Know and understand characteristics, uses, advantages and disadvantages of biometric recognition including face, iris, retina, finger, thumb, hand, voice
6 ICT Applications – Recognition Systems (Syllabus 6.10)
Recognition systems turn physical or digital information into data a computer can process. The Cambridge IGCSE ICT syllabus requires you to know four non‑biometric techniques and a group of biometric techniques.
Non‑biometric techniques
Technique
What it does (one‑sentence summary)
Typical uses
Optical Mark Recognition (OMR)
Detects the presence or absence of marks on pre‑printed forms.
Marking of multiple‑choice answer sheets, surveys.
Optical Character Recognition (OCR)
Converts printed or handwritten characters into editable digital text.
Biometrics identify a person from unique physiological or behavioural traits. The IGCSE syllabus lists the following modalities: face, iris, retina, fingerprint, thumb, hand (palm) and voice. Each subsection below follows the required four sub‑headings.
1. Face Recognition
Characteristics
Analyzes facial geometry (distances between eyes, nose shape, jawline) from a 2‑D image.
Works at a distance; no physical contact required.
Often combined with liveness detection (blink, depth‑sensor) to deter spoofing.
Uses
Security checkpoints (airports, stadiums).
Smartphone, laptop and tablet unlocking.
Attendance monitoring in schools or workplaces.
Advantages
Fast, non‑intrusive and familiar to users.
No tokens or passwords to remember.
Can reuse existing CCTV cameras.
Disadvantages
Performance drops with poor lighting, glasses, facial hair, ageing or cosmetic changes.
Privacy concerns – faces can be captured without consent.
Vulnerable to photographs, video loops or 3‑D masks unless liveness detection is used.
2. Iris Recognition
Characteristics
Uses the highly detailed coloured pattern of the iris.
Captured with near‑infrared illumination; works in low‑light.
Pattern is stable for life; changes only with disease or injury.
Uses
Border‑control e‑gates and immigration checkpoints.
High‑security facilities (data centres, research labs).
Mobile banking authentication (e.g., Apple Pay, Samsung Pass).
Advantages
Very low false‑accept rate – among the most accurate biometrics.
Difficult to forge; the iris is internal and not easily copied.
Verification typically under 1 second.
Disadvantages
User must be close to the camera and keep eyes steady.
Higher equipment cost than fingerprint scanners.
Glasses, contact lenses or bright sunlight can degrade performance.
3. Retina Recognition
Characteristics
Scans the unique pattern of blood vessels at the back of the eye.
Uses low‑intensity infrared light; eye must be positioned very close to the scanner.
Pattern is extremely stable and unique.
Uses
Very high‑security environments (military, nuclear facilities).
Secure access to classified information systems.
Advantages
Highest level of uniqueness among biometric modalities.
Extremely low false‑accept and false‑reject rates.
Disadvantages
Intrusive – user must place eye very close to the scanner.
Expensive hardware and longer enrolment time.
Can cause discomfort; not suitable for everyday public use.
4. Fingerprint Recognition
Characteristics
Analyzes ridge patterns, minutiae points and overall fingerprint shape.
Captured by optical, capacitive or ultrasonic sensors.
Technology is mature and widely available in consumer devices.
Uses
Smartphone, tablet and laptop unlocking.
Time‑and‑attendance systems.
Physical access control for doors, cabinets and safes.
Advantages
Low cost; users are familiar with the technology.
Fast enrolment and verification.
Small, robust sensors can be embedded in many devices.
Disadvantages
Performance can drop with cuts, dryness, dirt or worn fingerprints.
Susceptible to spoofing with lifted prints unless liveness detection (e.g., sweat or pulse) is added.
Privacy risk if fingerprint templates are stored insecurely.
5. Thumb Recognition
Characteristics
Same underlying technology as fingerprint recognition but uses the thumb’s larger surface area.
Thumbs are often easier to position correctly, giving a slightly higher capture success rate.
Some devices store a separate “thumb template” as a backup biometric.
Uses
Mobile devices offering a “thumb‑only” unlock option.
Time‑and‑attendance terminals where users naturally place their thumb on a pad.
Advantages
Higher placement reliability than smaller fingers.
Provides a second biometric factor without extra hardware.
Disadvantages
Shares the same vulnerabilities as fingerprint recognition (cuts, spoofing, privacy).
Limited benefit if the same sensor already reads all fingers.
6. Hand (Palm) Recognition
Characteristics
Captures overall hand geometry (size, finger lengths, palm shape) and/or vein patterns beneath the skin using infrared imaging.
Provides a larger data set than a single fingerprint, making replication harder.
Often combines “hand‑geometry” (surface) with “vein‑pattern” (internal) features for added security.
Uses
High‑throughput access points such as factory entrances, warehouses and large office complexes.
Some ATMs and banking kiosks in countries that favour palm‑print verification.
Advantages
Less affected by minor cuts or wear on individual fingers.
Dual‑feature (geometry + vein) systems achieve very low false‑accept rates.
Comfortable for users who dislike placing a single finger on a sensor.
Disadvantages
Requires a larger, more expensive scanner, increasing installation space and cost.
Verification is slightly slower because more data must be processed.
Users may find it less convenient to place an entire hand on a sensor.
7. Voice Recognition
Characteristics
Analyzes vocal‑tract features, pitch, cadence, pronunciation and timing.
Can be text‑dependent (requires a specific pass‑phrase) or text‑independent (recognises the speaker regardless of words).
Works over telephone lines, microphones, smart‑speakers and other audio input devices.
Uses
Customer‑service authentication for banks, telecoms and utilities.
Smart‑home assistants (e.g., Amazon Alexa, Google Assistant) that respond to a recognised voice.
Remote login to computers or VPNs where a physical token is impractical.
Advantages
Hands‑free; useful for users with mobility impairments.
Can be used at a distance – no specialised hardware beyond a microphone.
Low hardware cost; most devices already contain a microphone.
Disadvantages
Accuracy drops in noisy environments, when the speaker is ill, or when emotional state changes pitch.
Vulnerable to replay attacks (recorded speech) unless anti‑spoofing measures are employed.
Voice recordings can reveal personal information, raising privacy concerns.
e‑Safety, Data Protection & Security of Biometric Data
Biometric templates are classified as sensitive personal data. Under data‑protection legislation (e.g., GDPR‑style rules) organisations must:
Obtain explicit, informed consent before collecting any biometric data.
Store templates in encrypted form and keep them separate from other personal information.
Restrict access to authorised personnel and use strong authentication (e.g., two‑factor) for administrators.
Define a clear retention period and securely delete templates when they are no longer needed.
Carry out regular security audits and risk assessments to detect and remediate breaches.
Requirement analysis: Choose biometric(s) that match the required security level, user population, budget and environment.
Design: Define system architecture – enrolment module, template storage, verification engine, user interface.
Prototype & testing: Collect sample templates, measure False‑Accept Rate (FAR) and False‑Reject Rate (FRR), test liveness detection and usability.
Implementation: Install hardware, integrate with existing access‑control or IT systems, train staff and obtain consent.
Evaluation & maintenance: Monitor performance, update software to counter new spoofing techniques, renew consent, and securely delete obsolete templates.
Comparison of Biometric Modalities (Exam‑focused summary)
Biometric
Uniqueness
Typical FAR
Equipment cost
Typical use cases
Key disadvantage
Face
Medium
0.1 % – 1 %
Low–Medium
Smartphone unlock, CCTV access control
Lighting & spoofing
Iris
Very high
0.001 % – 0.01 %
Medium–High
Border control, high‑security sites
Close proximity required
Retina
Very high
0.0001 % – 0.001 %
High
Military, nuclear facilities
Intrusive & expensive
Fingerprint
High
0.01 % – 0.1 %
Low–Medium
Mobile devices, attendance
Susceptible to cuts & spoofing
Thumb
High
0.01 % – 0.1 %
Low–Medium
Thumb‑only unlock, time‑clock terminals
Same vulnerabilities as fingerprint
Hand (Palm)
High
0.01 % – 0.05 %
Medium
Factory/warehouse access, some ATMs
Bulkier hardware
Voice
Medium
0.1 % – 1 %
Low
Phone banking, smart assistants
Noisy environments & replay attacks
Suggested diagram: Flowchart showing the enrolment phase (capture → template creation → encrypted storage) and the verification phase (capture → template comparison → access decision) for each biometric type.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.