SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

What’s new with biometrics?

14 Mar 2024

What’s new with biometrics?
Larry Anderson
Larry Anderson
14 Mar 2024

Editor Introduction

Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?


Card image cap
Bobby Varma Princeton Identity

There is so much excitement surrounding biometrics as it migrates from high-security applications into the mainstream. Manufacturers are emphasising the user experience, and rightfully so. Biometrics are “the ultimate wearable,” which means they can offer unrivalled convenience. On-the-move solutions further improve that experience, and such systems are now available using modalities other than the face – a modality that has raised privacy concerns because of its ability to be used for surveillance. There is a growing demand for multifactor authentication in physical security applications. Pairing cards or PIN codes with biometrics makes it impossible for users to share credentials or for imposters to use lost or cloned cards. Multimodal devices are coming to market that can perform dual or multifactor authentication as quickly as traditional access readers. Also, look for an expansion of integrated solutions that leverage biometrics. Time and attendance, visitor management, point of sale, and logical access are all applications in which biometrics improve convenience, reduce fraud, and streamline administrative operations.

Card image cap
Rob Druktenis Axis Communications

Biometrics have contributed to major strides in access control technologies, specifically with a shift towards more secure and convenient authentication methods. Traditional access control methods that use biometrics, like fingerprint and facial recognition, have evolved with improved accuracy and resistance to spoofing. Facial recognition technology has also gained prominence, leveraging AI for enhanced precision and adaptability to varying conditions. Multi-factor authentication biometric systems that combine multiple identifiers such as a credential with fingerprints, facial features, and iris scans offer flexibility, heightened security and reduced false positives. Additionally, the integration of behavioural biometrics – analysing situations in real-time with AI-powered analytics on a camera – adds an extra layer of authentication to modern access control systems to prevent tailgating, exceed occupancy limits, or verify proper safety equipment is worn, etc. These developments collectively contribute to a more robust, user-friendly, and sophisticated landscape in biometric access control.

Card image cap
Jon Payne Entrust Inc.

The application of biometrics in the travel industry has proven to be a new and increasingly useful tool in achieving global seamless travel. This past year, companies like Eurostar implemented digital travel credentials (DTCs) that allow passengers to forgo carrying physical passports or tickets with them and instead turn to biometric-backed verification. As a result, the number of manual checkpoints required was reduced drastically, and security officials were provided with additional support in identifying falsified documents and IDs. The introduction of biometrics does not mean we should eradicate physical security measures altogether. Instead, biometrics should act as an additional measure for organisations to fortify and bolster traditional physical security practices, helping to catch threats like AI-generated morphed photographs or digital injection attacks used to evade endpoint security checks. In our increasingly digital age, a hybrid security approach will be critical to ensure secure, seamless travel for passengers across the globe.

Card image cap
Viktoria Ruubel Veriff

In 2023, 85% of fraud was categorised as impersonation fraud. Advancements in AI and machine learning have triggered greater security threats, empowering bad actors to generate multimedia content that surpasses previous levels of realism to manipulate and steal someone's identity. Conversely, AI has streamlined and enhanced the usability of biometric information to achieve intended insights and outcomes, like verifying people quickly and accurately without the friction of requiring manual input or substantial hardware. With the growing complexity of identity verification, businesses and consumers are leveraging AI in biometrics. For example, AI-powered liveness detection technology, like facial recognition tools, depth perception, and motion and environment analysis, fulfils functions comparable to hundreds of checks in seconds. Facial recognition works with sophisticated algorithms to determine if a subject is physically present and alive when their biological or physiological characteristics are captured. These recent advances decrease the risk of fraud and impersonation while bolstering end-user satisfaction.


Editor Summary

Instead of relying on a single fingerprint or face scan, biometrics systems are integrated seamlessly into our lives. Multi-factor authentication, often including biometrics, makes physical and logical access control systems more secure than ever. The use of biometrics has evolved, too. No longer restricted to high-security applications, today’s biometrics applications span the globe and are as close as the nearest smartphone. 

  • Related links
  • IP Surveillance Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
  • Bollards
  • Power supplies & batteries
  • Barricades
  • Video servers (IP transmission)
  • Gates
  • Barriers
  • Storage
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Round table discussions
About this page

"Discover the latest advances in biometrics technology for enhanced security. From iris scanning to facial recognition, learn from experts about its evolving uses in our digital world."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec