秒首屏渲染、HTTP/3与Brotli加速、WebP+AVIF双格式图片、免登录浏览全参数等特性。本专题为大家提供相关的文章、下载、课程内容,供大家免费下载体验。

10

2025.12.24

热门下载

更多
网站特效
/
网站源码
/
网站素材
/
前端模板

精品课程

更多
相关推荐
/
热门推荐
/
最新课程
PostgreSQL 教程
PostgreSQL 教程

共48课时 | 5.9万人学习

Git 教程
Git 教程

共21课时 | 2.2万人学习

关于我们 免责申明 举报中心 意见反馈 讲师合作 广告合作 最新更新
php中文网:公益在线php培训,帮助PHP学习者快速成长!
关注服务号 技术交流群
PHP中文网订阅号
每天精选资源文章推送

Copyright 2014-2025 https://www.php.cn/ All Rights Reserved | php.cn | 湘ICP备2023035733号