specific evaluation scheme such as Common Criteria;
rather, its aim is to provide guidance to developers and
evaluators on security concerns for biometric systems
and to specify a generic methodology for their evalua-
tion. It is similar to the BEM, but is not limited to
Common Criteria evaluations and contains more
detailed information on potential threats, countermea-
sures, and evaluation requirements. Like the BEM, it
assumes that evaluators are familiar with the broader IT
security evaluation issues and does not address these.
19792 covers biometric-specific security issues of
the system as a whole as well as threats and potential
vulnerabilities of the component parts. It describes
technical and nontechnical threats and how these
may be reduced or eliminated by appropriate counter-
measures. It provides guidance to evaluators on testing
and the assessment of potential vulnerabilities and
countermeasures, and it defines the responsibilities of
vendors and evaluators in the evaluation process.
Biometric-specific aspects of system security and
evaluation methodology covered by 19792 include.
Statistical Performance Testing
Biometric comparison decisions (match and nonmatch)
are not certainties, but are prone to false match and false
non-match errors. Comparison results are therefore
often expressed in terms of the probabilities of correct
and incorrect decisions, the actual numbers being
expressed in terms of statistical performance figures.
An example of what this means in practical terms is
that for an access control application with a false match
rate of 1%, if 100 randomly chosen impostors were to
present their own biometric characteristic to the system
while claiming to be legitimate enrollees, one of them
might succeed in gaining admittance through chance
error. The quantification of errors through robust per-
formance testing therefore forms one part of a biometric
system security evaluation. The international standard
for biometric testing and reporting is provided by the
multipart ISO/IEC standard 19795 [11].
The significance of biometric error rates to security
depends on the purpose of the identification or verifica-
tion in the application domain. For access control, the
false match rate may be the most important security
relevant factor, but for applications such as passport or
ID card registration, an important requirement will be
the successful detection of attempts to register multiple
times under different claimed identities. Here, the sys-
tem needs to search its biometric database to determine
if there is an apparent match with any existing enrollee.
If a false non-match occurs during the search, a multiple
enrolment attempt may succeed and therefore, for this
function, the false non-match rate statistics will be the
most important security consideration.
Biometric System Threats and Countermeasures
The use of biometrics brings potential security threats
and vulnerabilities that are distinct from those of other
IT technologies, including spoofing, mimicry, and
disguise. Further details of these threats and exam-
ples of countermeasures can be found in the defini-
tional entries for
▶ Biometric System Threats and
▶ Countermeasures.
Human Security and Privacy Concerns
Since biometric systems collect and store the personal
data of its enrollees, security measures are necessary
to protect the data and the privacy of the enrollees. This
is another important difference between systems using
biometrics for authentication and those that depend on
inanimate entities such as passwords and tokens.
People have a right to privacy regarding the use and
sharing of their pers onal data, that is, data about their
lifestyle, preferences, habits etc. that can be linked to
them as individuals. Such data should be collected,
processed, and stored only with the informed consent
of the individual and only for the declared and author-
ized purpose. Unauthorized disclosure and misuse can
lead to undesirable consequences such as identity theft
and function creep. Biometric data are regarded as
particularly sensitive, because their strong binding to
specific persons may make it difficult for individuals to
repudiate transactions authorized by biometric
authentication.
Technical security measures such as data encryp-
tion and the use of cryptographic signatures to bind
data to an application can help to secure biome tric
data, but usually, complete protection also requires
administrative controls and sanctions implemented
within an overall system security policy.
Future Directions for Biometrics
Security Standards
The first generation of biometric standards may be
characterized as a collection of largely self-contained
or stand-alone parts that provide the essential building
Biometric Security, Standardization
B
127
B