Biometric technology has been with us for over two decades, but how will it evolve over the next ten years?  John Davies, Managing Director of access control specialist TDSi, looks at the impact of biometrics and considers how future developments might shape the security industry.

Biometrics is quite rightly viewed to be at the cutting edge of security technology.  From the very first commercial application of a finger print reader in 1984, we have seen new systems and applications introduced to the market on a regular basis; some are still firmly in the development phase whilst others, like iris and facial recognition, are gradually being introduced into practical installations.

In many ways, it has taken the increased threat from global terrorism and organised crime to create an acceptance of biometric security, convincing an anxious and cynical public that systems do not necessarily pose a threat to civil liberties, provided they are properly controlled and effectively managed. 

In a recent pan-European survey of consumer attitudes conducted by LogicaCMG, research showed that the general public were more concerned with their safety when travelling - and with the security of managing their financial affairs - than they were threatened by any potential privacy issues.  It seems that the debate has now moved on from questioning what is ethical and acceptable to asking what form of biometric technology is most effective and appropriate for particular applications.

Emerging biometric technologies

A growing number of installations are already in successful operation in the UK across a range of sectors - as diverse as school libraries and canteens; airport frequent flyer programmes and prisoner identification systems.  International applications cover airports, financial institutions and embassies. 

Biometrics is quite rightly viewed to be at the cutting edge of security technology

Biometric information remains a topic high on many governments' agendas - with ID cards, visas, passport and border controls all key elements of national security debates.  Recent system developments have seen a significant change in both the biometric information being analysed and the quality of the reading and processing performance.  From the early finger print readers - which still carry with them an unfortunate association with criminal identification, as well as some lingering doubts over the users ability to fool the scanners - have come a range of iris, face, vein and voice technologies.

These emergent technologies are now providing specifiers and security managers with real choice, allowing them to select the most appropriate system for their particular needs - balancing the key variables of accuracy, quality, reliability, speed of performance and cost.From the early finger print readers have come a range of iris, face, vein and voice technologies

Whereas finger print readers are typically at the lower end of the biometric cost scale (partly resulting from the benefits of relatively high production levels, which in four years has seen the cost of readers practically halved), they also tend to be at the lower end of the accuracy scale and so are most appropriate for higher volume, lower risk applications. 

Facial recognition systems are currently second to finger print readers in terms of global usage.  Although facial recognition systems have a higher relative unit cost, they do offer increased accuracy levels.  Inherently the technology has a number of advantages, most notably, that it is readily acceptable by the public and relatively easy to integrate with other security systems, particularly CCTV.  But development work still needs to be done to improve its performance.  It needs to make allowance for the changes that occur to the human face over time - aging, facial hair, skin tone, glasses, etc.  All of which could impede the recognition software.  And technically, the affect of prevailing light conditions and the angle of the image needs to be reduced, thereby allowing faster and more accurate processing. 

Two other stronglfy emerging systems are vein pattern readers and iris recognition.  Both offer a highly attractive combination of accuracy, reliable performance and medium cost and are likely to be the technologies that we will see in the higher-level security systems in the coming years.

Advantage of finger vein recognition

The benefits of vein recognition in particular are significant - and the system is already proving highly effective in the banking sector in Japan.  Palm vein technology was developed by Fujitsu and Finger Vein technology by Hitachi to help combat the increasing incidence of financial fraud and forgery, problems which have plagued many financial institutions in Japan for a number of years - at great cost to the country's economy. 

In many ways, it has taken the increased threat from global terrorism and organised crime to create an acceptance of biometric security

One of the main benefits of vein readers is that, unlike fingerprints which change during childhood, the palm and finger vein pattern is established in the womb and is constant throughout a person's life.  The scanners operate on near-infrared light to read the palm vein pattern, which lies underneath the epidermis and so can't be distorted by damage to the skin, age or the wearing of gloves.  Vein readers also benefit from being non-contact - a particular advantage in environments such as health care, where hygiene may be an issue.

Several of Japan's major banks have been using palm and finger vein recognition at cash points, rather than PINs, for almost 3 years now and are confirming extraordinarily high standards of accuracy, with false rejection rates of 0.01% and false acceptance rates of less than 0.00008%.  TDSi is working closely with both Fujitsu and Hitachi to incorporate this sensing technology into readers that can be deployed in physical access security applications. The first of these readers, PalmGarde (utilising Fujitsu's Pam Secure sensor), was made available for sale in July 2007.

An advantage of the vein readers in that, unlike fingerprints which change during childhood, the palm and finger vein pattern is establishsed for a lifetime in the wombEye recognition development

In terms of eye recognition, developments are being seen in both iris and retina scanning.  Iris recognition offers a highly effective and reliable security option; each individual iris has around 260 unique characteristics and individuals' irises tend not to experience great changes over time.  Furthermore, recognition is only very marginally affected by the angle of image capture and ambient light conditions and the technology is equally effective through glasses, contact lenses and goggles. 

Performance can be affected by certain eye problems, such as cataracts, and if the user is wearing coloured contact lenses or sunglasses - but these potential drawbacks can all be overcome with a degree of cooperation from the user.  TDSi has successfully integrated the Panasonic Iris reader system into our eXguard Pro software platform and have several installations ranging from banks, to pharmaceutical companies to construction sites deploying this solution to augment their physical access security regimes and processes.

Retinal scanning takes the technology a step further and examines the characteristics of patterns of blood vessels at the back of the eye.  Although highly effective and incredibly accurate, this is a particularly time intensive process and is seen by users to be quite intrusive - each individual must look directly into a reader, where a low intensity light is directed through the pupil and performs a 360-degree retinal scan. 

Several of Japan's major banks have been using palm and finger vein recognition at cash points, rather than PINs, for almost 3 years now and are confirming extraordinarily high standards of accuracy

Currently, both iris and retina recognition equipment are rather cost-prohibitive, although strides are being made to bring down the unit cost.  But, given the speed and user issues associated with retina scanning, it is likely that it will only be used in the most high-security situations in the short to medium term, with iris recognition being the more dominant technology - potentially being used in conjunction with facial recognition systems.

Expanding biometric systems

As well as vein and eye recognition systems, there are a whole host of other biometric technologies at various stages of development and acceptance, some of which are set to come to market in future years.  The list includes hand geometry, palm printing, dynamic grip recognition, facial thermography, facial feature recognition and retina recognition - not to mention voice and signature recognition, keystroke dynamics and DNA identification!  Amongst this list, voice scanning techniques are already proving to be highly successful in telephone applications, with several insurance companies already using voice scanning software to identify anomalies in speech patterns, indicating fraudulent behaviour.  However, this technology is less likely to be widely adopted in physical applications.

The next five years promise to be a time of continued change, as complex and expensive research programmes deliver refinements to current biometric systems and the development of completely new technologies and applications.  Perhaps the future is actually staring us in the face, looking right into our eyes and sitting in the palm of our hand all at the same time. John Davis, Managing Director of TDSi

John Davies
Managing Director
TDSi

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?