i3 - May/June 2019 - 30

Whether it's smartphone authentication or classroom facial monitoring,
continued innovation and practical application of the technology."
His comments added to the growing dialogue about the role of FRT. For example,
Rep. Emanuel Cleaver, II (D-MO), chairman of the House Subcommittee on
National Security, International
Development and Monetary Policy has
focused on the social implications of FRT.
"Facial recognition is a powerful tool that
is permeating American life, and yet, the
propensity of the technology to misidentify individuals, particularly in regard to
variances in skin type and gender, is welldocumented," Cleaver said. "The potential
for illegal discrimination and/or unfair
practices resulting from such bias continues to concern lawmakers."

BEYOND THE BROUHAHA:
GROWING IMPLEMENTATION

While policymakers ponder how to handle
FRT and its allied biometric tools, countless communications, retail, academic and
marketing organizations have embraced
the capabilities of these technologies. Its
financial impact is expected to grow from
$3.8 billion in 2017 to $9.8 billion by 2023.
Whether it's smartphone authentication
(such as Apple's Face ID or Android's
Smart Lock systems) or classroom facial
monitoring (to assure that only authorized
students are in the classroom as well as to
take attendance), FRT has established
itself as a viable and often vital technique.
Going farther, research companies are
using "emotion recognition" to fine-tune
advertising campaigns and other creative
ventures by observing how facial responses
such as smiles or grimaces indicate viewers'
attitudes toward specific images.
In hospitals, FRT is being used for
quicker, more accurate patient care. Online
retailer Alibaba's "Smile-to-Pay" software
has been used for fast-food purchases for
nearly two years. Snapchat lets users establish privacy settings by using FRT to determine which friends should be blocked by
an emoji. Facebook's system has helped its
members tag friends when they appear in
photos for nearly eight years.
HyreCar, a car-sharing marketplace for
ridesharing now operating in three dozen
30	

MAY/JUNE 2019

states, introduced a mobile application in
March that can expedite new driver onboarding and verification, using technology from software developers Mitek.
HyreCar CEO Joe Furnari says that the
new seamless mobile interface can expedite the booking and verification process by
30 percent and lower ID document forgery
up to 20 percent - all of which will "enable
scale and reduce overhead costs toward our
future vision of personal transportation."
Fundamentally, FRT blends computer
vision and data processing to measure and
match dozens of unique facial characteristics; the most basic systems capture about
80 nodal points to create a faceprint (a
numerical code) that analyzes features
such as the length of a jawline, the shape of
a nose and cheekbones and the distance
between eye sockets. Subsequently, this
image, reduced to data, is put into a facial
database and can then be compared to
other images. For example, in security
authorizations, the current face scan is
matched to the image in the database to
confirm that it is really you.
In most configurations, these FRT recognitions can be integrated with existing
security systems, such as employee or student ID. Experts acknowledge that processing and storing visual IDs can be
burdensome, but they observe it is another
cost of doing business.
The recent Biometric Consumer
Sentiment Survey, commissioned by
Veridium, a developer of authentication
solutions, identified the growing appeal
of such systems. The introduction of fingerprint sensors into mobile devices in
2011 was the catalyst for the consumerization of biometric authentication, says
Veridium CEO James Stickland. The
study found - perhaps reflecting familiarity with current systems - that fingerprint ID was preferred by 63 percent of
respondents, compared to facial recognition (14 percent), voice recognition (two
percent), or traditional passwords and
PINs (eight percent).
Veridium also found that consumers are
comfortable using biometrics to unlock
their devices (80 percent), and to use applications such as finance (35 percent),

payments (31 percent), company networks
(12 percent), travel (11 percent) and health
care (10 percent). Among the demographic
preferences uncovered in Veridium's study:
● Millennials (under age 35 years) value
speed (46 percent), Generation X (ages
35-55) cite not having to remember passwords (44 percent) and Baby Boomers
(55+ years) favor security (30 percent)
more than anything.
● Millennials most frequently use biometrics to access financial applications such as
banking apps or ATMs (46 percent) and
payments (45 percent). Generation X's
number one application of biometric
authentication is for travel (41 percent) and
Baby Boomers most use the technology

Measuring Beings
Biometric measurements are emerging thanks to
the confluence of enabling technologies. Sensors,
big data, high-speed processing and other precision digital tools are enabling companies to identify personal traits and behaviors far beyond such
classic unique identifiers as fingerprints (first used
widely in the 1890s) and handwriting/signature
analysis, also called "graphology" (dating from
the 1870s). To be fair, older examples exist. For
example, thumbprints on clay slabs were used in
ancient China as a form of personal identification.
Today's identity tools can verify an individual via
retinal and iris patterns, hand geometry, earlobe
shapes, voice waves as well as DNA. By assembling vast libraries of personal features and using
the immense processing power of networked
computers, systems can analyze features to determine countless factors about individuals.
Despite the privacy handwringing about collecting personal identifiers, many advocates see
extensive value in using these technologies for
safety, accessibility and business improvement.
For example, some health experts believe that a
unique patient identifier system would assure accurate information for critical clinical, administrative and research purposes. Marketers are using
"emotion recognition" (an extension of facial monitoring) to identify when an eye twitch or a cheek
pout subtly expresses a person's true reaction to
an image or visual experience - far more accurately than a thumb up or down response.
As for what's ahead: the constantly improving biometric monitoring capabilities will be able
to recognize gestures, gait patterns, palm and
ear prints, and "scent signatures." The days of
blending into a crowd will soon be over.
I T I S I N N O VAT I O N



i3 - May/June 2019

Table of Contents for the Digital Edition of i3 - May/June 2019

Contents
i3 - May/June 2019 - Cover1
i3 - May/June 2019 - Cover2
i3 - May/June 2019 - Contents
i3 - May/June 2019 - 2
i3 - May/June 2019 - 3
i3 - May/June 2019 - 4
i3 - May/June 2019 - 5
i3 - May/June 2019 - 6
i3 - May/June 2019 - 7
i3 - May/June 2019 - 8
i3 - May/June 2019 - 9
i3 - May/June 2019 - 10
i3 - May/June 2019 - 11
i3 - May/June 2019 - 12
i3 - May/June 2019 - 13
i3 - May/June 2019 - 14
i3 - May/June 2019 - 15
i3 - May/June 2019 - 16
i3 - May/June 2019 - 17
i3 - May/June 2019 - 18
i3 - May/June 2019 - 19
i3 - May/June 2019 - 20
i3 - May/June 2019 - 21
i3 - May/June 2019 - 22
i3 - May/June 2019 - 23
i3 - May/June 2019 - 24
i3 - May/June 2019 - 25
i3 - May/June 2019 - 26
i3 - May/June 2019 - 27
i3 - May/June 2019 - 28
i3 - May/June 2019 - 29
i3 - May/June 2019 - 30
i3 - May/June 2019 - 31
i3 - May/June 2019 - 32
i3 - May/June 2019 - 33
i3 - May/June 2019 - 34
i3 - May/June 2019 - 35
i3 - May/June 2019 - 36
i3 - May/June 2019 - 37
i3 - May/June 2019 - 38
i3 - May/June 2019 - 39
i3 - May/June 2019 - 40
i3 - May/June 2019 - 41
i3 - May/June 2019 - 42
i3 - May/June 2019 - 43
i3 - May/June 2019 - 44
i3 - May/June 2019 - 45
i3 - May/June 2019 - 46
i3 - May/June 2019 - 47
i3 - May/June 2019 - 48
i3 - May/June 2019 - 49
i3 - May/June 2019 - 50
i3 - May/June 2019 - 51
i3 - May/June 2019 - 52
i3 - May/June 2019 - Cover3
i3 - May/June 2019 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com