COURSE TITLE: SEMINAR ON EMERGING
TECHNOLOGY
COURSE CODE: MBA 841
SEMINAR TOPIC: BIOMETRICS
DEPARTMENT: BUSINESS AND ENTREPRENEURSHIP
LECTURER-IN-CHARGE: DR. ISIAKA
FACULTY: MANAGEMENT AND SOCIAL SCIENCES
KWASU BUSINESS SCHOOL
PRESENTED BY: MISHAEL OLORUNSHOLA (2024)
MATRIC NO: 22/27BSIT/004
Definition and Overview of Biometrics
Biometrics refer to measurable anatomical, physiological, or behavioral attributes used
for automated recognition, such as fingerprints, facial photos, or gait patterns. Biometrics has
gained global significance, driven by decreasing technology costs and support from entities like
the World Bank. Countries worldwide, including India with its Unique Identification Project, are
enrolling large populations in biometric programs. The U.S. government has actively invested in
biometric research since the 1960s, advancing technologies like fingerprint identification, facial
recognition, iris, and speech recognition. After the 9/11 attacks, biometric systems were rapidly
deployed for national security, border control, and general public applications, including access
control and personnel verification. In Europe, major systems like the Schengen Information
System and the Visa Information System rely on biometrics for migration and border
management.
The use of biometrics is expanding in response to proposals for improved border control,
including the Entry/Exit system and Registered Traveller Programme. While biometrics are seen
as a solution for identity-related issues, concerns arise about their reliability, security,
accessibility, and usability. Criticisms from human rights advocates and data protection
authorities emphasize the probabilistic and uncertain nature of biometric technologies, raising
questions about their ability to accommodate bodily differences and the increasing reliance on
them in various sectors.
Biometrics encompasses a diverse range of identification and authentication methods based
on unique physical or behavioral characteristics. Here are some of the primary types of
biometrics:
1. Fingerprint Recognition:
Fingerprint recognition is one of the oldest and most widely used biometric methods. It
involves capturing and analyzing the unique patterns of ridges and valleys on an
individual's fingertips. It is commonly used in law enforcement, access control systems,
and mobile devices for secure authentication.
2. Facial Recognition:
Facial recognition involves capturing and analyzing facial features such as the distance
between eyes, nose shape, and jawline. It uses this information to create a unique
faceprint for identification. It is widely used in security and surveillance systems, mobile
devices, and airport security for identity verification.
3. Iris Recognition:
Iris recognition involves capturing the unique patterns in the colored part of the eye
(iris). The intricate and stable nature of iris patterns makes this method highly accurate. It
is commonly used in high-security environments, border control, and access control
systems.
4. Retina Scans:
Retina scans involve capturing the unique patterns of blood vessels at the back of the eye
(retina). This method requires close proximity to the scanning device. It is used in secure
facilities where high accuracy is crucial, such as military installations and research
laboratories.
5. Voice Recognition:
Voice recognition analyzes the unique vocal characteristics of an individual, including
pitch, tone, and speech patterns. It is used in telephone-based authentication systems,
voice-activated devices, and security applications.
6. Hand Geometry:
Hand geometry recognition measures and analyzes the physical structure of the hand,
including finger length and width, to create a unique handprint. It is commonly used in
access control systems and time and attendance tracking.
7. Vein Pattern Recognition:
Vein pattern recognition captures the unique patterns of veins beneath the skin's surface,
typically in the palm or fingers. It is used in secure environments and high-tech
authentication systems.
8. Signature Recognition:
Signature recognition analyzes the dynamic aspects of a person's signature, including
pressure, speed, and style. It is used for secure document verification and financial
transactions.
9. Keystroke Dynamics:
Keystroke dynamics analyze an individual's typing rhythm and keystroke patterns,
providing a unique behavioral biometric. It is used for user authentication in computer
systems and online platforms.
10. Gait Recognition:
Gait recognition involves analyzing an individual's walking pattern, taking into account
factors such as step length and pace. It is applied in video surveillance and security
systems for identifying individuals based on their gait.
11. Ear Shape Recognition:
Ear shape recognition analyzes the unique features and contours of an individual's ear for
identification. It is primarily used in specialized security applications.
It's common for systems to employ multiple biometric modalities for enhanced accuracy and
reliability.
Application of Biometrics
Biometrics, involving the use of measurable physical or behavioral attributes for automated
recognition, finds applications in various sectors due to its reliability and security. Here are six
key applications of biometrics:
1. Law enforcement and public security (criminal/suspect identification)
2. Military (enemy/ally identification)
3. Border, travel, and migration control(traveller/migrant/passenger identification)
4. Healthcare and subsidies (patient/beneficiary/healthcare professional identification)
5. Physical and logical access (owner/user/employee/ contractor/partner identification)
6. Commercial applications (consumer/customer identification)
1. Law Enforcement and Public Security:
Biometrics revolutionizes law enforcement by providing advanced tools for criminal
identification. Automated Fingerprint Identification Systems (AFIS) and Automated
Biometric Identification Systems (ABIS) allow law enforcement agencies to store,
search, and retrieve fingerprint images, improving the accuracy and speed of suspect
identification. Live face recognition adds another layer of security, enabling real-time
identification in crowded public spaces. The use of biometrics in law enforcement aims to
enhance investigative capabilities, reduce false identifications, and improve overall
public security by swiftly identifying and apprehending suspects.
2. Military :
Biometrics plays a crucial role in military operations, where it is employed for ally and
enemy identification. The U.S. military's collection of faces, irises, fingerprints, and
DNA data since 2009 enables precise identification of individuals on the battlefield.
Biometric identification is a powerful tool for military intelligence, helping in the
tracking and neutralization of potential threats.
Purpose - Enhancing military operations through accurate identification, ensuring the
safety of troops, and facilitating strategic decision-making based on biometric data.
3. Border Control, Travel, and Migration:
Biometrics transforms border control and travel experiences. Integrated into e-passports,
biometrics such as facial and fingerprint recognition streamline border crossings through
automated gates and self-service kiosks. Biometric infrastructure at border posts
enhances accuracy in identifying travelers, preventing fraudulent use of passports and
ensuring the secure movement of people.
Purpose - Improving the efficiency of border control, enhancing security by accurately
identifying travelers, and facilitating a seamless and secure travel experience.
4. Healthcare and Subsidies:
Biometrics is employed to safeguard healthcare services and subsidy programs. National
identity cards with biometric verification, as seen in countries like Gabon, ensure that
individuals are accurately identified before accessing governmental services or
healthcare. Biometric health insurance cards, containing fingerprints and photographs,
prevent fraudulent use of benefits, ensuring that the intended beneficiaries receive the
assistance.
Purpose - Safeguarding the integrity of healthcare and subsidy programs, preventing
misuse, and ensuring that resources are directed to the rightful recipients.
5. Physical and Logical Access Control:
Biometric access control systems provide a robust layer of security for physical and
logical access. In physical access control, biometrics like fingerprints, iris scans, or facial
recognition restrict entry to authorized personnel, safeguarding sensitive locations. In
logical access control, biometric authentication complements traditional methods,
ensuring secure access to computer systems and networks.
Purpose - Enhancing overall security by preventing unauthorized access, whether to
physical spaces or digital platforms, and improving Identity and Access Management
(IAM) policies for comprehensive security measures. In the mobile world, smartphones
(a form of I.T. system) now usually include fingerprint and facial recognition features.
The iPhone 5 was the first to introduce fingerprint recognition in 2013 (with TOUCH
ID), and facial recognition became trendy with the iPhone X introduced in November
2017 (with FACE ID). Many Android phones have this feature (combined with iris
scanning).
These applications underscore how biometrics enhances security, accuracy, and efficiency across
diverse sectors, offering tailored solutions to specific identification and verification challenges.
Existing Problems and the Biometric Interventions
While biometrics is seen as a solution for identity-related issues, concerns arise about their
reliability, security, accessibility, and usability. Criticisms from human rights advocates and data
protection authorities emphasize the probabilistic and uncertain nature of biometric technologies,
raising questions about their ability to accommodate bodily differences and the increasing
reliance on them in various sectors. Examples of biometric interventions include the adoption of
ID and biometric verification in fintech, traditional banks, gambling, on-demand delivery, car-
sharing services, hospitality, and retail, striking a balance between speed, security, and customer
trust.
1. Lack of customer trust:
Fintech companies like Revolut and Monzo revolutionized the digital marketplace, prioritizing
user convenience and simplified access to online banking. Remote identity verification became a
challenge, prompting the adoption of ID and biometric verification. Traditional banks followed
suit, responding to evolving customer expectations and pandemic-related restrictions. Other
regulated industries, such as gambling and on-demand delivery, also embraced biometrics for
high-assurance identity and age verification. Consumer comfort with digital services, especially
biometrics, grew during lockdowns, with data indicating that nine out of 10 consumers felt at
ease accessing services online.
2. Speedy access:
While speed is crucial for customer experiences, it's essential to balance it with privacy and trust.
The growth of online traffic has increased opportunities for fraud, leading to a focus on quantity
over quality by cybercriminals. In the financial services sector, a primary target for
cybercriminals, biometrics plays a vital role in fraud prevention, contributing to building
customer trust. Trust-based services like dating apps also leverage biometrics to enhance safety
and reduce fraud. The delicate balance between customer experience and security highlights the
importance of adding the right amount of friction, where biometrics becomes a reassuring
method.
3. Creating a Compelling Customer Experience:
Businesses focus on building genuine relationships and positive customer experiences through
biometrics. Examples include car-sharing services like Drivy using facial biometrics for digital
driver verification, resulting in increased users and reduced drop-off rates. Biometrics also
transform the hospitality sector, with platforms like Sidehide enabling hotel customers to book
and check-in via an app. Tech giants like Amazon explore contactless retail payments using
biometrics. The emphasis is on a smooth customer journey, and mainstream rental companies
like Hertz and Avis are adopting similar practices to streamline processes and enhance customer
satisfaction.
Examples of existing businesses in Biometrics
1. NEC Corporation: NEC Corporation is a Japanese multinational information technology
and electronics company. NEC is a major player in the biometrics industry, offering
solutions such as fingerprint recognition, facial recognition, and multimodal biometric
systems.
2. Idemia: Idemia, formerly known as Safran Morpho, is a global company specializing in
security and identity solutions. Idemia provides a wide range of biometric technologies,
including fingerprint, facial, and iris recognition, for applications such as identity
verification, border control, and law enforcement.
3. Fujitsu Limited: Fujitsu is a Japanese multinational information technology equipment
and services company. It is involved in the development and deployment of biometric
solutions, including palm vein recognition technology. Fujitsu's biometric technologies
find applications in security, access control, and identity management.
4. Crossmatch (now HID Global): Crossmatch, now a part of HID Global, was known for
its biometric identity management solutions. They offered fingerprint, palm print, and
facial recognition technologies for applications in law enforcement, border control, and
enterprise security.
5. Aware, Inc.: Aware, Inc. is a biometrics software and services company based in the
United States. It specializes in providing biometric solutions such as fingerprint, face, and
iris recognition. Aware's technology is used in various industries, including government,
healthcare, and financial services.
Recommendations for Organizations Adopting Biometrics:
1. Comprehensive Risk Assessment:
• Conduct a thorough risk assessment to identify potential vulnerabilities and risks
associated with the adoption of biometric systems. This should include privacy considerations,
regulatory compliance, and potential challenges during implementation.
2. Robust Security Measures:
• Prioritize the implementation of biometric systems with robust security measures,
ensuring encryption, secure storage of biometric data, and protection against potential cyber
threats. Regular security audits should be conducted to assess system integrity.
3. User Education and Acceptance:
• Invest in comprehensive user education programs to ensure employee and customer
understanding of biometric systems. Address concerns related to privacy, data security, and the
overall benefits of the technology to enhance user acceptance.
4. Privacy Compliance:
• Adhere to stringent privacy regulations and ethical standards governing the collection,
storage, and usage of biometric data. Establish transparent policies and practices, obtaining
informed consent from individuals whose biometric information is being utilized.
5. Organizational Culture and Training:
• Foster an organizational culture that embraces technological innovation. Provide
extensive training programs for employees to ensure a smooth transition and address any
resistance to change. Employee involvement is crucial for successful implementation.
6. Scalability and Future-Readiness:
• Choose biometric systems that are scalable and adaptable to future technological
developments. Consider emerging trends, such as multimodal biometrics or behavioral
authentication, to ensure the organization remains at the forefront of technological
advancements.
7. Continuous Monitoring and Evaluation:
• Implement mechanisms for continuous monitoring and evaluation of biometric systems'
performance. Regularly assess the effectiveness, user experiences, and any emerging issues to
facilitate timely adjustments and improvements.
8. Collaboration with Experts:
• Engage with experts in biometric technology, data security, and legal compliance to
ensure a well-informed implementation strategy. Collaboration with specialists can provide
valuable insights and guidance throughout the adoption process.
By following these recommendations, organizations can navigate the complexities associated
with adopting biometrics, unlocking the full potential of these technologies while
safeguarding privacy, ensuring security, and fostering positive user experiences. This
strategic approach positions businesses to thrive in an era where biometrics plays a pivotal
role in shaping the future of organizational operations.
Opportunities in Biometrics Business
1. Enhanced Security Measures: Biometrics provides a robust and secure method for identity
verification, offering increased protection against unauthorized access and fraudulent activities.
Organizations can enhance security measures for physical and digital access, preventing identity
theft, and ensuring secure transactions.
2. Increased Adoption in Various Sectors: Biometric technologies are being widely adopted in
sectors such as finance, healthcare, government, and commercial applications. This widespread
adoption opens up new markets and revenue streams for biometric solution providers, fostering
growth and innovation.
3. Advancements in AI and Machine Learning: Integration with artificial intelligence (AI) and
machine learning (ML) allows biometric systems to continuously improve accuracy and
efficiency. Enhanced algorithms contribute to more reliable identification, reduced false
positives, and increased adaptability to diverse user populations.
4. Contactless Solutions in a Post-Pandemic World: The demand for contactless authentication
methods has risen, and biometrics, especially facial recognition, provides a convenient and
hygienic solution. Biometric technologies can play a pivotal role in the development of touchless
systems for access control, payments, and various applications in a world focused on hygiene.
Challenges in Biometrics Businesses
1. Privacy Concerns and Ethical Issues: Biometric data, being highly personal, raises concerns
about privacy, consent, and the ethical use of such information. Striking a balance between
enhanced security and safeguarding individual privacy is a significant challenge, requiring clear
regulations and ethical standards.
2. Vulnerability to Spoofing and Cyber Attacks: Biometric systems are susceptible to spoofing,
where attackers use fake fingerprints or facial images, and cyber threats targeting biometric
databases. Ensuring the resilience of biometric systems against sophisticated attacks is crucial to
maintaining trust and reliability.
3. Standardization and Interoperability: Lack of universal standards and interoperability can
hinder seamless integration of biometric systems across different platforms and applications.
Establishing common standards is essential for the widespread adoption of biometrics, allowing
for compatibility and collaboration between diverse systems.
4. User Acceptance and Usability: Some users may be uncomfortable with the idea of biometric
data storage or may find certain biometric methods inconvenient. Achieving broad user
acceptance requires addressing usability concerns, ensuring user-friendly interfaces, and
educating the public about the security and benefits of biometric technologies.
References:
Smith M, Mann M, Urbas G (2018) Biometrics, security and crime
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A (2019) Secure Remote Authentication Using
Biometric Data
Ashok, J., & Shivashankar, V. (2010). An overview of biometrics.
Jain, A., & Bolle, R. (2004). 1 Introduction to biometrics.
Li, Y. (2006). Biometric technology overview. Nuclear Science and Techniques, 17, 97–105.
Wang, P., & Yanushkevich, S. (2007). Biometric technologies and applications.
Fairhurst, M. (2018). Biometrics: A Very Short Introduction. Oxford University Press.
Jain, A. K., Ross, A., & Nandakumar, K. (2008). Introduction to biometrics.
Ross, A., & Jain, A. K. (2015). Biometrics, overview.
Heyer, R. (2008). Biometrics Technology Review 2008.
Sayoud, H. (2011). Biometrics: An Overview on New Technologies and Ethic Problems.
International Journal of Technoethics, 2, 19–34.
Harriss, L. M., & Davis, K. (2018). Biometric technologies.
https://fastercapital.com/keyword/biometric-technology.html The Evolution of Biometrics:
Security and Identity in a Digital Age
https://hbr.org/2023/03/how-biometrics-are-transforming-the-customer-experience How
Biometrics Are Transforming the Customer Experience
https://www.google.com/search?
client=opera&q=Protecting+your+Personal+Data+and+Privacy+Online+2016+(Pages+183-
198)&sourceid=opera&ie=UTF-8&oe=UTF-8 Protecting your Personal Data and Privacy
Online 2016 (Pages 183-198)
https://www.sciencedirect.com/science/article/abs/pii/B978012391063900047X Usability of
Biometric Systems