• Home
  • About
  • My Account
  • Blog
  • Success Stories
  • Contact
Bayometric Bayometric Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Jun 27

Biometric Authentication Now and Then: History and Timeline

  • Danny Thakkar
  • Biometric Authentication, Biometric Technology

From ancient ways of personal identification, in which people had limited options to identify others, we have come to the era of computer vision and biometrics, which does not require any external artefact or token to identify others. With biometrics, an individual can be identified with his/her own biological or behavioural characteristics, instead of his/her associations, possessions or any secret information.

The need of accurate identification led us to biometrics, which leverages technology to expedite the process of human identification and authentication.

From printed IDs, we have come to the biometric ID, which lets you prove your identity without carrying any card or document. Biometric security is evident everywhere. At airports, public places, workplaces office and even on your smartphone, biometric authentication is now a commonplace.

But how did we reach there? How this extraordinary journey of biometrics started and how did it attain today’s level of ubiquity. This articles covers history, timeline and where has biometrics reached today.

biometrics much older than most people knowImage: Biometrics may seem as if it grew recently, its history, however, is much older than the most people know.

Biometric technology: basics

Biometrics, which was once seen either in Sci-Fi movies or used in forensics applications, is now a commonplace. So common that people who own a smartphone, leverages one or more biometric recognition methods.

Let’s start with basics, what is biometric technology or biometrics?

Biometrics is a technology that leverages human beings’ very own anatomical, chemical or behavioral characteristics to identify them. Human beings’ own characteristics are naturally used for person to person identification as well. We can recognize our friends, family and a familiar person by their face or voice. In case of biometrics, this ability is given to electronic equipment to identify us without the help of any human assistance.

Some human physiological characteristics like Fingerprints, iris patters, retina pattern, vascular patterns, face geometry, hand geometry, etc. are considered to be unique for an individual. So these characteristics are taken as biometric identifiers. Along with these physiological characteristics, there are behavioral characteristics like gait, key stroke dynamics, signature, voice, etc. that are also considered individual characteristics and can be leveraged for biometric identification.

Types of biometrics

There are several types of characteristics found in anatomy, chemistry and behavior of the human beings, which can be leveraged to uniquely identify an individual. These biometric types are categorized in the following:

Physiological characteristics

These characteristics or patterns are found in or on human body, e.g. patterns found in fingerprints, iris, retina, DNA structure, etc.

Behavioral characteristics

These characteristics or patterns are found in behavior of an individual, e.g. gait, signature dynamics, keystroke dynamics, patterns of using smartphones, etc.

Biometric authentication

Authentication is the act of confirming the validity of an attribute of a single piece of data provided and claimed true by an entity. When this confirmation of validity is done using biometrics of a person making the claim, it is called biometric authentication.

Biometric systems

Biometric systems are the system that can acquire, process, and match one or more biometric identifiers. Biometric systems can be standalone systems consisting dedicated hardware and software to perform a specific task (e.g. fingerprint attendance machine) or they may be computerised systems to run different applications to perform different biometric operations like identification, analysis, management, etc. (e.g. AFIS and IAFIS).

On the basis of modalities leveraged, biometric systems can be of the following types:
Uni-modal biometric systems

These systems are designed to capture and process a single biometric identifier, e.g. fingerprint recognition systems, face recognition systems, etc. These systems may fall short in “population coverage” as not all individuals in target population may have that particular biometric identifier in usable condition.

Multimodal biometric system

These systems make use of more than one biometric characteristics to identify or authenticate a subject. Since these systems do not rely on just one biometric identifier, they provide better population coverage. People with a biometric identifier in unusable condition may present the other one that can be scanned by the system.

Biometric security

Security controls laid with the help of biometric recognition technology is called biometric security. When you replace your old school mechanical key door lock with a fingerprint lock, biometric security is what you deploy. Biometric security can be deployed to control physical access, e.g. door access, as well as to control digital access like PC logins, online accounts, etc.

Biometric ID

Commonly, the term “ID” refers to a government issued valid ID card. These IDs serve as a tool of identity verification, i.e. they can help you prove who you are. Just like those printed IDs, a biometric ID, is also a mean of identity verification, the difference is that you do not have to rely on a card, document or any external object to prove your identity. Your biometrics like fingerprint, iris pattern, etc., are used as an ID instead.

Biometric ID is considered superior than printed IDs. Printed IDs can be highly vulnerable to manipulation. They can be shared by similar looking people. Computer based editing and printing technology has made ID manipulation as easy as child’s play, resulting increasing numbers of cases of identity fraud. In such scenarios a biometric ID can do the job of trusted identity verification.

Biometric data

Biometric systems capture physical or behavioural characteristics using different sensing and imaging techniques. Biometric systems capture this data in digital form, just like today’s computers or smartphones and it is also stored or transmitted in digital form. This human physiological or behavioral data captured through a biometric system is called biometric data. Most biometric systems are equipped with built-in mechanism such as encryption, for the security of biometric data.

Biometrics now and then: history of biometrics

Due to increasing use in civil identification applications and consumer electronics like phones and computers, biometrics may seem as if it has emerged in recent years, the technology, however, is quite old and its roots dates back to 500BC.

Following is the history and timeline of major events related with biometrics:
fingerprint engraved clay tabletsImage: Fingerprint engraved on ancient clay tablets.

Prehistoric era

Thumbprints are mentioned in ancient Indian text written by Hindu sage Agastya, who is believed to be able to predict past, present and future lives of an individual by reading his/her thumb print.

There are evidences that Babylonians used fingerprints to record business transactions on clay tablets. Fingerprints served as a proof for the parties involved in the transaction. Fingerprints are also found on their pottery and seals.

BC 200 to AD 1500s

In Qin and Han Dynasties (221 BC – 220 AD), there are findings that indicate the use of handprints as evidence. Historic records from Qin Dynasty also mention use of handprints for the theft crime investigations.

Handprints were also used as evidence in some criminal trials of theft in china during AD 300. Kia Kung-Yen, a Chinese historian also mentioned that fingerprints can be leveraged for verification.

In a Persian book “Jaamehol-Tawarikh” (means Universal History), written by Rashid-al-Din Hamadani (also known as “Rashideddin”, 1247–1318) in 14th century, the author commented about the Chinese practice of personal identification using fingerprints.

1600s

Major events in the fields of biometrics took place in 1600s

Dr. Nehemiah Grew (1641 – 1712), an English plant anatomist and physiologist, who is also known as the “Father of Plant Anatomy” published friction ridge skin observations in his paper “Philosophical Transactions of the Royal Society of London” in 1684. Dutch anatomist Govard Bidloo detailed friction ridges in his book “Anatomy of the Human Body” in 1685.

Marcello Malpighi (1628 – 1694), an Italian biologist and physician, who is also called the founder of microscopical anatomy and histology, mentioned fingerprint ridges, spirals and loops in his literature. The innermost layer of the epidermis of skin was named after him.

1700s

Major events in the fields of biometrics took place in 1700s

Until late 1700s, there was no mention for the uniqueness of fingerprints. In 1788, Johann Christoph Andreas Mayer (1747–1801), a German anatomist made first of such statement in his book Anatomical Copper-plates with Appropriate Explanations.

“Although the arrangement of skin ridges is never duplicated in two persons, nevertheless the similarities are closer among some individuals. In others the differences are marked, yet in spite of their peculiarities of arrangement all have a certain likeness”
Johann Christoph Andreas MayerAuthor: Anatomical Copper-plates with Appropriate Explanations

Mayer was the first to mention the uniqueness of friction ridges.

1800s

19th century witnessed some major breakthroughs in the field of biometrics including rise and fall of Bertillon System, development of fingerprint classification system, use of fingerprint in crime scene investigations and establishment of fingerprint bureaus.

Major events in the fields of biometrics took place in 1800s
1823: Purkinje’s classification

Jan Evangelista Purkyně or Purkinje mentioned nine types of fingerprints patterns in his thesis published in 1823. However, there was no mention of usage of fingerprint patterns in personal identification.

1856: Observations on permanence

Hermann Welcker, German anthropologist from the University of Halle acknowledged that fingerprint patterns are permanent. He conducted the study on his own fingerprints by taking handprint in 1856 and again in 1897. He published his observations in 1898.

1858: Hand images on legal documents

In 1858, Sir William Herschel, while working as a chief magistrate of the Hooghly district in Jungipoor, India, started recording handprints on legal contracts. According to the englishman, the purpose of printing handprint on the contracts was to frighten the other party. From there, Herschel started collecting handprints and later fingerprints while writing contracts with locals. Personal identification was not at all the objective behind this collection.

Locals also superstitiously believed that handprints or fingerprints made the contract more binding rather just signing it. So the motive behind this biometric collection was more superstitious than scientific.

1863: First discovery on developing latent prints

In 1863, Paul-Jean Coulier, a professor for chemistry at Val-de-Grâce military hospital in Paris discovered that iodine fumes can help reveal latent prints on paper. He also showed how these prints can be persevered.

1870: First identification with latent prints

In 1877, The American Journal of Microscopy and Popular Science included the following excerpt from a lecture.

“In a recent lecture, Mr. Thomas Taylor, microscopist to the Department of Agriculture, Washington, D.C., exhibited on a screen & view of the markings on the palms of the hands and the tips of the fingers, and called attention to the possibility of identifying criminals, especially murderers, by comparing the marks of the hands left upon any object with impressions in wax taken from the hands of suspected persons. In the case of murderers, the marks of bloody hands would present a very favorable opportunity. This is a new system of palmistry.”
Thomas TaylorAmerican microscopist

During the 1870s, a major contribution in fingerprint biometrics came from Dr. Henry Faulds, a Scottish surgeon in a hospital of Tokyo city, Japan. In his paper published in the scientific journal Nature, he explained how fingerprints can be useful in personal identification and also proposed a method of recording them with ink. He was the first to identify a fingerprint left on a vial. He also proposed a classification system for fingerprints.

1880: Statistical model for fingerprint analysis

In 1886, Dr. Henry Faulds contacted Charles Darwin with details of his work, but Darwin was too old to work on it, so he transferred Dr. Faulds’ work to his cousin, Francis Galton. Francis Galton later published a detailed statistical model of fingerprint analysis and identification in his book Finger Prints. He also encouraged usage of fingerprints in crime scene investigations and criminal identification.

bertillon system of physical measurementImage: Bertillon system of physical measurement.
Rise of Bertillon system

Just when fingerprint recognition was trying to come out of its infancy, Alphonse Bertillon, a French police officer, who was also a biometrics researcher, proposed a personal identification method based on physical measurements. Alphonse Bertillon’s unique approach to anthropological techniques is considered the first scientific approach for criminal identification. This system consisted of five initial measurements — head length, head breadth, length of middle finger, length of the left foot, and length of the cubit. Bertillon system was later supplanted by fingerprint recognition.

1892: World’s first fingerprint filing method and fingerprint bureau

An Argentine law enforcement officer Juan Vucetich started filing fingerprints with a self-created fingerprint recording method. He associated these fingerprints with anthropometric system that Alphonse Bertillon had already proposed for better accuracy in identification. He is also known for establishing the world’s first fingerprint bureau in 1892 following the statistical model of fingerprint analysis proposed by Francis Galton.

In the same year, fingerprints helped solve a crime mystery in the Argentinian city Necochea, in which a mother murdered her two sons and accused the neighbour, despite the brutal interrogation the neighbour did not confess to the crime. The investigation officer, who was also a colleague of Juan Vucetich, found a thumb print on the crime scene. Upon analysis, the print matched with the right thumb of the mother of deceased kids and later she confessed killing them. This case proved the superiority of fingerprints over anthropometry for the purpose of crime scene identification.

Francisca Rojas, the murderer of her own kids, became the first criminal brought to justice with fingerprint matching.

1897: Henry classification system and more fingerprint bureaus

Following the approval by the Council of the Governor General, a committee report resulted in establishment of a fingerprint bureau in Calcutta (now Kolkata), India. The report had proposed use of fingerprints for the identification and classification of criminal records and the approval paved the way to the formation of Calcutta Anthropometric Bureau in 1897.

Indian fingerprint experts Azizul Haque and Hem Chandra Bose, who were working at the bureau in the supervision of Sir Edward Richard Henry, worked on a fingerprint classification system. This system was called Henry Classification System, named after Sir Edward Richard Henry.

1900s

20th century witnessed some major breakthroughs in biometrics. Early years of 1900s established fingerprint biometrics as a credible biometric method. This century also witnessed more human characteristics for personal identification expending the horizon of biometrics.

1901: Henry Classification System reaches Scotland Yard

After India, Henry fingerprint classification system was later accepted in England and Wales upon the formation of UK’s first Fingerprint Bureau in Scotland Yard, headquarters of the Metropolitan Police Service (MPS) in 1901.

Henry Classification System was used in fingerprint identification for around hundred years and became the basis of modern day automated fingering identification system (AFIS). After 1990s, ridge flow classification approaches has taken over Henry Classification System.

anthropometry and fingerprinting recordsImage: William West and Will West’s anthropometry and fingerprinting records.
1902 – 1904: Biometrics comes to the United States, Bertillon system tumbles

In 1902, Dr. Henry P. DeForrest, pioneered the idea of fingerprinting in the New York Civil Services to prevent identity fraud during exams. In 1903, two inmates in Leavenworth Prison System named Will West and William West found to have nearly identical Bertillon measurements, and bore a striking resemblance. This incident rendered reliability of the Bertillon system questionable.

Fingerprints of Will and William West, however, found to be different. This incident drastically impacted the reliability of Bertillon system and it began to decline. In 1904, the St. Louis, Missouri Police Department and United States Penitentiary at Leavenworth, Kansas introduced fingerprinting by forming fingerprint bureaus.

1905 – 1908: The United States Army, Navy and Marine Corps began using fingerprinting

US Army started using fingerprints in 1905. Two years later, the US Navy and then US Marine Corps in 1908 also adopted fingerprinting.

1924: FBI gets an identification division

An act enacted by the US congress resulted in establishment of identification division of the FBI. National Bureau of Criminal Identification of International Association of Chiefs of Police (IACP) and Bureau of Criminal Identification of US Justice Department consolidated to form the identification division.

1936: Iris pattern for personal identification

In 1936, Frank Burch (1876-1957), an ophthalmologist from the United States, conceived the concept of iris pattern for personal identification.

1949: Iris pattern is unique

In 1949, a British ophthalmologist J.H. Doggart, wrote that:

“Just as every human being has different fingerprints, so does the minute architecture of the iris exhibit variations in every subject examined. [Its features] represent a series of variable factors whose conceivable permutations and combinations are almost infinite.”
J.H. DoggartOSSLM, page 27
1953: More experts agree on the uniqueness of patterns formed by iris muscles

In a 1953, F.H. Adler mentioned in Physiology of the Eye, a clinical textbook written by him:

“In fact, the markings of the iris are so distinctive that it has been proposed to use photographs as a means of identification, instead of fingerprints.”
F.H. AdlerAuthor: Physiology of the Eye
1960: Birth of the facial recognition

Woodrow Wilson Bledsoe, an American mathematician and computer scientist, started working on facial measurement. He developed a system using RAND tablet that could manually classify photos of faces. RAND Tablet is a graphical computer input device, which is one of the earliest digital graphic devices. Bledsoe used RAND tablet to input horizontal and vertical coordinates on a grid using a stylus that emitted electromagnetic pulses. Coordinate locations of different facial features like eyes, nose, hairline and mouth could be recorded manually with Bledsoe’s method.

Acoustic speech production: first model created

Carl Gunnar Michael Fant (1919-2009), a professor emeritus at the Royal Institute of Technology (KTH) in Stockholm, published the source-filter model of speech production in 1960. His acoustic speech production model explained the physiological components of acoustic speech production. Gunnar Fan’s research and model was based on x-ray analysis of people making a particular phonic sound. Gunnar Fant’s Orator Verbis Electris (OVE) system was able to produce lifelike speech synthesis.

Research paper on automation of fingerprinting

Hughes published a research paper on automation of fingerprint recognition.

1965: First signature recognition system

First signature recognition system was developed by North American Aviation in 1965.

1969: FBI contracts automation of fingerprint recognition

FBI (Federal Bureau of Investigation) started putting significant efforts and manpower in developing an automated system for fingerprint recognition. A contract for the research on automation of fingerprint recognition was given to National Institute of Standards and Technology (NIST) by the FBI in 1969.

1970: Dynamic signature recognition grabs focus

Research in the direction of signature recognition continued in 1970s. However, research during this decade was more focused on dynamic characteristics of signatures (how signatures are made) rather than static characteristics (design of the signature).

Behavioural elements of speech modelled

Dr. Joseph Perkell expanded the original model of acoustic speech production developed by Gunnar Fant. His model of acoustic speech production detailed the complex behavioural components along with biological elements of speech production.

First hand geometry system became commercially available

Hand geometry recognition became the second biometric modality, which had commercially available recognition systems after the fingerprint recognition.

The fingerprint society was established

A few employees from Hertfordshire (United Kingdom) Fingerprint Bureau started organizing fingerprint experts throughout the UK in 1974. Their efforts paved the way to formation of the country’s first professional fingerprint organization, the National Society of Fingerprint Officers. The organization also attracted fingerprint experts throughout the world and eventually became The Fingerprint Society in 1977.

FBI pushes forward the fingerprint recognition tech

In 1975, FBI started pushing forward fingerprint recognition by funding the development of fingerprint sensors and minutiae extracting methods. Due to high cost of digital storage back then, only the minutiae were stored while processing fingerprints. The fingerprint machine algorithm M40 developed by NIST became the first operational algorithm used by the FBI.

Improvements in facial recognition accuracy

Following their efforts in 1970s, Harmon, Goldstein and Lesk were able to add increased accuracy to a manual facial recognition system. They used 21 specific subjective markers including lip thickness and hair color in order to identify faces automatically. As with Bledsoe’s system, the actual biometrics had to still be manually computed.

First prototype developed for speaker recognition

World’s first speaker recognition prototype was developed by Texas Instruments, an American semiconductor and IC manufacturer, in 1976.

World’s first fingerprint certification program

Institution of the world’s first certification program for fingerprint experts was agreed by voting of delegates to the 62nd Annual Conference of the International Association for Identification (IAI) on 1 August 1977 at New Orleans, Louisiana.

Dynamic signature recognition: patent granted

A patent was granted to Veripen, Inc., for developing a system that was able to capture dynamic information from a signature. This “personal identification apparatus” (as it was named in patent filing) was able to capture pressure data while signing.

1980: NIST establishes Speech Group to promote voice recognition tech

The National Institute of Standards and Technology (NIST) form a dedicated division named Speech Group to encourage the development of voice recognition (speech recognition and speaker recognition) technology.

unique pattern formed by iris musclesImage: Pattern formed by iris muscles is found to be unique for each individual (Image Credit: IEEE Spectrum).
Major breakthrough in iris recognition

John Gustav Daugman, a British-American professor of computer vision and pattern recognition at the University of Cambridge, started working on iris recognition in 1980s. He filed for a patent for his iris recognition system in 1991 while working with the University of Cambridge. John Daugman’s iris recognition algorithm was able to recognize people in real time by encoding iris pattern from some distance.

Daugman’s iris recognition went commercial in late 1990s and turned out to be a huge success. It was used in many small as well as large scale iris recognition campaigns.

Notable mentions that used John Daugman’s algorithm are:
  • Aadhaar biometric registration in India to enroll its 1.3 billion citizens with iris and other biometrics.
  • Border security controls with iris recognition in UAE.
  • Passport free immigration in many countries including the USA, the UK and Canada.
Patent for hand recognition is awarded

Although a patent had been awarded by the US patent office to Robert P. Miller in the late 1960’s and early 1970’s for a hand recognition device. This device could measure hand characteristics and record unique features for comparison and ID verification. Miller’s device, however, was highly mechanical and manufactured under the name “Identimation”.

Several other companies launched development and manufacturing efforts during the 70s and early 80s. In the mid-1980s, David Sidlauskas developed and patented an electronic hand scanning device and established the Recognition Systems, Inc. of Campbell, California in 1986.

Patent issued for vascular pattern recognition

In 1985, vascular pattern recognition method devised by Joseph Rice was awarded a patent. Rice’s recognition system leveraged the pattern formed by subcutaneous blood vessel to identify a subject.

Patent awarded for personal recognition with iris pattern

In 1986, Aran Safir and Dr. Leonard Flom presented a concept that patterns formed by iris muscles are unique and can be used for personal recognition.

1991: Real time face recognition gets real

Matthew Turk and Alex Pentland found that eigenfaces could enable computer vision to identify subjects in real time. Eigenfaces is the name given to a set of eigenvectors when they are used in the computer vision problem of human face recognition. Facial recognition with eigenfaces was originally developed by Sirovich and Kirby in 1987.

unique biometric face profileImage: Face recognition tech creates and computes distance between several points on human face to create a biometric face profile unique to an individual.
1994: John Daugman patents iris recognition algorithm

Owing to its efficiency and accuracy, John Daugman’s iris recognition algorithm was a commercial success. It was used in wide variety of applications including large scale biometric enrolments. This algorithm was tested in many field and laboratory trials, producing no false matches in several million comparison tests.

In 1994, John Daugman patented basis for iris recognition and its underlying computer vision algorithms for image processing, feature extraction, and matching, and published the paper “High confidence visual recognition of persons by a test of statistical independence” in IEEE Transactions on Pattern Analysis and Machine Intelligence.

1996: Hand geometry recognition gets deployed at Olympics

Hand geometry was used in Atlanta Olympic Games 1996 to protect the Olympic village from any unauthorized entry. More than 65,000 people were enrolled to use the system and over 1 million transactions were processed by these systems during the Olympic Games.

1997: First commercial, generic biometric interoperability standard is published

Human Authentication API (HA-API), the first commercial, generic biometric interoperability standard, was published in 1997. It led to vendor independence and interchangeability by allowing easy integration between different products manufactured by different vendors / manufacturers.

1998: COOlS (DNA forensic database) launched

The FBI (Federal Bureau of Investigation) launched Combined DNA Index System (CODIS). This system could store, search and retrieve DNA data.

1998: International Biometric Industry Association (IBIA) was founded

The International Biometric Industry Association (IBIA), a non-profit industry trade association to advance the collective international interests of the biometric industry, was founded in Washington, DC.

1999: ICAO initiates study on biometrics and MRTD

Technical Advisory Group on Machine Readable Travel Documents (TAG / MRTD) of ICAO (International Civil Aviation Organization) initiated its study on biometrics and MTRD (Machine Readable Travel Documents) in 1999. According to ICAO, objective of study was to determine…

“Compatibility of currently available biometric technologies with the issuance and inspection processes relevant to MRTDs; and quantifying these compatibilities to determine whether one or more technologies could/should be adopted as the international standard for application in MRTDs.”
International Civil Aviation Organization
1999: IAFIS (Integrated Automated Fingerprint Identification System) becomes operational

FBI’s large scale computerized fingerprint identification system IAFIS became operational 1999. With IAFIS, it became possible for FBI to search fingerprints collected on any system. It also made integration of different systems possible. IAFIS was able accept electronic submissions of fingerprint services (e.g. for criminal history, background check, etc.) with AFIS.

2000s

So far, 21st century has been an astonishing journey for biometrics. Faster and more efficient systems, mobile biometric and most importantly increasing use and social acceptance are something biometrics can brag about as of late 2010s. Now people carry multiple biometric systems in their phones and rely on them to carry out financial and e-commerce transactions.

2001: National Biometric Security Project (NBSP) was founded

The National Biometric Security Project (NBSP) was founded in 2001 to respond to the events of September 11, 2001, and the need for accelerated development and deployment of biometrics technologies.

Face recognition is deployed at the Super Bowl

Face recognition was deployed at Super Bowl championship organized in January, 2001 in Tampa, Florida. It was done to identify individuals wanted by the law enforcement agencies. Unfortunately, the system misidentified several sports fans and none of them came out to be anyone wanted by the agencies.

2002: ISO / IES standards committee formed

In 2002, ISO / IEC standards committee on biometrics was established to standardize the different aspects of the technology.

Vein recognition gets recognized

Hitachi and Fujitsu launched vein biometric products in 2002. Initially doubted for its uniqueness and usability, veins eventually turned out to be one of the most consistent, discriminatory and accurate biometric trait.

Intensified biometric surveillance post 9/11 attacks

Post September 11, 2001 attacks, people felt civil liberties drastically affected by the incident. Common citizens had to go through thorough security checks and public surveillance with biometrics intensified.

In her book Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance, Kelly A. Gates, Associate Professor in Communication and Science Studies at University of California San Diego, identifies 9/11 as the turning point for the cultural language of our present.

“In the language of cultural studies, the aftermath of 9/11 was a moment of articulation, where objects or events that have no necessary connection come together and a new discourse formation is established: automated facial recognition as a homeland security technology.”
Kelly A. GatesUCLA
2003: Biometric integration into the MRTDs: ICAO adopts the blueprint

In an effort to introduce biometric MRTDs (Machine Readable Travel Documents) and enhance travel security, ICAO (International Civil Aviation Organization) adopted a global, harmonized blueprint for the integration of biometrics into the MRTDs (e.g. passports, passport cards, etc.).

European Biometrics Forum takes shape

In order to achieve excellence in biometrics, European commission established European Biometrics Forum.

2004: US-VISIT (United States Visitor and Immigrant Status Indication Technology) becomes operational

In order to enhance travel security of the domestic as well as international travel, CBP (U.S. Customs and Border Protection) agency made the US-VISIT system operational. The system could collect and analyse biometric data (e.g. face, fingerprints, etc.) and verify against the database of biometric identities of people on surveillance (e.g. criminals, illegal immigrants, terrorists, etc.) This system is now accessed by as much as 30,000 users from federal, state, and local government agencies.

US Department of Defence deploys ABIS

US Department of Defence deployed ABIS (Automated Biometric Identification System) in 2004. ABIS can be viewed as an extended version of FBI’s IAFIS, however, unlike IAFIS, which is designed to perform fingerprint operations; ABIS can perform biometric operations on fingerprints as well as facial images, voice samples, iris patterns, and even DNA. ABIS’s primary objective is leverage biometrics to ensure national security from internal as well as external threats.

2006: Algorithm performance of face recognition evaluated at FRCG

In 2006, latest algorithms for face recognition technology were evaluated for their performance at FRCG (Face Recognition Grand Challenge). FRCG was an event to promote and advance face recognition technology designed to support existing face recognition efforts in the U.S. Government.

2011: Osama bin Laden’s body gets identified with biometrics

Face recognition technology and DNA profiling was used to confirm the identity of the United States’ most wanted terrorist Osama bin Laden. With the help of biometrics, CIA was able to identify the remains of his body with 95 percent certainty.

Biological signals as biometrics
2013: Rise of mobile biometrics

With the launch of iPhone 5s in 2013, Apple introduced Touch ID, a fingerprint recognition solution, which consisted of a capacitive sensor embedded on the device’s home button and underlying software that could perform fingerprint enrollment and authentication. It is not the first time that a mobile phone manufacturer had tried its luck in mobile biometrics; however, efforts prior to Apple’s were not so well organized and publicised.

With initial mixed reactions, fingerprint solution on iPhone 5s was eventually a success. It encouraged other manufacturers to come up with their take on mobile biometrics and soon the market flooded with phones with biometric recognition.

Biological signals as biometrics

Popular biometric recognition methods like fingerprints or iris recognition are still touted as “high-tech”. However, these high tech methods may start feeling like “old-school” in coming years. In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram) signals have emerged.

For example, Nymi band is a wearable authentication device, on which you need to authenticate once with your heartbeat and you can remain in authenticated states once in. Commercial brainwave authentication is yet to see light of day.

On-going research has proved that biological signals from brain and heartbeat are unique to an individual and they can be used as a password or to lay access control. Some manufactures and start-ups are coming up with the innovative products with biological signal biometrics.

Mid 2010s

Continuous authentication for mobile application security

Rise of the smartphones and their increased share in performing banking, financial and ecommerce transactions have rendered them vulnerable to theft, fraud and cybercrime. It made service providers to look for newer countermeasures of user and data security, which paved the way for continuous authentication.

Continuous authentication is an authentication approach, which can be implemented along with traditional authentication with passwords or physiological biometrics (e.g. fingerprint, iris, etc.). Once use crosses initial authentication barrier with password / biometrics, usage pattern is profiled to check for any unusual activity.

Machine learning and artificial intelligence

As of mid-2010s, machine learning and artificial intelligence were hard at work to make technology based system smart and biometrics was not an exceptions.

Biometric systems had started using cutting edge machine learning and big data technologies to improve security as well as the system performance. User Behavior Analytics (UBA), an approach based on user behavior uses big data and advanced algorithms to assess user risk.

With machine learning and artificial intelligence, biometric systems can analyse the vast fields of data they collect. Machine learning is particularly useful in behavioural biometrics, in which key signal features collected by the system are modelled for each user, allowing individuals to differentiate from each other. With the help of machine learning and deep learning, biometric systems can also understand the variation in biometric samples or user behavior, making the authentication more reliable.

fingerprint to unlock car and start engineImage: No more keys or fobs to unlock their car and start the engine. (Image Credit: Hyundai Motors)

Late 2010s

Electric vehicles with face biometrics

At Consumer Electronics Show 2018, Chinese start-up Byton introduced an electric vehicle that uses face biometrics to recognize its driver. It automatically unlocks the door and loads the driver profile when as soon as you get behind the wheel. The EV also uses voice and gesture to control several features of the vehicle.

Hyundai announces its futuristic biometric SUV

In 2018, the South Korean car maker announced an SUV with integrated biometric solution, which allows the driver to unlock the vehicle and start the engine using fingerprint recognition. Hyundai’s fingerprint solution offers more than just unlocking the door or starting the engine. You can save your preference like seat height, angle of rear view mirrors, etc. with your fingerprint and once your car recognizes it’s you, it automatically makes adjustments.

World’s largest biometric database

India’s biometric identity scheme for its citizens holds biometric data of more than 1.2 billion people as of 2018. Biometric data includes fingerprints, iris pattern and face geometry of the Indian citizens. The scheme was implemented for targeted delivery of government benefits, subsidiaries and services. Since its implementation, Aadhaar has been criticized for lack of proper data protection measures and several incidents of data leak.

Next wave of mobile biometrics

In 2018, Vivo, a Chinese mobile phone manufacturer launched world’s first phone with under-display fingerprint sensor. The optical sensor resides beneath the phone screen enabling the display to capture fingerprints. Since then, many phone manufacturers have launched phones with in-display / under-display sensors. Some high end-devices also included ultrasonic in-display fingerprint sensor for enhanced security and performance.

Mobile devices now offer multiple biometric recognition methods: smart digital assistant using voice recognition as well as face, iris and fingerprint recognition for device security and authentication.

Biometrics’ success on mobile phone encouraged manufacturers of other consumer electronic products to integrate biometric security to replace their existing authentication methods. Smart home security systems, home appliances, smart devices, etc. have already started taking biometric route.

Biometrics: what is next?

Biometrics, once limited to only a few applications and high-end facilities is now everywhere. It carried the stigma of being a criminal identification method for a very long time, however, now people do not hesitate to present their fingerprints for unlocking phones to authenticating their identity.

Frictionless and secure yet instant identification is the need of the hour

Frictionless and secure yet instant identification is the need of the hour, staying stranded at identification or authentication formalities is one of the top time wasters in personal as well as professional space.

Staying authenticated will soon be a necessity

The way things are moving, soon we will be living in the world where staying in authenticated state will be a necessity. Fifth generation of cellular mobile communication is knocking door and we are about to enter 5G and IoT era.

IoT will bring along connected vehicles, devices, appliances, home security systems, and much more and these connected systems will have to make sure that only authorized individuals can access them.

We are not done yet

We all have experienced the identification and authentication practices taking a shift in recent years and this is just the beginning. Biometrics is here to stay and there is a lot more to come. We will make sure that this article is able to keep up with the latest in the field of biometrics.

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Mary Clark is Product Manager at Bayometric, one of the leading biometric solution providers in the world. She has been in the Biometric Industry for 10+ years and has extensive experience across public and private sector verticals.

Comments are closed.

Have any questions? We will be happy to answer.

Sidebar Contact

Shop online for high quality fingerprint readers

Hamster Pro 20

hamster pro 20
Buy Online

Unity 20 Bluetooth

unity 20 bluetooth
Buy Online

Hamster Plus

hamster plus
Buy Online

Columbo

columbo
Buy Online

Fingerprint applications we offer

Fingerprint SDK

Simple and Intuitive API, NO biometrics programming experience required. Get sample code in C++, C#, VB, Java etc.
Take a Tour

Live Scan

Live scan fingerprinting allows quick and cost effective background checks of individuals.
Take a Tour

Computer Logon

Logon to Windows, Domain, Websites and Applications using fingerprints & create a ”password free” environment.
Take a Tour

Search the Blog

Categories

  • Access Control
  • Archive
  • Automotive Biometrics
  • Background Check
  • Big Data
  • Biometric ATMs
  • Biometric Authentication
  • Biometric Data Security
  • Biometric Device
  • Biometric Identification
  • Biometric Immigration
  • Biometric National ID
  • Biometric News
  • Biometric Passport
  • Biometric Payment
  • Biometric Research
  • Biometric Screening
  • Biometric Security
  • Biometric Spoofing
  • Biometric System
  • Biometric Technology
  • Biometric Terminology
  • Biometrics as a Service
  • Biometrics Comparison
  • Biometrics Examples
  • Biometrics in Banking
  • Biometrics in Education
  • Biometrics in School
  • Border Control
  • BYOD
  • Cloud Communication
  • Cloud-based Biometrics
  • Covid 19
  • Cyber Security
  • Facial Recognition
  • Finger Vein Recognition
  • Fingerprint Attendance
  • Fingerprint Door Lock
  • Fingerprint Recognition
  • Fingerprint Scanner App
  • Fingerprint scanners
  • Fingerprint SDK
  • Fingerprint with Phone
  • Future of Biometrics
  • Guest Blog
  • Hand Geometry
  • Healthcare Biometrics
  • Home Security
  • Hospitality Industry
  • Integration Guideline
  • Internet of Things
  • Iris Recognition
  • Law Enforcement
  • Live Scan Fingerprinting
  • Mass Surveillance
  • Membership Management
  • Multi-factor Authentication
  • Multimodal Biometrics
  • Network Security
  • NFA Fingerprinting
  • Palm Vein Recognition
  • Patient Identification
  • Privacy
  • Public Safety
  • Retail POS
  • Retinal Scan
  • SecuGen RD Service
  • Secure Data Center
  • Signature Verification
  • Single Sign On
  • Smart Card
  • Time and Attendance
  • Two-factor Authentication
  • Vascular Biometrics
  • Visitor Management
  • Voice Authentication
  • Voter Registration
  • Windows Biometrics
  • Workforce Management

About Bayometric

Bayometric is a leading global provider of biometric security systems offering core fingerprint identification solutions. Learn more

Products We Offer

  • Touch N Go
  • Single Sign-On
  • Biometric Access Control
  • Biometric Security Devices
  • Fingerprint Scanners
  • FBI Certified Readers
  • Live Scan Systems
  • OEM Modules

Contact Us

Footer Contact
Sending

Recent from Blog

  • How Does NFA Obtain Your Criminal History Record? February 4, 2023
  • ATF Final Rule (2021R-08F) – Attached Stabilizing Braces January 30, 2023
  • Can Live Scan Detect Masked Fingerprints? January 5, 2023
© 2007 - 2022 by Bayometric | All Rights Reserved.
  • Best Seller
  • Cart
  • Checkout
  • Policies
  • Industries
  • Knowledge Base
  • Sitemap