Risk
8/28/2013
01:46 PM
Connect Directly
RSS
E-Mail
50%
50%

Eyeball Scans Stay Accurate Over Time, Says NIST

National Institute of Standards and Technology research says aging doesn't hurt reliability of iris images to identify individuals.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
Researchers investigating the use of iris recognition for biometric identification have concluded that aging doesn't affect distinguishing characteristics of the average person's iris for almost a decade. The findings, reported by National Institute of Standards and Technology (NIST) researchers, suggest that identity program managers may not need to recapture iris images as frequently as generally thought to maintain recognition accuracy, NIST officials said.

Whether that will prompt more agencies to embrace iris recognition as a reliable method for identifying individuals remains an open question, however.

In their report, "Temporal Stability of Iris Recognition Accuracy," researchers in NIST's Information Access division found "no evidence of a widespread aging effect" and "no degradation in overall recognition accuracy" over a nine-year period. The NIST research is the most comprehensive study ever undertaken of the stability of iris characteristics over long periods of time.

The NIST researchers based their study on two vast data sets, including one of nearly 8,000 frequent travelers across the Canada-U.S. border that involved millions of captured iris images. The travelers used an iris identification system deployed as part of a joint Canadian-U.S. program called NEXUS designed to help recurrent travelers move quickly across the border. The travelers used the system for at least four years and up to nine years. Researchers also analyzed a larger, but less well controlled set of anonymous statistics collected over a six-year period.

[ Learn more: read Eye Scans Meet Federal ID Cards. ]

Ultimately, they said, the study suggests that "iris recognition of average individuals will remain viable over decades," said NIST biometric testing leader Patrick Grother, adding that he hoped that the methods NIST scientists developed for the aging study will be applicable to other biometric aging research such as face aging.

Will the conclusions reached in NIST's study cause security managers to consider iris recognition as a stronger option for identity management?

John Pescatore, director of emerging security trends at the SANS Institute, an information security research and education organization in Bethesda, Md., was circumspect about the results of the study.

"For enterprise use of biometrics, long-term changes in biometric characteristics are not a major issue since most employees do not stay at one [organization] for more than five years," he told InformationWeek Government.

Even if the unique identifying characteristics of the iris remain stable over long periods, there is still the issue of accuracy in biometric identification, he added.

A 2012 NIST study of iris recognition technology, the "Iris Exchange III" report, found a significant variation in accuracy rates, between 90% and 99%.

"Ninety percent accuracy just isn't good enough," Pescatore said. "If 10% of legitimate employee access is denied, that is a disaster operationally."

The major reason biometrics has seen limited use in enterprises or government agencies is that no form of biometrics is "yes/no," he said. "Biometrics will always have both false positives and false negatives and various thresholds that can be set between the two," he said. "For all their weaknesses, passwords or hardware tokens are yes/no. Either you got the password right or you didn't; either you had the token or you didn't."

The researchers at NIST acknowledged that their latest iris recognition study was intended to quantify natural aging effects in a healthy population, and medical conditions and injuries can "rapidly and severely" affect recognition. They also termed the results of their study "provisional pending the application of refined statistical techniques to larger and richer data sets" and other factors.

The NIST reports are part of ongoing research into iris identification. The agency established the Iris Exchange Program in 2008 to give quantitative support to iris recognition standardization, development and deployment. Sponsors of the program include the FBI's Criminal Justice Information System Division and the Office of Biometric Identity Management in the Department of Homeland Security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio