Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics Technology Touches the Future

By Cynthia Freschi
November 1, 2007


As I write this month’s column, ASIS has just issued a press release stating that their exhibit space for the 2007 ASIS show in Las Vegas was sold out and a record 910 companies exhibited at the September event. This is obviously good news for our industry, reflecting its continued growth. One of the areas in which I anticipate we’ll see an increase in product exhibits is biometric access control.

Biometric solutions are appealing on many levels and can be used for a variety of applications, including time and attendance reporting, building/door access control, signature verification and several other uses, depending on the technology employed. Increasingly, biometric solutions are being networked and integrated with access cards and/or smart cards to provide dual authentication and ultimately, a higher level of security.

Basically, a biometric access control system consists of a reader or scanning device, software that converts the gathered information into digital form and a database that stores the information for retrieval and comparison. The verification procedure requires the user to enter a PIN code into a keypad, swipe a magnetic stripe/bar code card or touch a biometric reader with a proximity card. The reader then pulls up a template of the individual’s biometric data, taken at the time of enrollment. Depending on the type of biometric device, the user then provides the biometric input (i.e. fingerprint, iris, etc.) and if the input matches the pulled-up template, the user is verified.

Several biometric technologies are already commercially available and field-proven and bear looking into when designing a state of the art security system. Some of the well-known forms of biometrics include fingerprint, iris, hand geometry and facial recognition.

Fingerprint

Fingerprint matching technology is one of the most developed of all biometric technologies and has been used extensively in and by law enforcement for many years because of its ease of use, non-intrusiveness and reliability. A typical system uses a fingerprint scanner (optical, silicon or ultrasound) to digitally map the series of ridges and furrows on the surface of the finger. The minutiae points, which are the local ridge characteristics that occur at either a ridge split or a ridge ending, are unique in every individual and these points provide the basis for the biometric verification method.

Fingerprint matching can be used for verification applications when an individual, using a PIN code or prox card, claims to be a certain person and the system verifies the claim by matching the fingerprint to the stored template. This is known as a one-to-one search. Fingerprint matching can also be used for identification applications without the use of a PIN code or proximity card and this is known as a one-to-many search. Usually, a minimum of 12 minutiae points are legally required for positive identification in a criminal case but the biometric fingerprint reader can record more than 40 of these points.

In addition to access control applications, fingerprint technology is also a very strong desktop solution for network authentication as well as for applications within the health care industry and other privacy-sensitive industries, where it can help to improve the ability to access, track, manage and share data resources while guaranteeing the confidentiality and integrity of the transactions. Other applications include transportation (i.e. harbors, airports, etc.), gaming and financial institutions.

Iris Recognition

Iris recognition is widely recognized as one of the most accurate of all biometric technologies, with a reported misidentification rate of only one per 1.2 million. Its combined attributes of mathematical certainty, speed and non-invasive operation clearly make it the technology of choice for high profile applications such as immigration control, correctional facilities, airport access control, child identification programs and automated banking.

Using a specialized video camera to capture a detailed close-up of the iris and accompanying biometric software, a template or “map” of each person’s iris pattern is made for storage in the system. To verify identity later, an individual simply looks into a specialized iris camera, and the system compares the patterns in the individual’s iris against the templates stored in the system. If there’s a match, the identity is verified.

Iris recognition systems can be used as stand-alone solutions or in combination with access control systems requiring a pause and declare process (i.e. enter PIN code, etc.).

Hand Geometry

The primary advantage of hand geometry technology compared to other biometric access control solutions is its capability to be deployed in harsher environments including construction sites or entrance gates to high security facilities such as nuclear sites. Most systems can withstand temperatures ranging from 0° C to 45° C, and soiled or rough hands do not affect the image reading. Another advantage is its non-threatening approach to enrollment and verification. The hand geometry scanner takes measurements of the length, width, thickness and surface area of the hand and fingers and then records a three-dimensional shape to a template.

When an individual uses the scanner, it compares the shape of the user’s hand to the recorded template and if the template and the hand match, the scanner produces an output to unlock a door, transmit data to a computer or simply verify identification.

Hand geometry is facing stiff competition from other biometric technologies because of the physical size of the hand scanner but it is still used extensively in time and attendance applications because its performance remains unaffected by soiled or dirty hands and because of its proven cost savings by reducing time fraud and buddy punching activities.

Facial Recognition

While the technology for facial recognition shows promise, it is not yet considered fully mature or perfected. However, as we move to “smart” environments on our city streets (i.e. traffic cameras) and in public buildings or educational facilities, facial recognition will play a more prominent role in safety and security. In fact, the infrastructure for its implementation in the form of video surveillance systems is already highly developed and widespread. In addition, every government agency and many private companies keep photo ID records.

New developments in facial recognition technology are advancing the systems from conventional two-dimensional images to 3-D technology as well as incorporating other improvements such as the ability to rotate the image, enhance the lighting or perform tracking functions. Of all the biometric technologies, facial recognition appears to have the most appeal and widespread application possibilities because it is unobtrusive and discreet and does not require active participation by the user.

There are several other biometric technologies either in development or on the market which are worth mentioning, including speaker/voice biometrics, dynamic signature verification, keystroke dynamics, vascular pattern recognition and DNA biometrics to name but a few. All of these modalities share the commonality of using a measurable biological or behavioral characteristic for automated recognition and one is only measurably better than another based on the application and implementation or the maturity of the technology.

Whatever the biometric though, it is an exciting new growth area for our industry and I for one am looking forward to its progress.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • IP Video Surveillance: An Investment in the Future

    See More
  • A Smart Future for Video Surveillance

    See More
  • Smart Technology Version 2.0

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!