{"id":1984,"date":"2012-07-30T19:00:07","date_gmt":"2012-07-30T23:00:07","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=1984"},"modified":"2022-06-17T06:08:35","modified_gmt":"2022-06-17T10:08:35","slug":"black-hat-iris-biometrics-attacks-dont-tell-the-whole-story","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/","title":{"rendered":"Black Hat Iris Biometrics Attacks Don&#8217;t Tell The Whole Story"},"content":{"rendered":"<figure id=\"attachment_1987\" aria-describedby=\"caption-attachment-1987\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/07\/iris-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1987 \" title=\"Biometrics industry clarifies Black Hat Conference paper that claimed to have re-engineered an iris image \" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/07\/iris-3-600x334.jpg\" alt=\"An iris biometrics expert clarifies the truth behind the technology in response to the Black Hat conference paper claiming to have hacked an iris template, recreated the image and fooled a recognition system\" width=\"300\" height=\"256\" \/><\/a><figcaption id=\"caption-attachment-1987\" class=\"wp-caption-text\">Is it really that easy to re-engineer an iris image? Not so fast&#8230;<\/figcaption><\/figure>\n<p>Planet Biometrics released an article today &#8220;<a title=\"Iris attacks no surprise to iris recognition inventor\" href=\"https:\/\/www.planetbiometrics.com\/article-details\/i\/1189\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Iris attacks no surprise to iris recognition inventor<\/strong><\/a>&#8221; which details an interview with John Daugman, Professor of Computer Vision and pattern Recognition at Cambridge\u00a0in response to the recent Black Hat conference paper that hacked into an iris system and re-engineered images to fool a recognition device. \u00a0Professor Daugman is credited with developing and patenting the first algorithm for iris recognition which is still widely used across the world.<\/p>\n<p>Professor Daugman acknowledges in the article:<\/p>\n<p style=\"text-align: center;\"><em>&#8220;This is a classic &#8216;hill-climbing&#8217; attack that is a known vulnerability for all biometrics&#8230;.the vulnerability in question, which involves using an iterative process to relatively quickly reconstruct a workable iris image from an iris template, is a classic &#8220;hill-climbing&#8221; attack that is a known vulnerability for all biometrics.&#8221;<\/em><\/p>\n<p style=\"text-align: left;\">The primary vulnerability in the Black Hat conference paper was the full disclosure and access to the Iris Code template, as well as having the ability &#8220;to generate an IrisCode template from an image, and to do so repeatedly and iteratively.&#8221; In other words, without access to the encoding algorithm or to a hardware device that implements it, the &#8220;attack&#8221; would not have been possible. Be that as it may, the Black Hat scientists did have access to the encoding algorithm but not all iris biometrics algorithm research and developers give access to the Software Development Kit (SDK) that is needed in order to perform the &#8220;attack.&#8221;<\/p>\n<p style=\"text-align: left;\">According to Daugman, this should be a sign, &#8220;to maintain cryptographic security on IrisCode templates&#8221; to maintain the highest level of security and thwart would be system attacks. Daugman went on to say that in addition to cryptographic security, there is also the issue of iris hardware detecting an artificial iris vs. a real one. Most of the higher quality iris biometrics recognition systems on the market are equipped with sophisticated technology to detect the presence of an artificial eye and tell when they are being spoofed. The bottom line is that a quality, modern iris biometrics recognition system would not have been fooled by the re-engineered iris image used in the Black Hat conference paper.<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Bio-plugin-SDK-m2sys-blog-article-promo1.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>Bio-Plugin\u2122 SDK<\/span><\/h2>\r\n\t\t\t<h3>For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Works With:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Bio-Plugin Appserver:<\/p>\r\n\t\t\t\t<p>C\/C++, Delphi, Foxpro, Java, VB, Clarion, PowerBuilder.<\/p>\r\n\t\t\t\t<p>Bio-Plugin Webserver:<\/p>\r\n\t\t\t\t<p>IIS, Apache, WebSphere, Oracle, and WebLogic<\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/bioplugin\/?utm_source=Black+Hat+Iris+Biometrics+Attacks+Don%E2%80%99t+Tell+The+Whole+Story&amp;utm_medium=Bio-Plugin%E2%84%A2&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p style=\"text-align: left;\">What is rather unfortunate about the content of this article is that virtually no one who was exposed to the Black Hat Conference paper will have the opportunity to hear the points brought out by Daugman and will automatically deduce that iris biometrics systems should be avoided at all costs since they can be easily hacked and your iris template stolen. Daugman&#8217;s view will be known by few, fueled in large part by organizations like the Electronic Frontier Foundation who immediately pounced on the Black Hat conference paper and began their mission to spread the word that iris biometrics are just as\u00a0susceptible to attacks as any other biometric modality, without reporting both sides of the issue.<\/p>\n<p style=\"text-align: left;\">We hope that you will take the time to educate yourself on the entire issue so you can formulate your own intelligent opinion when presented with all of the facts. Please share your thoughts with us on where you stand on the issue and why in the comments section below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Planet Biometrics released an article today &#8220;Iris attacks no surprise to iris recognition inventor&#8221; which details an interview with John<\/p>\n","protected":false},"author":3,"featured_media":1987,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"iris biometrics","_yoast_wpseo_title":"Black Hat Iris Biometrics Attacks Don't Tell The Whole Story","_yoast_wpseo_metadesc":"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don't tell the whole story.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[255,256,254,50,149,257],"class_list":["post-1984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-resources","tag-black-hat","tag-iris-attacks","tag-iris-biometrics","tag-iris-recognition","tag-planet-biometrics","tag-professor-john-daugman"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Black Hat Iris Biometrics Attacks Don&#039;t Tell The Whole Story<\/title>\n<meta name=\"description\" content=\"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don&#039;t tell the whole story.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Black Hat Iris Biometrics Attacks Don&#039;t Tell The Whole Story\" \/>\n<meta property=\"og:description\" content=\"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don&#039;t tell the whole story.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-30T23:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T10:08:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/07\/iris-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\"},\"headline\":\"Black Hat Iris Biometrics Attacks Don&#8217;t Tell The Whole Story\",\"datePublished\":\"2012-07-30T23:00:07+00:00\",\"dateModified\":\"2022-06-17T10:08:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\"},\"wordCount\":635,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Black Hat\",\"iris attacks\",\"iris biometrics\",\"Iris recognition\",\"Planet Biometrics\",\"Professor John Daugman\"],\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\",\"name\":\"Black Hat Iris Biometrics Attacks Don't Tell The Whole Story\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2012-07-30T23:00:07+00:00\",\"dateModified\":\"2022-06-17T10:08:35+00:00\",\"description\":\"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don't tell the whole story.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Black Hat Iris Biometrics Attacks Don&#8217;t Tell The Whole Story\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Black Hat Iris Biometrics Attacks Don't Tell The Whole Story","description":"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don't tell the whole story.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/","og_locale":"en_US","og_type":"article","og_title":"Black Hat Iris Biometrics Attacks Don't Tell The Whole Story","og_description":"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don't tell the whole story.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2012-07-30T23:00:07+00:00","article_modified_time":"2022-06-17T10:08:35+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/07\/iris-3.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0"},"headline":"Black Hat Iris Biometrics Attacks Don&#8217;t Tell The Whole Story","datePublished":"2012-07-30T23:00:07+00:00","dateModified":"2022-06-17T10:08:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/"},"wordCount":635,"commentCount":3,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Black Hat","iris attacks","iris biometrics","Iris recognition","Planet Biometrics","Professor John Daugman"],"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/","name":"Black Hat Iris Biometrics Attacks Don't Tell The Whole Story","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2012-07-30T23:00:07+00:00","dateModified":"2022-06-17T10:08:35+00:00","description":"Professor John Daugman from Cambridge University explains that the recent Black Hat iris biometrics attacks don't tell the whole story.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/black-hat-iris-biometrics-attacks-dont-tell-the-whole-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Black Hat Iris Biometrics Attacks Don&#8217;t Tell The Whole Story"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/1984"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=1984"}],"version-history":[{"count":19,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/1984\/revisions"}],"predecessor-version":[{"id":17663,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/1984\/revisions\/17663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/1987"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=1984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=1984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=1984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}