FB pixel

Glossary of Biometric Terms and Technique Classifications

 

BiometricUpdate.com has developed a fully cross-referenced glossary of technical terms concerning biometric technology. We understand that the language of biometrics can be quite complex and confusing. Below are some commonly used terms and their meanings. This glossary is developed to provide an accurate understanding of biometric technology and will be constantly updated for your convenience.

Active Impostor Acceptance– when an access control system incorrectly recognizes and accepts a biometric sample which has been altered, modified, or cloned.

Algorithm– a sequence of instructions that instructs a biometric system on how to solve a problem. It could have a finite number of steps in the instruction to use in computing whether the sample and the template are matched.

Application Program Interface (API)– a set of protocols use to standardize an application by a developer. For example, an API may be added or interchanged by an application developer into any biometric system.

Application Developer– an application programmer or manufacturer that develops and applies any software

Artificial Neural Network– an artificial intelligence system which allows learning to take place in the system. it may use past experiences and compute whether a biometric sample is a match with a template

ASIC or Application Specified Integrated Circuit-a silicon chip for a biometric system which is specifically produced to enhance performance

Attempt– the moment a biometric sample is being submitted for verification. An “attempt” may happen more than once in cases where it is denied or rejected.

Authentication– biometric data is considered to be correct and valid. “Validation” is the preferred term.

Behavioral Biometric– pattern of biometrics that is established after a given amount of time. It is not necessarily a physiological trait.

Biometric– a physical trait or pattern which is unique to every individual. It often used to verify and authenticate a person’s identity who is enrolled into a system. Biometric patterns can be anything from fingerprints, iris scans, facial recognition or even voice recognition.

Biometric Application– the implementation of any system that involves biometric data.

Biometric data– a sample taken from individual which is unique to their own person. Common biometric data are: fingerprint, voice and iris scans, palm vein patterns and even facial patterns.

Biometric Engine– the portion of the biometric software system that processes the gathered data. It can start to operate from the data capture, extraction, comparison down to the matching.

Biometric Identification Device– gathers, reads an compares biometric data. Biometric System is the term more often use.
Biometric Sample Data- the data captured by a system collected from a person of interest or a user.

Biometric System– an automated system which:

1. Collects or captures biometric data via a scanner
2. Extracts the data from the actual submitted sample
3. Compares the scanned data from those capture for reference
4. Matching the submitted sample with the templates
5. Determining or verifying whether the identity of the biometric data holder is authentic.

Biometric Taxonomy– a method of classification using gathered biometric data. It can also be the classification of biometric data according to their use in a given system such as:

• Cooperative versus Non-cooperative User
• Overt vs. Covert Biometric System
• Habituated vs. Non-habituated user
• Supervised vs. unsupervised User
• Standard Environment vs. Non-standard Environment

Biometric Technology– A system or application which is designed to employ biometric data. It can also be classified further according to the type of biometrics being used in the system.

Capture– the process of collecting biometric data from the end user or enrollee. Most biometric ata are “capture” by use of an image scanner in cases of fingerprints, palm vein patterns or a camera to collect facial an iris scans.

Certification– testing gathered biometric data against a system or software to verify its ability to perform. The application will be then tested according to set standards for certification. Testing organizations are the ones that issue certifications.

Comparison– comparing a biometric sample with previously gathered samples or against a template or templates for verification of the identity

Claimed Identity– a biometric sample of an enrolled user of the system

Claimant– person who submits his biometric sample for identity verification. Claimants may either have true or false identities.

Closed Set Identification-users need to be enrolled into a biometric system and verified for access to be granted

CMOS or Complementary Metal Oxide Semiconductor-a kind of circuit (integrated) used by some biometric systems due to its low power consumption

D Prime– statistical measure which grades the ability of a system to distinguish between biometric samples or individuals. The higher D prime number means that the system is more capable of distinguishing between samples.

Degrees of Freedom– the number of independent features in a biometric system

Encryption-the conversion of any biometric data into a code which cannot be easily read. A password may be used to decrypt or decode the data

End User– an enrolled or about to enroll individual who has his biometric data submitted for verification

End User Adaptation-users of a biometric system are able to adjust accordingly to it after being familiar with the test

Enroll-the user who has their biometric template entered into the system

Enrolment-gathering and processing of biometric data with the intent of storing them into a database

Enrollment Time-time spent the moment biometric data is collected and successfully processed

Equal Error Rate– the rate in which the rate of false rejection is almost equal to the rate of false acceptance

Extraction– the moment a biometric sample is converted into data after which it compared to a biometric template.

Failure to Acquire– a biometric system fails to capture, extract and store the ata

Failure to Acquire rate-the number of times that a failure to acquire occurs

False Acceptance– the biometric system accepts either a false identity or incorrectly identifies a wrong identity against a claimed one

False Match Rate-the moment a match between enrollee and submitted data is done which in turn results to a rejection

False Rejection– occurs when an enrolled identity is rejected by the system or when it fails to verify a legitimate identity

False Rejection Rate– the probability that a biometric system will fail to identify a legitimate identity

The equation is:

FRR=NFR/NEIA or FRR=NFR/NEVA

• FRR is the false rejection rate
• NFR- number of false rejections
• NEIA number of enrollee identification attempts
• NEVA-number of enrollee verification attempts

Field Test– a sample trial done in the outside or Real world

Goats Biometric System– pattern of activity done by system end-users which varies beyond the specified range allowed. Consequently, it may be rejected by the system.

Hamming Distance-a measure of dissimilarity. It is actually the disagreeing bits between two binary vectors.

Identification or Identity– biometric sample which is matched against templates and other biometric references

Impostor– a person who poses as a verified user by submitting his own biometric sample

In House Test– series of testing done in a closed facility or laboratory. It may or may not involve the use of external participants or subjects.

Live Capture– the actual process of gathering biometric sample from a live user using a biometric system

Match or Matching– the process of matching a template versus a submitted biometric sample. It is then rejected or accepted based on the whether the score has met the threshold or not.

Open- Set Identification– identifying users who are not enrolled in the system. Opposite of closed set identification

Original Equipment Manufacturer or Module-an organization which assembles a biometric system from different parts or an independent module which can be integrated into a biometric system

Passive Impostor Acceptance– when an impostor’s submitted sample is verified and accepted by the system.

Personal Identification Number (PIN)-usually a four digit number is entered into a system to gain access

Performance criteria– a set of standards or criteria which is used to evaluate the performance of the system

Physiological or Physical Biometric– a physical characteristic used as biometric data. This includes: fingerprints, face recognition, ear shape, iris recognition, palm and retina scans.

Receiver Operating curves– a graph showing how the false rejection and false acceptance rates varies with one another

Recognition– widely use term is identification

Response Time– the amount of time in which a biometric system analyzes a sample and returns with a decision

Template or Reference Template Data– a biometric measurement which is used to verify succeeding biometric data

Third Party Test-a test done by an independent party in a controlled environment

Threshold or Decision Threshold– acceptance level of any given biometric system. it may be tightened or widened accordingly to make the system meet certain requirements. If the data falls above or below the threshold, it is rejected. If the sample falls within the acceptable range it is accepted.

Throughput Rate– the number of users a biometric system can successfully process within a given time

Type 1 error– See “false rejection”

Type 2 Error– See “false acceptance”

User– the client of any biometric vendor. Essentially, they are the clients that purchase the technology but may or may not enroll themselves into the system. End-users are those who enroll their biometric data into the system.

Validation-the process of comparing a biometric sample with the biometric data in the system whose identity is claimed

Wavelet Transform/Scalar quantization or WSQ-a compression algorithm used to compress used to reduce the size of reference templates

Zero Effort Forgery-an impostor uses the actual biometric sample of an enrolled user

Biometric Technology terms and technique classifications:

1. AFIS or Automated Fingerprint– a database of fingerprints used by law enforcement agencies. However, some civil or government agencies may also use the same database to verify identities.

Binning is one method of classification being used in some AFIS systems. Physical characteristics of the fingerprints such as loops, arches and whorls are further classified and stored in “Bins” according to their category. This method is used to make searches faster with a high egree of reliability.

2. Body Odor-a smell given off by the human body which is biometrically analyzed.

3. DNA– a human gene chain which is unique to every individual. Due to many underlying issues, the technology is not yet automatic and does not rank well alongside other biometric technologies

4. Ear Shape-biometrics of the ears

5. Face Recognition– facial features are analyzed and gathered as biometric data

Eigen Face– a method that represents the human face as a linear deviation from an average or mean face

Eigen Head– a 3d version of the Eigen Face

Face Monitoring– used for checking the attendance of a user t a desktop, it applies facial recognition technology.

Facial thermogram– detects and scans the heat signature from the face

6. Finger Image– takes the a scan of the patterns found at the tip of the finger.

Auto Correlation– two identical finger patterns are overlaid to create a Moire fringe.

Bifurcation-a branch mae by more than one finger image ridge.

Capacitance-a finger image capture technique that detects an electrical charge.

7. Finger Geometry– analyzes the shape of one or more fingers

8. Hand geometry or Hand recognition– analyzes and measures the shape of the hand

9. Iris Recognition– a biometric system that reads and scans iris features which is the colored ring the surrounds the pupil

10. Keystroke Dynamics– the typing rhythm of the end user is analyzed and gathered as behavioral biometric data

11. Palm– a biometric analysis of the palm of the hand

12. Retina– a biometric analysis of the blood vessels at the back of the eye

13. Signature verification– a behavioral biometric that analyses a signature made by the end user. Another signature verification may also analyze the speed, velocity and pressure exerted by the end user when signing his name and not just the image made.

14. Speaker Verification– a speech pattern analysis of a behavioral biometric.

Subsystems in this category are:

• Fixed text system
• Free text system
Speaker Dependent-is able to distinguish between voices
Speaker Separation– a system which is able to differentiate between voices and blot out background noise
Speech Recognition-recognizes the words but not the speaker
Speaker Verification Application Program Interface-API for speaker verification systems
Text Dependent System-requires a speaker to say a specific set of words
Text Independent System-creates voiceprints from unrestricted speech and does need a specific set of words to be spoken

Any terms we have missed? Contact us and make a suggestion.

Article Topics

Latest Biometrics News

 

Biometrics race for the borders

Biometrics to ease border crossings are a major theme of the week among Biometric Update’s most-read articles of the week….

 

US election likely to be a missed opportunity to advance digital ID policy

The 2024 U.S. election represents an opportunity for social dialogue around digital identity policy in the wake of a series…

 

India to pilot Digi Yatra for foreign nationals in 2025

India is planning an international pilot project for June 2025 that will see the introduction of facial recognition technology beyond…

 

Papua New Guinea advances digital ID, wallet and govt platform to pilot

Papua New Guinea has stood up a new digital ID, wallet and online government platform, and plans to pilot them…

 

UK police organized crime unit seeks new facial recognition software

The UK’s main law enforcement agency against organized crime is looking into new facial recognition solutions, as the country doubles…

 

The EUDI Wallet was not meant for age assurance: AVPA

The European Union should not look at the EU Digital Identity (EUDI) Wallet as an age-assurance solution to keep minors…

Most Read This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events