{"id":938,"date":"2011-06-15T11:49:58","date_gmt":"2011-06-15T15:49:58","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=938"},"modified":"2025-04-23T08:08:41","modified_gmt":"2025-04-23T12:08:41","slug":"biometric-modalities-what-makes-a-good-biometric","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/","title":{"rendered":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d"},"content":{"rendered":"<p><strong>The following is a guest post from Jason Hodge, Vice President of Business Development for SecurLinx. \u00a0SecurLinx specializes in networked biometric deployments and multi-modal biometric integration. \u00a0You can read more about biometric technology on the SecurLinx blog which can be found at <a title=\"Securlinx Blog\" href=\"https:\/\/securlinx.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/securlinx.blogspot.com\/<\/a><\/strong><\/p>\n<p>Iris, Retina, Face, Fingerprint, Finger vein, Palm geometry, Palm vein, gait, ear, DNA, body odor, voice, typing rhythm, signature recognition. \u00a0The range of human physical traits and behaviors offers fertile ground for scientists interested in quantifying them for use in identifying individuals.<\/p>\n<p>Two main forces have influenced the selection of biometric identification modality from the near limitless choices: Convenience and Necessity.<\/p>\n<p>Face and fingerprint have been by far the most convenient from both scientific and deployment perspectives.<\/p>\n<p>Scientists need data to develop the algorithms that biometric systems use to identify individuals. \u00a0For face and finger, data was never a problem. \u00a0Bureaucracies have been collecting both for a century.<\/p>\n<p>In deployment, it\u2019s easy and convenient for participating individuals to interact with the technology.<\/p>\n<p>Necessity, playing its usual role, has driven the development of other biometric modalities. \u00a0From a development perspective, given enough data, time and money, I suspect any definable aspect of the human anatomy could be used as a biometric identifier.<\/p>\n<p>In instances where teeth are all that is known about an individual, they are used for high confidence identification.<\/p>\n<p>As long as the telephone is with us as a ubiquitous communication tool, there will be significant demand for voice recognition no matter the challenges.<\/p>\n<p>In order to displace finger\/hand and face\/eye biometrics in wide scale deployments, the newer biometric modalities will have to out-compete them on two levels, in the lab and in the market. \u00a0But in order to thrive as high value-added tools in highly specialized deployments they just need to help solve a high value problem.<\/p>\n<p>Any biometric modality can be useful, especially if it\u2019s the only one available.<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/06\/Jason-Hodge-from-SecurLinx.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-939\" title=\"Jason Hodge from SecurLinx\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/06\/Jason-Hodge-from-SecurLinx.jpg\" alt=\"\" width=\"100\" height=\"118\" \/><\/a>Jason can be reached at Mail: <strong><a title=\"Mail to Securlinx Blog\" href=\"mailto:blog@securlinx.com\" target=\"_blank\" rel=\"noopener noreferrer\">blog@securlinx.com<\/a><\/strong> Twitter: @SecurLinx URL: <strong><a title=\"www.securlinx.com\" href=\"https:\/\/www.securlinx.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.securlinx.com<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post from Jason Hodge, Vice President of Business Development for SecurLinx. \u00a0SecurLinx specializes in networked<\/p>\n","protected":false},"author":398,"featured_media":15875,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[17,29,6,139,10,9,46,22,16,140,50,11,123],"class_list":["post-938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric-systems","tag-biometric-technology","tag-biometrics","tag-ear","tag-finger-vein","tag-fingerprint","tag-fingerprint-reader","tag-fingerprint-recognition","tag-fingerprint-scanner","tag-gait","tag-iris-recognition","tag-palm-vein","tag-vascular-biometrics-2"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The following is a guest post from Jason Hodge, Vice President of Business Development for SecurLinx. \u00a0SecurLinx specializes in networked\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2011-06-15T15:49:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T12:08:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/02\/man-holding-phone-with-fingerprint-scanning-app-9PEKUVB-1024x686.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"686\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Biometric Modalities: What makes a \u201cGood Biometric?\u201d\",\"datePublished\":\"2011-06-15T15:49:58+00:00\",\"dateModified\":\"2025-04-23T12:08:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\"},\"wordCount\":344,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric systems\",\"biometric technology\",\"biometrics\",\"ear\",\"finger vein\",\"fingerprint\",\"fingerprint reader\",\"Fingerprint recognition\",\"fingerprint scanner\",\"gait\",\"Iris recognition\",\"palm vein\",\"vascular biometrics\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\",\"name\":\"Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2011-06-15T15:49:58+00:00\",\"dateModified\":\"2025-04-23T12:08:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Modalities: What makes a \u201cGood Biometric?\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services","og_description":"The following is a guest post from Jason Hodge, Vice President of Business Development for SecurLinx. \u00a0SecurLinx specializes in networked","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2011-06-15T15:49:58+00:00","article_modified_time":"2025-04-23T12:08:41+00:00","og_image":[{"width":1024,"height":686,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/02\/man-holding-phone-with-fingerprint-scanning-app-9PEKUVB-1024x686.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d","datePublished":"2011-06-15T15:49:58+00:00","dateModified":"2025-04-23T12:08:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/"},"wordCount":344,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric systems","biometric technology","biometrics","ear","finger vein","fingerprint","fingerprint reader","Fingerprint recognition","fingerprint scanner","gait","Iris recognition","palm vein","vascular biometrics"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/","name":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2011-06-15T15:49:58+00:00","dateModified":"2025-04-23T12:08:41+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-modalities-what-makes-a-good-biometric\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Modalities: What makes a \u201cGood Biometric?\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/938"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=938"}],"version-history":[{"count":14,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/938\/revisions"}],"predecessor-version":[{"id":16158,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/938\/revisions\/16158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15875"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}