Science Fiction

Despite biometric technology existing since the early 90s, its overall use in the public domain has been limited, making it more science fiction than fact 

For the most part, biometric technology has been used in security measures adding to the misconceptions surrounding its wider application. Over recent years, biometrics has crept more into the public domain through personal mobile security and now can be used as an analytical tool providing qualitative data to retail, digital marketing and User Experience (UX) development. 

Many marketing traditionalists may underestimate the value that biometric user testing can bring. In reality, by utilising biometrics, marketers can add a whole new level to their UX insights – highlighting not just the what but also the why of a user’s journey. 

Biometrics seems to be one area of technology which is set to grow and continue to see more innovations and breakthroughs in the security industry. Far from being a passing trend, it’s predicted that the biometric market will grow to just under US$60 billion by 2025. A number of biometric techniques are already being used to great success including eye-tracking, facial expression recognition and galvanic skin response, where changes in a user’s emotional arousal are monitored. This is just the beginning of a number of possibilities, with wearable tech for UX testing already in the early stages of development. 

Let’s take a look at three common myths of biometrics. 

1: Biometrics is expensive and is a new technology 

It has been argued that biometrics can be costly. However, when deployed correctly, the benefits can be significant and can increase a multilayered security solution in most environments. 

The first myth that needs to be dispelled is that biometrics is a modern-day idea. Despite its high-tech glitzy image, the principles behind the technology can actually be traced right back to Egyptian times, when workers building the great pyramids were not only identified by their name, but also their physical size, face shape, complexion and other noticeable features, such as scars. 

It may have taken the next four-and-a-half thousand years to really get going, but the technology is now experiencing a “hockey stick” adoption curve with governments, hospitals, schools, airports, retail outlets and modern offices all successfully using this remarkably straightforward empowering technology. 

The problem with such a rapidly emerging industry is that many people are elevated to the position of “expert”, almost overnight. This can be a particularly dangerous situation – especially when the expert used to be the company salesman or marketing executive. 

This scenario has led to some of the industry’s best technological fallacies, which can either be put down to pure ignorance, or worse, the stirring up of malicious rumours in order to gain competitive advantage. 

2: Reducing cybersecurity fears 

As security breaches continue to hit headlines, the public has become ever more aware of the need for data security – particularly around their biometric data. Storing biometric data in a centralised database can be a challenge and a risk. In an IBM global Cost of Data Breach Report, 83% of organisations said they have had more than one data breach, putting sensitive information at risk. A common misconception is that biometric data for fingerprint payment cards is stored on a central database, which has the potential to be hacked, but this is not the case. 

Instead, upon registration with a smartcard, the owner’s fingerprint image is immediately transformed into an abstract biometric certificate via encryption technology. This is then stored in the secure element of the card’s EMV chip and the owner’s data never leaves the card – making it extremely secure and reassuring. 

Along with security concerns, centralising biometric data is inconvenient – requiring the user to visit a secure site to register the fingerprint to be matched to the card. Instead, with user data encrypted and stored on the payment card, the user can register their fingerprint at home through a remote enrolment process that also eliminates the risk of online hacking. The user remains fully in control of their data – a critical aspect for many consumers. 

3: Fingerprints can be replicated to ‘trick’ devices 

The internet is full of articles and videos that claim it is possible to use materials from sellotape to gummy bears to craft fingerprint spoofs and access biometric systems. 

Although there might have been a time when gummy bear spoofing was the go-to party trick, today’s consumer biometric authentication solutions have too many technological defences, such as improved image quality and matching algorithms, to simply ‘trick’ devices. 

To add to this, the criminal needs to have access to the person’s device where this fingerprint is enrolled, for example, a smartphone or payment card, before they notice and block it. This is not scalable or common in comparison with gaining access to someone’s PIN code or skimming a contactless card. 

To read the full exclusive and other news stories and exclusives, see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
Altronix - Security Buyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
SB Awards register now advert - Security Buyer

Launching Security Buyer Awards

Honouring innovation, leadership, and success across the global security industry at the Security Buyer Judges’ and Readers’ Awards 2025 
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Scroll to Top