Assessing Biometric Authentication -A Holistic Approach

biometric authentication is increasingly capturing the attention of the public. recent announcements, such as the discovery last fall that a russian crime syndicate had amassed over 1 billion stolen passwords, highlight the vulnerabilities in current security systems and the urgent need for new security measures. there is a growing agreement in both government and industry circles (often echoed in hollywood) that biometric methods represent the most promising future direction. the efforts by apple and samsung to integrate fingerprint authentication into their devices are among the most prominent examples of biometric technology in use.

However, evaluating different biometric solutions presents a significant challenge, even for experts in the field, and even more so for the average consumer who desires security without added complexity. The biometrics industry recognizes that various factors are crucial in determining the viability of a biometric application, but it must develop improved methods that allow for a comprehensive and holistic evaluation. The initial step in creating a more effective comparison framework involves defining the elements of such an approach.

Assessing Biometric Authentication -A Holistic Approach

Over-emphasis on False Accepts

The false accept rate (FAR) measures the probability that a biometric system will mistakenly grant access to an unauthorized individual. This metric is typically the most highlighted statistic in corporate documents and media reports on biometric products.

There is occasional mention of the false reject rate (FRR), which indicates the likelihood that the system will wrongly deny access to an authorized user. The FRR is closely linked to the FAR, and adjusting the system to find a balance between these two rates is a matter of fine-tuning. Before delving deeper into the significance of FRR, it’s important to address the disproportionate focus on FAR.

FAR is generally calculated by gathering biometric data from a large pool of individuals, then randomly selecting target individuals and comparing them to the rest of the database. This practice has resulted in the development of extensive datasets of fingerprints, irises, faces, and other biometric features, some of which are publicly available. Minimizing FAR while considering its trade-off with FRR is the focus of most research in the biometric fields, leading to competitions organized by NIST and other agencies to compare different solutions.

When the dataset is very clean (e.g., good lighting for face recognition, low noise for voice, clear fingerprints), it provides an indication of the inherent uniqueness of the biometric. Fingerprints, for instance, possess a relatively high inherent uniqueness, which partly explains their widespread use in law enforcement. Yet, this high uniqueness can be counteracted by other factors within the overall system.

The selection of data used to report a system’s performance is largely subjective, except in public competitions. It requires an evaluation of the range and frequency of conditions under which the biometric system will be used.

Furthermore, for most industry products, it’s nearly impossible to challenge the claimed accuracies through simple “black box” testing—claims of a 1 in 100,000 FAR cannot be verified by having a few colleagues attempt to access your phone. Consequently, when biometric systems are deployed in the real world, they are often evaluated directly (e.g., by bloggers) and indirectly (e.g., by non-adoption) based on other criteria.

The Importance of False Rejects

The false reject rate (FRR) is crucial for user adoption of a biometric system. No matter how secure the system is against unauthorized access, it will only be widely used if authorized users can access it successfully most of the time.

The FRR should always be reported alongside the FAR; otherwise, the FAR loses its relevance—it’s not impressive to design a system that rejects everyone, including authorized users. Surprisingly, it’s common to see only FAR reported, not just in company literature but also in media articles.

Like FAR, determining the FRR of a system is highly subjective and depends on the data selected to represent the conditions under which authentication attempts will occur.

There are several standard methods for evaluating the combination of FAR and FRR for a given system. Detection Error Tradeoff (DET) curves plot FRR against FAR, generated by gradually increasing the rejection threshold (see Figure 1 for an example of a DET plot for face recognition).

At lower rejection thresholds, the detection rate (allowing authorized users access) is higher (lower FRR), but the FAR may be relatively high.

Figure 1: Typical DET plot for face recognition

As the rejection threshold increases (becoming more restrictive), false accepts decrease, but at the cost of a lower detection rate (higher FRR). Other variations of this type of plot include ROC (Receiver Operating Characteristic) curves.

A commonly used metric from the DET curve is the Equal Error Rate (EER), the point where FAR and FRR are equal.

While EER can sometimes provide a quick comparison point, it should not be the sole metric for comparing different biometric systems for several reasons. First, the EER often does not reflect the operating point at which the system is intended to function—systems are typically tuned to operate at lower FARs. Second, EER does not capture the other critical information necessary for a more holistic approach as advocated in this article.

FAR and FRR, as described, are laboratory measures of a biometric system’s accuracy. What truly matters to users is the real-world likelihood of successful access and the effectiveness of thwarting impostor attacks.

Assessing the True Rate of False Accepts

Biometric systems are typically designed to have very low FARs. Therefore, a straightforward false accept attack, where random individuals attempt to authenticate using the biometric feature of an authorized user, is unlikely to succeed—a single impostor has a low probability of matching.

That single impostor is also unlikely to have thousands of impostor friends to increase the attack’s probability. Additionally, most systems implement limits (such as the number of attempts or timeouts) that make it practically impossible to attempt thousands of tries.

Four-digit PINs operate on a similar principle—there are 10,000 combinations, making it theoretically unlikely for an impostor to guess the correct one quickly. In practice, however, a few commonly used PINs increase the likelihood of a successful attack beyond the theoretical 1 in 10,000.

Spoofing as a Key Concern

A more sophisticated impostor attack involves spoofing, where the attacker directly mimics the biometric feature of the authorized user. This is a likely method used by criminals to access someone’s device. The specific spoofing technique varies by biometric. For instance, fingerprints can be lifted from device screens and recreated using materials like glue, gelatin, or Play-Doh. Face and iris recognition can be fooled by images, while voice recognition is susceptible to recordings.

A primary defense against spoofing is “liveness” testing, which varies by biometric. For face recognition, motion can be measured to confirm a 3-dimensional face. The challenge-response approach is also common—asking the user to perform a specific action to verify they are a live person, such as winking or speaking a particular phrase.

The downside of a challenge-response system is that it can become cumbersome, potentially reducing user adoption. Many users may feel uncomfortable winking at their device in public to gain access.

Another defense strategy is to require multiple biometrics, which increases the challenge for attackers by necessitating multiple spoofing methods. The downside is that it can be more burdensome for users, requiring multiple biometric verifications for each authentication.

Each spoofing method has its pros and cons, including the availability of the biometric (e.g., fingerprints are left everywhere), the required fidelity (e.g., the quality of a voice recording), the effort needed to create a spoof (e.g., printing a face or iris image), and the likelihood of a successful counterattack (e.g., effectiveness of liveness tests).

jQuery瀑布流插件Grid-A-Licious jQuery瀑布流插件Grid-A-Licious

jQuery瀑布流插件Grid-A-Licious是一款简单易用的jQuery插件,可用于创建响应式瀑布流布局,针对不同设备可自动适应宽度。

jQuery瀑布流插件Grid-A-Licious 81 查看详情 jQuery瀑布流插件Grid-A-Licious

All these factors contribute to the actual likelihood of a successful impostor attack. Importantly, these should be directly considered in the overall assessment of the biometric system and are often more relevant than the basic FAR typically cited.

This aspect is often overlooked by biometric system manufacturers but quickly noticed by the media, as seen with fingerprint sensors in Apple and Samsung phones, which were soon followed by reports of spoof attacks that allowed unauthorized access.

Assessing the True Rate of False Rejects

The measured false reject rate heavily depends on the data chosen to represent typical system usage. Unfortunately, this often fails to account for the broader range of real-world conditions. Every biometric has scenarios where authentication can be challenging or impossible.

For fingerprints, dirt and grease can significantly impact system accuracy. Lighting conditions can challenge face or other camera-based biometrics. Background noise complicates voice recognition. Measuring and reporting performance under ideal conditions that don’t reflect real-world scenarios creates unrealistic expectations and leads to disappointment when the system underperforms.

For many biometric systems, initial enrollment is critical to performance. A poorly executed or incorrect enrollment can lead to poor results, even if the system is capable of high accuracy. Ensuring the enrollment process is as simple and intuitive as possible is essential.

Some biometrics benefit from adaptive enrollment, where the user’s profile can improve over time. This can significantly enhance accuracy by expanding the range of covered environments and mitigating initial enrollment flaws.

The degree to which a biometric changes over time (known as permanence) strongly affects the true false reject rate. As users age, their biometric identity can change. Like environmental and enrollment concerns, this can be addressed through adaptive enrollment when possible. Universality is also crucial—does everyone possess this biometric trait? Fingerprints can be lost over time for people in occupations involving heavy hand use, and certain eye diseases can impair iris recognition.

Thus, the true FRR of a biometric system should account for the full range and expected frequency of environmental conditions, the range of possible enrollment quality, and the permanence and universality of the trait.

Factors Affecting User Adoption

Beyond the inherent accuracy of the biometric system, other factors influence user adoption and should be considered in any assessment. Acceptability and ease-of-use are two critical factors.

Acceptability measures whether users will be willing to use the biometric. If it’s embarrassing or invasive, users are unlikely to adopt it.

The required level of acceptability may vary by application—for example, accessing a phone in public requires a minimally invasive system, while boarding an airplane might warrant a more complex process.

Ease-of-use, along with speed, is crucial for areas where biometrics are expanding today. Mobile devices are convenience tools, and users will not adopt systems that complicate their use. This is evident in the low usage rates of basic phone protection with PINs, patterns, or passwords, which many find cumbersome and slow. Widespread biometric use will only happen if it’s fast and easy, including both the initial setup and daily use.

Cost and Security

Cost is a significant factor in consumer devices. Adding biometric-specific sensors can substantially increase the retail price. As a result, fingerprint sensors in mobile devices are typically found only in high-end phones and are of lower quality than dedicated fingerprint systems. They are also smaller and capture less of the fingerprint, leading to lower overall accuracy. Sensor longevity also impacts cost considerations.

Data security is crucial for creating a viable biometric solution and depends on the specific biometric used. A key difference among solutions is whether cloud access is required. Cloud-based biometrics can leverage greater computing power, potentially increasing accuracy, but at the cost of connectivity requirements, time delays, and data security concerns. Storing biometric information for many users in the cloud presents an attractive target for hackers.

In the case of biometric theft, revocability is necessary. Just as one can change a password after an account is compromised, some biometrics allow for replacement. Voice recognition, for instance, can easily change the passphrase. Unfortunately, most biometrics do not facilitate easy replacement.

Finding the Right Applications

The concepts discussed in this holistic approach to biometric system assessment—including spoofing, permanence, universality, acceptability, and revocability—are well-known within the biometric research community and industry. However, they are often downplayed in corporate literature and media coverage and are not easily understood by end users.

If these issues are addressed, it is typically in the form of a table with simplistic relative rankings like Low, Medium, and High, with little or no explanation of how those values were determined. These factors should be considered explicitly and quantitatively from the outset.

With a better understanding of the real advantages and disadvantages of a specific biometric system, one can then evaluate the appropriate applications for that system. While high-security applications like banking are often the focus, there are applications across the spectrum of security needs. In all cases, it’s important to consider what is currently in use and whether a biometric system adds value, rather than waiting for the perfect biometric system to emerge.

The PIN option for locking a phone provides a good example—it’s rarely used and often one of a few common PINs. Replacing the PIN with a relatively tolerant, easy-to-use biometric can significantly enhance security in this context.

Another example is using biometrics as a second factor, which can provide much greater security without being entirely dependent on the biometric itself. In scenarios requiring high security, it may be acceptable to limit the biometric’s use to favorable environmental conditions to achieve high accuracy.

It is crucial that the biometric industry drives the conversation toward the actual utility that a biometric system provides and helps set realistic expectations by presenting a holistic framework that fairly represents real-world operations.

About the Authors

Gordon Haupt has nearly 20 years of experience building and leading diverse engineering and operations teams. With a strong background in signal processing and computer vision, he has developed numerous innovative technology products. Gordon is the Senior Director of Vision Technologies at Sensory, focusing on bringing speech and face biometrics to consumer devices.

Todd Mozer has over 20 years of experience in machine learning, speech, and vision and holds dozens of patents in these and related fields. He is the Founder, Chairman, and CEO of Sensory.

Sensory is a leader in speech and vision technology for consumer products. Its award-winning TrulyHandsfree™ technology offers consumers a voice-controlled, completely hands-free experience, found in various popular mobile devices. Sensory has recently introduced its TrulySecure™ technology, which combines face recognition and speaker verification. More information is available at https://www.php.cn/link/530f49aa780e4bb3a605e586094008e7.

以上就是Assessing Biometric Authentication -A Holistic Approach的详细内容,更多请关注创想鸟其它相关文章!

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。
如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 chuangxiangniao@163.com 举报,一经查实,本站将立刻删除。
发布者:程序猿,转转请注明出处:https://www.chuangxiangniao.com/p/470436.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2025年11月8日 07:19:58
下一篇 2025年11月8日 07:20:50

相关推荐

  • Uniapp 中如何不拉伸不裁剪地展示图片?

    灵活展示图片:如何不拉伸不裁剪 在界面设计中,常常需要以原尺寸展示用户上传的图片。本文将介绍一种在 uniapp 框架中实现该功能的简单方法。 对于不同尺寸的图片,可以采用以下处理方式: 极端宽高比:撑满屏幕宽度或高度,再等比缩放居中。非极端宽高比:居中显示,若能撑满则撑满。 然而,如果需要不拉伸不…

    2025年12月24日
    400
  • 如何让小说网站控制台显示乱码,同时网页内容正常显示?

    如何在不影响用户界面的情况下实现控制台乱码? 当在小说网站上下载小说时,大家可能会遇到一个问题:网站上的文本在网页内正常显示,但是在控制台中却是乱码。如何实现此类操作,从而在不影响用户界面(UI)的情况下保持控制台乱码呢? 答案在于使用自定义字体。网站可以通过在服务器端配置自定义字体,并通过在客户端…

    2025年12月24日
    800
  • 如何在地图上轻松创建气泡信息框?

    地图上气泡信息框的巧妙生成 地图上气泡信息框是一种常用的交互功能,它简便易用,能够为用户提供额外信息。本文将探讨如何借助地图库的功能轻松创建这一功能。 利用地图库的原生功能 大多数地图库,如高德地图,都提供了现成的信息窗体和右键菜单功能。这些功能可以通过以下途径实现: 高德地图 JS API 参考文…

    2025年12月24日
    400
  • 如何使用 scroll-behavior 属性实现元素scrollLeft变化时的平滑动画?

    如何实现元素scrollleft变化时的平滑动画效果? 在许多网页应用中,滚动容器的水平滚动条(scrollleft)需要频繁使用。为了让滚动动作更加自然,你希望给scrollleft的变化添加动画效果。 解决方案:scroll-behavior 属性 要实现scrollleft变化时的平滑动画效果…

    2025年12月24日
    000
  • 如何为滚动元素添加平滑过渡,使滚动条滑动时更自然流畅?

    给滚动元素平滑过渡 如何在滚动条属性(scrollleft)发生改变时为元素添加平滑的过渡效果? 解决方案:scroll-behavior 属性 为滚动容器设置 scroll-behavior 属性可以实现平滑滚动。 html 代码: click the button to slide right!…

    2025年12月24日
    500
  • 如何选择元素个数不固定的指定类名子元素?

    灵活选择元素个数不固定的指定类名子元素 在网页布局中,有时需要选择特定类名的子元素,但这些元素的数量并不固定。例如,下面这段 html 代码中,activebar 和 item 元素的数量均不固定: *n *n 如果需要选择第一个 item元素,可以使用 css 选择器 :nth-child()。该…

    2025年12月24日
    200
  • 使用 SVG 如何实现自定义宽度、间距和半径的虚线边框?

    使用 svg 实现自定义虚线边框 如何实现一个具有自定义宽度、间距和半径的虚线边框是一个常见的前端开发问题。传统的解决方案通常涉及使用 border-image 引入切片图片,但是这种方法存在引入外部资源、性能低下的缺点。 为了避免上述问题,可以使用 svg(可缩放矢量图形)来创建纯代码实现。一种方…

    2025年12月24日
    100
  • 旋转长方形后,如何计算其相对于画布左上角的轴距?

    绘制长方形并旋转,计算旋转后轴距 在拥有 1920×1080 画布中,放置一个宽高为 200×20 的长方形,其坐标位于 (100, 100)。当以任意角度旋转长方形时,如何计算它相对于画布左上角的 x、y 轴距? 以下代码提供了一个计算旋转后长方形轴距的解决方案: const x = 200;co…

    2025年12月24日
    000
  • 旋转长方形后,如何计算它与画布左上角的xy轴距?

    旋转后长方形在画布上的xy轴距计算 在画布中添加一个长方形,并将其旋转任意角度,如何计算旋转后的长方形与画布左上角之间的xy轴距? 问题分解: 要计算旋转后长方形的xy轴距,需要考虑旋转对长方形宽高和位置的影响。首先,旋转会改变长方形的长和宽,其次,旋转会改变长方形的中心点位置。 求解方法: 计算旋…

    2025年12月24日
    000
  • 旋转长方形后如何计算其在画布上的轴距?

    旋转长方形后计算轴距 假设长方形的宽、高分别为 200 和 20,初始坐标为 (100, 100),我们将它旋转一个任意角度。根据旋转矩阵公式,旋转后的新坐标 (x’, y’) 可以通过以下公式计算: x’ = x * cos(θ) – y * sin(θ)y’ = x * …

    2025年12月24日
    000
  • 如何让“元素跟随文本高度,而不是撑高父容器?

    如何让 元素跟随文本高度,而不是撑高父容器 在页面布局中,经常遇到父容器高度被子元素撑开的问题。在图例所示的案例中,父容器被较高的图片撑开,而文本的高度没有被考虑。本问答将提供纯css解决方案,让图片跟随文本高度,确保父容器的高度不会被图片影响。 解决方法 为了解决这个问题,需要将图片从文档流中脱离…

    2025年12月24日
    000
  • 如何计算旋转后长方形在画布上的轴距?

    旋转后长方形与画布轴距计算 在给定的画布中,有一个长方形,在随机旋转一定角度后,如何计算其在画布上的轴距,即距离左上角的距离? 以下提供一种计算长方形相对于画布左上角的新轴距的方法: const x = 200; // 初始 x 坐标const y = 90; // 初始 y 坐标const w =…

    2025年12月24日
    200
  • CSS元素设置em和transition后,为何载入页面无放大效果?

    css元素设置em和transition后,为何载入无放大效果 很多开发者在设置了em和transition后,却发现元素载入页面时无放大效果。本文将解答这一问题。 原问题:在视频演示中,将元素设置如下,载入页面会有放大效果。然而,在个人尝试中,并未出现该效果。这是由于macos和windows系统…

    2025年12月24日
    200
  • 为什么 CSS mask 属性未请求指定图片?

    解决 css mask 属性未请求图片的问题 在使用 css mask 属性时,指定了图片地址,但网络面板显示未请求获取该图片,这可能是由于浏览器兼容性问题造成的。 问题 如下代码所示: 立即学习“前端免费学习笔记(深入)”; icon [data-icon=”cloud”] { –icon-cl…

    2025年12月24日
    200
  • 如何利用 CSS 选中激活标签并影响相邻元素的样式?

    如何利用 css 选中激活标签并影响相邻元素? 为了实现激活标签影响相邻元素的样式需求,可以通过 :has 选择器来实现。以下是如何具体操作: 对于激活标签相邻后的元素,可以在 css 中使用以下代码进行设置: li:has(+li.active) { border-radius: 0 0 10px…

    2025年12月24日
    100
  • 如何模拟Windows 10 设置界面中的鼠标悬浮放大效果?

    win10设置界面的鼠标移动显示周边的样式(探照灯效果)的实现方式 在windows设置界面的鼠标悬浮效果中,光标周围会显示一个放大区域。在前端开发中,可以通过多种方式实现类似的效果。 使用css 使用css的transform和box-shadow属性。通过将transform: scale(1.…

    2025年12月24日
    200
  • 如何计算旋转后的长方形在画布上的 XY 轴距?

    旋转长方形后计算其画布xy轴距 在创建的画布上添加了一个长方形,并提供其宽、高和初始坐标。为了视觉化旋转效果,还提供了一些旋转特定角度后的图片。 问题是如何计算任意角度旋转后,这个长方形的xy轴距。这涉及到使用三角学来计算旋转后的坐标。 以下是一个 javascript 代码示例,用于计算旋转后长方…

    2025年12月24日
    000
  • 为什么我的 Safari 自定义样式表在百度页面上失效了?

    为什么在 Safari 中自定义样式表未能正常工作? 在 Safari 的偏好设置中设置自定义样式表后,您对其进行测试却发现效果不同。在您自己的网页中,样式有效,而在百度页面中却失效。 造成这种情况的原因是,第一个访问的项目使用了文件协议,可以访问本地目录中的图片文件。而第二个访问的百度使用了 ht…

    2025年12月24日
    000
  • 如何用前端实现 Windows 10 设置界面的鼠标移动探照灯效果?

    如何在前端实现 Windows 10 设置界面中的鼠标移动探照灯效果 想要在前端开发中实现 Windows 10 设置界面中类似的鼠标移动探照灯效果,可以通过以下途径: CSS 解决方案 DEMO 1: Windows 10 网格悬停效果:https://codepen.io/tr4553r7/pe…

    2025年12月24日
    000
  • 使用CSS mask属性指定图片URL时,为什么浏览器无法加载图片?

    css mask属性未能加载图片的解决方法 使用css mask属性指定图片url时,如示例中所示: mask: url(“https://api.iconify.design/mdi:apple-icloud.svg”) center / contain no-repeat; 但是,在网络面板中却…

    2025年12月24日
    000

发表回复

登录后才能评论
关注微信