Glossary
A
- Automated Biometric Identification System (ABIS)
- System for large-scale biometric matching and identification using algorithms an...
B
- Biometric Matching
- Comparing a biometric sample against stored templates to verify or identify an i...
- Biometric Spoofing
- Attempt to deceive a biometric system by presenting artificial traits like masks...
- Biometric Template
- Digital representation of biometric features extracted from a sample for matchin...
C
- Consent
- Voluntary agreement by a person for their personal data to be used for specific ...
D
- Deep Learning
- Subset of machine learning using neural networks with multiple layers to model c...
E
- eIDAS
- EU regulation on electronic identification and trust services for secure electro...
- Equal Error Rate (EER)
- A single operating point where the false match rate equals the false non‑match r...
F
- Failure to Acquire (FTA)
- The proportion of attempts where a usable biometric sample cannot be captured (e...
- Failure to Enroll (FTE)
- The proportion of subjects who cannot be enrolled due to poor quality or insuffi...
- FIDO Alliance
- Industry consortium promoting standards for strong authentication like U2F and F...
- FMR and FNMR
- FMR (False Match Rate) is the proportion of impostor comparisons incorrectly acc...
G
- General Data Protection Regulation (GDPR)
- EU regulation enforcing data protection and privacy for individuals within the E...
I
- Identification vs Verification
- Identification answers ‘who is this?’ via 1:N search against a gallery. Verifica...
- Identity Proofing
- Process of verifying that a person is who they claim to be, often using ID docum...
M
- Multi-Factor Authentication (MFA)
- Authentication method requiring two or more verification factors, such as someth...
N
- NIST Face Recognition Vendor Test (FRVT)
- A series of evaluations by NIST to benchmark face recognition algorithms under c...
O
- On‑Device vs Server‑Side Matching
- Design choice where biometric matching happens locally on a user’s device (with ...
P
- Presentation Attack Detection (PAD)
- PAD refers to techniques used to detect artefacts (masks, photos, deepfakes) int...
- Privacy
- The right of individuals to control the collection, use, and disclosure of their...
R
- ROC and DET Curves
- Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curve...
T
- Template Inversion
- An attack that attempts to reconstruct a biometric sample (e.g., a face image or...
U
- Universal 2nd Factor (U2F)
- Open authentication standard that adds a second factor using hardware tokens for...
