Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics and Error Rates

May 8, 2002
Breakthroughs in technology as well as heightened need for higher level security have combined to bring renewed attention to biometrics as a means of physical access control. Bill Spence of Recognition Systems division of IR Security & Safety is author of this special report. This first in the report’s series provides an executive briefing on practical issues of biometrics and the need to understand error rates.

The first question, once you have decided to consider biometrics, should be “Is this technology right for me?” After getting comfortable with the technology and successful in justifying it, the next step is deciding what biometrics technology is right for the specific application. Certain technologies are extremely well-suited and thoroughly proven in access control applications. Others still are relatively untried or unreliable.

For the majority of access control applications in use today, there are several practical and proven methods ranging from hand and finger to iris. One way to compare systems is by error rates.

Biometrics includes captured data compared to "live" data.

Don’t Overlook Error Rates

There are several types of error rates to consider in the practical selection of a biometric device. Security professionals typically concentrate on preventing an unauthorized individual from entering. However, if a biometric device (or any other access control method) does not consistently recognize and allow entry to authorized people, it won’t remain on the door for very long. The real job of security is as much to let only authorized people into specific places as it is to keep the unauthorized people out. Therefore, it is important to ensure that the biometric device does a good job of recognizing the authorized users.

The reality is that biometric devices aren’t perfect, and all will make some errors.

Biometric devices can make two kinds of errors; the false accept, in which the device accepts an unauthorized person; and the false reject, in which the device falsely rejects an authorized person. Picking the right biometric device requires careful analysis of which type of error will have the greater impact on both security and everyday operations.

Because different types of biometric devices have widely differing false reject and false accept rates, the parameters of the specific application must be considered. Where a device serves a small population or has limited use, a higher false reject rate may not make much difference. In larger populations or with frequent use, a high false reject rate can affect enough people to make the system impractical.

For example, in a group of 20 people that each use the device twice a day, a 2 percent false reject rate would cause an average of less than one person per day to be wrongly denied access. With 100 people going in and out four times daily, generating 400 transactions, the resulting eight false rejects per day could be enough to cause the device to be removed. Therefore it is important to focus not only on the ability of the device to deter unauthorized entry but also its ability to let authorized people in.

Biometric device manufacturers claim a broad range of results, but check further to be sure the claims can be substantiated. For example, a manufacturer can claim its false reject rate is 0.1 percent, but just as important is how this number was derived and over what period of time. The time over which a result is generated is critical to the validity of the results.

Checking a device’s operation over a few weeks will not necessarily give a representative result for projecting over the years the device is expected to be in operation. In fact, some biometric technologies experience higher error rates during the wintertime, due to the dryness of the season. Will the manufacturer provide results to substantiate its claimed performance over time?

Failure to Enroll Problems

Another significant factor, too often overlooked, is failure to enroll. This is usually due to the particular biometric technology being unable to read the characteristics of a given person for various reasons. The failure to enroll rate is multiplied by the number of expected users; the false reject rate is multiplied by the number of transactions over time, since every single attempt is an opportunity for a false reject.

The false acceptance rate should not be over looked since it provides the essential deterrent that is critical in all security applications. Again just like the other error rates, it must be put in the context of the application. As an example, if a group of 100 people use a given door four times per day, it adds up to 400 transactions per day or 2,000 transactions per week. A one percent false reject rate will create 20 problems within one week, which is high given the context of a 100-person group. As for the false accept rate, one must remember that a false reject can only occur when an unauthorized person attempts to gain entry. So by contrast, the number of false attempts by unauthorized persons during the same week would be considerably lower in all cases.

This contrast and the frustration of dealing with a high number of false rejects will have authorized users and management alike looking for a way to replace the biometric system with something else if these factors are not considered up front.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0818-gsx-sielox-prod3-feat-slide_900px

    Reduces Human Error in Door Management

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    3 simple steps to protect data from human error

    See More
  • blue shield with lock and dark blue background

    Credit union fraud rates increased by more than 70% in 2022

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing