Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics and Error Rates

May 8, 2002
Breakthroughs in technology as well as heightened need for higher level security have combined to bring renewed attention to biometrics as a means of physical access control. Bill Spence of Recognition Systems division of IR Security & Safety is author of this special report. This first in the report’s series provides an executive briefing on practical issues of biometrics and the need to understand error rates.

The first question, once you have decided to consider biometrics, should be “Is this technology right for me?” After getting comfortable with the technology and successful in justifying it, the next step is deciding what biometrics technology is right for the specific application. Certain technologies are extremely well-suited and thoroughly proven in access control applications. Others still are relatively untried or unreliable.

For the majority of access control applications in use today, there are several practical and proven methods ranging from hand and finger to iris. One way to compare systems is by error rates.

Biometrics includes captured data compared to "live" data.

Don’t Overlook Error Rates

There are several types of error rates to consider in the practical selection of a biometric device. Security professionals typically concentrate on preventing an unauthorized individual from entering. However, if a biometric device (or any other access control method) does not consistently recognize and allow entry to authorized people, it won’t remain on the door for very long. The real job of security is as much to let only authorized people into specific places as it is to keep the unauthorized people out. Therefore, it is important to ensure that the biometric device does a good job of recognizing the authorized users.

The reality is that biometric devices aren’t perfect, and all will make some errors.

Biometric devices can make two kinds of errors; the false accept, in which the device accepts an unauthorized person; and the false reject, in which the device falsely rejects an authorized person. Picking the right biometric device requires careful analysis of which type of error will have the greater impact on both security and everyday operations.

Because different types of biometric devices have widely differing false reject and false accept rates, the parameters of the specific application must be considered. Where a device serves a small population or has limited use, a higher false reject rate may not make much difference. In larger populations or with frequent use, a high false reject rate can affect enough people to make the system impractical.

For example, in a group of 20 people that each use the device twice a day, a 2 percent false reject rate would cause an average of less than one person per day to be wrongly denied access. With 100 people going in and out four times daily, generating 400 transactions, the resulting eight false rejects per day could be enough to cause the device to be removed. Therefore it is important to focus not only on the ability of the device to deter unauthorized entry but also its ability to let authorized people in.

Biometric device manufacturers claim a broad range of results, but check further to be sure the claims can be substantiated. For example, a manufacturer can claim its false reject rate is 0.1 percent, but just as important is how this number was derived and over what period of time. The time over which a result is generated is critical to the validity of the results.

Checking a device’s operation over a few weeks will not necessarily give a representative result for projecting over the years the device is expected to be in operation. In fact, some biometric technologies experience higher error rates during the wintertime, due to the dryness of the season. Will the manufacturer provide results to substantiate its claimed performance over time?

Failure to Enroll Problems

Another significant factor, too often overlooked, is failure to enroll. This is usually due to the particular biometric technology being unable to read the characteristics of a given person for various reasons. The failure to enroll rate is multiplied by the number of expected users; the false reject rate is multiplied by the number of transactions over time, since every single attempt is an opportunity for a false reject.

The false acceptance rate should not be over looked since it provides the essential deterrent that is critical in all security applications. Again just like the other error rates, it must be put in the context of the application. As an example, if a group of 100 people use a given door four times per day, it adds up to 400 transactions per day or 2,000 transactions per week. A one percent false reject rate will create 20 problems within one week, which is high given the context of a 100-person group. As for the false accept rate, one must remember that a false reject can only occur when an unauthorized person attempts to gain entry. So by contrast, the number of false attempts by unauthorized persons during the same week would be considerably lower in all cases.

This contrast and the frustration of dealing with a high number of false rejects will have authorized users and management alike looking for a way to replace the biometric system with something else if these factors are not considered up front.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0818-gsx-sielox-prod3-feat-slide_900px

    Reduces Human Error in Door Management

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    3 simple steps to protect data from human error

    See More
  • Communications Lapses Cited as Major Error in LAX Shooting

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing