SlideShare uma empresa Scribd logo
1 de 22
Security Audit in  UID Biometric System
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  is  UID? Is an ambitious project initiated by government of India to give each Indian  Resident  a  Unique ID (UID) Number  that can establish their identity at any place, any time.
Key  features  of UID ,[object Object],[object Object],[object Object]
Key  features  of UID Cont… ,[object Object],[object Object],[object Object]
Key Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Challenges
UID Agencies
UID Process Workflow
[object Object],[object Object],[object Object],[object Object],[object Object],UID & Biometrics
Typical Biometric System  Functions Enrollment Data acquisition Transmission Signal Processing Decision Data Storage Matching
Risks and vulnerabilities  in the system
Threats and Counter Measures Location Threats Counter measures Data collection Spoofing Multimodal biometrics Device substitution Have authenticated, trusted devices Raw data transmission Reading/modification of data Sign in data, have session tokens Signal processing Component replacements Have digitally signed components and check integrity of the software Matching Manipulation of match scores Don’t allow processes to be running that introspect data and results coming back Hill Climbing Don’t provide detailed scoring data back to any 3 rd  party Storage Database compromise  Have database access controls, Sign and encrypt templates and store keys in a separate hardware Decision Threshold manipulation Protected function, data protection
Audit checkpoints for biometric system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
Summary   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
Umer Khalid
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
NCTechSymposium
 

Mais procurados (20)

BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 

Destaque

Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking system
Suchit Moon
 

Destaque (17)

Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project report
 
Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)
 
E ticket to channel success
E ticket to channel successE ticket to channel success
E ticket to channel success
 
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
 
Braking system
Braking systemBraking system
Braking system
 
E-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATIONE-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATION
 
Regenerative braking Project report
Regenerative braking Project reportRegenerative braking Project report
Regenerative braking Project report
 
Regenerative braking
Regenerative brakingRegenerative braking
Regenerative braking
 
E-Ticketing
E-TicketingE-Ticketing
E-Ticketing
 
IR Sensor Working and Concepts
IR Sensor Working and ConceptsIR Sensor Working and Concepts
IR Sensor Working and Concepts
 
Uid
UidUid
Uid
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking system
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking system
 
Regenerative braking system
Regenerative braking system Regenerative braking system
Regenerative braking system
 
Infrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working PrincipleInfrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working Principle
 
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...
 
E-Ticket presentation
E-Ticket presentationE-Ticket presentation
E-Ticket presentation
 

Semelhante a Uid security

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 

Semelhante a Uid security (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Uid security

  • 1. Security Audit in UID Biometric System
  • 2.
  • 3. What is UID? Is an ambitious project initiated by government of India to give each Indian Resident a Unique ID (UID) Number that can establish their identity at any place, any time.
  • 4.
  • 5.
  • 6.
  • 7.
  • 10.
  • 11. Typical Biometric System Functions Enrollment Data acquisition Transmission Signal Processing Decision Data Storage Matching
  • 12. Risks and vulnerabilities in the system
  • 13. Threats and Counter Measures Location Threats Counter measures Data collection Spoofing Multimodal biometrics Device substitution Have authenticated, trusted devices Raw data transmission Reading/modification of data Sign in data, have session tokens Signal processing Component replacements Have digitally signed components and check integrity of the software Matching Manipulation of match scores Don’t allow processes to be running that introspect data and results coming back Hill Climbing Don’t provide detailed scoring data back to any 3 rd party Storage Database compromise Have database access controls, Sign and encrypt templates and store keys in a separate hardware Decision Threshold manipulation Protected function, data protection
  • 14.
  • 15.  
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.  

Notas do Editor

  1. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  2. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  3. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  4. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  5. Vulnerabilities Data collection Signal processing Data storage Matching Decission
  6. Vulnerabilities Data collection Signal processing Data storage Matching Decission
  7. The following are used as performance metrics for biometric systems:[3] false accept rate or false match rate (FAR or FMR) – the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false non-match rate (FRR or FNMR) – the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. receiver operating characteristic or relative operating characteristic (ROC) – The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false non-matches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors). equal error rate or crossover error rate (EER or CER) – the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuarcy of devices with different ROC curves. In general, the device with the lowest EER is most accurate. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. The lower the EER, the more accurate the system is considered to be. failure to enroll rate (FTE or FER) – the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs. failure to capture rate (FTC) – Within automatic systems, the p include all all are related to biometrics and can be imp to be mentioned
  8. The following are used as performance metrics for biometric systems:[3] false accept rate or false match rate (FAR or FMR) – the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false non-match rate (FRR or FNMR) – the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. receiver operating characteristic or relative operating characteristic (ROC) – The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false non-matches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors). equal error rate or crossover error rate (EER or CER) – the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuarcy of devices with different ROC curves. In general, the device with the lowest EER is most accurate. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. The lower the EER, the more accurate the system is considered to be. failure to enroll rate (FTE or FER) – the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs. failure to capture rate (FTC) – Within automatic systems, the p include all all are related to biometrics and can be imp to be mentioned