Part 1: Authentication
Part 2: Biometric authentication
Biometrics authenticate a person by measuring physical or behavioral characteristics such as fingerprints, face geometry, iris texture, or voice. Unlike passwords or tokens, biometrics tie an identity to a body or behavior. This improves usability but introduces new risks: bodies change, sensors vary, and privacy rules apply.
Biometric systems are pattern recognizers, not exact match engines. A captured sample will never be identical to the stored sample. Matching is probabilistic and tuned with thresholds. That is the core difference from password checks.
What we wish we could do
if scanned_fingerprint == stored_fingerprint: accept
else: reject
What real systems do
if distance(scanned, stored) <= threshold: accept
else: reject
Choosing that threshold is the main design decision in biometric authentication.
Measuring performance: FAR, FRR, EER, ROC
The quality of a biometric system is not measured by whether it matches or fails but by how often it makes mistakes. Since matching is probabilistic, the same sample might be accepted one time and rejected the next, depending on threshold settings.
False Accept Rate (FAR)
Probability that the system accepts an impostor (incorrect acceptance).
False Reject Rate (FRR)
Probability that the system rejects a genuine user (incorrect rejection).
Tuning the threshold to decrease FAR will generally increase FRR, and vice versa. Plotting FRR against FAR as you vary the threshold gives a Receiver Operating Characteristic (ROC) curve. The Equal Error Rate (EER) is the point where FAR = FRR; it’s a common single-number summary, but deployments should choose an operating point appropriate to the risk. A consumer phone unlock can tolerate more false rejects than a payment or admin-login workflow.
Modalities
Biometric authentication can be based on physical traits of the body or on measurable patterns of behavior. These are usually grouped into two families, each with different trade-offs in reliability, user acceptance, and distinctiveness.
-
Physiological: fingerprints, iris, retina, face, hand geometry, palm/vein, ear shape, DNA.
-
Behavioral: voice, signature dynamics, typing rhythm, gait, driving or device-usage habits.
A rough comparison (typical, not universal):
Modality | Robustness (repeatability) | Distinctiveness | Ease of use | User acceptance |
---|---|---|---|---|
Fingerprint | Moderate | High | Medium | Medium |
Face | Moderate | High | High | High |
Hand geometry | Moderate | Low | Medium | Medium |
Voice | Moderate | Low | High | High |
Iris | High | Ultra-high | Medium | Medium |
Retina | High | Ultra-high | Low | Low |
Signature | Low | Moderate | Low | High |
Fingerprint vs. iris example
High-end fingerprint systems typically compare tens of salient features (minutiae). Iris systems extract hundreds of features from the iris texture. In practice, that often translates into lower FAR for iris under comparable conditions. Face is attractive for usability but harder to secure against presentation attacks unless depth sensing, IR illumination, and robust liveness checks are used.
How fingerprint matching works (example)
Fingerprint recognition is a good case study because it is the most widely deployed biometric. A scanner captures a gray-scale ridge pattern. The matcher extracts minutiae (ridge endings, bifurcations, islands, bridges) and compares the relative configuration of these points against the enrolled template. This is not a pixel-by-pixel comparison; it tolerates translation, rotation, partial prints, and noise. Feature selection and quality scoring are critical.
Identification vs. verification
Biometrics can be used in two different ways: to verify a claimed identity or to discover an unknown one. These modes have different accuracy and scalability requirements.
-
Verification answers, “Is this Bob?” The user presents an identity (name, user ID, card, or token) and the system performs a 1:1 match (or 1:small set).
-
Identification answers, “Who is this?” The system searches the entire database (1:many). False accepts become more likely as the gallery size grows, so thresholds must be adjusted and search must be engineered carefully (e.g., coarse filters followed by fine matches).
The biometric pipeline
All biometric systems follow the same high-level process from enrollment to decision. Weakness at any stage compromises accuracy.
-
Enrollment
Capture several samples to build a high-quality template. Average or select features that are distinctive and stable. Poor enrollment guarantees poor authentication later. -
Sensing
Sensors matter. Illumination, focus, pressure, dryness, and placement affect quality. Environmental control reduces FRR. -
Feature extraction
Signal processing reduces noise and computes features. Templates are typically compact representations of features, not raw images. -
Matching
A distance or similarity score quantifies how close the sample is to the template. You will rarely get a perfect match. -
Decision
Compare the score to the threshold chosen for your application. This is where you trade convenience for security.
Sensor and system requirements
For biometric authentication to be dependable, the hardware and software must resist manipulation and spoofing. A good system combines trustworthy sensors, secure channels, and strong liveness checks.
-
Trusted sensor with attested firmware and a secure path to the matcher.
-
Liveness detection to reject photos, masks, prosthetics, or replays of stored signals. Techniques include blink/eye-gaze checks, depth/IR sensing, micro-texture analysis, challenge prompts, and spectral cues.
-
Tamper resistance to prevent bus injection or replay between sensor and host.
-
Secure communication between sensor and secure enclave or matcher.
-
Acceptable thresholds tuned per use case; log scores for forensics and tuning.
Attacks and pitfalls
Biometric systems are attractive targets because they secure valuable data and because biometric traits cannot be replaced if compromised. Attacks fall into several broad categories.
Presentation (spoof) attacks
Photos, 2D masks, and simple props have fooled commodity face unlock on many devices. Depth-sensing and IR can help, but poor liveness settings are exploitable. Public demos have also shown 3D-printed fingerprints fooling certain phone sensors, and printed eyes with contact lenses defeating weak iris liveness. Voice systems are now attacked with AI-generated deepfakes, drastically raising the bar for anti-spoofing.
Sensor/link tampering
Replacing the sensor stream or injecting pre-recorded data at the host interface can bypass liveness if the link is not authenticated and encrypted.
Template theft and privacy
A breach of stored biometric templates is worse than a password leak because you cannot change your eyes or fingerprints. Store templates, not raw images; match in a secure enclave when possible; and ensure templates are useless off-device (see “Template protection” below). Sensitive databases (e.g., national ID) have seen exposures; liveness and stronger operational controls were introduced in response.
Coercion and physical harm
Biometrics can be obtained by force. There have been reported cases where attackers used a victim’s finger to unlock a car and, in an extreme incident, severed the tip. Consider an emergency lockout or attention checks (“eyes open” gating) for device unlock.
Bias and accessibility
Lighting, skin tone, age, injury, and disability can affect capture and matching. Evaluate performance across demographics and provide alternative factors.
Template protection: you cannot “hash and compare”
Passwords can be stored as salted hashes because equality is exact. Biometric matching is fuzzy, which makes storage trickier. Templates must be protected differently.
-
Store compact feature templates, not images. Reduce what can leak.
-
Match on secure hardware. Keep templates and matchers inside a secure enclave (hardware coprocessor), secure element, or a FIDO authenticator.
-
Cancelable biometrics. Apply a repeatable transform at enrollment so a stolen template can be invalidated by changing the transform.
-
Helper-data schemes. Use cryptographic helper data that enables reconstruction only when a close sample is present.
-
Encrypt at rest and in transit. Obvious, but many breaches reveal poor hygiene.
-
On-device matching by default. Prefer local device unlock models; avoid shipping templates to remote services unless strictly necessary.
Limitations and Role in Multi-Factor Authentication
Passwords can be compartmentalized: you can use different ones for each service and change them if they are compromised. Biometrics cannot. Your fingerprint, face, or iris is the same across every service, and once a copy is stolen it cannot be replaced. This creates two structural problems:
-
No compartmentalization. A biometric is reused across services. If one service leaks a template, the same biometric can still be recognized elsewhere.
-
No true revocation. Unlike a password, you cannot “reset” your fingerprint or iris. If a template is copied, that biometric trait is compromised permanently.
Because of these limitations, biometrics should rarely stand alone as the sole factor for protecting valuable data. They are most effective as part of multi-factor authentication (MFA). In MFA, a biometric (“something you are”) complements a password (“something you know”) or a device (“something you have”). This restores some of the compartmentalization and recovery that biometrics lack by themselves.
Examples
-
Phone unlock: A fingerprint or face scan lets you unlock your phone, which then uses a stored cryptographic key or code to log into services. The biometric is used only on the device, not sent to the service.
-
Enterprise login: A fingerprint reader can be paired with an ID card. The biometric confirms the person’s presence; the card proves possession.
-
Online accounts: A face or fingerprint can unlock an authenticator app that generates one-time codes. The biometric adds convenience, while the actual authentication relies on revocable secrets.
Biometrics provide convenience and presence detection but lack revocability and compartmentalization. They are best deployed as one factor in a layered system, where they unlock or supplement stronger, replaceable credentials.
Choosing and tuning an operating point
The same biometric system can behave very differently depending on how thresholds are set. The right choice depends on the value of what you are protecting.
-
Consumer unlock (phone/laptop): low FAR and tolerable FRR, with strong liveness. Provide easy fallback (PIN/passcode).
-
Payments, admin access: push FAR even lower. Consider multi-modal biometrics plus a second factor.
-
Large-scale identification (1:many): accept that effective FAR rises with gallery size. Use multi-stage matching and high-quality sensors; log and review edge cases.
Practical notes on specific modalities
Each biometric trait has its own strengths and weaknesses. Here are the most common ones.
Fingerprint
Common, inexpensive sensors. Vulnerable to dry skin, smudges, and presentation attacks if liveness is weak. Good for verification; large-scale search requires careful normalization and indexing.
Face
Convenient, hands-free, and familiar. Security depends heavily on depth/IR sensing and liveness. Systems that unlock on eyes closed or accept 2D photos should not gate high-value actions.
Iris
Very distinctive patterns with many features. Capture requires controlled illumination (near-IR) and cooperation. Strong for verification; identification is efficient if images are normalized consistently.
Voice
Attractive for phone-based services but now heavily attacked with deepfakes. Strong liveness and challenge prompts are essential; avoid voice as a sole factor for high-risk actions.
Behavioral signals
Gait, typing rhythms, and gestures can add continuous authentication but should not be sole factors.
When to use biometrics
Biometrics can be valuable for convenience and continuous verification, but they must be integrated carefully into broader authentication strategies.
-
Use biometrics for convenience and continuous verification, not as the only barrier to valuable data.
-
Prefer on-device matching and secure hardware.
-
Pair biometrics with possession (the device) and context (risk signals).
-
Offer fallbacks and consider fail-to-PIN models for accessibility or sensor failures.
-
Treat biometric data as sensitive personal data: minimize collection, lock down storage, and enforce retention limits.
Before deploying a biometric system, organizations should validate sensors, policies, and safeguards.
-
Pick a modality that fits the environment (lighting, gloves, noise).
-
Require a trusted sensor with authenticated, encrypted links.
-
Turn on liveness and test with realistic spoofs.
-
Tune thresholds using application-specific ROC data; document the operating point.
-
Keep templates on-device; if central storage is unavoidable, encrypt and segment.
-
Monitor FRR/FAR in the field; adjust policies, not just thresholds.
-
Provide accessible alternatives and privacy notices.
-
Combine with RBA and second factors for high-value actions.
Example: smartphone unlock policy
Smartphones are the most common consumer application of biometrics. Their design shows how thresholds, liveness, and fallback policies fit together.
-
Enrollment: capture several face images with and without glasses; run quality checks.
-
Sensor: structured light or IR depth camera; authenticated link to secure enclave.
-
Liveness: eye-gaze or blink prompt, micro-texture analysis, anti-photo and anti-mask checks.
-
Matching: choose an operating point with FRR ≈ 1–2% and FAR ≪ 1e−5 for unlock; lower FAR for payments.
-
Decisions:
-
Unlock allowed with biometric when context is normal.
-
Payment or password manager requires biometric plus PIN/passkey.
-
If liveness fails or sensor quality is low, fall back to PIN.
-
Privacy: templates stored in secure enclave; never uploaded; auto-delete after N failed enrollments or device reset.
Conclusion
Closing thoughts
Biometrics add convenience and can strengthen authentication by tying access to a person, not just a secret. But they also have structural weaknesses: they cannot be compartmentalized across services and cannot be changed if copied. That makes them poor choices as the only barrier to valuable data.
The safe way to use biometrics is as one factor in multi-factor authentication. A fingerprint, face, or iris scan can confirm the user’s presence, but it should work alongside replaceable secrets such as passwords, tokens, or one-time codes. This way, biometrics provide usability while other factors provide revocability and compartmentalization.
Treat biometric data as sensitive personal information, secure it carefully, and always combine it with complementary factors. Biometrics are not a replacement for strong authentication—they are a useful supplement.