What are the biggest misconceptions about biometrics?
Editor Introduction
Among the technologies widely used in the world of security, none is more fraught with privacy concerns than biometrics. However, sometimes the privacy concerns are based more on false information than on facts. Privacy must be addressed, of course, but the industry should also promote greater understanding of the technology as a means of combatting misinformation. We asked this week’s Expert Panel Roundtable: What are the biggest misconceptions surrounding biometrics? What is the impact?
For access control, a big misconception around Facial Recognition is that it must be an invasion of privacy. In truth, a correctly implemented system stores opt-in face data securely on the company’s infrastructure. It is not shared. The face data is a mathematical representation, not a photo, which makes it meaningless to any system not tied to the internal company database. Another misconception is that facial recognition can be easily fooled by a picture or video. A system like SAFR can analyse texture and context, based entirely on the RGB visual spectrum field to determine liveness. Our access control device includes a second layer of liveness using 3D data from a structured light projector. Although some facial algorithms have been shown to exhibit bias based on skin tone, not all of them do. It’s important that people seek out facial recognition systems with the lowest possible bias scores from reputable organisations like NIST.
One of the biggest misconceptions surrounding biometrics is that biometrics is too difficult to implement because of consumer privacy concerns. The impact is that companies are apprehensively deploying the technology to solve their business use case and forego the immediate benefits that biometrics brings to verifying a person’s true identity. The same privacy frameworks that apply to any IT system that collects personal data also apply to biometrics. Solutions use privacy impact assessments to classify the sensitivity of biometric data, ensure they obtain consent to use the biometric data, determine if it should be stored, for how long, who has access to it, and how it is removed. Additionally, companies ensure they are ethically sourcing training data for AI and machine learning algorithms used to advance the accuracy and PAD detection of their biometrics. Transparency by companies in disclosing how they use biometrics and protect data is an important factor in alleviating privacy concerns.
Biometrics have made great strides in the last few years as a more advanced and safer authentication method than the use of PINs, passwords and cards. However, when required to provide biometric information, users often worry that their information is being stored as an actual image that could be easily hacked and used to impersonate their information. Because biometric data is stored as a template in binary code rather than an image, it makes hacking considerably more challenging. People also worry that physical changes such as aging, facial hair, etc. will lead to false reads. Significant changes to a person’s biometric markers occur over long periods of time, and as most users are authenticating regularly, small changes in their features will be noted and updated by the algorithms. Biometric technology has huge potential, so it’s important to dispel misconceptions about privacy breaches, accuracy levels and security risks.
Low trust, privacy invasion, and long-term practicality are some of the biggest misconceptions for biometrics authentication. However, Gartner predicts greater adoption of biometrics, especially in supporting access via mobile technology. Biometrics can be an incredibly safe method of authentication as users can quickly and securely log on to different workstations and devices simply by touching their finger to a scanner, rather than managing passwords, logging on multiple times throughout the day, and waiting to gain access to applications and data. Biometrics solutions also give users an unprecedented ability to move between points of work – an increasing demand as more jobs become remote. In regulated industries, like healthcare or banking, biometric solutions can enable companies to comply with HIPAA and FINRA password policy regulations, minimising calls to the help desk, and realising substantial cost reductions.
Over the last few years, biometrics has taken great strides in the security industry. Fingerprint and facial recognition have replaced PINs and passwords as a popular verification form. Over the last couple of years dealing with the pandemic, anything that is completely hands-free has gained some traction. We have also seen a shift in organisations using biometrics in tandem with access control solutions. One common misconception about biometrics is how they are stored and used. While many think the actual image is stored (for example, the fingerprint or iris), it's the encrypted biometric template that is stored, making the chance of risk much lower. Another misconception is that biometrics are unreliable because of people's changing features throughout time. This is also not the case. Biometrics create a safe, streamlined, and scalable way to deliver access and verification, and we will continue to see its use throughout the security industry for years to come.
Editor Summary
Privacy concerns about a centralised database of personal biometric information are generally overblown. The design of many biometrics systems does not involve transport or storage of ‘personal information,’ at least not in any format that would be useful to a hacker or a spy. Rather, much biometric information is just data that is useful only in the context of the system itself. It has been said that a lie repeated often enough becomes the truth. In the world of biometrics, repeating the real facts has never been more important.
- Related companies
- Vanderbilt Industries
- Genetec, Inc.
- Imprivata, Inc.
- RealNetworks Inc.
- Related links
- ACT Access control controllers
- ACT Access control software
- Genetec Access control controllers
- Genetec CCTV software
- Genetec Access control software
- ACT Access control cards/ tags/ fobs
- Card Access control cards/ tags/ fobs
- ANPR Software CCTV software
- Biometric Access control software
- Magnetic Stripe Access control cards/ tags/ fobs
- Standalone Access control controllers
- Control Software CCTV software
- Contact Access control software
- Mifare Access control software
- Drawing Software CCTV software
- Smart Card Access control cards/ tags/ fobs
- Tag Access control cards/ tags/ fobs
- Carpool Anti-passback Access control software
- Central Monitoring Option Access control software
- Management Software CCTV software
- Monitoring Software CCTV software
- Combined online/offline solution Access control software
- Surveillance Software CCTV software
- Door Monitoring Option Access control software
- Face Recognition Software Access control software
- Keypad Commands/Intrusion Zones Access control software
- License Access control software
- Management Systems Upgrade Access control software
- Remote software for telecode door entry phone system Access control software
- Reporting Option Access control software
- Server software for MSDE Access control software
- Visitor Management tool Access control software
- View all news from
- Vanderbilt Industries
- Genetec, Inc.
- Imprivata, Inc.
- RealNetworks Inc.
Expert commentary
Maximising security and performance
DownloadThe truth behind 9 mobile access myths
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadClimax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Milesight 4x5MP AI Multi-Directional Camera
Anviz AI-driven Fisheye Dome Network Camera