Biometric Screening: The Future of Food Processing Technology?

biometric identification managementThis post comes from the writing team at Viking Food Solutions, Australia’s leading supplier of Butcher Shop and Meat Processing Machinery.

Foodborne Illness

We have had many unintentional foodborne illnesses transmitted to consumers this past year. For example, these have come through such companies as Chipolte’s, Wegmans, Dove candies, Trader Joe’s, and a host of others with less notoriety. Foodborne illness is a complex problem involving the producer, the land, equipment used to nurture, harves, and prepare food for transportation, processing and packaging, maintaining product integrity on its way to market, and actual consumer use of the product once received. Continue reading →

Iris recognition Vs. Palm Vein Biometrics – How do they compare?

The biometric technology used in iris recognition takes a digital photograph of the iris using safe, non-visible near-infrared technology, capturing more than 250 data points for identification

The biometric technology used in iris recognition takes a digital photograph of the iris using safe, non-visible near-infrared technology, capturing more than 250 data points for identification

If you are somewhat familiar with biometric technology and its use around the world, you probably recognize that iris recognition and palm vein biometrics are two completely different modalities, but did you know that they share some common characteristics? To begin with, both iris recognition and palm vein biometrics are biometric modalities used in identification and authentication of an individual. Iris recognition biometrics uses a detailed photographic image of the iris for identification whereas palm vein biometrics captures an image of the pattern of the veins under the skin of the palm for identification. Both of these biometric modalities are very effective and their implementations are determined by the environments each one is most suitable for.

Let’s take a look at these modalities and how they compare to each other in terms of functionality:
Continue reading →

5 Ways Biometric Technology Impacts Our Everyday Life: A Statistical Representation

Impact of biometric technology in everyday life

Biometric technology has become an integral part of our everyday lives

Did you know that biometric identification management technology has been around since the 19th century when police began to use it to track criminals? The implementation of biometric technology is around us and expanding fast, quickly becoming a part of everyday life.

A number of biological characteristics such as fingerprints, finger and palm vein patterns, and iris and voice recognition have proven to be useful in the evolution of biometrics and biometric identification capabilities are now becoming standard on many devices we use each day.

Listed here are 5 ways biometric technology is impacting your everyday life:
Continue reading →

Common Misunderstandings between Iris Recognition and Retina Scanning

Retinal Scanning and Iris Recognition: Are they different?

The colored section of the eye is known as the iris.

The biometric technology used in iris recognition takes a digital photograph of the iris using safe, non-visible near-infrared technology

Biometric identification management hardware modalities have different characteristics that often have a strong impact on their performance and acceptability by end users. You probably already know about the differences between fingerprint identification and finger-vein biometrics – fingerprint biometrics relying on an external physiological characteristic and finger vein biometrics use the vascular, internal vein patterns of the fingers for individual identification. Continue reading →

Liveness Detection to Fight Biometric Spoofing

 

our new M2-FuseID finger scanner uses sophisticated anti-spoofing technology and liveness detection.

Modern biometric hardware devices feature sophisticated “liveness detection” and anti-spoofing technology to prevent fraud and increase security.

The following post was written by Shaon Shahnewaz, Senior Executive in our Business Development & Interactive Marketing Department

Should we be wary of leaving our fingerprints behind? Circumventing biometric security access by spoofing the system – is turning from science-fiction to reality.

Intro

There have been times where we have seen in sci-fi movies that thieves are copying and spoofing biometric identification management systems to gain unauthorized access to valuable information. Extracting eyeballs, and lifting fingerprints to create rubber molds to successfully fool a biometric recognition hardware device in the movies that might look like a cool thing to do, but have you thought about the implications of it in real life? What if, for example, someone right now is trying to copy your biometric information and using it to spoof a biometric system to access your bank account?

What is Spoofing?

Biometric spoofing is a method of fooling a biometric identification management system, where an artificial object (like a fingerprint mold made of silicon) is presented to the biometric scanner that imitates the unique biological properties of a person which the system is designed to measure, so that the system will not be able to distinguish the artifact from the real biological target.

Are Biometric Characteristics Private?

Biometric spoofing is a growing concern. We leave fingerprints everywhere in our day to day lives, so the chance of someone lifting them and copying them is real. Currently it’s only researchers that are doing spoofing and copying for testing purposes and it is not a mainstream activity–but it could be soon as more businesses and governments around the world adopt biometrics for identification management. Many people are trying to classify biometric physiological characteristics as secret, but they aren’t. Our faces and irises are visible to everyone and our voices can be recorded. Fingerprints and DNA are left everywhere we go and it’s been proved that these are real threats to be replicated for the purpose of spoofing biometric systems.

Biometric Deployment Risks with Spoofing

Like any other security technology, biometrics has inherent weaknesses that can potentially compromise the security of a system. Susceptibility to spoofing attacks is just one of them. The implication of a biometric device’s susceptibility to spoofing attacks includes:

  • Artificial objects being used to mount attacks against existing enrollments in order to gain unauthorized access to the resources protected by the biometric system.
  • Artificial objects being used to authenticate thus fraudulently associating an audit trail with an unwitting individual.
  • Artificial objects being used to enroll in a biometric system and then delegating these objects across multiple individuals, undermining the integrity of the entire system.
  • An individual may repudiate transactions associated with his account or enrollment – claiming instead that they are the result of attacks – due to the inability of the biometric system to ensure liveness detection.

What’s the Solution?

Academic and industry experts have been researching methods to counter the threat of physical spoofing of biometric samples. In particular, various liveness detection methods have been conceived and implemented in some devices. Liveness detection is defined as biometric hardware devices that have the ability to look beyond the surface of the skin and can discriminate between the features of live skin and copies of those features in a fraction of a second. However, as every man made solution can be defeated, efforts to enhance and improve liveness detection remain a work in progress.

Recently our researchers here at M2SYS Technology developed a “smart” biometric finger scanner named M2-FuseID™, which is capable of distinguishing fingerprints made of artificial objects from a live fingerprint. The liveness detection technology they have introduced for this is among the most sophisticated in the world. Our researchers have  designed the M2-FuseID™ “smart” finger scanner by including  an extra liveness detection finger vein sensor just beside the regular fingerprint sensor in this advanced fingerprint reader. This advanced sensor can measure the liveness of the finger veins by identifying the presence of a live blood flow to detect whether the object it’s scanning for fingerprints is artificial or a real finger.

Benefits of Adopting a Liveness Detection System with M2-FuseID™

Our M2-FuseID™ smart fingerprint device with sophisticated liveness detection helps to minimize the risk against spoofing in the following manner:

  • It simultaneously looks at and beneath the skin surface for live blood flow in the veins of the finger.
  • Protects against fake and spoofed fingerprints.
  • Provides protection from published and unpublished finger copying methods.
  • Adaptable against future spoof threats.

Conclusion

Although biometric authentication devices can be susceptible to spoofing attacks, different anti-spoofing techniques can be developed and implemented that may significantly raise the level of difficulty of such attacks. Our M2-FuseID™reader with advanced liveness detection identifies the individual being scanned as alive or fake in fingerprint biometric security systems. It has all the potential to enhance security, reliability, and effectiveness of a biometric system and protect against unauthorized access.

M2-FuseID™ “Smart” Biometric Finger Reader Achieves FBI Personal Identity Verification (PIV) Certification

M2-FuseID is a multimosal biometric finger reader that simultaneously captures a fingerprint and finger vein pattern.

Our brand new M2-FuseID™ multimodal “smart” finger reader achieves FBI PIV certification.

With great pride we announced today that our brand new M2-FuseID™ “smart” multimodal biometrics finger reader that allows end users the ability to simultaneously capture a fingerprint and finger vein pattern with a single scan and offers sophisticated liveness detection to prevent forgery and spoofing has achieved FBI PIV certification and meets quality specifications for civil ID and other commercial applications.

Significant in that PIV certification is viewed by the industry as a key characteristic to provide assurance and piece of mind to end users of biometric identification management systems that a hardware device meets or exceeds FBI interoperability standards and quality specifications, the M2-FuseID™ reader is poised to make a significant impact on deployments that require the highest levels of security and accuracy such as civil ID and banking/financial services.

The innovative M2-FuseID™ smart finger reader was conceived, designed, and built by M2SYS staff with the goal of delivering a more sophisticated fingerprint scanner that delivers optimal security, reliability, and accuracy with advanced finger imaging and modern “liveness” detection to alleviate spoofing and fraud.

A link to the news release can be found here: http://bit.ly/WeZHnQ

Congratulations to the M2SYS team for this achievement!

M2SYS Announces Support for Integrated Biometrics’ “Sherlock LES Fingerprint Sensor

The M2-RapdiCheck mobile biometric identification device uses the Sherlock fingerprint sensor

Mobile biometric devices, such as our RapidCheck™10-29 multimodal biometric device, require flexible, modern sensor technology to meet market demands.

Today we announced support in our Hybrid Biometric Platform™ multi-modal biometrics system for the innovative “Sherlock” Light Emitting Sensor (LES) fingerprint sensor, designed and produced by Integrated Biometrics. Why is this important?

The marked increase in mobile biometric identification management deployments demands innovative hardware that is capable of capturing moist or dry fingerprints in any type of weather conditions, even extreme in nature. The evolution of biometric identification deployments from a brick and mortar setting to mobile deployments in the field that allow system administrators to bring equipment directly to the end user for identification necessitates flexible, secure, lightweight, and durable hardware requiring low power requirements and fast, accurate results. The LES fingerprint sensors are perfectly geared towards mobile and pocket-sized smart devices which are quickly becoming mainstream for modern deployments.

One of the core tenets at M2SYS is to invest in the prosperity and success of our partners and end users by offering the most innovative, efficient, and results-oriented biometric identification solutions easily adaptable to any environment or conditions. We understand that success is determined by customizing our solutions to meet the unique needs of our end users and adapting to their environment. The steady rise in mobile biometric deployments is largely based on the ability to quickly and accurately capture fingerprints regardless of the conditions or physical environment. Support of the LES “Sherlock” sensor fits into our commitment to continue offering the most innovative, accurate, and user-friendly biometric identification tools on the market.

In what ways do you see the “Sherlock” fingerprint sensor having an immediate impact on the biometric identification market?

Book Review: Age Factors in Biometric Processing

This textbook examines the issue of how aging effects the perfomance of biometric identification systems

“Age Factors in Biometric Processing” is a new research text that sheds light on the effect that aging has on the performance of biometric systems.

If you work in the biometrics industry or you happen to follow it closely, you are probably aware that a topic of discussion that frequently comes up is how does the aging of the human body effect the way that biometric systems are designed and deployed. In fact, a recent industry dust up saw researchers at The University of Notre Dame dispute the conclusions of a National Institute of Standards & Technology (MIST) study that the aging of the iris in humans does not have a significant impact in their ability to be identified in an iris biometric authentication system. The NIST study actually came on the heels of The University of Notre Dame’s study that age does in fact play a role in an iris biometrics identification system inability to recognize an individual previously enrolled in the database. Potato vs. Potatoe? Right now, it’s difficult to tell which report to believe.

What’s clear is that as the field of biometrics for identification management continues to expand and evolve, increased stringency will be placed on the affect that aging has on biometric systems and biometric research and development companies will be close attention to research and experimental results on this topic. The industry will be pleased to know that a new book by Michael Fairhurst has just been published called: “Age Factors in Biometric Processing” by The Institution of Engineering and Technology (IET) which details the effect that human aging has on the long term performance of biometric systems. Perhaps foreshadowing for just how complicated and in-depth this issue is, Fairhurst writes in his Introduction:

“It is clear, therefore, that the question of what the effects of human aging are likely to be in relation to biometric measurements, and how this phenomenon affects the performance of a particular biometric system, is very complex, and will almost certainly depend on many very different factors.”

Mr. Fairhurst assembles his book into four primary sections:

1.) An introduction to the aging process and an overview of biometric systems – setting the              stage for discussion on how aging can effect individual biometric modalities
2.) A study of how aging effects specific biometric modalities including physiological                       and behavioral modalities
3.) A closer look at the topic of aging from the perspective of an industrial viewpoint, a forensics        perspective, and the impact of aging on one of the more popular biometric modalities – facial        recognition
4.) A look to the future and based on the conclusions of this book, what type and the scope of          research that may be needed in the future

The book is highly technical in nature, offering an array of charts, graphs, photos, and mathematical equations throughout that help explain and support the conclusions the researchers put forth. Most chapters include a brief conclusion at the end that summarize the results of each experiment and research. A quick read through the book and an interpretation of the researchers’ conclusions clearly tells us that they overwhelmingly felt that age does indeed have a detrimental effect on biometric processing since “aging introduces variability of key biometric features over time.” Another important point that the researcher’s postulate is that the comparison of the aging of one person is not enough to predict how a much larger biometric system will act and it’s important to include as large a pool of individuals as possible to assess recognition performance results.

We were happy to see this important research text published and made available to help further explain the effect that aging has on the construction and performance of biometric identification systems. Age Factors in Biometric Processing is available through IET’s Web site by clicking here.

What are your conclusions on how aging effects biometric identification?

 

Introducing a New Fingerprint Reader to our Family of Biometric Hardware

fingerprint reader for fingerprint scanner to help biometric identification projects

The M2-B™ fingerprint reader is ergonomically designed to provide high level security for PC’s and complex network environments.

We are pleased to announce the launch of a new piece of hardware to the M2SYS family of fingerprint scanners, the M2-B™ fingerprint reader. This compact, ergonomically designed fingerprint reader is powered by our award winning Hybrid Biometric Platform™ fingerprint software and our Bio-Plugin™ biometric integration middleware.

The M2-B™ fingerprint reader features a high-quality, rugged, scratch-free 500 DPI optical fingerprint sensor, a plug and play USB 2.0 high speed interface, and is versatile for use in any scanning environment.

This fingerprint reader offers a host of benefits including:

  • Resistance to scratches, impact, corrosion, and electrostatic discharge (ESD)
  • Seamless integration into all M2SYS fingerprint software applications
  • Ultra-precise, FBI compliant 500 DPI resolution
  • A rugged design built to last, eliminating costly replacements

The M2-B™ fingerprint scanner  captures clear prints to help produce quality enrollment templates and accurate identification on each and every scan to help maximize system performance and facilitate user acceptance and trust in the system.

For more information on the features and benefits of our M2-B™ fingerprint reader, please take a look at this brief traning video which includes highlights of its capability, proper and improper scanning techniques, and the proper way to clean the reader during use.

 

Training Video on How to Use the M2SYS Palm Vein Scanner with Fujitsu PalmSecure Sensor

This week, M2SYS created a training video on proper and improper scanning techniques for the M2 Palm Vein reader that uses Fujitsu’s PalmSecure sensor.  If you are a new or existing palm vein customer, this video demonstrates the correct placement of the hand on the hand guide to ensure an accurate read of the end user’s palm vein pattern as well as incorrect placement of the hand that will cause difficulty in obtaining a proper scan.

Please take a moment to view the video and contact us if you have any comments or questions: