Risk
8/28/2013
01:46 PM
Connect Directly
RSS
E-Mail
50%
50%

Eyeball Scans Stay Accurate Over Time, Says NIST

National Institute of Standards and Technology research says aging doesn't hurt reliability of iris images to identify individuals.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
Researchers investigating the use of iris recognition for biometric identification have concluded that aging doesn't affect distinguishing characteristics of the average person's iris for almost a decade. The findings, reported by National Institute of Standards and Technology (NIST) researchers, suggest that identity program managers may not need to recapture iris images as frequently as generally thought to maintain recognition accuracy, NIST officials said.

Whether that will prompt more agencies to embrace iris recognition as a reliable method for identifying individuals remains an open question, however.

In their report, "Temporal Stability of Iris Recognition Accuracy," researchers in NIST's Information Access division found "no evidence of a widespread aging effect" and "no degradation in overall recognition accuracy" over a nine-year period. The NIST research is the most comprehensive study ever undertaken of the stability of iris characteristics over long periods of time.

The NIST researchers based their study on two vast data sets, including one of nearly 8,000 frequent travelers across the Canada-U.S. border that involved millions of captured iris images. The travelers used an iris identification system deployed as part of a joint Canadian-U.S. program called NEXUS designed to help recurrent travelers move quickly across the border. The travelers used the system for at least four years and up to nine years. Researchers also analyzed a larger, but less well controlled set of anonymous statistics collected over a six-year period.

[ Learn more: read Eye Scans Meet Federal ID Cards. ]

Ultimately, they said, the study suggests that "iris recognition of average individuals will remain viable over decades," said NIST biometric testing leader Patrick Grother, adding that he hoped that the methods NIST scientists developed for the aging study will be applicable to other biometric aging research such as face aging.

Will the conclusions reached in NIST's study cause security managers to consider iris recognition as a stronger option for identity management?

John Pescatore, director of emerging security trends at the SANS Institute, an information security research and education organization in Bethesda, Md., was circumspect about the results of the study.

"For enterprise use of biometrics, long-term changes in biometric characteristics are not a major issue since most employees do not stay at one [organization] for more than five years," he told InformationWeek Government.

Even if the unique identifying characteristics of the iris remain stable over long periods, there is still the issue of accuracy in biometric identification, he added.

A 2012 NIST study of iris recognition technology, the "Iris Exchange III" report, found a significant variation in accuracy rates, between 90% and 99%.

"Ninety percent accuracy just isn't good enough," Pescatore said. "If 10% of legitimate employee access is denied, that is a disaster operationally."

The major reason biometrics has seen limited use in enterprises or government agencies is that no form of biometrics is "yes/no," he said. "Biometrics will always have both false positives and false negatives and various thresholds that can be set between the two," he said. "For all their weaknesses, passwords or hardware tokens are yes/no. Either you got the password right or you didn't; either you had the token or you didn't."

The researchers at NIST acknowledged that their latest iris recognition study was intended to quantify natural aging effects in a healthy population, and medical conditions and injuries can "rapidly and severely" affect recognition. They also termed the results of their study "provisional pending the application of refined statistical techniques to larger and richer data sets" and other factors.

The NIST reports are part of ongoing research into iris identification. The agency established the Iris Exchange Program in 2008 to give quantitative support to iris recognition standardization, development and deployment. Sponsors of the program include the FBI's Criminal Justice Information System Division and the Office of Biometric Identity Management in the Department of Homeland Security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.