Nowadays, biometrics is considered to be the best method of authentication in the banking sector with a wide range of applications, including at ATMs, branches and internet banking payments. “Within the framework of Getin Up project we want to offer our customers the package of technical innovations that will facilitate them day-by-day using of banking services. Our long-term objective is to implement biometrics in all bank branches.” – said Karol Karolkiewicz, member of the Management Board of Getin Noble Bank.
Biometric technology is used to authenticate a person based on unique human physical or behavioural characteristics such as iris, fingerprint, voice or finger vein patterns. Getin Bank chose finger vein biometrics based on it being safe and secure via the use of the unique structure of blood vessels inside fingers.
Facial recognition software flops in US trials (Information Age)
“The number of system-generated false positives was excessive,” concluded the report, recently obtained under freedom of information regulations.
The airport had installed two separate facial recognition systems at security checkpoints at the airport. However, they failed to detect volunteers posing as terrorists 96 times during the three months that the trial was running, despite successfully picking them up 153 times.
Logan Airport was where 10 of the 19 terrorists involved in the 11 September terror attacks on New York boarded their flights.
Articles like this only make sense with reference to the expectations of the people that write them and users of the technology.
Catching a bad guy in 153 out of 249 chances (a 61.4% success rate) is obviously worth something, especially if the chance of catching that bad guy was 0% before the addition of the new technology. [Note: this analysis only makes sense if it is assumed that the subjects involved are on a watch list.]
The article also mentions the September 11 hijackers, begging the question: would the attacks have been possible if 11 or 12 (out of nineteen) of the attackers had been detected on the day?
Maybe, maybe not. Security protocols, not technology, would determine the answer. But a smart security protocol might say that if six terrorists are caught entering the same airport within a couple of hours of each other, certain measures should be taken.
False positives and low accuracy are real concerns to be overcome by improved performance of facial recognition systems. In fact, they are interchangeable problems. SecurLinx can provide a system that rarely provides false positives, but will fail to alert the user to a larger proportion of accurate matches, or we can provide a system that will catch more matches but will generate more false positives. We work with end users to help them determine their own “sweet spot” for the kinds of matches to which they want to be alerted. Facial recognition in surveillance applications isn’t like fingerprint biometrics.
The key to getting these things right for the customer and delivering the goods on a Return-on-Investment basis, is good communication about system capabilities, good training, and the application of the technology at the appropriate job function level.
If the system was sold as a bulletproof terrorist finder, a 39% failure rate is a flop. If it was sold as a 61% chance of preventing disaster, isn’t that worth something?
Traditionally ID verification is all about two or more things – something you know (knowledge factor), something you have (possession factor) and something the user is (biometric factor).
VB [ed. Voice Biometrics] is one of the strongest and most convenient of these three, with a few seconds of natural speech removing the need for pin numbers, date of birth, mother’s maiden name and so on. All of which are increasingly easy to get hold of from social media sources and targeted malware stealing pins and passwords.
Read the whole thing. Voice biometrics seem to be improving rapidly and there is a huge installed base of networked hardware — land line phones — for which voice is the only biometric option.
At the beginning of Wednesday’s sitting of Parliament, Mikov announced that the use of biometrics would put an end to the practice of voting with other MPs’ cards.
The use of biometrics was introduced in early 2010.
However, the process of collection of biometric data and their integration into the MP cards in Bulgaria’s 42nd National Assembly was delayed, […]
Biometric payments are top option for security-concious shoppers, survey finds — (49%) stated they would like to have biometric payments, such as fingerprint, palm or iris scanners, far outweighing the popularity of emerging mobile technology options. Thirty per cent would like to use PIN based smartphone payments, 25% online wallets, and 23% are keen to use SMS payments.
China Biometrics Market Forecast & Opportunities, 2018 (Research and Markets)
“China Biometrics Market Forecast & Opportunities, 2018”, identifies that fingerprint identification market in China is anticipated to grow at the CAGR of around 38%, reaching up by six folds revenue by the end of 2018. Anhui, Shandong and Shanghai are the leading provinces of eastern region, generating highest revenue in biometrics market when compared with other regions in the country. One of the other large biometric projects is e-passports, which is primarily to be implemented in Shaanxi province in northern region and would act as the main growth driver for biometrics market in the next five years. The major players of biometrics industry in China are Zk Technology, Ingersoll Rand, Rosslare Security, Zks Group and Suprema Inc.
The software under development by Prof Rudolph, engineer Amit Roy-Chowdhury and art historian Jeanette Kohl will try to put a name to these forgotten likenesses by grabbing data about defining elements of faces from portraits and comparing them to known depictions.
Early work on the project established that key parameters for facial recognition in portraiture include the position of the corners of the eyes and mouth, the width between the eyes, and the width of the mouth. Mapping these characteristics using a 27-point scheme captures sufficient information to make identifications, said the researchers.
The application of facial recognition technologies to the challenges of art history is a fascinating topic. We once had a call from a collector who believed he had discovered a third existing photograph of Henry David Thoreau and wanted our help with the verification.
The BBC article, however, discusses the application of facial recognition technology to artifacts created before the invention of photography, which presents a whole different set of challenges.
Art historians interested in applying software to facial analysis might be wise to enroll death masks (also mentioned in the article, or life masks) as database images since they are as nearly as possible an actual recording of a person’s face. Those could then be compared to painted images purportedly of the same person. Using this technique, art historians would quickly get an idea of how “accurate” portraitists (in general, or individually) were at painting images to the mathematical specificity that underlies facial recognition algorithms.
They would probably learn a lot from this basic exercise. How accurate did portraits tend to be? Were they supposed to be scientifically accurate? Or, were they more like the airbrushed and Photoshopped images that grace the covers of magazines today? Were certain portraitists consistently more accurate than others. Once these questions are well understood, analysis of painted or carved images for identification purposes might come within reach even where no contemporary physical impression of the face exists.
Intel to Invest $100 Million in Voice, Gesture Technologies (Wall Street Journal)
Intel […] Capital, the global investment arm of chipmaker Intel Corp., is setting up a $100 million fund to invest in “perceptual” computing technologies like voice and gesture control, company executives said. The fund will invest over the next two to three years in firms making software and applications with functions like imaging, gesture and voice control, emotion sensing and biometrics, the company said.
The top education official in the Autonomous Region in Muslim Mindanao claims that unlike other regions plagued with shortages of teachers and classrooms no such problem was evident in the ARMM when school opened last Monday.
“There were no teacher and classroom shortages even after we had cleansed the payroll of ghost teachers,” ARMM Secretary of Education Jamar Kulayan told reporters here Wednesday. That was because, as the joke goes, they also eliminated a lot of “ghost students” and “ghost schools.”
The ARMM saved approximately US $19 million by cleaning out the ghosts.
Emotient, which specializes in facial expression analysis, and iMotions, an eye-tracking and biometric software platform company, have announced that Procter and Gamble, The United States Air Force and Yale University are its first customers for a newly integrated platform that combines facial expressions recognition and analysis, eye-tracking, EEG and GSR technologies.
According to the companies, the new cobmbined solution is designed for usability research, market research, neurogaming as well as academic and scientific research.
Google has filed a patent suggesting users stick out their tongue or wrinkle their nose in place of a password.
It says requiring specific gestures could prevent the existing Face Unlock facility being fooled by photos.
…and then think about Google Glass (or something similar offered by another brand) and the things that become knowable as these technologies are combined and others are added. Iris and face for backward-facing and front-facing ID, knowing precisely what (or whom) someone is looking at when a certain change in neurological activity is noted. Or, precise targeting of weaponry controlled by the eye’s movement along with detailed observations of the neurological states of combatants.
Right now, all of it seems like a long way off, and it is. Significant scientific, technological, and organizational barriers exist. The technology of measurement; the science of interpretation; the fact that a lot of small players own small pieces of the puzzle; integrating the pieces: each present significant challenges. But…
“Most people overestimate what they can do in one year and underestimate what they can do in ten years.”
Stay tuned. Ubiquitous multi-modal sensors and the real-time ability to interpret and act on the data they collect would have profound effects.
“Within the UK there is no official or statutory attribute or set of attributes that are used to uniquely identify individuals across Government,” the joint Cabinet Office and CESG guidance document said. “Neither is there a single official or statutory issued document whose primary purpose is that of identifying an individual. Without such attributes or documentation it is difficult for any person to be absolutely certain of the identity of another.”
“This guide is designed to demonstrate how a combination of the breadth of evidence provided, the strength of the evidence itself, the validation and verification processes conducted and a history of activity can provide various levels of assurance around the legitimacy of an identity,” it said.
The whole piece is interesting.
The first quoted sentence above really jumps out, though.
The early industrializers/bureaucratizers typically developed their ID schemes in an ad hoc fashion. The church kept its records for its purposes. The military kept its records for its purposes. Schools, for theirs. Service providers, etc. The system generally works. In the end, error rates and whether or not the costs of the ID errors exceed what it would cost to fix them rule the day. Political and financial considerations factor in.
It is precisely this patchwork ID environment that later-developing countries are choosing to leap-frog with more centralized (United Arab Emirates) or ecosystem (India) approaches involving biometrics. Outside observers from the earlier developing countries are often surprised that their political perspective on government-backed ID isn’t universally shared while observers in later-developing countries may be equally surprised that the most developed countries in the world have such patchwork ID systems.
Computerworld Honors 2013: ID program empowers citizens in India (Computerworld)
An estimated 400 million Indians cannot prove their identity. As a result, they’re shut out of countless opportunities. They cannot access educational programs, open a bank account, apply for welfare benefits or seek higher-level employment. Lack of identification is also problematic for the government, because as much as 40% of the $40 billion it directs yearly toward helping these individuals doesn’t reach the intended beneficiaries.
Aadhaar is more than a technology program that collects biometric data from residents. It is a transformative initiative that will allow all Indian residents the opportunity to participate more fully in society.
The Computerworld Honors Program, now in its 25th year, recognizes organizations that use information technology to promote and advance the public welfare, benefit society and business, and change the world for the better. This year’s 267 Laureates are that rare group with the ability to recognize problems and the courage to take bold steps to solve them. They are an inspiring reminder that great things can happen when determined people explore technology’s full potential.
In what has come to be known as the “No Name Match,” UNICEF brilliantly harnessed the power of the Paraguay-Uruguay World Cup qualification match to drive the issue of universal ID for Paraguayans to the front of people’s minds before recent elections.
The two-minute video below is really good.
Without universal legitimate ID, it’s harder to make a lot of other things work that most of us take for granted. Universal vaccination against preventable disease, compulsory primary education, effective social safety nets — all of these things get a lot easier if everyone can prove their unique identity.
Google announced late Friday that it will outlaw facial recognition and other biometric identification apps on Glass, its networked eyewear still in prototype phase that’s expected to be commercially released later this year.
“As Google has said for several years, we won’t add facial recognition features to our products without having strong privacy protections in place,” Google’s Project Glass team said in on its Google Plus page.
Google may have publicly said this, however until now its developer policy did not explicitly rule out apps that can do facial recognition.
If it’s a camera, it can be used for facial recognition. Facial recognition is really just a specific type of image analysis. It doesn’t matter where the image comes from. It could be a 19th Century daguerreotype or a picture taken from space. The software doesn’t care. Presumably running the open source Android operating system, as a head-mounted sensor array with a camera, there is little or nothing preventing application developers from passing images collected via the headset through facial recognition applications not developed by Google.
Google’s announcement should be taken to mean that Google isn’t going to integrate facial recognition into Google Glass. Facial recognition apps won’t be on the Google Play store. And, at least for now, they won’t be facilitating face rec. in other Google services such as YouTube, search, Gmail, and Google+.