pk.org: CS 419/Lecture Notes

Authentication

Biometric Authentication

Paul Krzyzanowski – 2025-09-30

Part 1: Authentication
Part 2: Biometric authentication


Biometrics authenticate a person by measuring physical or behavioral characteristics such as fingerprints, face geometry, iris texture, or voice. Unlike passwords or tokens, biometrics tie an identity to a body or behavior. This improves usability but introduces new risks: bodies change, sensors vary, and privacy rules apply.

Biometric systems are pattern recognizers, not exact match engines. A captured sample will never be identical to the stored sample. Matching is probabilistic and tuned with thresholds. That is the core difference from password checks.

What we wish we could do

if scanned_fingerprint == stored_fingerprint: accept
else: reject

What real systems do

if distance(scanned, stored) <= threshold: accept
else: reject

Choosing that threshold is the main design decision in biometric authentication.

Measuring performance: FAR, FRR, EER, ROC

The quality of a biometric system is not measured by whether it matches or fails but by how often it makes mistakes. Since matching is probabilistic, the same sample might be accepted one time and rejected the next, depending on threshold settings.

False Accept Rate (FAR)
Probability that the system accepts an impostor (incorrect acceptance).

False Reject Rate (FRR)
Probability that the system rejects a genuine user (incorrect rejection).

Tuning the threshold to decrease FAR will generally increase FRR, and vice versa. Plotting FRR against FAR as you vary the threshold gives a Receiver Operating Characteristic (ROC) curve. The Equal Error Rate (EER) is the point where FAR = FRR; it’s a common single-number summary, but deployments should choose an operating point appropriate to the risk. A consumer phone unlock can tolerate more false rejects than a payment or admin-login workflow.

Modalities

Biometric authentication can be based on physical traits of the body or on measurable patterns of behavior. These are usually grouped into two families, each with different trade-offs in reliability, user acceptance, and distinctiveness.

A rough comparison (typical, not universal):

Modality Robustness (repeatability) Distinctiveness Ease of use User acceptance
Fingerprint Moderate High Medium Medium
Face Moderate High High High
Hand geometry Moderate Low Medium Medium
Voice Moderate Low High High
Iris High Ultra-high Medium Medium
Retina High Ultra-high Low Low
Signature Low Moderate Low High

Fingerprint vs. iris example
High-end fingerprint systems typically compare tens of salient features (minutiae). Iris systems extract hundreds of features from the iris texture. In practice, that often translates into lower FAR for iris under comparable conditions. Face is attractive for usability but harder to secure against presentation attacks unless depth sensing, IR illumination, and robust liveness checks are used.

How fingerprint matching works (example)

Fingerprint recognition is a good case study because it is the most widely deployed biometric. A scanner captures a gray-scale ridge pattern. The matcher extracts minutiae (ridge endings, bifurcations, islands, bridges) and compares the relative configuration of these points against the enrolled template. This is not a pixel-by-pixel comparison; it tolerates translation, rotation, partial prints, and noise. Feature selection and quality scoring are critical.

Identification vs. verification

Biometrics can be used in two different ways: to verify a claimed identity or to discover an unknown one. These modes have different accuracy and scalability requirements.

The biometric pipeline

All biometric systems follow the same high-level process from enrollment to decision. Weakness at any stage compromises accuracy.

  1. Enrollment
    Capture several samples to build a high-quality template. Average or select features that are distinctive and stable. Poor enrollment guarantees poor authentication later.

  2. Sensing
    Sensors matter. Illumination, focus, pressure, dryness, and placement affect quality. Environmental control reduces FRR.

  3. Feature extraction
    Signal processing reduces noise and computes features. Templates are typically compact representations of features, not raw images.

  4. Matching
    A distance or similarity score quantifies how close the sample is to the template. You will rarely get a perfect match.

  5. Decision
    Compare the score to the threshold chosen for your application. This is where you trade convenience for security.

Sensor and system requirements

For biometric authentication to be dependable, the hardware and software must resist manipulation and spoofing. A good system combines trustworthy sensors, secure channels, and strong liveness checks.

Attacks and pitfalls

Biometric systems are attractive targets because they secure valuable data and because biometric traits cannot be replaced if compromised. Attacks fall into several broad categories.

Presentation (spoof) attacks
Photos, 2D masks, and simple props have fooled commodity face unlock on many devices. Depth-sensing and IR can help, but poor liveness settings are exploitable. Public demos have also shown 3D-printed fingerprints fooling certain phone sensors, and printed eyes with contact lenses defeating weak iris liveness. Voice systems are now attacked with AI-generated deepfakes, drastically raising the bar for anti-spoofing.

Sensor/link tampering
Replacing the sensor stream or injecting pre-recorded data at the host interface can bypass liveness if the link is not authenticated and encrypted.

Template theft and privacy
A breach of stored biometric templates is worse than a password leak because you cannot change your eyes or fingerprints. Store templates, not raw images; match in a secure enclave when possible; and ensure templates are useless off-device (see “Template protection” below). Sensitive databases (e.g., national ID) have seen exposures; liveness and stronger operational controls were introduced in response.

Coercion and physical harm
Biometrics can be obtained by force. There have been reported cases where attackers used a victim’s finger to unlock a car and, in an extreme incident, severed the tip. Consider an emergency lockout or attention checks (“eyes open” gating) for device unlock.

Bias and accessibility
Lighting, skin tone, age, injury, and disability can affect capture and matching. Evaluate performance across demographics and provide alternative factors.

Template protection: you cannot “hash and compare”

Passwords can be stored as salted hashes because equality is exact. Biometric matching is fuzzy, which makes storage trickier. Templates must be protected differently.

Limitations and Role in Multi-Factor Authentication

Passwords can be compartmentalized: you can use different ones for each service and change them if they are compromised. Biometrics cannot. Your fingerprint, face, or iris is the same across every service, and once a copy is stolen it cannot be replaced. This creates two structural problems:

Because of these limitations, biometrics should rarely stand alone as the sole factor for protecting valuable data. They are most effective as part of multi-factor authentication (MFA). In MFA, a biometric (“something you are”) complements a password (“something you know”) or a device (“something you have”). This restores some of the compartmentalization and recovery that biometrics lack by themselves.

Examples

Biometrics provide convenience and presence detection but lack revocability and compartmentalization. They are best deployed as one factor in a layered system, where they unlock or supplement stronger, replaceable credentials.

Choosing and tuning an operating point

The same biometric system can behave very differently depending on how thresholds are set. The right choice depends on the value of what you are protecting.

Practical notes on specific modalities

Each biometric trait has its own strengths and weaknesses. Here are the most common ones.

Fingerprint
Common, inexpensive sensors. Vulnerable to dry skin, smudges, and presentation attacks if liveness is weak. Good for verification; large-scale search requires careful normalization and indexing.

Face
Convenient, hands-free, and familiar. Security depends heavily on depth/IR sensing and liveness. Systems that unlock on eyes closed or accept 2D photos should not gate high-value actions.

Iris
Very distinctive patterns with many features. Capture requires controlled illumination (near-IR) and cooperation. Strong for verification; identification is efficient if images are normalized consistently.

Voice
Attractive for phone-based services but now heavily attacked with deepfakes. Strong liveness and challenge prompts are essential; avoid voice as a sole factor for high-risk actions.

Behavioral signals
Gait, typing rhythms, and gestures can add continuous authentication but should not be sole factors.

When to use biometrics

Biometrics can be valuable for convenience and continuous verification, but they must be integrated carefully into broader authentication strategies.

Before deploying a biometric system, organizations should validate sensors, policies, and safeguards.

Example: smartphone unlock policy

Smartphones are the most common consumer application of biometrics. Their design shows how thresholds, liveness, and fallback policies fit together.

  1. Enrollment: capture several face images with and without glasses; run quality checks.

  2. Sensor: structured light or IR depth camera; authenticated link to secure enclave.

  3. Liveness: eye-gaze or blink prompt, micro-texture analysis, anti-photo and anti-mask checks.

  4. Matching: choose an operating point with FRR ≈ 1–2% and FAR ≪ 1e−5 for unlock; lower FAR for payments.

  5. Decisions:

  6. Unlock allowed with biometric when context is normal.

  7. Payment or password manager requires biometric plus PIN/passkey.

  8. If liveness fails or sensor quality is low, fall back to PIN.

  9. Privacy: templates stored in secure enclave; never uploaded; auto-delete after N failed enrollments or device reset.

Conclusion

Closing thoughts

Biometrics add convenience and can strengthen authentication by tying access to a person, not just a secret. But they also have structural weaknesses: they cannot be compartmentalized across services and cannot be changed if copied. That makes them poor choices as the only barrier to valuable data.

The safe way to use biometrics is as one factor in multi-factor authentication. A fingerprint, face, or iris scan can confirm the user’s presence, but it should work alongside replaceable secrets such as passwords, tokens, or one-time codes. This way, biometrics provide usability while other factors provide revocability and compartmentalization.

Treat biometric data as sensitive personal information, secure it carefully, and always combine it with complementary factors. Biometrics are not a replacement for strong authentication—they are a useful supplement.