Biometric Technology


With the introduction of biometric studies into the computer science, the first devices and methodologies started to grow in such manner we can see fingerprints scanners in airports, voting machines in democratic countries and even in ATM’s (very common in Brazil). There are different methods to identify an information system user, including fingerprints and facial recognition, for instance.


One of the most popular methods of identifying an information systems user is by the facial recognition. As a user I have already used this technology to be identified by companies which required my facial recognition to emit educational certificates, I was requested to be identified by Coursera as stated by Vrankulj (2013) and Duolingo (n.d), and both companies applied the technology to identify me as the real student, what allowed the institution to emit the certificate with assurance that I was the student who was in class and doing the required tests.

This technology in the past was in the hands of a few companies, but today with my experience of developing such kind of systems, the facial recognition can be easily implemented using the OpenCV (Open Source Computer Vision) library OpenCV(n.d), which is available on an open source license, and with a few efforts can be achieved a fully functional facial recognition solution.


As mentioned in the topic above, one of the most effective ways of ensuring the identification of an internet user is by facial recognition biometry. On my viewpoint, this technology is becoming so trusted that the Australian border and immigration control has efforts on replacing the use of passports with facial recognition as stated by The Guardian (2017).

There are more studies on the way, which impacts the facial recognition technology with the use of alternative methods that goes beyond the technology we have today, with 3-d scanning to be implemented by Apple in the iPhone 8 as stated by The Fortune (2017), what in my viewpoint are efforts to minimize the possibility of the facial recognition system to be cracked (think about using a picture of someone instead of the real person at the moment of the recognition, what can be a controversy on the effectiveness of such technology).


If you think that by implementing a fingerprint scanner in an ATM, reduces a high possibility of fraud in the banking system since the bank card is not allowed to be used by another person. Not even considering all the ghost users that the banking system may possibly identify by the use of such technology.

In spite of bringing costs to the system, we live in a society today where all social classes may be possibly corrupted. Corruption in inserted in all kinds of social classes and people, especially thinking about the banking system, which is the source of the money transactions and may be the easiest way of detect corruption by the implementation of such technologies.

If you consider that to implement such a system there is a cost, the users which do not practice corrupt activities may have the impact of paying the price of that one who practices it, however when you think about society as a whole, most of the non corrupt users can be positively affected by the reduction of the frauds, since they can also be a victim.


Vrankulj (2013) Coursera looks to verify online student identity with photo, keystroke dynamics [ONLINE] Available at: (Accessed 17 September 2017).

Duolingo (n.d) Introducing Duolingo Language Certificates [ONLINE] Available at: (Accessed 17 September 2017).

OpenCV (n.d) Face Recognition with OpenCV [ONLINE] Available at: (Accessed 17 September 2017).

The Guardian (2017) Facial recognition to replace passports in security overhaul at Australian airports [ONLINE] Available at: (Accessed 17 September 2017).

Fortune (2017) Apple Is Reportedly Testing 3D Facial Scans to Unlock iPhones [ONLINE] Available at: (Accessed 17 September 2017).

Published by Ademir Constantino

Software Engineer

%d bloggers like this: