Risk
8/28/2013
01:46 PM
Connect Directly
RSS
E-Mail
50%
50%

Eyeball Scans Stay Accurate Over Time, Says NIST

National Institute of Standards and Technology research says aging doesn't hurt reliability of iris images to identify individuals.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
Researchers investigating the use of iris recognition for biometric identification have concluded that aging doesn't affect distinguishing characteristics of the average person's iris for almost a decade. The findings, reported by National Institute of Standards and Technology (NIST) researchers, suggest that identity program managers may not need to recapture iris images as frequently as generally thought to maintain recognition accuracy, NIST officials said.

Whether that will prompt more agencies to embrace iris recognition as a reliable method for identifying individuals remains an open question, however.

In their report, "Temporal Stability of Iris Recognition Accuracy," researchers in NIST's Information Access division found "no evidence of a widespread aging effect" and "no degradation in overall recognition accuracy" over a nine-year period. The NIST research is the most comprehensive study ever undertaken of the stability of iris characteristics over long periods of time.

The NIST researchers based their study on two vast data sets, including one of nearly 8,000 frequent travelers across the Canada-U.S. border that involved millions of captured iris images. The travelers used an iris identification system deployed as part of a joint Canadian-U.S. program called NEXUS designed to help recurrent travelers move quickly across the border. The travelers used the system for at least four years and up to nine years. Researchers also analyzed a larger, but less well controlled set of anonymous statistics collected over a six-year period.

[ Learn more: read Eye Scans Meet Federal ID Cards. ]

Ultimately, they said, the study suggests that "iris recognition of average individuals will remain viable over decades," said NIST biometric testing leader Patrick Grother, adding that he hoped that the methods NIST scientists developed for the aging study will be applicable to other biometric aging research such as face aging.

Will the conclusions reached in NIST's study cause security managers to consider iris recognition as a stronger option for identity management?

John Pescatore, director of emerging security trends at the SANS Institute, an information security research and education organization in Bethesda, Md., was circumspect about the results of the study.

"For enterprise use of biometrics, long-term changes in biometric characteristics are not a major issue since most employees do not stay at one [organization] for more than five years," he told InformationWeek Government.

Even if the unique identifying characteristics of the iris remain stable over long periods, there is still the issue of accuracy in biometric identification, he added.

A 2012 NIST study of iris recognition technology, the "Iris Exchange III" report, found a significant variation in accuracy rates, between 90% and 99%.

"Ninety percent accuracy just isn't good enough," Pescatore said. "If 10% of legitimate employee access is denied, that is a disaster operationally."

The major reason biometrics has seen limited use in enterprises or government agencies is that no form of biometrics is "yes/no," he said. "Biometrics will always have both false positives and false negatives and various thresholds that can be set between the two," he said. "For all their weaknesses, passwords or hardware tokens are yes/no. Either you got the password right or you didn't; either you had the token or you didn't."

The researchers at NIST acknowledged that their latest iris recognition study was intended to quantify natural aging effects in a healthy population, and medical conditions and injuries can "rapidly and severely" affect recognition. They also termed the results of their study "provisional pending the application of refined statistical techniques to larger and richer data sets" and other factors.

The NIST reports are part of ongoing research into iris identification. The agency established the Iris Exchange Program in 2008 to give quantitative support to iris recognition standardization, development and deployment. Sponsors of the program include the FBI's Criminal Justice Information System Division and the Office of Biometric Identity Management in the Department of Homeland Security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant