What_Is_Biometric_Authentication
What_Is_Biometric_Authentication
(https://www.linkedin.com/in/antonia-din-826b79165/)
The word biometric is a combination of two words: bio (human) and metric (measurement). In
simpler words, biometrics are any metrics related to human features which make an individual
different from other individuals.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 1/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Now, although biometric systems can combine authentication and identification, there is a major
difference between the two. Specifically, identification asks, “who are you?” while authentication
asks, “Are you who you say you are?” Biometric identification verifies you are you based on your body
measurements. Biometric authentication goes one step further and uses that information to
compare you against a database and enters your information in service.
The important thing to note is that the match between the two data sets has to be nearly
identical but not exactly identical. This is because it’s close to impossible for 2 biometric data to
match 100%. For instance, you might have a slightly sweaty finger or a tiny, tiny scar that changes
the print pattern.
Designing the process so that it doesn’t require an exact match greatly diminishes the chance of a
false negative (the device doesn’t recognize your fingerprint) but also increases the odds that a fake
fingerprint might be considered genuine.
Here’s what we will cover in this extensive explanation of biometric authentication, a fascinating
technology with significant adoption in the present and huge potential in the future.
Table of contents
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 2/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
1. Fingerprint Scanners
There are three types of fingerprint scanners: optical, capacitive, and ultrasound.
An optical scanner takes a photo of the finger, identifies the print pattern, and then compiles it
into an identification code.
A capacitive scanner works by measuring electrical signals sent from the finger to the scanner.
Print ridges directly touch the scanner, sending electrical current, while the valleys between print
ridges create air gaps. A capacitive scanner basically maps out these contact points and air gaps,
resulting in an absolutely unique pattern. These are the ones used in smartphones and laptops.
Ultrasonic scanners will make their appearance in the newest generation of smartphones.
Basically, these will emit ultrasounds that will reflect back into the scanner. Similar to a capacitive
one, it forms a map of the finger unique to the individual.
To open up a smartphone secured with a fingerprint, the attacker will first need to find a high-quality
print, that contains a sufficient amount of specific patterns to open up the device. Next, an attacker
will lift the fingerprint, place it on a plastic laminate, and then cast a finger to fit this mold.
Once the malicious hacker creates the fake finger, all he has to do is to place it on the scanner, press
with his finger to conduct electricity, and then use the unlocked phone.
2. Retina Scanners
Security researchers consider the eye as one of the most reliable body parts for biometric
authentication since the retina and iris remain almost completely unchanged during a person’s
lifetime. A retinal scan will illuminate the complex blood vessels in a person’s eye using infrared
light, making them more visible than the surrounding tissue. Just like fingerprints, no two persons
will ever have the same retinal pattern.
3. Iris Scanners
Iris scanners rely on high-quality photos or videos of one or both irises of a person. Irises too are
unique to the individual. However, iris scanners have proven to be easy to trick simply by using a
high-quality photograph of the subject’s eyes or face. When it comes to biometrics, the iris has
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 3/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
You don’t spread the information around every time you touch something.
The iris stays virtually unchanged throughout a person’s life. A fingerprint, on the other hand, can
be dirtied, scarred, or eroded.
You can’t use a fingerprint with dirty or sweaty hands. Irises, however, have no such problem.
The only major disadvantage of an iris scanner is that high-quality photos of your face or eyes
(http://www.zdnet.com/article/ultrasecure-samsung-galaxy-s8-iris-scanner-can-be-easily-tricked-
say-hackers/) can trick the scanner and unlock the device.
Despite these limitations, the technology has made its way as a security feature in airports, banks,
and other sensitive buildings. Of course, just like with other security measures, it’s used in
conjunction with multiple authentication technologies.
How it works. In the enrollment phase, the scanner will take a photograph of your iris using both
normal light, as well as infrared light to capture details that wouldn’t be visible otherwise.
After the device records the person’s iris, it will remove any unnecessary details, such as eyelashes,
and then transform the information into mathematical data and encrypt it.
During verification, an iris scanner will again emit infrared light to spot those hidden details. Because
an iris scanner supplies its own light, it also works in low light or dark conditions.
Tricking an Iris Scanner. For some iris scanners, all it takes is taking a photo with a cheap camera in
night mode, print the iris on paper, and then putting a wet contact lens to mimic the roundness of the
human eye.
4. Speaker Recognition
Speaker recognition, unlike voice recognition, wants to identify who is talking, and not what is being
said.
In order to identify the speaker, the specialized software will break down their words into packets of
frequencies called formants. These packets of formants also include a user’s tone, and together they
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 4/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Text-dependent, meaning it unlocks after identifying certain words or phrases (think “Hey Alexa!”
for the Amazon Echo).
Text-independent, where it tries to recognize the voice itself but ignores what is actually said.
Unlike other methods mentioned here, speaker recognition comes with a significant usability
problem, since it’s easy for background noises to distort the person’s voice and make it
unrecognizable.
When it comes to consumer devices, voice activation can come across as awkward (a.k.a. talking to
Siri in the subway).
But the biggest issue with speech recognition is how easy it is to create a high-quality reproduction
of a person’s voice. Even low-quality smartphones can accurately record a person’s voice, complete
with inflections, tone, and accents.
This hasn’t stopped speaker recognition and similar technologies from gaining mainstream
adoption. Just look at the success of Amazon Echo, Google Home, and other voice-controlled
speakers integrated into a lot of smart homes. It’s an amazing biometric authentication experience
for users. At the same time, it’s a security risk of nightmare proportions.
The classic way is to simply extract your face’s features from an image (eyes, nose, distance
between your lips and your nose, etc) and compare them to other images to find a match.
Through skin texture analysis, your unique lines, beauty marks, wrinkles, and so on are turned into a
mathematical space, which is then compared to other images.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 5/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Both of them can be easily fooled with makeup, masks, or, in some cases, simply obstructing part of
your face. This is where thermal imagery and other technologies stepped up the game until we got
to this point – that of widespread adoption of systems like the Apple FaceID.
A hand geometry scanner will measure palm thickness, finger length and width, knuckle distance,
and so on.
Advantages of this kind of system are cheapness, ease of use, and unobtrusiveness. It also has a
few major disadvantages. A hand’s size can vary over time. Health problems might limit
movements. More importantly, a hand is not that unique, so the system has low accuracy.
7. Vein Geometry
Our vein layout is completely unique and not even twins have the same vein geometry. In fact, the
overall layout is different from one hand to another.
Veins have an added advantage since they are incredibly difficult to copy and steal because they are
visible under tightly controlled circumstances.
A vein geometry scanner will light up the veins with near-infrared light, which makes your veins
visible in the picture.
8.DNA Based
Deoxyribonucleic acid (DNA) is the most reliable personal identification method. It is intrinsically
digital and does not modify during a person’s life. Since DNA is the structure that defines who we are
physically and intellectually, it is not possible that any other human being will have the same set of
genes. Of course, this does not apply to identical twins.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 6/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Nevertheless, DNA biometrics is not an infallible method of identification. If forensic experts do not
carry out a DNA test properly, an individual’s identification code can be altered.
Gait recognition is a type of behavioral biometric authentication that recognizes and verifies people
by their walking style and pace. Compared to other first-generation biometric modalities such as
fingerprint and iris recognition, gait has the advantage of being unobtrusive, in that it requires no
subject contact.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 7/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 8/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Advantages:
Ease of use. A fingerprint or iris scan is much easier to use than a password, especially a long
one. It only takes a second (if that) for the most modern smartphones to recognize a fingerprint and
allow a user to access the phone. Ultrasound scanners will soon become commonplace, since
manufacturers can place them directly behind the screen, without taking any extra real estate on a
phone. Voice recognition, on the other hand, is a bit iffier and background noises can easily scramble
the process and render it inoperable.
The malicious hacker has to be near you. The biggest advantage of biometrics is that a
malicious hacker has to be in your physical proximity in order to collect the information required to
bypass the login. This narrows down the circle of possible suspects in case your biometric lock is
somehow bypassed. The proximity also puts him at risk of getting caught red-handed, in a way that
regular malicious hackers working from another continent cannot.
Biometrics are difficult to fake or steal. Biometrics such as facial recognition, fingerprint or
retina scanning, and others are almost impossible to reproduce using the current technology. There’s
a one in 64 billion chance that your fingerprint will correspond exactly with someone else’s.
Disadvantages:
You cannot revoke the fingerprint/iris/voice remotely. A big disadvantage of biometric security
is that a user cannot remotely alter them. If you lose access to an email, you can always initiate a
remote recovery to help you regain control. During the process, you will be able to change your
password or add two-factor authentication to double your account’s security. Biometrics, however,
don’t work like that. You have to be physically near the device to change its initial, secure data set.
A thief could steal your smartphone, create a fake finger, and then use it to unlock the phone at will.
Unless you quickly lock your phone remotely, a thief would quickly steal every bit of information on
the device.
“Master fingerprints” can trick many phones and scanners. When you first register a fingerprint,
the device will ask you for multiple presses from different angles. These samples will then be used
as the original data set to compare with subsequent unlock attempts. However, smartphone sensors
are small, so they often rely on partial matches of fingerprints. Researchers have discovered that a
set of 5 “master fingerprints” can exploit these partial matches, and open about 65% of devices. The
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 9/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
number is likely to go down in real-life conditions, but an open rate of even 10% to 15% is huge and
can expose millions of devices.
Biometrics last a lifetime. You can always change your password if somebody learns it, but
there’s no way to modify your iris, retina or fingerprint. Once somebody has a working copy of these,
there’s not much you can do to stay safe, other than switching to passwords or using another finger.
In one of the biggest hacks ever, the US Office of Personnel Management leaked 5.6 million
employee fingerprints (https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-
now-says-more-than-five-million-fingerprints-compromised-in-breaches/?
utm_term=.5e1219d6aaec). For the people involved, a part of their identity will always be
compromised. In CPO Magazine, we explored even more risks of using biometric data, especially in
the context of law enforcement.
Since then, patches have come for vulnerabilities, but bug hunters are constantly on the hunt for new
ones.
VOTE
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 10/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Below you can find some examples of how these businesses are employing the use of biometrics to
enhance the security and efficiency of existing processes.
According to a research conducted by Cision PR Newswire, almost 50% of the most appreciated
mobile banking applications use biometric authentication.
Healthcare Sector
Healthcare facilities use biometric services to verify the identity of patients, keep a record so that
whenever a person comes to the hospital his medical records could be easily and rapidly accessed
by their doctor, keep sensitive data secure and prevent mix-ups.
The stored information can be used to make sure patients receive the care they need, whether that
means faster identification in emergency cases, better medical diagnosis, or averting medical
mistakes.
Academic Sector
Biometric authentication can also be used in school management systems where keeping records of
students’ and teachers’ attendance is an ordinary custom. It is beneficial because it also keeps
evidence of students’ arrival and leaving time from school, and work hours for teachers. Automated
record-keeping of student identities significantly improves educational activities.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 11/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
Barclays biometric technology. Barclays was one of the first to develop one-touch fingerprint
banking access and have since expanded their biometric approach to include voice-enabled
biometrics. This system allows the financial institution contact center to identify customers from the
first few spoken words.
Their voice recognition technology analyses each client’s unique voice to immediately check their
identity, providing Barclays with a streamlined method of authorization, whilst creating a more
powerful barrier of protection against fraudulent calls.
American Airlines facial recognition biometrics. American Airlines is one of the major airline
companies successfully using biometric technology in the U.S. by creating a biometric facial
recognition program that plans to streamline a client’s journey through the boarding process.
Wrapping up…
Biometric authentication has strongly expanded in the last few years, with more and more
consumers relying on it and even demanding it.
Over the years, we have witnessed a rising increase of organizations transitioning from traditional
forms of cyber protection and access control to biometric technology.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 12/20
3/23/23, 9:54 AM What Is Biometric Authentication? Definition, How It Works, Pros And Cons
This kind of technology provides managers the freedom to simplify their authentication process and
due to the physical attributes involved in identifying employees, biometric technology offers a
stronger, more advanced level of security, access control, and management over traditional
counterparts.
Do you use any sort of biometric technology? How do you feel about it, especially in the
government’s hands, and how secure do you think is?
This article was initially published by Ana Dascalescu in July 2017 and rewritten in July 2021 by
Antonia Din.
I agree to have the submitted data processed by Heimdal Security according to the Privacy
Policy (/license-agreement-and-privacy-policy)
RELATED
Netiquette Rules: Definition and 10 Basic Rules To Dramatically Improve your Safety
(https://heimdalsecurity.com/blog/netiquette-rules-safety/)
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages 13/20