Select Page

“Any sufficiently advanced technology is indistinguishable from magic”.

This well-known aphorism by Arthur C. Clarke remains a perfect framework for understanding the perception of biometrics and verification technologies.

For decades, TV shows and movies have portrayed systems that instantly identify people, creating an aura of fascination around these solutions. However, what once seemed like pure science fiction is now part of our daily lives: we unlock phones with fingerprints, confirm transactions with our voice, and open bank accounts with a selfie.

The question is no longer “Is this possible?” but rather “How does this technology actually work?”

How do biometric identification technologies work?

Biometrics uses physical or behavioral features that make us unique as individuals. Some common examples include fingerprints, facial features, the iris, or even more dynamic features like voice tone, typing rhythm, or signatures. Not all traits are equally easy to capture and process, nor do they offer the same reliability or accessibility, so their selection depends on the requirements of each final system.

In general, a biometric process can be divided into three key phases:

  1. Capture: Devices such as cameras, microphones, or sensors are used to record the biometric trait.
  2. Feature extraction: From the raw data, a trained system can create feature vectors (biometric templates) that model the original trait.
  3. Comparison and verification: The system compares the captured mathematical representation with a stored database to confirm or reject the identity.

pin   Once any of the biometric traits described above have been captured with an electronic device (a camera, a microphone, a fingerprint sensor…) it is possible to extract a sort of features that best represent each of them.

Technological evolution

Before the advent of deep learning, the success of biometric systems largely depended on the manual selection of relevant features. For example, in a voice system, it was necessary to define in advance which characteristics would be used to model that trait: fundamental frequency, deviations, formants…

Today, thanks to advances in hardware and access to large databases, deep neural networks have revolutionized this paradigm. These systems can automatically learn the most representative features for each case, analyzing patterns at different levels of abstraction:

  • Initial layers: Identify basic details such as edges, shadows, or frequency traits.
  • Intermediate layers: Recognize shapes, textures, or timbres.
  • Deep layers: Detect complete structures such as facial features or voice tone.

red neuronal biometría

Características de redes neuronales

This approach enables end-to-end training, improving the performance of feature extractors by making them more robust.

pin  The access to large databases available on the Internet and the cheapening and improvement of hardware for intensive computing (GPUs) brought back to the fore the neural network architectures that had previously given discrete results.

How to protect biometric data

The widespread use of biometrics raises critical questions about privacy and data protection. Unlike passwords or PINs, biometric data is immutable; we cannot change our fingerprints or face if they are compromised. This makes them an attractive target for cybercriminals.

To mitigate these risks, biometric technology manufacturers actively work on solutions to provide the highest degree of security in operations:

  • Physical and logical security in biometric data storage: Storing biometric data requires a combination of physical and logical measures to prevent unauthorized access. From a physical perspective, these databases must be housed in facilities with security certifications such as ISO 27001.
  • Advanced encryption for data protection: Biometric data, being unique and irreplaceable, requires robust encryption to prevent reverse engineering. Techniques such as homomorphic encryption allow computations to be performed directly on encrypted data, eliminating the need to decrypt it and minimizing exposure risk. Alternatively, cryptobiometrics integrates biometric features with cryptography to ensure templates cannot be reconstructed or used outside the original system.
  • Zero-knowledge proofs: These techniques allow the authenticity of an identity to be verified without fully revealing it. This is a particularly interesting approach that aligns with regulations aimed at addressing concerns about the privacy of personal data.

Legal and ethical framework in biometrics

The implementation of biometric systems is subject to strict regulations, such as the General Data Protection Regulation (GDPR) and the new Artificial Intelligence Act (AI Act) in Europe. These regulations not only govern consent, storage, and use of biometric data but also address the risks associated with the use of AI-based technologies, including biometric applications. They ensure that companies managing biometric data adopt appropriate measures to protect privacy and prevent potential abuse while guaranteeing that AI systems are fair, transparent, and explainable. Specifically, the principles of proportionality in use and purpose, transparency in the use of these systems, and explicit user consent must be upheld.

Beyond regulatory aspects, it is essential to address biases in biometric algorithms, a growing concern in the development of AI-based technologies. Studies, such as those conducted by the NIST (National Institute of Standards and Technology), have shown that facial recognition systems, for example, may exhibit higher error rates for people of certain ethnicities, genders, or physical characteristics that are underrepresented in the training data.

The NIST report on demographic biases in biometrics and facial recognition technologies, which analyzes various databases and algorithms, showed that systems can be prone to significant errors when not trained with adequately diverse data. In this regard, it is crucial to train models with databases that are as diverse and representative as possible, reflecting the heterogeneity of the global population, in order to reduce the risk of biases and improve the system’s fairness and accuracy.

At Mobbeel, we are aware that biometrics is as powerful as a magic wand. That is why we continue to explore new possibilities with the goal of offering solutions that are not only at the forefront of innovation but also ensure maximum security and respect for our users’ privacy.

Let the magic continue!

GUIDE

Identify your users through their face

In this analogue-digital duality, one of the processes that remains essential for ensuring security is identity verification through facial recognition. The face, being the mirror of the soul, provides a unique defence against fraud, adding reliability to the identification process.