{"title":"Identification technologies","authors":"Jean Scholtz, Jeff Johnson","doi":"10.1145/543459.543473","DOIUrl":null,"url":null,"abstract":"Peter pointed out that any biometrics-based ID system exhibits three kinds of failure: false acceptance, false rejection, and failure to enroll. False acceptance is incorrectly authenticating someone. False rejection is the failure to authenticate someone who should have been. Failure to enroll is when a person does not possess the biometrics data needed for identification. For example, people without hands cannot provide fingerprints, and many elderly people have such thin skin that their fingerprints don't register. Error rates of ID systems are not fixed but can be adjusted depending on the security desired and the cost of the various types of errors.","PeriodicalId":7070,"journal":{"name":"ACM Sigchi Bulletin","volume":"1 5 1","pages":"9 - 9"},"PeriodicalIF":0.0000,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Sigchi Bulletin","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/543459.543473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Peter pointed out that any biometrics-based ID system exhibits three kinds of failure: false acceptance, false rejection, and failure to enroll. False acceptance is incorrectly authenticating someone. False rejection is the failure to authenticate someone who should have been. Failure to enroll is when a person does not possess the biometrics data needed for identification. For example, people without hands cannot provide fingerprints, and many elderly people have such thin skin that their fingerprints don't register. Error rates of ID systems are not fixed but can be adjusted depending on the security desired and the cost of the various types of errors.