| {"title":"ABIS & Deduplication","slug":"abis-dedup","summary":"Automated Biometric Identification Systems perform large-scale 1:N searches to resolve identities and detect duplicates.","order":23,"published":true,"also_known_as":["ABIS","deduplication","1:N search"],"category":"Technology","tags":["biometrics","identity","standards"],"see_also":["fingerprint-recognition","facial-recognition","iris-recognition"],"standards":[{"label":"ANSI/NIST-ITL 1-2011 biometric data format","url":"https://www.nist.gov/publications/ansi-nist-itl-1-2011-data-format"}],"last_reviewed":"2025-11-10","faq":[{"question":"What does an ABIS do?","answer":"It searches biometric databases to identify individuals and flag duplicate enrollments across large populations."},{"question":"What’s the difference between identification and verification?","answer":"Identification is 1:N (who is this?); verification is 1:1 (is this person who they claim?). ABIS primarily supports 1:N at scale."},{"question":"How are false positives managed?","answer":"Systems tune thresholds and use adjudication workflows; quality checks and multi‑modal fusion reduce spurious hits."}],"references":[{"label":"NIST biometric standards resources","url":"https://www.nist.gov/itl/iad/image-group/biometric-standards"},{"label":"ANSI/NIST-ITL 1 data format","url":"https://www.nist.gov/publications/ansi-nist-itl-1-2011-data-format"},{"label":"ISO/IEC 19795-1 performance testing","url":"https://www.iso.org/standard/41446.html"}],"createdAt":"2026-03-31T15:12:40.477Z","updatedAt":"2026-03-31T15:12:40.477Z","name":"ABIS & Deduplication","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/abis-dedup.mdx","canonicalPath":"/technologies/abis-dedup","apiPath":"/api/technologies/abis-dedup"},"description":"## Overview\nABIS platforms store and search biometric templates at national or global scale. Deduplication ensures each person has only one identity record.\n\n## How it works\n1. Capture biometric samples during enrollment. \n2. Extract features and store templates. \n3. Run 1:N searches to detect matches or duplicates. \n4. Adjudicate hits and maintain watchlists.\n\n## Common use cases\n- National ID enrollment\n- Border and visa vetting\n- Civil or criminal watchlists\n\n## Strengths and limitations\n**Strengths:** Scales to millions; prevents multiple identities. \n**Limitations:** Infrastructure cost; privacy and governance.\n\n## Key terms\n- **1:N search:** Matching a probe against all records. \n- **Deduplication:** Removing duplicate identities in a database."} | |
| {"title":"Age Assurance (Verification & Estimation)","slug":"age-assurance","summary":"Processes that verify age via trusted documents or estimate age from signals like face or behavior for online safety compliance.","order":18,"published":true,"also_known_as":["age verification","age estimation"],"category":"Technology","tags":["privacy","regulation","standards"],"see_also":["facial-recognition","digital-id"],"standards":[{"label":"PAS 1296: Age verification","url":"https://shop.bsigroup.com/products/pas-1296-age-verification"}],"last_reviewed":"2025-11-10","faq":[{"question":"How does age estimation differ from verification?","answer":"Estimation predicts age from signals, while verification checks authoritative documents or records."},{"question":"What inputs are used for estimation?","answer":"Commonly face images or short videos; some systems consider behavioral signals. Estimation should include bias and uncertainty reporting."},{"question":"How is privacy handled?","answer":"Prefer on-device processing, minimize retention, and use privacy-preserving proofs where possible; follow regulator guidance (e.g., data minimization)."}],"references":[{"label":"UK Ofcom guidance on age assurance","url":"https://www.ofcom.org.uk/online-safety/age-assurance"},{"label":"ICO Age Appropriate Design Code","url":"https://ico.org.uk/for-organisations/ico-codes-of-practice/age-appropriate-design-a-code-of-practice-for-online-services/"},{"label":"BSI PAS 1296: Age verification","url":"https://shop.bsigroup.com/products/pas-1296-age-verification"}],"createdAt":"2026-03-31T15:12:40.477Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Age Assurance (Verification & Estimation)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/age-assurance.mdx","canonicalPath":"/technologies/age-assurance","apiPath":"/api/technologies/age-assurance"},"description":"## Overview\nAge assurance tools help platforms meet legal requirements by verifying or estimating user ages before granting access to restricted content or services.\n\n## How it works\n1. **Verification:** Validate a government ID or authoritative record. \n2. **Estimation:** Use biometrics or behavior (e.g., face, voice, activity) to infer age. \n3. **Decision:** Apply policy thresholds (e.g., over 18) and handle appeals or manual review.\n\n## Common use cases\n- Social media sign-up\n- Online gaming and gambling\n- Adult content gateways\n\n## Strengths and limitations\n**Strengths:** Supports regulatory compliance; multiple methods. \n**Limitations:** Privacy concerns; estimation accuracy varies.\n\n## Key terms\n- **Age verification:** Checking an ID or database to confirm age. \n- **Age estimation:** Predicting age from biometric or behavioral signals."} | |
| {"slug":"behavioral-biometrics","name":"Behavioral Biometrics","summary":"Behavioral biometrics analyzes patterns in user interactions—such as typing rhythm, mouse movement, or touchscreen gestures—to continuously verify identity.","order":10,"published":true,"references":[{"label":"NIST: Behavioral biometrics program overview","url":"https://www.nist.gov/programs-projects/behavioral-biometrics"},{"label":"NIST SP 800-63B (AAL, user verification context)","url":"https://pages.nist.gov/800-63-3/sp800-63b.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is behavioral biometrics?","answer":"Behavioral biometrics analyzes patterns in user interactions, such as typing rhythm, mouse movements, or touchscreen gestures, to verify identity continuously."},{"question":"How does behavioral biometrics differ from physiological biometrics?","answer":"Behavioral biometrics focuses on how users behave, whereas physiological biometrics rely on static physical traits like fingerprints or iris patterns."},{"question":"Where is behavioral biometrics commonly used?","answer":"It is used for continuous authentication, fraud detection, and adaptive security in banking, healthcare, and enterprise environments."},{"question":"What about privacy and consent?","answer":"Deployments should disclose passive monitoring and adhere to privacy laws; many systems process derived features rather than raw inputs to reduce risk."}],"title":"Behavioral Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/behavioral-biometrics.md","canonicalPath":"/technologies/behavioral-biometrics","apiPath":"/api/technologies/behavioral-biometrics"},"description":"Behavioral biometrics leverages how a user interacts with devices or interfaces rather than physical traits. By monitoring characteristics like keystroke dynamics, touchscreen swipes, or navigation habits, systems can provide continuous and passive authentication. This modality enhances security by detecting anomalies in real-time and can complement physiological biometrics for multifactor authentication."} | |
| {"slug":"biometric-border-control","name":"Biometric Border Control","summary":"Biometric border control uses face or fingerprint recognition at checkpoints to verify travelers and automate border processes.","order":7,"published":true,"references":[{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"EU Smart Borders / Entry-Exit System overview","url":"https://home-affairs.ec.europa.eu/policies/schengen-borders-and-visa/smart-borders_en"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/programs-projects/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is biometric border control?","answer":"It uses biometrics like fingerprints or face images at border crossings to verify travelers."},{"question":"Where is it used?","answer":"Many countries deploy biometric e-gates at airports and land checkpoints for security."},{"question":"How does it help travelers?","answer":"Automated gates reduce wait times while enhancing identity assurance."},{"question":"What’s the difference between entry and exit checks?","answer":"Entry typically verifies a traveler against their travel document and watchlists (1:1 and 1:N). Exit can confirm departure and detect overstays, often with facial verification at gates."},{"question":"How do systems handle spoofing?","answer":"They combine document checks, live capture quality controls, and presentation attack detection (PAD) to detect photos, masks, or replays."}],"title":"Biometric Border Control","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/biometric-border-control.md","canonicalPath":"/technologies/biometric-border-control","apiPath":"/api/technologies/biometric-border-control"},"description":"Biometric border control systems automate entry and exit checks with biometric capture and matching at e-gates or manual stations.\n\n### Latest Updates\n* **2025-06-30:** Somalia deployed the U.S.-backed PISCES border system at Mogadishu airport, capturing fingerprints and face images for real-time watch-list checks, with national roll-out planned."} | |
| {"slug":"biometric-id-cards","name":"Biometric ID Cards","summary":"Biometric ID cards embed fingerprints or facial data on a chip for secure identity verification in travel and public services.","order":19,"published":true,"references":[{"label":"ICAO Doc 9303 (eMRTD fundamentals)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"EU Regulation 2019/1157 (ID card security features)","url":"https://eur-lex.europa.eu/eli/reg/2019/1157/oj"},{"label":"ISO/IEC 7816 (smart cards)","url":"https://www.iso.org/committee/54028.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is a biometric ID card?","answer":"A physical identity card containing a chip with biometric templates such as fingerprints."},{"question":"Where are biometric ID cards used?","answer":"They are used in national ID programs and for travel documents."},{"question":"Are biometrics stored securely?","answer":"Yes, data is typically encrypted and access-protected on the card chip."},{"question":"How are cards verified?","answer":"Inspectors read the chip and validate signatures using PKI (e.g., CSCA/DSC for eMRTD) and check data consistency with the printed document."}],"title":"Biometric ID Cards","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/biometric-id-cards.md","canonicalPath":"/technologies/biometric-id-cards","apiPath":"/api/technologies/biometric-id-cards"},"description":"Biometric ID cards store biometric templates on a secure chip to verify the holder and prevent fraud during identity checks.\n\n### Latest Updates\n* **2025-07-01:** Switzerland confirmed biometric ID cards will launch by end-2026, storing face and fingerprints on a secure chip in line with EU Regulation 2019/1157."} | |
| {"title":"Contactless Fingerprinting","slug":"contactless-fingerprints","summary":"Touch-free fingerprint capture using cameras or scanners, enabling mobile or hygienic enrollment.","order":20,"published":true,"also_known_as":["touchless fingerprints","mobile fingerprint capture"],"category":"Technology","tags":["fingerprint","contactless","standards"],"see_also":["fingerprint-recognition"],"standards":[{"label":"NIST SP 500-334: Contactless fingerprint guidelines","url":"https://www.nist.gov/publications/sp-500-334-contactless-fingerprint-devices"}],"last_reviewed":"2025-11-10","faq":[{"question":"Why use contactless capture?","answer":"It improves hygiene and allows capture with commodity cameras on phones or kiosks."},{"question":"Will contactless images match legacy databases?","answer":"Systems reconstruct contact-equivalent images and templates; adherence to emerging profiles improves interoperability with contact-based AFIS."},{"question":"What about spoofing and PAD?","answer":"Optics and software can detect prints-on-displays or photos; PAD should be evaluated separately from matching accuracy."}],"references":[{"label":"FBI contactless fingerprint pilot specs","url":"https://fbibiospecs.fbi.gov/standards-and-specifications"},{"label":"NIST SP 500-334: Contactless devices","url":"https://www.nist.gov/publications/sp-500-334-contactless-fingerprint-devices"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Contactless Fingerprinting","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/contactless-fingerprints.mdx","canonicalPath":"/technologies/contactless-fingerprints","apiPath":"/api/technologies/contactless-fingerprints"},"description":"## Overview\nContactless fingerprinting collects ridge detail without touching a platen, using optical setups or smartphone cameras to reconstruct flat equivalents.\n\n## How it works\n1. Capture multiple finger images in 3D or at angles. \n2. Normalize and flatten ridges into a standard fingerprint image. \n3. Generate templates compatible with contact-based databases.\n\n## Common use cases\n- Mobile enrollment for civil ID\n- Border kiosks with hygiene requirements\n- Workforce or time-and-attendance apps\n\n## Strengths and limitations\n**Strengths:** Hygienic; uses commodity hardware. \n**Limitations:** Image distortion; interoperability with contact-based standards still evolving.\n\n## Key terms\n- **Contactless capture:** Imaging without touching a sensor. \n- **Platen:** Surface used in traditional fingerprint scanners."} | |
| {"title":"Deepfake Detection","slug":"deepfake-detection","summary":"Methods that detect synthetic or manipulated media (audio, images, video) used to impersonate people in identity verification and biometric systems.","published":true,"order":999,"category":"Technology","tags":["synthetic-media","deepfakes","biometrics","identity-verification","security"],"see_also":["pad","face-recognition","voice-recognition","document-verification-nfc"],"last_reviewed":"2026-01-07","createdAt":"2026-01-07T00:00:00.000Z","updatedAt":"2026-01-07T00:00:00.000Z","references":[{"label":"NIST: Face Recognition Technology Evaluation (FRTE)","url":"https://www.nist.gov/programs-projects/face-recognition-technology-evaluation-frte"},{"label":"ISO/IEC 30107-3 (PAD testing and metrics)","url":"https://www.iso.org/standard/67381.html"}],"name":"Deepfake Detection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/deepfake-detection.mdx","canonicalPath":"/technologies/deepfake-detection","apiPath":"/api/technologies/deepfake-detection"},"description":"## Overview\nDeepfake detection aims to identify AI-generated or heavily manipulated media intended to defeat identity verification (e.g., selfie checks) or to enable fraud via impersonation.\n\n## How it’s used in identity systems\n- As a **signal** alongside PAD/liveness, device checks, and document verification.\n- To **flag suspicious submissions** for step-up or manual review.\n- To **harden enrollment and re-verification**, where synthetic media can create or take over accounts.\n\n## Common challenges\n- Rapidly evolving generation methods and attack techniques.\n- Domain shifts (lighting, cameras, compression) that can affect detector performance."} | |
| {"slug":"digital-id","name":"Digital ID","summary":"Digital ID represents electronic identity credentials that can be used to authenticate individuals and access services online.","order":5,"published":true,"references":[{"label":"EU eIDAS Regulation overview","url":"https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation"},{"label":"W3C Decentralized Identifiers (DID) v1.0","url":"https://www.w3.org/TR/did-core/"},{"label":"NIST SP 800-63 Digital Identity Guidelines","url":"https://pages.nist.gov/800-63-3/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is a Digital ID?","answer":"A Digital ID is an electronic representation of a person’s identity credentials, used to authenticate and authorize access to online services."},{"question":"How are Digital IDs issued and managed?","answer":"Digital IDs are issued by trusted entities (e.g., governments or certification authorities) and managed through secure identity providers, often leveraging public key infrastructure (PKI)."},{"question":"Why are standards like eIDAS important for Digital IDs?","answer":"Standards such as eIDAS ensure interoperability, security, and legal trust across jurisdictions for cross-border digital identity services."}],"title":"Digital ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/digital-id.md","canonicalPath":"/technologies/digital-id","apiPath":"/api/technologies/digital-id"},"description":"Digital identity (Digital ID) systems bind personal attributes—such as name, date of birth, and biometric data—to a secure digital credential. These credentials can be issued by governments or trusted entities and used for online authentication, e-government services, and financial inclusion. Standards like eIDAS in Europe and W3C Decentralized Identifiers (DIDs) shape interoperability and privacy."} | |
| {"title":"Document Verification & NFC e-Chip Reading (eMRTD / ICAO 9303)","slug":"document-verification-nfc","summary":"How modern ID documents are verified using optical checks, NFC chip reading, and PKI validation per ICAO Doc 9303.","order":3,"published":true,"also_known_as":["eMRTD inspection","ePassport NFC","ICAO 9303 verification","LDS/PKD validation","BAC/PACE/AA/PA/CA/EAC"],"category":"Technology","tags":["digital-onboarding","travel-documents","nfc","pkd","pki","icao-9303","standards"],"see_also":["digital-id","mobile-id","national-e-id","facial-recognition"],"standards":[{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"ICAO Public Key Directory (PKD)","url":"https://www.icao.int/icao-pkd"}],"last_reviewed":"2025-11-10","faq":[{"question":"What’s in the chip?","answer":"The LDS stores data groups (e.g., DG1 MRZ, DG2 face image, DG3 fingerprints, DG4 iris) plus the SOD file containing signed hashes."},{"question":"How do inspectors validate authenticity?","answer":"They verify the SOD’s signature against trusted CSCA/DSC certificates (often via the ICAO PKD) and ensure DG digests match the chip contents."},{"question":"Which access protocols are used?","answer":"BAC or PACE establish secure messaging; AA/CA/EAC provide stronger document authenticity and biometric access controls where applicable."}],"references":[{"label":"ICAO PKD overview","url":"https://www.icao.int/icao-pkd"},{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"NFC passport reading – developer guide (example)","url":"https://www.nordicapis.com/what-you-need-to-know-about-nfc-passport-reading/"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Document Verification & NFC e-Chip Reading (eMRTD / ICAO 9303)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/document-verification-nfc.mdx","canonicalPath":"/technologies/document-verification-nfc","apiPath":"/api/technologies/document-verification-nfc"},"description":"## Overview\nModern passports and many IDs are **electronic Machine-Readable Travel Documents (eMRTDs)** with an NFC chip. Verifying them combines visual checks with **chip reading** and **PKI cryptographic validation** to confirm authenticity and detect tampering.\n\n## How it works\n1. **Optical checks:** MRZ, VIZ, security features. \n2. **Secure messaging:** Use MRZ or CAN to start BAC/PACE. \n3. **Chip read:** Extract LDS data groups (e.g., DG2 face, DG1 MRZ) and SOD. \n4. **PKI validation:** Verify SOD signature using issuer’s DSC/CSCA; trust roots often fetched via the **ICAO PKD**. \n5. **Consistency checks:** Compare chip data vs printed data; run face match to selfie if needed.\n\n## Common use cases\n- Border control; eGate flows \n- Remote KYC / onboarding (NFC on smartphones) \n- Airport or workplace issuance/verification\n\n## Strengths and limitations\n**Strengths:** Cryptographic authenticity, global standards, offline verification with cached trust lists. \n**Limitations:** Access to trust anchors; device NFC variability; privacy rules on biometric access.\n\n## Key terms\n- **LDS (Logical Data Structure):** Standardized layout of chip data (DG1..DG16 + SOD). \n- **PKD:** Global repository of signing keys and revocation material."} | |
| {"title":"Ear Recognition","slug":"ear-recognition","summary":"Identifies people by the unique shape and texture of the outer ear, often for surveillance or forensic support.","order":21,"published":true,"also_known_as":["ear biometrics"],"category":"Technology","tags":["biometrics","surveillance"],"see_also":["facial-recognition"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"Is ear recognition accurate?","answer":"Modern CNN-based approaches show promise, but occlusions and hairstyles can reduce reliability."},{"question":"How is it used with face recognition?","answer":"As a supplemental cue in surveillance or re-identification when the face is partially visible or at oblique angles."}],"references":[{"label":"Survey on ear biometrics","url":"https://www.mdpi.com/1424-8220/22/3/1017"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Ear Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/ear-recognition.mdx","canonicalPath":"/technologies/ear-recognition","apiPath":"/api/technologies/ear-recognition"},"description":"## Overview\nEar recognition uses images of the ear’s contours and texture as a supplemental biometric, particularly in surveillance footage.\n\n## How it works\n1. Detect the ear region in images or video. \n2. Extract features (e.g., shape descriptors, deep embeddings). \n3. Compare with stored ear templates or multi-modal records.\n\n## Common use cases\n- Surveillance in public spaces\n- Forensic photo analysis\n- Research on unobtrusive biometrics\n\n## Strengths and limitations\n**Strengths:** Can work at a distance; stable shape over time. \n**Limitations:** Susceptible to occlusion by hair or accessories; smaller dataset availability.\n\n## Key terms\n- **Auricle:** External part of the ear captured for matching. \n- **Occlusion:** Blocking or covering of the ear in images."} | |
| {"slug":"facial-recognition","name":"Facial Recognition","summary":"Facial recognition matches a photo of a face to an identity.","order":1,"published":true,"references":[{"label":"NIST Face Recognition Vendor Test (FRVT)","url":"https://www.nist.gov/programs-projects/face-recognition-vendor-test-frvt"},{"label":"ISO/IEC 19795-1: Biometric performance testing and reporting","url":"https://www.iso.org/standard/41446.html"},{"label":"ICAO Doc 9303: Machine Readable Travel Documents (Face images)","url":"https://www.icao.int/publications/pages/publication.aspx?docnum=9303"}],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"How does facial recognition work?","answer":"Facial recognition uses algorithms to analyze facial features—such as the distance between eyes or the shape of cheekbones—to create a unique digital signature for identification."},{"question":"How accurate is facial recognition technology?","answer":"Modern facial recognition systems can achieve very low false match rates (below 0.1%) under controlled conditions, but accuracy may vary with lighting, pose, and image quality."},{"question":"What are common concerns around facial recognition?","answer":"Concerns include privacy violations, potential bias against certain demographic groups, and misuse by surveillance systems without consent."},{"question":"What is Presentation Attack Detection (PAD)?","answer":"PAD aims to detect spoofing attempts (e.g., photos, masks, deepfakes) and is evaluated separately from matching accuracy using standards-driven tests."},{"question":"What are 1:1 vs 1:N operations?","answer":"1:1 verifies a claimed identity (authentication), while 1:N searches across a gallery (identification). They have different accuracy and scalability considerations."}],"title":"Facial Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/face-recognition.md","canonicalPath":"/technologies/facial-recognition","apiPath":"/api/technologies/facial-recognition"},"description":"Facial recognition is a biometric modality that analyses the geometry and texture of a person’s face to establish identity. Modern systems rely on CNN embeddings and achieve <0.1% FNMR on NIST FRVT benchmarks.\n\n### Latest Updates\n* **2025-07-01:** Tinder, Deliveroo, Uber Eats and Just Eat expanded selfie or facial-verification checks to fight bots, deepfakes and illegal-account rentals in CA and UK gig-economy platforms."} | |
| {"title":"Finger Vein Recognition","slug":"finger-vein","summary":"Near-infrared imaging of vascular patterns inside fingers provides high liveness assurance for authentication.","order":22,"published":true,"also_known_as":["finger vein biometrics"],"category":"Technology","tags":["biometrics","vein","liveness"],"see_also":["palm-vein-recognition"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"Where is finger vein used?","answer":"It appears in banking ATMs, physical access systems, and some consumer devices."},{"question":"How does it compare to fingerprints?","answer":"Vein patterns are sub-dermal and difficult to copy, offering strong liveness properties; sensors are more specialized and costlier."}],"references":[{"label":"Survey on finger vein recognition","url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8502037/"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Finger Vein Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/finger-vein.mdx","canonicalPath":"/technologies/finger-vein","apiPath":"/api/technologies/finger-vein"},"description":"## Overview\nFinger vein systems illuminate the finger with near-infrared light and capture subdermal vein patterns that are difficult to replicate.\n\n## How it works\n1. Shine near-infrared light through the finger. \n2. Image absorbed vs transmitted light to reveal veins. \n3. Extract features and match against stored templates.\n\n## Common use cases\n- ATM and banking authentication\n- High-security access points\n- Research on wearable devices\n\n## Strengths and limitations\n**Strengths:** Built-in liveness; privacy-friendly since patterns are internal. \n**Limitations:** Specialized sensors; smaller vendor ecosystem.\n\n## Key terms\n- **NIR (Near-Infrared):** Wavelength used to image veins. \n- **Vein template:** Feature representation of vascular patterns."} | |
| {"slug":"fingerprint-recognition","name":"Fingerprint Recognition","summary":"Fingerprint recognition identifies individuals by analyzing unique patterns of ridges and valleys on the fingertip.","order":2,"published":true,"references":[{"label":"ISO/IEC 19794-2: Finger minutiae data","url":"https://www.iso.org/standard/73515.html"},{"label":"NIST: Fingerprint recognition overview","url":"https://www.nist.gov/programs-projects/fingerprint-recognition"},{"label":"NIST MINEX overview","url":"https://www.nist.gov/programs-projects/minutiae-interoperability-exchange-minex-overview"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"How does fingerprint recognition work?","answer":"Fingerprint recognition captures the unique ridge and valley patterns on a fingertip using sensors, then extracts key minutiae points to match against stored templates."},{"question":"Can fingerprint recognition work with wet or damaged fingers?","answer":"Most modern sensors use capacitive or multispectral imaging to handle moisture and minor skin abrasions, but extreme conditions may reduce accuracy."},{"question":"What are common uses of fingerprint recognition?","answer":"Fingerprint recognition is used for smartphone unlocking, access control, time and attendance tracking, and large-scale identity verification systems."}],"title":"Fingerprint Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/fingerprint-recognition.md","canonicalPath":"/technologies/fingerprint-recognition","apiPath":"/api/technologies/fingerprint-recognition"},"description":"Fingerprint recognition is one of the oldest and most widely used biometric modalities. It captures and compares the distinctive ridge patterns of a person's fingertip using optical or capacitive sensors. Modern algorithms extract minutiae points and match them against stored templates, achieving high accuracy and fast performance in applications ranging from smartphone unlocking to large-scale national ID systems."} | |
| {"slug":"gait-recognition","name":"Gait Recognition","summary":"Gait recognition identifies individuals by analyzing their unique walking style and body movements from video or sensor data.","order":24,"published":true,"references":[{"label":"NIST: Gait recognition research overview","url":"https://www.nist.gov/programs-projects/gait-recognition"},{"label":"Survey of gait biometrics","url":"https://www.sciencedirect.com/topics/engineering/gait-recognition"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is gait recognition?","answer":"Gait recognition analyzes an individual’s unique walking pattern and body movements, captured via video or wearable sensors, to identify them."},{"question":"How accurate is gait recognition?","answer":"Gait recognition can achieve moderate accuracy in controlled settings, but performance may degrade under varying speeds, shoe types, or carrying conditions."},{"question":"What factors can affect gait recognition accuracy?","answer":"Factors like clothing, walking surface, speed, and camera angle can impact accuracy, requiring robust normalization and feature extraction methods."},{"question":"Is gait privacy sensitive?","answer":"Yes. It can be captured at a distance; deployments should evaluate proportionality, transparency, and legal frameworks before use."}],"title":"Gait Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/gait-recognition.md","canonicalPath":"/technologies/gait-recognition","apiPath":"/api/technologies/gait-recognition"},"description":"Gait recognition captures a person's walking pattern using video cameras or wearable sensors, extracting features like stride length, joint angles, and motion dynamics. Since gait can be captured at a distance without user cooperation, it is valuable for surveillance and forensic applications. Environmental factors and clothing can affect accuracy, so robust algorithms are essential."} | |
| {"slug":"hand-biometrics","name":"Hand Biometrics","summary":"Hand biometrics identifies people using characteristics of the entire hand, such as geometry, vein patterns, or palm prints.","order":25,"published":true,"references":[{"label":"ISO/IEC 19794-10: Hand geometry data","url":"https://www.iso.org/standard/54064.html"},{"label":"NIST Hand geometry resources","url":"https://www.nist.gov/services-resources/software/hand-geometry"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What are hand biometrics?","answer":"Hand biometrics analyze traits of the whole hand, including geometry, palm prints, or vein structure, to confirm identity."},{"question":"How do hand biometrics differ from fingerprint recognition?","answer":"While fingerprint systems focus on ridge patterns of fingertips, hand biometrics capture broader features like hand shape or subcutaneous veins."},{"question":"Where are hand biometrics used?","answer":"They are common in access control, time and attendance systems, and high-security checkpoints requiring contactless identification."}],"title":"Hand Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/hand-biometrics.md","canonicalPath":"/technologies/hand-biometrics","apiPath":"/api/technologies/hand-biometrics"},"description":"Hand biometrics encompass techniques that measure unique attributes across the hand. Systems may scan three-dimensional hand geometry, image palm or finger veins using near-infrared light, or analyze palm prints. These methods provide an alternative when fingerprints are obscured or when contactless capture is preferred, offering reliable identification in environments such as secure facilities and workforce management."} | |
| {"slug":"iris-recognition","name":"Iris Recognition","summary":"Iris recognition uses the unique patterns in the colored ring surrounding the pupil to verify identity.","order":6,"published":true,"references":[{"label":"ISO/IEC 19794-6: Iris image data","url":"https://www.iso.org/standard/60346.html"},{"label":"NIST: Iris recognition overview","url":"https://www.nist.gov/programs-projects/iris-recognition"},{"label":"NIST IREX program","url":"https://www.nist.gov/programs-projects/iris-exchange-irex"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What makes iris recognition unique compared to other biometrics?","answer":"The iris has highly distinctive and stable texture patterns, offering very low false match rates and resistance to aging."},{"question":"How accurate is iris recognition?","answer":"Iris recognition typically achieves false match rates well below 0.1%, making it one of the most accurate biometric modalities."},{"question":"What are common applications of iris recognition?","answer":"Iris recognition is used in border control, national identity programs, secure building access, and even smartphone authentication in some devices."}],"title":"Iris Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/iris-recognition.md","canonicalPath":"/technologies/iris-recognition","apiPath":"/api/technologies/iris-recognition"},"description":"Iris recognition captures high-resolution images of the eye, isolating the iris region and encoding its intricate texture patterns. Since the iris texture is highly unique and stable over time, this modality offers one of the highest levels of accuracy with low false match rates. It is widely used in border control, national ID programs, and secure access credentials."} | |
| {"title":"Keystroke Dynamics","slug":"keystroke-dynamics","summary":"Authenticates users by timing patterns in how they type on a keyboard or touchscreen.","order":15,"published":true,"also_known_as":["typing biometrics","keystroke biometrics"],"category":"Technology","tags":["behavioral-biometrics","continuous-auth"],"see_also":["behavioral-biometrics"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"What features are analyzed?","answer":"Hold times, key-to-key latencies, and higher-level timing rhythms across sessions."},{"question":"How do models handle context changes?","answer":"Adaptive or per-device profiles, domain adaptation, and periodic re-enrollment help account for keyboard and posture shifts."},{"question":"Can bots spoof keystroke patterns?","answer":"Scripted automation can mimic simple averages; richer timing distributions and anomaly detection increase resilience."}],"references":[{"label":"Antispoofing wiki on keystroke dynamics","url":"https://antispoofing.org/keystroke-dynamics"},{"label":"NIST: Behavioral biometrics overview","url":"https://www.nist.gov/programs-projects/behavioral-biometrics"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Keystroke Dynamics","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/keystroke-dynamics.mdx","canonicalPath":"/technologies/keystroke-dynamics","apiPath":"/api/technologies/keystroke-dynamics"},"description":"## Overview\nKeystroke dynamics track how users type to provide a behavioral biometric signal for login or continuous authentication.\n\n## How it works\n1. Record timing of key presses and releases. \n2. Build a profile using statistical or machine-learning models. \n3. Compare new typing samples to the stored profile.\n\n## Common use cases\n- Continuous authentication on desktops\n- Fraud detection in online banking\n- Step-up identity verification\n\n## Strengths and limitations\n**Strengths:** Passive and continuous; works with existing hardware. \n**Limitations:** Sensitive to context changes like device or posture.\n\n## Key terms\n- **Dwell time:** Duration a key is pressed. \n- **Flight time:** Time between consecutive key presses."} | |
| {"slug":"mobile-id","name":"Mobile ID","summary":"Mobile ID leverages smartphones to store and present digital identity credentials securely, often using SIM-based security and biometric unlock.","order":11,"published":true,"references":[{"label":"GSMA Mobile Identity overview","url":"https://www.gsma.com/mobileid/"},{"label":"ISO/IEC 18013-5: Mobile driver’s license (mDL)","url":"https://www.iso.org/standard/69084.html"},{"label":"NIST SP 800-63A (Enrollment & Identity Proofing)","url":"https://pages.nist.gov/800-63-3/sp800-63a.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is Mobile ID?","answer":"Mobile ID refers to digital identity credentials stored on smartphones, enabling secure user authentication for online and offline services."},{"question":"How are Mobile IDs secured on the device?","answer":"Credentials are stored in secure elements like SIM cards or hardware-backed keystores, protected by device-level authentication such as PIN, fingerprint, or face unlock."},{"question":"What are common applications for Mobile ID?","answer":"Mobile ID is used for e-government services, mobile banking, and secure enterprise access, offering convenient two-factor or multi-factor authentication."},{"question":"How do mDLs relate to Mobile ID?","answer":"mDLs are a standardized form of Mobile ID for driver’s licenses (ISO/IEC 18013-5), enabling local verification and selective disclosure via mobile devices."}],"title":"Mobile ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/mobile-id.md","canonicalPath":"/technologies/mobile-id","apiPath":"/api/technologies/mobile-id"},"description":"Mobile ID solutions enable users to enroll and authenticate using their mobile devices. Credentials may be provisioned to secure elements such as SIM cards or device hardware, and biometric sensors ensure that only the legitimate holder can use them. Common use cases include e-government portals, banking, and secure access to enterprise resources."} | |
| {"title":"Multimodal Biometrics (Fusion)","slug":"multimodal-biometrics","summary":"Combining two or more biometric signals (e.g., face + fingerprint) to boost accuracy, resilience, and spoof resistance.","order":13,"published":true,"also_known_as":["multi-biometric","biometric fusion"],"category":"Technology","tags":["fusion","biometrics","performance","security"],"see_also":["facial-recognition","fingerprint-recognition","voice-recognition","pad"],"standards":[{"label":"ISO/IEC 19795-1: Biometric performance testing (metrics, reporting)","url":"https://www.iso.org/standard/73515.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"Which fusion levels are typical?","answer":"Sensor, feature, score, and decision-level fusion. Score-level is common in practice due to availability and interoperability."},{"question":"What benefits should I expect?","answer":"Lower false rejects at fixed false accept rates; robustness to sensor/environment variability; better PAD via ‘liveness stacking’."},{"question":"How do you tune thresholds across modalities?","answer":"Normalize scores per modality (e.g., z-norm) and set an operating point using development data to meet target FAR/FRR under fusion."}],"references":[{"label":"NIST on performance testing (19795-1)","url":"https://cdn.standards.iteh.ai/samples/73515/544e07f312664b1da1a84368dca02899/ISO-IEC-19795-1-2021.pdf"},{"label":"NIST studies on score-level fusion","url":"https://www.nist.gov/document/ir7346appendixbpdf"},{"label":"Recent fusion survey","url":"https://www.sciencedirect.com/science/article/pii/S1566253522002081"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Multimodal Biometrics (Fusion)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/multimodal-biometrics.mdx","canonicalPath":"/technologies/multimodal-biometrics","apiPath":"/api/technologies/multimodal-biometrics"},"description":"## Overview\n**Multimodal biometrics** fuse signals (e.g., face + finger, iris + vein) to improve accuracy and resilience. Fusion can also harden systems against presentation attacks when combined with modality-specific PAD.\n\n## How it works\n- **Feature-level fusion:** combine feature vectors before matching. \n- **Score-level fusion:** normalize and combine matcher scores (e.g., sum, weighted, learned). \n- **Decision-level fusion:** combine accept/deny votes (e.g., AND/OR rules).\n\n## Common use cases\n- Border & national ID deduplication (1:N)\n- High-assurance workforce access\n- Financial KYC with PAD stacking\n\n## Strengths and limitations\n**Strengths:** Higher accuracy; graceful degradation; spoof resistance. \n**Limitations:** Cost/complexity; correlation between signals can cap gains; tuning/maintenance.\n\n## Key terms\n- **Score fusion:** Combining matcher scores, often after normalization. \n- **Decision fusion:** Using voting or logic rules on match outcomes."} | |
| {"slug":"national-eid","name":"National e-ID","summary":"National e-ID programs issue electronic identity credentials tied to biometrics for secure access to government and private services.","order":14,"published":true,"references":[{"label":"World Bank ID4D initiative","url":"https://www.worldbank.org/en/programs/id4d"},{"label":"EU eIDAS Regulation overview","url":"https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation"},{"label":"MOSIP (Modular Open Source Identity Platform)","url":"https://www.mosip.io/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is a national e-ID?","answer":"It is a government-issued digital identity card or credential with embedded biometrics."},{"question":"Why implement national e-IDs?","answer":"They enable secure access to services and help prevent identity fraud."},{"question":"What data do e-IDs store?","answer":"They typically store personal data and biometric templates on a secure chip."},{"question":"How do national e-IDs relate to passports and ICAO 9303?","answer":"Many e-IDs reuse eMRTD technology (chips, PKI). Some also support online authentication and qualified signatures per regional frameworks like eIDAS."},{"question":"How are duplicates prevented at enrollment?","answer":"Systems use ABIS deduplication (1:N) on face/fingerprint/iris to catch multiple enrollments under different identities."}],"title":"National e-ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/national-eid.md","canonicalPath":"/technologies/national-eid","apiPath":"/api/technologies/national-eid"},"description":"National electronic ID systems provide citizens with a secure credential, often backed by biometric verification, to authenticate for public and private services.\n\n### Latest Updates\n* **2025-07-01:** Vietnam began issuing Level-2 e-ID accounts (VNeID) to foreign residents; processing in 3-7 days after biometric capture at immigration offices."} | |
| {"title":"Online Signature Verification (Dynamic)","slug":"online-signature","summary":"Analyzes pen dynamics such as pressure, speed, and trajectory to authenticate handwritten signatures.","order":12,"published":true,"also_known_as":["dynamic signature verification"],"category":"Technology","tags":["behavioral-biometrics","signature"],"see_also":["behavioral-biometrics"],"standards":[{"label":"ISO/IEC 19794-7: Signature/sign behavioral data","url":"https://www.iso.org/standard/50866.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"What data is captured?","answer":"Time-stamped x/y coordinates, pressure, and sometimes pen-tilt or velocity."},{"question":"How is it different from image-based signature matching?","answer":"Online methods use temporal dynamics captured during signing, which are harder to forge than a static image of a signature."},{"question":"What sensors are used?","answer":"Signature tablets, stylus-enabled devices, or capacitive touchscreens with pen support capture the necessary dynamics."}],"references":[{"label":"Overview of online signature verification","url":"https://www.iso.org/standard/50866.html"},{"label":"NIST Biometric testing overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Online Signature Verification (Dynamic)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/online-signature.mdx","canonicalPath":"/technologies/online-signature","apiPath":"/api/technologies/online-signature"},"description":"## Overview\nOnline signature verification captures the dynamic process of signing to provide stronger assurance than static image comparison.\n\n## How it works\n1. Capture pen movement and pressure over time. \n2. Extract features like speed, direction, and acceleration. \n3. Compare against stored signature templates using temporal alignment.\n\n## Common use cases\n- Financial document signing\n- Point-of-sale terminals\n- Digital contracts requiring biometric evidence\n\n## Strengths and limitations\n**Strengths:** Difficult to forge precisely; continuous temporal data. \n**Limitations:** Requires specialized tablets or stylus input.\n\n## Key terms\n- **Dynamic features:** Time-based measurements of the signing process. \n- **DTW (Dynamic Time Warping):** Technique for aligning signature trajectories."} | |
| {"title":"Presentation Attack Detection (Liveness / PAD)","slug":"pad","summary":"Techniques and tests that detect spoofed biometric samples (e.g., masks, replays, synthetics) to ensure the sample is from a live, consenting subject.","order":9,"published":true,"also_known_as":["liveness detection","anti-spoofing","PAD"],"category":"Technology","tags":["biometrics","security","testing","iso-30107","standards"],"see_also":["facial-recognition","voice-recognition","fingerprint-recognition","iris-recognition","multimodal-biometrics"],"standards":[{"label":"ISO/IEC 30107-1: Terms & framework for PAD","url":"https://www.iso.org/standard/83828.html"},{"label":"ISO/IEC 30107-3: PAD testing & metrics (APCER/BPCER)","url":"https://www.nist.gov/system/files/documents/2020/09/15/12_buschthieme-ibpc-pad-160504.pdf"},{"label":"iBeta guidance on ISO 30107-3 conformance","url":"https://www.ibeta.com/iso-30107-3-presentation-attack-detection-confirmation-letters/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What metrics does ISO/IEC 30107-3 define?","answer":"APCER (attack presentations misclassified as bona fide) and BPCER (bona fide misclassified as attacks). Vendors often report operating points across attack species and attack potential."},{"question":"Is PAD the same as liveness?","answer":"‘Liveness’ is commonly used, but PAD is broader: it covers detecting presentation attacks of many kinds (physical and digital), not only vitality cues."},{"question":"How is PAD evaluated in practice?","answer":"Independent labs test across PAI types and attack potentials, reporting APCER/BPCER at defined thresholds; results are separate from core matcher accuracy."}],"references":[{"label":"ISO/IEC 30107-1 overview","url":"https://www.iso.org/standard/83828.html"},{"label":"ISO/IEC 30107-3 testing primer (NIST slide deck)","url":"https://www.nist.gov/system/files/documents/2020/09/15/12_buschthieme-ibpc-pad-160504.pdf"},{"label":"iBeta PAD tiers and test descriptions","url":"https://www.ibeta.com/iso-30107-3-presentation-attack-detection-confirmation-letters/"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Presentation Attack Detection (Liveness / PAD)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/pad.mdx","canonicalPath":"/technologies/pad","apiPath":"/api/technologies/pad"},"description":"## Overview\nPresentation Attack Detection (PAD) protects biometric systems from spoofs such as printed photos, silicone fingerprints, recorded voices, or AI-generated samples. It’s a cross-cutting layer used with face, voice, fingerprint, iris and other modalities.\n\n## How it works\n1. **Capture:** Sensor or camera acquires the sample. \n2. **Signal analysis:** Algorithms look for cues inconsistent with live traits (e.g., texture, reflectance, micro-motions, audio artifacts). \n3. **Decision & score:** The PAD subsystem outputs a score or decision (bona fide vs attack). \n4. **Policy:** Systems combine PAD with biometric matching and business rules to accept/deny or request step-up verification.\n\n## Common use cases\n- Remote onboarding / selfie match\n- Contactless border checks\n- KYC and high-risk transactions\n- Access control and workforce auth\n\n## Strengths and limitations\n**Strengths:** Mitigates common spoofs; complements matching; standard metrics for evaluation. \n**Limitations:** Attack diversity; new synthetic media; environment variability; false rejections at strict thresholds.\n\n## Key terms\n- **APCER/BPCER:** Core PAD error metrics from ISO/IEC 30107-3. \n- **PAI (Presentation Attack Instrument):** The artifact used to attack. \n- **Attack potential:** Effort/resources required to mount an attack."} | |
| {"slug":"palm-vein-recognition","name":"Palm Vein Recognition","summary":"Palm vein recognition uses near-infrared light to capture the unique vascular patterns beneath the skin of the palm.","order":16,"published":true,"references":[{"label":"Fujitsu PalmSecure overview","url":"https://www.fujitsu.com/jp/group/frontech/en/solutions/business-technology/security/palmsecure/"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is palm vein recognition?","answer":"Palm vein recognition uses near-infrared light to image the unique vascular patterns beneath the skin of the palm for identity verification."},{"question":"How does palm vein recognition prevent spoofing?","answer":"Since veins are located beneath the skin, palm vein recognition inherently offers liveness detection and resists fake artifacts like lifecasts."},{"question":"Where is palm vein recognition commonly deployed?","answer":"It is used in high-security access control, financial authentication, and healthcare applications requiring strong liveness assurance."}],"title":"Palm Vein Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/palm-vein-recognition.md","canonicalPath":"/technologies/palm-vein-recognition","apiPath":"/api/technologies/palm-vein-recognition"},"description":"Palm vein recognition illuminates the palm with near-infrared light, revealing the vein structure that lies beneath the skin. These vein patterns are unique to each individual and difficult to replicate, providing a high level of liveness assurance. This modality is used in secure access control, banking authentication, and identity verification in sensitive environments."} | |
| {"title":"Palmprint Recognition","slug":"palmprint-recognition","summary":"Uses dermal ridge patterns across the palm for identification, distinct from vein-based methods.","order":17,"published":true,"also_known_as":["palm print biometrics"],"category":"Technology","tags":["biometrics","palm","forensics"],"see_also":["hand-biometrics","fingerprint-recognition"],"standards":[{"label":"ISO/IEC 19794 series (palmprint, hand)","url":"https://www.iso.org/standard/54064.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"Where are palmprints used?","answer":"In forensics and access control systems where more surface area improves matching."},{"question":"How is palmprint different from palm vein?","answer":"Palmprint uses surface ridge patterns; palm vein uses sub-dermal vascular patterns captured with NIR illumination."}],"references":[{"label":"Overview of palmprint recognition","url":"https://www.sciencedirect.com/topics/engineering/palmprint-recognition"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Palmprint Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/palmprint-recognition.mdx","canonicalPath":"/technologies/palmprint-recognition","apiPath":"/api/technologies/palmprint-recognition"},"description":"## Overview\nPalmprint recognition analyzes ridge detail across the palm, offering a larger surface area than fingerprints for feature extraction.\n\n## How it works\n1. Capture the palm using optical or contactless sensors. \n2. Extract ridge minutiae and orientation fields. \n3. Match against enrolled templates.\n\n## Common use cases\n- Law-enforcement forensic databases\n- Secure facility access\n- Research on hand-based biometrics\n\n## Strengths and limitations\n**Strengths:** Large feature area; resistant to minor cuts. \n**Limitations:** Bulkier sensors; less standardized than fingerprints.\n\n## Key terms\n- **Palmprint:** Ridge patterns of the palm surface. \n- **Minutiae:** Ridge endings and bifurcations used for matching."} | |
| {"title":"Passkeys / FIDO2 / WebAuthn","slug":"passkeys-webauthn","summary":"Passwordless authentication based on public-key cryptography, delivered through WebAuthn (W3C) and CTAP (FIDO).","order":4,"published":true,"also_known_as":["FIDO2","WebAuthn","CTAP2","passkeys"],"category":"Technology","tags":["authentication","passwordless","webauthn","ctap","fido","standards"],"see_also":["behavioral-biometrics","mobile-id","digital-id"],"standards":[{"label":"W3C WebAuthn Level 3","url":"https://www.w3.org/TR/webauthn-3/"},{"label":"FIDO CTAP 2.x","url":"https://fidoalliance.org/specifications/"},{"label":"FIDO Alliance: Passkeys overview","url":"https://fidoalliance.org/passkeys/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is a passkey?","answer":"A FIDO credential (public/private key pair) bound to a user and relying party. The private key stays on the device; the public key is registered with the service."},{"question":"How is this phishing-resistant?","answer":"Credentials are origin-bound and never revealed; a signed challenge is produced locally after user verification (biometric or PIN)."},{"question":"CTAP vs WebAuthn?","answer":"WebAuthn is the browser API; CTAP connects clients to authenticators (platform or roaming security keys)."},{"question":"What’s the difference between multi-device and single-device passkeys?","answer":"Single-device credentials live only on one device; multi-device credentials can sync across an ecosystem under vendor security policies."},{"question":"How do recoveries and device loss work?","answer":"RPs should provide recovery paths (additional authenticators, admin-recovery, or re-enrollment) while balancing phishing resistance and account takeover risks."}],"references":[{"label":"WebAuthn L3 spec","url":"https://www.w3.org/TR/webauthn-3/"},{"label":"CTAP 2.x spec","url":"https://fidoalliance.org/specifications/"},{"label":"FIDO Alliance passkeys explainer","url":"https://fidoalliance.org/passkeys/"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Passkeys / FIDO2 / WebAuthn","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/passkeys-webauthn.mdx","canonicalPath":"/technologies/passkeys-webauthn","apiPath":"/api/technologies/passkeys-webauthn"},"description":"## Overview\n**Passkeys** implement passwordless login using **public-key cryptography**. Users authenticate with a device-bound credential and local user verification (biometric or PIN), via the **WebAuthn API** and **CTAP** protocols.\n\n## How it works\n1. **Registration:** Site asks for a new credential via WebAuthn; an authenticator creates a key pair and returns a public key + attestation. \n2. **Authentication:** Site sends a challenge. Authenticator signs it with the private key after local user verification. \n3. **Device portability:** Platform sync or roaming authenticators (security keys) enable use across devices in line with vendor policies.\n\n## Common use cases\n- Consumer sign-in replacing passwords \n- Workforce phishing-resistant MFA \n- Step-up auth for high-risk transactions\n\n## Strengths and limitations\n**Strengths:** Phishing resistance; no shared secrets; fast UX. \n**Limitations:** Cross-ecosystem portability; attestation policy; account recovery patterns.\n\n## Key terms\n- **WebAuthn:** W3C API for creating/using credentials. \n- **CTAP:** FIDO protocol between client and authenticator. \n- **Attestation:** Evidence about the authenticator model/security."} | |
| {"slug":"physiological-biometrics","name":"Physiological Biometrics","summary":"Physiological biometrics refers to verifying identity based on unique physical characteristics such as fingerprints, face, iris, and vein patterns.","order":27,"published":true,"references":[{"label":"ISO/IEC 19794 series overview","url":"https://www.iso.org/committee/45144.html"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What are physiological biometrics?","answer":"Physiological biometrics verify identity based on unique physical characteristics like fingerprints, iris patterns, or vein structures."},{"question":"How do physiological biometrics differ from behavioral biometrics?","answer":"Physiological biometrics rely on stable physical traits, whereas behavioral biometrics analyze dynamic user behaviors like typing or gait."},{"question":"What are common examples of physiological biometrics?","answer":"Common examples include fingerprint, facial, iris, and palm vein recognition, all based on inherent physical features."}],"title":"Physiological Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/physiological-biometrics.md","canonicalPath":"/technologies/physiological-biometrics","apiPath":"/api/technologies/physiological-biometrics"},"description":"Physiological biometrics encompasses modalities that rely on inherent physical attributes of an individual. Common examples include fingerprint, facial, iris, and palm vein recognition. These traits are generally stable over a person’s lifetime and provide strong authentication guarantees when sensors and matching algorithms are implemented securely."} | |
| {"title":"Biometric Template Protection","slug":"template-protection","summary":"Techniques like cancellable biometrics and encryption safeguard stored biometric templates from misuse or breach.","order":28,"published":true,"also_known_as":["cancellable biometrics","template security"],"category":"Technology","tags":["biometrics","security","privacy","standards"],"see_also":["fingerprint-recognition","iris-recognition"],"standards":[{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is cancellable biometrics?","answer":"A method that transforms templates so they can be revoked and reissued if compromised."},{"question":"How is matching done on protected data?","answer":"Approaches include secure enclaves for plaintext-in-TEE matching, helper-data schemes, or privacy-preserving computation (e.g., homomorphic encryption)."},{"question":"Can template protection stop inversion attacks?","answer":"Properly designed schemes reduce the risk and utility of reconstructions, but security depends on threat models and implementation."}],"references":[{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/programs-projects/biometrics"},{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Biometric Template Protection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/template-protection.mdx","canonicalPath":"/technologies/template-protection","apiPath":"/api/technologies/template-protection"},"description":"## Overview\nTemplate protection techniques reduce the risk that stolen biometric data can be reused or inverted, supporting privacy regulations.\n\n## How it works\n1. Transform or encrypt templates at enrollment. \n2. Perform matching in protected form (e.g., homomorphic encryption or secure enclaves). \n3. Allow template revocation and reissue when needed.\n\n## Common use cases\n- Privacy-sensitive biometric databases\n- Mobile devices with secure enclaves\n- Research on secure multi-party matching\n\n## Strengths and limitations\n**Strengths:** Limits impact of data breaches; supports revocation. \n**Limitations:** Performance overhead; interoperability challenges.\n\n## Key terms\n- **Cancellable biometrics:** Reversible transform of templates. \n- **Biometric cryptosystem:** Uses cryptographic schemes to protect matching."} | |
| {"title":"Verifiable Credentials & Identity Wallets (W3C VC 2.0)","slug":"verifiable-credentials","summary":"Cryptographically verifiable claims issued by trusted parties and presented via identity wallets, enabling selective disclosure and offline verification.","order":8,"published":true,"also_known_as":["W3C VC","identity wallets","decentralized identity"],"category":"Technology","tags":["digital-id","identity-wallet","vc2.0","standards","privacy"],"see_also":["mobile-id","digital-id","document-verification-nfc"],"standards":[{"label":"W3C Verifiable Credentials Data Model 2.0","url":"https://www.w3.org/TR/vc-data-model-2.0/"},{"label":"W3C VC Overview (roadmap)","url":"https://www.w3.org/TR/vc-overview/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is a Verifiable Credential (VC)?","answer":"A tamper-evident set of claims with metadata proving who issued it; holders store VCs in wallets and present verifiable proofs to verifiers."},{"question":"How does selective disclosure work?","answer":"Cryptographic proofs reveal only needed attributes (e.g., ‘over 18’) rather than the full credential."},{"question":"How do VCs relate to government IDs?","answer":"They can complement physical documents; issuers (e.g., agencies, universities) issue VCs that can be verified online or offline."},{"question":"What about revocation/status?","answer":"Verifiers check credential status lists or cryptographic status proofs to ensure a VC hasn’t been revoked without contacting the issuer."}],"references":[{"label":"VC Data Model 2.0","url":"https://www.w3.org/TR/vc-data-model-2.0/"},{"label":"VC overview","url":"https://www.w3.org/TR/vc-overview/"},{"label":"Decentralized Identifiers (DID) v1.0","url":"https://www.w3.org/TR/did-core/"}],"createdAt":"2026-03-31T15:12:40.478Z","updatedAt":"2026-03-31T15:12:40.478Z","name":"Verifiable Credentials & Identity Wallets (W3C VC 2.0)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/verifiable-credentials.mdx","canonicalPath":"/technologies/verifiable-credentials","apiPath":"/api/technologies/verifiable-credentials"},"description":"## Overview\n**Verifiable Credentials (VCs)** allow entities to issue cryptographically signed credentials that holders store and present through **identity wallets**. Verifiers check proofs without calling the issuer, enabling privacy-preserving flows and offline checks.\n\n## How it works\n1. **Issuance:** Issuer signs a credential to the holder’s wallet. \n2. **Presentation:** Holder creates a verifiable presentation with selective attributes. \n3. **Verification:** Verifier validates signature, status/revocation, and schema against trusted keys/registries.\n\n## Common use cases\n- Digital diplomas & licenses\n- Age or attribute checks\n- Travel & cross-border credentials\n\n## Strengths and limitations\n**Strengths:** Privacy via selective disclosure; offline verification; open standards. \n**Limitations:** Interop profiles; governance/trust frameworks; revocation/status infrastructure.\n\n## Key terms\n- **Verifiable presentation:** A bundle proving certain claims to a verifier. \n- **Issuer/Holder/Verifier:** Roles in VC ecosystems."} | |
| {"title":"Video Injection Detection","slug":"video-injection-detection","summary":"Controls that detect injected, replayed, or pre-recorded video streams used to bypass selfie and liveness checks during remote identity verification.","published":true,"order":999,"category":"Technology","tags":["identity-verification","biometrics","pad","replay-attacks","video"],"see_also":["pad","face-recognition","deepfake-detection"],"last_reviewed":"2026-01-07","createdAt":"2026-01-07T00:00:00.000Z","updatedAt":"2026-01-07T00:00:00.000Z","references":[{"label":"ISO/IEC 30107-3 (PAD testing and metrics)","url":"https://www.iso.org/standard/67381.html"}],"name":"Video Injection Detection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/video-injection-detection.mdx","canonicalPath":"/technologies/video-injection-detection","apiPath":"/api/technologies/video-injection-detection"},"description":"## Overview\nVideo injection detection focuses on identifying attempts to feed a verification system a manipulated or pre-recorded stream (for example, via virtual cameras, screen replays, or intermediaries) instead of a live capture from the user’s device camera.\n\n## Typical signals and controls\n- Capture pipeline integrity checks (e.g., detecting virtual camera sources).\n- Consistency checks across frames and metadata (timing, encoding artifacts).\n- Challenge-response or motion prompts combined with PAD/liveness.\n\n## Where it shows up\n- Remote onboarding / selfie identity verification\n- Account recovery re-verification\n- High-risk transaction step-up checks"} | |
| {"slug":"voice-recognition","name":"Voice Recognition","summary":"Voice recognition authenticates individuals based on their unique vocal characteristics like pitch, cadence, and spectral features.","order":29,"published":true,"references":[{"label":"ISO/IEC 19794-13: Voice data","url":"https://www.iso.org/standard/54115.html"},{"label":"NIST: Voice recognition / ASV resources","url":"https://www.nist.gov/programs-projects/voice-identity-verification"},{"label":"ASVspoof initiative (attack corpora)","url":"https://www.asvspoof.org/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is voice recognition?","answer":"Voice recognition authenticates individuals by analyzing unique vocal characteristics such as pitch, cadence, and spectral features."},{"question":"How does voice recognition handle background noise?","answer":"Modern systems use noise reduction and robust feature extraction techniques to maintain accuracy in noisy environments."},{"question":"What prevents voice spoofing in recognition systems?","answer":"Anti-spoofing measures include liveness detection, voice challenge-response prompts, and model training against replay attacks."},{"question":"How do systems handle deepfake speech?","answer":"Modern anti-spoofing (CM) models are trained on synthetic speech corpora and combined with challenge-response or secondary factors for riskier flows."}],"title":"Voice Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/voice-recognition.md","canonicalPath":"/technologies/voice-recognition","apiPath":"/api/technologies/voice-recognition"},"description":"Voice recognition systems analyze the physiological and behavioral traits of a person's speech to verify identity. They extract features such as Mel-frequency cepstral coefficients (MFCCs) and match them using statistical or deep-learning models. While highly convenient for remote authentication, voice recognition can be affected by background noise and requires robust anti-spoofing measures."} | |