Applicatoin of Technology


Biometrics in banking has extended an extraordinary deal in a previous couple of years and is being carried out by way of banks at some stage in the world. As worldwide financial entities grow to be extra digitally-based, banks are implementing biometric technology to enhance consumer and employee identity control in order to fight fraud, increase transaction security, and decorate consumer convenience. customers also are fed-up with identity theft and the inconveniences associated with constantly having to prove their identities. As a result, increasingly more clients are searching out banks that have biometric authentication in area prompting banks to greater carefully studies the generation for implementation.

Access control and SSO (Single Sign-On):

The globe adopting biometric technology for access control and single sign-on (SSO) is due to the fact traditional authentication techniques like passwords are insufficient for personal identity. Passwords simplest offer proof or evidence of expertise while biometrics offers unique advantages as it is predicated on figuring out a person via “who they’re” compared to “what you understand “or “what you’ve got.”


The Top 5 Uses of Biometrics Across the Globe. (n.d.). Retrieved from

Application of Technology

There is a different application of using biometric technology.

Airport Security:

Making the journey thru airport terminals greater seamless for passengers is an aim shared with the aid of airports around the world. Biometric technology to verify passenger identities has been used in several big worldwide airports for some of the years and the generation is fast spreading to different places across the globe. in many airports, the top biometric modality choice for immigration manage is iris popularity. with a purpose to use iris popularity, tourists are first enrolled by having an image of their iris and face captured by a digicam. Then, their precise details are saved in an international database for immediate, correct identity at ports of entry and go out that use iris reputation for visitor identity verification.

Attendance System:

The most common biometric functions used for worker identification are faces, fingerprints, finger veins, palm veins, irises, and voice patterns. while a worker tries identification by means of their biological tendencies, a biometric hardware device compares the new scan to all available templates which will locate an actual in shape.


The Top 5 Uses of Biometrics Across the Globe. (n.d.). Retrieved from

Experimental Analysis

India’s ambitious digital identity document (id) initiative – the world’s biggest biometric database – has awed its many observers and proponents. The countrywide id card device, referred to as Aadhaar (translated as foundation) turned into introduced in 2010 and made a point of first enrolling the most economically and socially excluded males and females. The biometric function of Aadhaar in all fairness a success in organizing someone’s specialty, even though not constantly dependable at verifying humans’ identities when they arrive to assert their entitlements. this could justify biometric authentication in a few high-hazard situations (e.g., registering for a brand new advantage) even as making it optionally available for greater recurring duties. most governments have records and records on residents and residents alike – no matter existential debates about protective freedom. It is authentic is that technology and virtual identification is enormously emotive and continually quite political.



Misra, P., & Bhanderi, M. (2018). All Eyes on India’s Biometrics ID Experiments. Retrieved from



Proposed solution to solve research issues

analyzing to the studies paper, there are some problems of biometric technology and it makes failure to a number of factors. For fingerprint popularity, there are number of blunders generate when person use fingerprint because of hardware and software program aren’t correct and now not greater responsive but these days, in fingerprint identification it takes extra time and step to confirm user’s finger and deliver accurate response to them also devices use extra accurate and brief responsive hardware and software for the machine. however, environment additionally outcomes on a fingerprint in order that the greater development for hardware for clean to get right of entry to any sort of surroundings and clean to access them. In face recognition, there is highly fake ration in a single to 1 or many programs due to camera and lighting fixtures so it offers accurate digicam lance with a huge perspective with appropriate mild for the camera and also improves software program which is noticed more point and provide them accurate response because of physiological characteristics mainly lessen accuracy. In iris generation, it offers an accurate reaction however it uses tough glass cowl with lenses so it is the effect of performance so they use thin glass with difficult characteristics so it decreases mirrored image of difficult glass and offers a more accurate response as well as the lower fake ratio. there’s a privateness trouble within the machine due to the fact the use of fingerprint and hand geometry it’s far difficult to recognize about who sue that statistics so it makes greater correct fingerprint and will increase duplication checking to discover the more duplicate statistics and remove from the database.


There are critical ethical problems inside the use of biometric generation. the main problems challenge the private privacy, the struggle with one’s ideas and values and the gathering, safety, and use of private biometric information. The civil liberty organizations argue that the generation undermines the human rights for privateness and anonymity. it is intrusive and has the functionality to make a critical effect on non-public freedom and democratic rights. The technology is susceptible to failure and isn’t always fake evidence as it is able to be spoofed(Shaikh, n.d.).
Because of many troubles and threats around the sector, e.g. threat of terrorism, identity theft and fraud, protection, illegal immigration, gain fraud and crime prevention and detection troubles, it has come to be crucial to have the capability to freeze someone identification for later identification and verification.

Shaikh, A. (n.d.).  Ethical Issues in the Use of Biometric Technology. Retrieved from


future innovation

Tokyo 2020 Olympic and Paralympic organizers are assured that security for the games will run easily and effectively after unveiling a pioneering face-reputation identity device . accredited people need to hold a card containing a chip with their facial statistics as much as a terminal at each safety test factor, even as additionally looking into a digicam to confirm their identity. NEC says that the generation, to be able to no longer be used for spectators, plays facial reputation “straight away” and has an accuracy price of greater than 99 percent. “The facial recognition device will not be used for spectators” however handiest those legal. “authorized humans will need to go to regions wherein spectators are not allowed, and we can need greater security to deal with that. humans will need to move inside and outside of cozy regions normally, and the facial reputation gadget will allow that technique to run greater smoothly.”


Mckirdy, A. (2018). 2020 Tokyo Olympic chiefs unveil pioneering face-recognition securitysystem. Japan Times. Retrieved from

Challenges and Opportunities

Biometric recognition–the automated recognition of people based totally on their behavioral and biological function–is promoted as a way to help pick out terrorists, offer higher manipulate of address admission to to physical facilities and financial bills, and increase the performance of access to offerings and their usage. Biometric reputation has been applied to identity of criminals, patient monitoring in medical informatics, and the personalization of social services, among other matters. despite tremendous effort, however, there stay unresolved questions about the effectiveness and control of structures for biometric reputation, as well as the appropriateness and societal effect of their use. furthermore, the general public has been exposed to biometrics in large part as excessive-technology gadgets in spy thrillers or as worry-instilling devices of kingdom or company surveillance in speculative fiction. Now, as biometric technology appear poised for broader use, accelerated issues approximately policymakers protection and the monitoring of individuals as they cross borders have caused passports, visas, and border-crossing statistics to be connected to biometric information. a focus on fighting insurgencies and terrorism has caused the army deployment of biometric gear to permit recognition of people as buddy or foe. Commercially, finger-imaging sensors, whose fee and bodily size have been decreased, now seem on many laptop non-public computer systems, hand-held devices, mobile phones, and other consumer devices.

Face recognition

Definition: face recognition technology measures and fits the precise characteristics for the functions of identity or authentication. often leveraging a virtual or linked digital camera, facial recognition software program can come across faces in pictures, quantify their features, and then match them in opposition to stored templates in a database.

How does it work?:

According to Rouse (n.d.),

The software program identifies eighty nodal points on a human face. on this context, nodal factors are endpoints used to degree variables of a person’s face, such as the duration or width of the nose, the intensity of the eye sockets and the form of the cheekbones. The system works by taking pictures records for nodal points on a virtual picture of a man or woman’s face and storing the resulting information as a faceprint. The faceprint is then used as a foundation for contrast with information captured from faces in a photo or video.

despite the fact that the facial reputation machine handiest makes use of eighty nodal points, it could speedy and as it should be discover goal individuals while the conditions are favorable. but, if the concern’s face is partially obscured or in profile as opposed to facing ahead, or if the light is insufficient, this sort of software program is less reliable








Rouse, M. (n.d.). Facial recognition. Retrieved from

IRIS bio metric

Iris recognition is a technique of identifying humans primarily based on precise patterns inside the ring-shaped area surrounding the pupil of the eye. According to IRISID (n.d.),

Iris recognition is the excellent breed authentication technique available nowadays. even as many mistake it for retinal scanning, iris recognition sincerely involves taking a photo of the iris; this photo is used completely for authentication. however what makes iris popularity the authentication system of desire?

stable – the precise pattern inside the human iris is shaped by using 10 months of age, and remains unchanged all through one’s lifetime
precise – the possibility of rises generating the equal code is almost not possible
flexible – iris reputation era without difficulty integrates into current security systems or operates as a standalone
dependable – a exclusive iris pattern isn’t at risk of theft, loss or compromise
Non-Invasive – not like retinal screening, iris recognition is non-touch and quick, imparting unrivaled accuracy when as compared to any other protection opportunity, from distances as some distance as three″ to ten″.







Iris recognition system. (n.d.). IRISID. Retrieved from

Bio-metric Security System

Biometric Security System
a number of solutions are proposed to deal with the biometric gadget protection problem. Biometric templates are in no way saved within the uncooked shape. they’re encrypted; from time to time even two times.

it’s far the high-quality or the state of being pure, real, or original, in place of being reproduced. statistics is genuine whilst it’s miles within the equal nation and satisfactory while it turned into created, saved, or transferred.

it’s far limiting data get entry to and disclosure to legal users and preventing access by using or disclosure to unauthorized human beings. In cases of a biometric gadget, it mainly refers to biometric and associated authentication information when it’s miles captured and saved, which wishes to be stored secret from unauthorized entities.

it’s far the situation of being whole and unaltered that refers to its consistency, accuracy, and correctness. For a biometric machine, the integrity ought to be excessive. Any malicious manipulations in the course of operation and storage should be saved away or detected earliest by way of consisting of its notification and correction.

it’s miles the identity of worried assets such as entities and components. it’s also visible as accountability. as an example, it prohibits a sender or a recipient of biometric information from denying having sent or obtained biometric information.

A useful resource has the belongings of availability with respect to a hard and fast of entities if all individuals of the set can access the aid. An issue known as reachability ensures that the people or gadget methods both can or can not be contacted, depending on user interests.


Just another CSU Thinkspace site

Skip to toolbar