by the NRC committee as a term used primarily within
the biometrics community and synonymous with
‘‘authentication.’’
Since at least the 1990s [19], it had been noted that
biometric claims could be negative as well as positive –
for example, ‘‘I am not data subject X’’ or ‘‘I am not
enrolled in the biometric system.’’ Using the NRC
definitions, the term ‘‘authentication’’ could be used
to describe the process of establishing the truth of such
a negative claim and ‘‘identification’’ could be used to
describe the outcome of an access control system.
Applying these definitions leads to some clarity of
language, restoring the dictionary, natural-language
meanings of these terms. ‘‘Verification’’ and ‘‘authenti-
cation’’ can apply to positive or negative claims. A data
subject, or some other party, need not specify an iden-
tifier, such as a PIN, pointing to an enrolled biometric
reference. So, for example, biometrics can be used
without a user identifier to verify that I am enrolled
in the system or that I am not enrolled in the system.
Examples of the former are biometric systems used to
prevent issuance of multiple enrolment records to the
same user. Examples of the latter are often called
‘‘watchlists.’’ With a claimed user identifier, biometric
systems can verify that I am enrolled (known to the
system) as X, or not enrolled as X. A consequence of
this definition is that all biometric systems can be seen
as verifying some kind of a claim, whether positive or
negative, whether with or without a specified user
identifier. The details of either the algorithm or the
data structures need not be considered in app lying
the term ‘‘verification.’’ ‘‘PIN-less verification’’ systems
are indeed ‘‘verification’’ systems.
Under the NRC definitions, ‘‘identification’’ is the
process of ‘‘infer(ring) who the person is,’’ meaning to
return an identifier (not necessarily a name) for that
person. This process can include a claim to an identifi-
er by the data subject or by someone else in reference to
the data subject (i.e., ‘‘She is enrolled as user X’’). By
these definitions, ‘‘identificat ion’’ and ‘‘verification’’
are not mutually exclusive. A biometric system can
identify a person by verifying a claim to a known
identity. This usage is consistent with the historical
documents such as [4, 5].
At the time of writing this essay, the interna-
tional standards committee on biometrics, ISO/IEC
JTC1 SC37, has tentative definitions for the terms
considered in this article [20], shown in the box
below. The SC37 definitions are compatible with
those of the NRC, although SC37 prefers ‘‘biometric
verification’’ to ‘‘biometric authentication,’’ the latte r
being depreciated in the vocabulary corpus. The SC37
definitions do not include ‘‘recognition,’’ deferring
to common dictionary definitions for the meaning of
that term.
Related Entries
▶ Biometrics, Overview
References
1. Pearsall, J. (ed.): Concise Oxford English Dictionary, 10th
revised edn. Oxford University Press (2002)
2. Li, K.P., Dammann, J.E., Chapman, W.D.: Experimental studies
in speaker verification using an adaptive system. JASA. 40(5),
966–978 (1966)
3. Pruzansky, S.: Pattern matching procedure for automatic talker
recognition. JASA. 35(3), 345–358 (1963)
4. Mauceri, A.J.: Technical Documentary Report for Feasibility
Study of Personnel Identification by Signature Verification,
North American Aviat ion, Inc, Space and Information Sys-
tems Division, SID 65–24, accession No. 00464–65, 19 Januar y,
1965
5. International Business Machines Corporation.: The Considera-
tions of Data Security in a Computer Environment, IBM
Corporation, White Plains, NY, Form 520–2169, 1969
6. Dixon, R.C., Boudreau, P.E.: Mathematical Model for Pattern
Verification, IBM J. Res. Dev. November, 717–729, 1969.
Available at http://www.research.ibm.com/journal/rd/136/
ibmrd1306I.pdf
7. Tosi, O., Oyer, H., Lashbrook, W., Pedrey, C., Nicol, J., Nash, E.:
Experiment on voice identification. JASA. 51(6), 2030–2043
(1972)
8. Tosi, O.: Experimental Studies on the reliability of the voiceprint
identification technique. In: Proceedings of third National Sympo-
sium of Law Enforcement and Technology , Chicago, IL (1970)
9. Doddington, G.: Speaker recognition evaluation methodology:
a review and perspective. In RLA2C, Avignon, April 1998,
pp. 60–66
10. Li, F., Wechsler, H.: Robust part-based face recognition using
boosting and transduction. In: IEEE Conference on Biometrics:
Theory, Applications and Systems, Washington, DC, 27–29
September 2007
11. Bolme, D.S., Beveridge, J.R., Howe, A.E.: Person identification
using text and image data. In IEEE Conference on Biometrics:
Theory, Applications and Systems, Washington, DC, 27–29
September 2007
156
B
Biometric Verification/Identification/Authentication/Recognition: The Terminology