PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

A Hacker’s Nightmare: New Advances in Biometrics

By Kimberly Biddings
September 12, 2022
in Biometrics, Emerging Payments, Featured Content, Industry Opinions
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
biometrics

biometrics

Biometrics are quickly becoming one of the most common methods for identity and access management (IAM), with over 85% of people interested in using biometrics to verify identity. This popularity is due in large part to the convenience and security offered by using a biometric over a password or token. As these are adopted at a greater rate the technology backing them is advancing as well. While we may see scenes in movies where masks are used to dupe a face scanner, the reality of hacking a biometric measurement is much more difficult. New techniques like liveness detection and innovative ways of storing the measurements have raised the bar for security and made hacker’s lives far more difficult.

How It Works

Liveness detection uses algorithms designed to look for authenticity in the biometric being used. For example, in a fingerprint scan rather than just compare the pattern of the fingerprint itself it looks for other indicators of life. Liveness detection can identify slight differences in the fingerprint due to skin flexibility, or it can detect the presence of sweat and pores in the skin. Many methods can detect blood flow beneath the fingerprint or see vein patterns under the skin. By looking at more than just the fingerprint itself, but also examining the composition of the biometric being used, these systems are able to avoid presentation attacks where a false version of a biometric is presented to a scanner.

These new approaches to presentation attack detection (PAD) rely upon the ability to collect a much larger number of data points to contribute to both the security and flexibility of the system. For example when using a face scan companies are employing 3D models where a user needs to move their head around showing data points in three dimensions rather than a static 2D image. A study published in the National Library of Medicine shows that using methods like motion analysis resulted in a 97% success rate in correctly identifying live versus fake biometrics. As our ability to take in thousands of data points to analyze a face, fingerprint, or voice grows, so too does our ability to prove liveness. Even if a hacker somehow gains access to a user’s fingerprint or a picture of their face, the process for replicating and then using it in a way that also passes liveness detection is nearly impossible.

How the Information is Stored Matters

Another method being used to prevent attacks is storing the biometric measurements in a fashion whereby they cannot be replicated if hacked. Centrally stored biometric systems keep measurements with the company granting access and this has led to concerns about what happens if there is a breach where the biometrics are stored. However, systems like identity-bound biometrics (IBB) have addressed this by storing templates rather than the direct measurements themselves. When a biometric is enrolled in the system it is sent through an algorithm and then saved as a template that doesn’t resemble the measurement itself. Like a lock and key the biometric now can be paired with the template to verify an identity and grant access to the system without the biometric being saved directly to the server. All of this means that even if a breach occurs the hacker won’t have access to a real person’s biometric measurement and would not be able to attempt to replicate the fingerprint or face of a user.

Continuing to Advance in Biometrics

To hack a password all that needs to happen is finding the right combination of letters and numbers. With advances in technology hacking a biometric has become a completely new game. Even having access to a person’s exact biometric measurements is no longer enough to fool a biometric scanner. The amount of time, effort, and expertise needed to even attempt to break through liveness detection creates a huge barrier for would be threat actors. Storing the biometric as a template makes stealing the data in a breach worthless. As hackers become more and more sophisticated, so too does the way in which we safeguard our data and identities.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: BiometricsFingerprintIAMIdentity

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    Navigating Global Fintech Regulations Through Strategic Regulatory Arbitrage

    PACE Act Could Open Fed Payment Rails Beyond Banks

    April 24, 2026
    fraud agentic risks

    As Fraud and Agentic Risks Mount, Data Provides Continuity

    April 23, 2026

    Thirty Years and Counting: Bank of America Renews Alaska Air Deal

    April 22, 2026
    stablecoins

    What Would it Take for Stablecoins to Replace Wire Transfers in B2B Payments?

    April 21, 2026
    Payment Facilitator

    How Banks Are Competing with Fintech Apps for Small Businesses

    April 20, 2026
    ai financial

    Consumers Are Putting More Financial Decisions in AI’s Hands

    April 17, 2026
    cybersecurity frontier ai

    Cybersecurity Must Evolve as Frontier AI Fuels New Fraud Risks

    April 16, 2026
    isos thriving

    In Defiance of the Prognosticators, ISOs Are Thriving Again

    April 15, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result