Glossary

A

Automated Biometric Identification System (ABIS)
System for large-scale biometric matching and identification using algorithms an...

B

Biometric Matching
Comparing a biometric sample against stored templates to verify or identify an i...
Biometric Spoofing
Attempt to deceive a biometric system by presenting artificial traits like masks...
Biometric Template
Digital representation of biometric features extracted from a sample for matchin...

C

Consent
Voluntary agreement by a person for their personal data to be used for specific ...

D

Deep Learning
Subset of machine learning using neural networks with multiple layers to model c...

E

eIDAS
EU regulation on electronic identification and trust services for secure electro...
Equal Error Rate (EER)
A single operating point where the false match rate equals the false non‑match r...

F

Failure to Acquire (FTA)
The proportion of attempts where a usable biometric sample cannot be captured (e...
Failure to Enroll (FTE)
The proportion of subjects who cannot be enrolled due to poor quality or insuffi...
FIDO Alliance
Industry consortium promoting standards for strong authentication like U2F and F...
FMR and FNMR
FMR (False Match Rate) is the proportion of impostor comparisons incorrectly acc...

G

General Data Protection Regulation (GDPR)
EU regulation enforcing data protection and privacy for individuals within the E...

I

Identification vs Verification
Identification answers ‘who is this?’ via 1:N search against a gallery. Verifica...
Identity Proofing
Process of verifying that a person is who they claim to be, often using ID docum...

M

Multi-Factor Authentication (MFA)
Authentication method requiring two or more verification factors, such as someth...

N

NIST Face Recognition Vendor Test (FRVT)
A series of evaluations by NIST to benchmark face recognition algorithms under c...

O

On‑Device vs Server‑Side Matching
Design choice where biometric matching happens locally on a user’s device (with ...

P

Presentation Attack Detection (PAD)
PAD refers to techniques used to detect artefacts (masks, photos, deepfakes) int...
Privacy
The right of individuals to control the collection, use, and disclosure of their...

R

ROC and DET Curves
Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curve...

T

Template Inversion
An attack that attempts to reconstruct a biometric sample (e.g., a face image or...

U

Universal 2nd Factor (U2F)
Open authentication standard that adds a second factor using hardware tokens for...