Know and understand characteristics, uses, advantages and disadvantages of biometric recognition including face, iris, retina, finger, thumb, hand, voice
6 ICT Applications – Recognition Systems (Syllabus 6.10)
Recognition systems turn physical or digital information into data a computer can process. The Cambridge IGCSE ICT syllabus requires you to know four non‑biometric techniques and a group of biometric techniques.
Non‑biometric techniques
Technique
What it does (one‑sentence summary)
Typical uses
Optical Mark Recognition (OMR)
Detects the presence or absence of marks on pre‑printed forms.
Marking of multiple‑choice answer sheets, surveys.
Optical Character Recognition (OCR)
Converts printed or handwritten characters into editable digital text.
Biometrics identify a person from unique physiological or behavioural traits. The IGCSE syllabus lists the following modalities: face, iris, retina, fingerprint, thumb, hand (palm) and voice. Each subsection below follows the required four sub‑headings.
1. Face Recognition
Characteristics
Analyzes facial geometry (distances between eyes, nose shape, jawline) from a 2‑D image.
Works at a distance; no physical contact required.
Often combined with liveness detection (blink, depth‑sensor) to deter spoofing.
Uses
Security checkpoints (airports, stadiums).
Smartphone, laptop and tablet unlocking.
Attendance monitoring in schools or workplaces.
Advantages
Fast, non‑intrusive and familiar to users.
No tokens or passwords to remember.
Can reuse existing CCTV cameras.
Disadvantages
Performance drops with poor lighting, glasses, facial hair, ageing or cosmetic changes.
Privacy concerns – faces can be captured without consent.
Vulnerable to photographs, video loops or 3‑D masks unless liveness detection is used.
2. Iris Recognition
Characteristics
Uses the highly detailed coloured pattern of the iris.
Captured with near‑infrared illumination; works in low‑light.
Pattern is stable for life; changes only with disease or injury.
Uses
Border‑control e‑gates and immigration checkpoints.
High‑security facilities (data centres, research labs).
Mobile banking authentication (e.g., Apple Pay, Samsung Pass).
Advantages
Very low false‑accept rate – among the most accurate biometrics.
Difficult to forge; the iris is internal and not easily copied.
Verification typically under 1 second.
Disadvantages
User must be close to the camera and keep eyes steady.
Higher equipment cost than fingerprint scanners.
Glasses, contact lenses or bright sunlight can degrade performance.
3. Retina Recognition
Characteristics
Scans the unique pattern of blood vessels at the back of the eye.
Uses low‑intensity infrared light; eye must be positioned very close to the scanner.
Pattern is extremely stable and unique.
Uses
Very high‑security environments (military, nuclear facilities).
Secure access to classified information systems.
Advantages
Highest level of uniqueness among biometric modalities.
Extremely low false‑accept and false‑reject rates.
Disadvantages
Intrusive – user must place eye very close to the scanner.
Expensive hardware and longer enrolment time.
Can cause discomfort; not suitable for everyday public use.
4. Fingerprint Recognition
Characteristics
Analyzes ridge patterns, minutiae points and overall fingerprint shape.
Captured by optical, capacitive or ultrasonic sensors.
Technology is mature and widely available in consumer devices.
Uses
Smartphone, tablet and laptop unlocking.
Time‑and‑attendance systems.
Physical access control for doors, cabinets and safes.
Advantages
Low cost; users are familiar with the technology.
Fast enrolment and verification.
Small, robust sensors can be embedded in many devices.
Disadvantages
Performance can drop with cuts, dryness, dirt or worn fingerprints.
Susceptible to spoofing with lifted prints unless liveness detection (e.g., sweat or pulse) is added.
Privacy risk if fingerprint templates are stored insecurely.
5. Thumb Recognition
Characteristics
Same underlying technology as fingerprint recognition but uses the thumb’s larger surface area.
Thumbs are often easier to position correctly, giving a slightly higher capture success rate.
Some devices store a separate “thumb template” as a backup biometric.
Uses
Mobile devices offering a “thumb‑only” unlock option.
Time‑and‑attendance terminals where users naturally place their thumb on a pad.
Advantages
Higher placement reliability than smaller fingers.
Provides a second biometric factor without extra hardware.
Disadvantages
Shares the same vulnerabilities as fingerprint recognition (cuts, spoofing, privacy).
Limited benefit if the same sensor already reads all fingers.
6. Hand (Palm) Recognition
Characteristics
Captures overall hand geometry (size, finger lengths, palm shape) and/or vein patterns beneath the skin using infrared imaging.
Provides a larger data set than a single fingerprint, making replication harder.
Often combines “hand‑geometry” (surface) with “vein‑pattern” (internal) features for added security.
Uses
High‑throughput access points such as factory entrances, warehouses and large office complexes.
Some ATMs and banking kiosks in countries that favour palm‑print verification.
Advantages
Less affected by minor cuts or wear on individual fingers.
Dual‑feature (geometry + vein) systems achieve very low false‑accept rates.
Comfortable for users who dislike placing a single finger on a sensor.
Disadvantages
Requires a larger, more expensive scanner, increasing installation space and cost.
Verification is slightly slower because more data must be processed.
Users may find it less convenient to place an entire hand on a sensor.
7. Voice Recognition
Characteristics
Analyzes vocal‑tract features, pitch, cadence, pronunciation and timing.
Can be text‑dependent (requires a specific pass‑phrase) or text‑independent (recognises the speaker regardless of words).
Works over telephone lines, microphones, smart‑speakers and other audio input devices.
Uses
Customer‑service authentication for banks, telecoms and utilities.
Smart‑home assistants (e.g., Amazon Alexa, Google Assistant) that respond to a recognised voice.
Remote login to computers or VPNs where a physical token is impractical.
Advantages
Hands‑free; useful for users with mobility impairments.
Can be used at a distance – no specialised hardware beyond a microphone.
Low hardware cost; most devices already contain a microphone.
Disadvantages
Accuracy drops in noisy environments, when the speaker is ill, or when emotional state changes pitch.
Vulnerable to replay attacks (recorded speech) unless anti‑spoofing measures are employed.
Voice recordings can reveal personal information, raising privacy concerns.
e‑Safety, Data Protection & Security of Biometric Data
Biometric templates are classified as sensitive personal data. Under data‑protection legislation (e.g., GDPR‑style rules) organisations must:
Obtain explicit, informed consent before collecting any biometric data.
Store templates in encrypted form and keep them separate from other personal information.
Restrict access to authorised personnel and use strong authentication (e.g., two‑factor) for administrators.
Define a clear retention period and securely delete templates when they are no longer needed.
Carry out regular security audits and risk assessments to detect and remediate breaches.