• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Subscribe
  • Advertise

Sensor Tips

Sensor Product News, Tips, and learning resources for the Design Engineering Professional.

  • Motion Sensing
  • Vision systems
    • Smart cameras
    • Vision software
    • Lighting
    • Optics
  • Pressure
  • Speed
  • Temperature
  • Suppliers
  • Video
    • EE Videos
    • Teardown Videos
  • EE Learning Center
    • Design Guides
    • Tech Toolboxes

What are the seven characteristics of biometrics that make it useful for security?

October 23, 2024 By Jeff Shepard

A biometric trait must be reliable to be a useful security tool. This article begins with an overview of the seven characteristics used to compare the reliability of biometric traits. It then looks at how well some common biometric traits satisfy those requirements. It considers how multimodal authentication and sensor fusion can enhance security and concludes with a glance at behavioral biometrics.

The seven characteristics of biometrics that make it useful include:

  • Universality: every person must possess the trait.
  • Distinctiveness: the trait must be sufficiently different between individuals.
  • Permanence: the trait must be sufficiently invariant over time with minimal changes.
  • Measurability: the trait must be quantitively described.
  • Acceptability: users must be willing to provide the required biometric data.
  • Circumvention: the trait must be difficult to imitate or forge.
  • Performance: the trait must have a high level of accuracy in distinguishing between individuals.

Individual biometric traits support varying levels of performance for the seven characteristics.

Examples of traits

Just because a biometric trait scores high on most or all the characteristics doesn’t necessarily make it suitable for a specific application, for example, DNA is highly accurate at identifying individuals and nearly impossible to circumvent, but it’s not easily implemented in a security system.

The rankings in Table 1 below are not absolute; they are qualitative, subjective, and can vary according to the specific implementation. Fingerprints and facial recognition have good overall scores and are widely used. Hand recognition can be problematic if a person has been in an accident and loses a digit. Iris recognition is more difficult to implement but is increasingly deployed in security applications. Voice recognition scores are relatively lower, and some artificial intelligence (AI) techniques have been developed to mimic a person’s voice and circumvent or confuse voice recognition systems.

biometrics
Table 1. Each biometric trait has a unique mix of strengths and weaknesses relative to the seven characteristics in the left-hand column, making them useful for different application needs. (Table: Innovatrics)

Multimodal biometrics and sensor fusion

Multimodal biometric security systems use sensor fusion to combine traits with different performance levels for key characteristics like facial recognition and fingerprints. However, simultaneously using diverse sensor sources like facial recognition and fingerprints can increase system complexity. Using data from a similar source, such as combining a fingerprint with a finder vein analysis, can simplify the implementation of multimodal identification.

A multimodal identification system will have two or more decision channels. Data and analysis can be fused at several levels of analysis, including the sensor level, feature level, matching score analysis, and decision classifiers (Figure 1). If not properly designed and implemented, multimodal biometric recognition can significantly delay obtaining the final classification, limiting its utility.

biometric
Figure 1. Multimodal biometrics uses two or more parallel analyses and decision paths for individual sensor inputs and can fuse the results at various points in the identification process. (Image: ICCCI)

Behavioral biometrics

Rather than focusing on physical traits, behavioral biometrics measures and distinguishes patterns in device users’ behavior. Behavioral biometrics have been developed to increase online transaction security and detect potential fraud.

Behavioral biometrics tends to be inherently multimodal. Behavioral biometric verification methods include keystroke dynamics, mouse usage patterns, and swipe and touch analysis. Device indicators like IP addresses and geolocation are also employed in some systems.

Summary

The seven characteristics of biometric traits that make them useful are universality, distinctiveness, permanence, measurability, acceptability, circumvention, and performance. Various biometric traits have different performance levels for those characteristics, sometimes limiting their applicability in a specific security scenario. Sensor fusion can overcome the limitations of individual traits and provide more robust security. Behavioral biometrics has been developed for online security to rely on behavioral patterns instead of physical traits to identify trusted individuals.

References

7 reasons why biometric security is important for digital identity, Mitek
An Enhanced 3-Tier Multimodal Biometric Authentication, International Conference on Computer Communication and Informatics (ICCCI)
Biometric Recognition: Challenges and Opportunities, National Center for Biotechnology Information
How Artificial Intelligence (AI) Is Used In Biometrics, Aratek,
What are Behavioral Biometrics?, BioCatch
What are biometric identification and personal identification?, Innovatrics

Related links

Sensor fusion – How does that work?
Sensor fusion levels and architectures
How is sensor fusion used in medicine?
What are different types of biometric sensors?

You may also like:


  • How does voice recognition biometrics work?

  • How do eye & iris scan biometrics work?

  • How do fingerprint, finger geometry & vein recognition biometrics work?

  • How do body odor recognition biometrics work?

  • What determines the connectivity bandwidth needed in a machine vision…

Filed Under: Featured, Frequently Asked Question (FAQ) Tagged With: FAQ

Primary Sidebar

Featured Contributions

Fire prevention through the Internet

Beyond the drivetrain: sensor innovation in automotive

Sensors in American football can help the game

Select and integrate sensors into IoT devices

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“sensor
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

RSS Current EDABoard.com discussions

  • Powering a USB hub: safely distributing current from a shared power supply
  • RF-DC rectifier impedance matching
  • How can I get the frequency please help!
  • Elektronik devre
  • 12VAC to 12VDC 5A on 250ft 12AWG

RSS Current Electro-Tech-Online.com Discussions

  • 100uF bypass Caps?
  • Fuel Auto Shutoff
  • Actin group needed for effective PCB software tutorials
  • how to work on pcbs that are thick
  • compatible eth ports for laptop

EE ENGINEERING TRAINING DAYS

engineering
“bills

RSS Featured White Papers

  • 4D Imaging Radar: Sensor Supremacy For Sustained L2+ Vehicle Enablement
  • Amphenol RF solutions enable the RF & video signal chains in industrial robots
  • Implementing Position Sensors for Hazardous Areas & Safety

DesignFast

Component Selection Made Simple.

Try it Today
design fast globle

Footer

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Test and Measurement Tips

SENSOR TIPS

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy