
Biometric Security
Biometric Security
D3 Innovations LLC. in Silver Spring, Maryland uses the following biometrics to identify authorized users.
1. Voice
1. Voice
The human voice is a dynamic form of biometrics since it dramatically changes as we age. The shifts may even occur daily as humans often say the same words in different ways. According to Brett Beranek of computer software company Nuance, this shift doesn’t change the underlying physical characteristics of the voice.

But physical variations like catching a cold could affect characteristics of the voice, making the user unable to authenticate. Variations like this make it more challenging to get the technology right but are also what make it so strong. Beranek emphasized the importance of providing a method to rectify issues like this.
Last year, TalkTalk announced that voice biometrics will be used in place of passwords after an incident of a high-profile cyberattack.

2. Iris
2. Iris
Another reliable form of biometrics makes use of the iris, the colored part of the eye. Unlike the dynamic voice, the iris is considered as static biometrics. The highly intricate patterns of the iris make them accurate and prompt to test.
In 2014, iris scanners were launched at various airports in the United Kingdom. They were, however, eventually withdrawn after it was observed that they take longer than standard passport checks. Additionally, the equipment requires sizeable storage and a high degree of proximity.
Companies like EyeLock contend that iris scanning will be useful to applications such as driverless cars and the internet of things.
3. Fingerprint
3. Fingerprint
Fingerprint scanning is another form of static biometrics that doesn’t change a lot over time. This method is efficient, inexpensive, and transportable. It uses a camera small enough to be built into mobile devices that can capture a fingerprint image.

Fingerprint scanning is great for authentication on smartphones as it doesn’t require users to always type their passwords on a device with a limited typing functionality.
Apple Pay is one of the biggest users of this technology.

4. Facial Recognition
4. Facial Recognition
Facial recognition is another economical form of biometrics. It’s fairly non-intrusive and suits well with smartphones with front-facing selfie cameras. This technology is currently used at e-passport gates at some UK airports and in MasterCard’s selfie-based payment app.
A potential drawback of this method is it’s also dynamic. The image of a person may change with age, a new haircut, or by wearing a pair of glasses. Additionally, images can be easily affected by lighting.
5. DNA
5. DNA
A DNA test is most likely to be accurate. There is a very slim chance that two persons share the same DNA profile. This testing may be highly accurate and sophisticated, but it is also expensive and intrusive.

However, there have been efforts to make DNA tests more portable. During an American Association for Clinical Chemistry event in 2015, scientists presented a low-cost, coffee mug-sized device that lets the user process the data using only a smartphone app.

6. Tattoo Recognition
6. Tattoo Recognition
Using images of people's tattoos to identity them, this technology reveals information about a particular person including his or her religion and political beliefs. It also connects the individual with people who have similar tattoos.
BIOMETRIC SYSTEM OVERVIEW
BIOMETRIC SYSTEM OVERVIEW
Biometric systems mainly use three steps:

Enrollment
Enrollment
Upon using a biometric system for the first time, it will record your name, ID number, and basic information. The system then captures your photo or a specific trait recording.
Storage
Storage
Biometric systems don’t usually store the full photo or recording. They examine the captured trait and translate it into a graph or code. Some biometric systems can put data onto a smart card, which one can use for identification.
Comparison
Comparison
Upon using the system again, it will compare the trait you present to the information it has on file. The system will either accept or reject your identity depending on whether the information match.
AUTHENTICATION AND IDENTIFICATION
AUTHENTICATION AND IDENTIFICATION
Step 1: Create Profile
Step 1: Create Profile
Create a new profile by uploading or taking an image using a webcam or smartphone.
Step 2: Photo Capture
Step 2: Photo Capture
The image from the video stream, webcam, or smartphone is captured and compared to the ID and biometric template. This is to make sure that the person is not using a stolen ID or picture.
Step 3: Liveness Face Map
Step 3: Liveness Face Map
To make sure that the user is present and not spoofing the process, the biometric solutions will integrate a liveliness check during the photo capture process.
Step 4: Identification Result
Step 4: Identification Result
The security service is notified and will block operations should there be any case of fraud. Otherwise, the user will then be assigned account credentials with a username and a password.
Step 5: Continuing User Authentication
Step 5: Continuing User Authentication
Whenever the user wants to log in, they will only need to take a photo to verify his or her identity. The authentication process only takes a few seconds to complete.
BIOMETRIC USE CASES
BIOMETRIC USE CASES
The use of biometrics, which was mostly in law enforcement and the military during the past few decades, is becoming more useful to more industries nowadays. In fact, smartphone users can now unlock their phones via facial or fingerprint recognition. Other use cases of biometric security include:
- Law Enforcement and Public Security (Criminal/Suspect Identification)
- Military (Enemy/Ally Identification)
- Border, Travel, and Migration Control (Traveler/Migrant/Passenger Identification)
- Civil Identification (Citizen/Resident/Voter Identification)
- Healthcare and Subsidies (Patient/Beneficiary/Health Professional Identification)
- Physical and Logical Access (Owner/User/Employee/Contractor/Partner Identification)
HOW ACCURATE ARE BIOMETRICS?
HOW ACCURATE ARE BIOMETRICS?
Just like any other science, biometrics allows a certain margin of error. However, biometrics are still highly accurate and continue to be more accurate over the years. Research by the National Institute of Standards and Technology claims that the accuracy of this technology has improved significantly – from a 4% failure rate in 2014 to a 0.2% failure rate in 2018.
The risk of biometric errors can be influenced by the following factors:
- The Age of the Person and the Tone of Their Skin
- Facial Hair or Dyed Hair
- Low-Quality Camera Model
- Busy Environment