{"id":11435,"date":"2019-06-17T06:55:34","date_gmt":"2019-06-17T10:55:34","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=11435"},"modified":"2022-06-20T01:42:54","modified_gmt":"2022-06-20T05:42:54","slug":"5-myths-biometric-identification","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/","title":{"rendered":"5 Myths of Biometric Identification"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The advent of biometric identification was dramatic when the Star Trek displayed different biometric modalities in the sci-fi series in 1966. Voice ID, retina, basic vitals, and facial recognition was stirred up then. Over the years biometric identification technology developed and nowadays it is no longer a topic to be shown in a sci-fi movie. It has become a reality and changed the landscape of secure identification in different industries. But most people think of the conventional notion about biometric identification and here are some of the myths which are now revealed:<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Myth# 1 Biometric Data Can be Stolen or Hacked from the System<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Most of the people think that if they enroll their biometric data in any system, the administrator can use that image of their biometric data to spoof their identity. But the reality is when someone scans his\/ her biometric, the scanners transform the biometric data to an encrypted binary code only using 1&#8217;s and 0&#8217;s to build a template. The <a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Blog&amp;utm_medium=5+Myths+of+Biometric+Identification&amp;utm_campaign=Blog+Post\">biometric matching engine<\/a> then uses that template to identify someone. So, biometric data could not be stolen or hacked from the system.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Myth# 2 Iris Scanning Relies on the Genetic Information<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In iris scanning, only one thing is collected that is the pattern of the iris. The iris pattern is extremely unique and differentiable, even more than your fingerprints. For iris enrollment it only takes two different images of iris; one is a usual one and another one is using infrared light. Then the combination of these two images is analyzed by the biometric system to create an identifiable visual pattern named iris code. There is no genetic information <\/span><span style=\"font-weight: 400;\">considered during the identification process and it can also differentiate the irises of identical twins also.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Myth# 3 Iris and Retinal Scanning is the Same<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">There are some significant differences between iris and retinal scanning. First of all, the iris scanning is possible to perform from a distance but the retinal scanning requires the scanner close to the eyes. The iris scanning requires a lower energy infrared light for scanning than the retina scanning. And finally, the measurement of iris doesn\u2019t change for any disease, whereas the retina scanning does.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Myth# 4 Biometric Can be Spoofed, So why Replace ID\/ Password<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">There is nothing easier than sharing ID\/ passwords or losing those. But spoofing biometric is not a matter of joke! Also, live detection enabled in some scanners can identify the fake or replicated biometric identity. Biometric has been used worldwide for exact identification which is most secure and non-transferrable. For example, a biometric time clock eliminates buddy punching and time theft in the workplace, whereas an ID\/ Password system is easily used for the purpose.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Myth# 5 Implementation of Biometric is Expensive<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Many people assume that the implementation of biometric identification is a matter of huge investment, which can only be used for government or large scale project. Biometric technology passed this stage a few years ago. Now through <a href=\"https:\/\/www.m2sys.com\/blog\/biometrics-as-a-service\/advantages-biometrics-as-a-service-in-business\/?utm_source=Blog&amp;utm_medium=5+Myths+of+Biometric+Identification&amp;utm_campaign=Blog+Post\">biometrics-as-a-service<\/a>, small and medium-sized enterprises can deploy the biometric solution at an affordable investment. It eliminates the need for huge development costs and specialized IT facilities. In addition, the use of biometric technology eliminates the administrative expenses thereby reducing the use of papers and stationeries, dedicated manpower, buddy punching, time theft and increases employee productivity. All of these impacts on a positive ROI (Return on Investment).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Many myths about biometric identification are getting busted nowadays with the increased adoption rate and the reality shows the positive impact of technology in different sectors.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The advent of biometric identification was dramatic when the Star Trek displayed different biometric modalities in the sci-fi series in<\/p>\n","protected":false},"author":403,"featured_media":15976,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Biometric Identification","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[1290,1291,1292,1293],"class_list":["post-11435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-advent-of-biometric-identification","tag-how-to-prevent-data-theft","tag-iris-scanning-and-genetic-information","tag-iris-vs-retinal-scanning"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Myths of Biometric Identification - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Myths of Biometric Identification - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T10:55:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T05:42:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/06\/5-Myths-about-Biometric-Identification-800x445-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leonardo Sam Waterson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leonardo Sam Waterson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\"},\"author\":{\"name\":\"Leonardo Sam Waterson\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/76ec8a3187cfbc51b302c610d3d1f558\"},\"headline\":\"5 Myths of Biometric Identification\",\"datePublished\":\"2019-06-17T10:55:34+00:00\",\"dateModified\":\"2022-06-20T05:42:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\"},\"wordCount\":584,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"advent of biometric identification\",\"How to prevent data theft\",\"Iris scanning and genetic information\",\"iris vs. retinal scanning\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\",\"name\":\"5 Myths of Biometric Identification - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-06-17T10:55:34+00:00\",\"dateModified\":\"2022-06-20T05:42:54+00:00\",\"description\":\"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"5 Myths of Biometric Identification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/76ec8a3187cfbc51b302c610d3d1f558\",\"name\":\"Leonardo Sam Waterson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"caption\":\"Leonardo Sam Waterson\"},\"description\":\"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Myths of Biometric Identification - Digital Transformation of Government Services","description":"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/","og_locale":"en_US","og_type":"article","og_title":"5 Myths of Biometric Identification - Digital Transformation of Government Services","og_description":"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-06-17T10:55:34+00:00","article_modified_time":"2022-06-20T05:42:54+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/06\/5-Myths-about-Biometric-Identification-800x445-1.jpg","type":"image\/jpeg"}],"author":"Leonardo Sam Waterson","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Leonardo Sam Waterson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/"},"author":{"name":"Leonardo Sam Waterson","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/76ec8a3187cfbc51b302c610d3d1f558"},"headline":"5 Myths of Biometric Identification","datePublished":"2019-06-17T10:55:34+00:00","dateModified":"2022-06-20T05:42:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/"},"wordCount":584,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["advent of biometric identification","How to prevent data theft","Iris scanning and genetic information","iris vs. retinal scanning"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/","name":"5 Myths of Biometric Identification - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-06-17T10:55:34+00:00","dateModified":"2022-06-20T05:42:54+00:00","description":"Many myths about biometric identification are getting busted nowadays with the increased adoption rate and positive impact of technology.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/5-myths-biometric-identification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"5 Myths of Biometric Identification"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/76ec8a3187cfbc51b302c610d3d1f558","name":"Leonardo Sam Waterson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","caption":"Leonardo Sam Waterson"},"description":"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11435"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/403"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=11435"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11435\/revisions"}],"predecessor-version":[{"id":15454,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11435\/revisions\/15454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15976"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=11435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=11435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=11435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}