08 Feb 2021
Idemia biometric devices

اجهزة بصمة وجه فرنسى

IDEMIA’s Top 4 Trends in Biometrics for 2020

IDEMIA’s Top 4 Trends in Biometrics for 2020

As the world leader in biometric solutions, Idemia Biometric devices explore the top four biometric

The full potential of biometrics is yet to unfold. The public and private sectors drive its growing usage. In our increasingly connected world, biometrics is set as one of the key enablers of its digital transformation. Today, the biometric industry’s central focus is to protect our identity and improve security for all of us.

1) Use of multi-biometric identification adds a further level of security

As the only form of Idemia Biometric devices that leaves a visible trace, our fingerprints were the first biometrics widely used for identity verification. Today, other biometrics such as face, iris, and DNA are commonly used as well. 2020 will see more and more solutions that offer multi-biometric identification. The combination of multiple types of biometrics enhances security and adds granularity. Depending on the nature of transaction or interaction, different levels of security might be needed. We can already unlock our smartphone with either our fingerprint or face, as this is a comparably less sensitive action. In contrast, mobile biometric devices using fingerprints and faces have, for example, been developed for law enforcement agencies, enabling officers to verify the identities of individuals while patrolling the streets. Another example is the national eID card in Nepal. Nepalese citizens can use their ID cards to interact with their bank, which is why both fingerprint and iris data are embedded into the card for maximum security. 2020 will see this trend growing.

2) Increased exposure of biometrics calls for top-notch technology to secure data

Today, public and private sectors alike face the challenge of achieving two aims simultaneously:
  1. Enhanced, convenient services in a digital world
  2. Prevention of identity theft when using these services
Biometrics is the safest way to verify one’s identity. With the assistance of advanced technologies, the verification of identities with biometrics is fast and easy. However, due to their increased usage, biometric data becomes ever more exposed. On top of this, the trend of storing data in the cloud increasingly includes even the most sensitive data. From startups to large multinationals, cloud computing has revolutionized the way many organizations store and interact with data. It facilitates easier data management, flow and sharing. Biometric data is arguably one of the most sensitive types of data that one can get hold of. 2020 will be all about developing ways to provide extremely tight cyber security to protect biometric data – in the cloud or wherever it might be stored, processed or shared. Three ways of securing data will ensure we can continue to benefit from convenient services and security at the same time, and feel confident in sharing our data:
  1. Secure multi-party computation. While securing data in rest and in transit is quite common, the trickiest part is to secure data that is being processed. Traditionally, the processing party had to be able to ‘see’ data to be able to work with it. The risk connected with this method is significantly reduced when the work of processing the data is shared between different parties. It means that there is not one central player processing all the open, vulnerable data, but several contributors. Only by breaching the data processed by each player would the data make sense to the malicious perpetrator. In 2020, we will see a much wider application of this methodology.
  2. Verifiable computing. For the security of biometric data, this is a very interesting trend in data processing, which will further develop in 2020. Verifiable computing means that one central entity can outsource the computing of data to another potentially unknown, not previously verified entity, while maintaining verifiable results. In the world of biometrics this could mean that we could do the matching of our own data to verify our identity, for example on our smartphone (i.e. the unknown, not verified entity), without anyone doubting the validity of the computing we have done. This would mean that we control our biometric data at all times and it would never leave our own device.
  3. Homomorphic encryption. Homomorphic encryption already protects data both at rest and in transit. However, the Holy Grail that we will see developing in 2020 is to apply this encryption technology also to data that is being processed. The goal is simple – to ensure the data processor cannot decipher or even understand the content that is being processed. It is a method of performing calculations on encrypted information, without decrypting it first. In 2020, we will see a movement towards standardizing homomorphic encryption on a worldwide level. The standard will give a boost towards the aim of using encrypted biometric data while computing. With this last step, end-to-end data privacy can be achieved, given that at no moment in time data is exposed without protection.

3) Wide-spread adoption of facial recognition technology

With high performance levels in terms of speed and accuracy, it is no wonder that we will see a wide adoption of facial recognition technology in 2020. Already over the last few years, many use cases have demonstrated how this technology brings convenience and security. It is one of the least intrusive biometric identification methods because it requires little behavioral adaptation. Today, facial recognition is already used to enable security and convenience. It is, for example, an important facilitator to manage the increasing number of travelers globally. In Europe, over 18 countries are using facial recognition, allowing 200 million passengers to cross borders using their face1. Banks have also started to deploy biometric-based systems, so users no longer need to visit branch offices when opening new bank accounts. They simply capture a picture of their ID and take a selfie. Liveness check functionalities permit the customer to prove who they are with a few movements of their head, ensuring a photo or video of them is not used to impersonate them2. As facial recognition continues to be widely implemented, what are some of the new use cases we should expect to see in 2020?
  1. Protection of public places with video analytics. Enhanced video analytics add intelligence to existing video surveillance. This technology will in 2020 play an increasingly important role in providing effective solutions to detect threats. Combined with efficient incident response platforms, video analytics enable the law enforcement community to react quickly when a person of interest is detected in a vulnerable area. The analytics provided can be compliant with the strictest data protection laws; detecting biometrics, i.e. face, is by far not their only capability. Next year, we expect to see this type of tool widely offered and therefore a sharp increase in its use.
  2. Facial recognition in new industries. While most use cases for facial recognition involve the public sector, many technically advanced industries are expected to implement facial recognition technology for security and convenience as well – like the automotive industry. In 2020, more and more proofs of concept will emerge enabling drivers to access their vehicles and start the engine by simply showing their face. Thanks to facial recognition, the vehicle will automatically adjust the temperature settings, move the seat precisely to fit physical characteristics and preferences and load personalized data, including music playlists and navigation settings into the infotainment system. Moreover, facial recognition replaces the need to look for physical keys (or mobile devices) to open a vehicle and drive away. This improves security by defeating “relay attacks”, where the signal from a car key is captured by the perpetrator within the vicinity of the car using a special device, and car hijacking attempts as the car can only be driven by recognized drivers.

4) Development of a regulatory and ethical framework for the use of facial recognition

Facial recognition technology offers significant problem-solving potential for both security- and convenience-related use cases. Yet as its use is based on monitoring people’s movements, this specific type of biometric data is particularly personal. Citizens have to keep control of their biometric data. They need to know how their data is used, how long it is saved and for what reason. To address unease, 2019 has already seen several attempts to develop regulatory and, arguably more importantly, ethical frameworks that define the way facial recognition technology should be used. IDEMIA expects this trend to grow in 2020, with national initiatives being escalated to a continental or even global level. As a leading provider in the industry, IDEMIA encourages the cooperation between governments, the private sector and providers of the technology to define a framework that allows all stakeholders and end-users to benefit from this technology while addressing the public’s concerns. Idemia Biometric devices اجهزة بصمة وجه فرنسى
16 Jan 2021

VisionPass جهاز بصمة الوجه الفرنسى الاحدث فى العالم

Idemia VisionPass To protect their premises, organizations need access control solutions that provide a high level of security but not to the detriment of employees’ experience, which requires ease and speed of use. Bearing those key constraints in mind, IDEMIA involved partners and end-users in the development of VisionPass, the ultimate face recognition device for access control. In this product, IDEMIA associated its latest advances in Artificial Intelligence and facial recognition algorithms with a state-of-the-art optical set combining 2D, 3D and infra-red cameras in order to meet the expectations of the most demanding clients. The result? A robust, reliable and powerful device, providing near-motion 1-second verification through multiple angles and in all light conditions, and resistant to all kinds of spoofing attempts.

Unique performance

Thanks to the association of a state-of-the-art optical set combining 2D/3D/IR cameras with IDEMIA’s latest advances in AI and image processing, VisionPass provides both a high level of security and real user convenience.

True security

VisionPass incorporates IDEMIA’s latest spoof detection mechanisms and is capable of coping with face changes (change of haircut, glasses, helmet, etc.).

Easy deployment

VisionPass can be deployed at any location: indoor or outdoor. In addition to biometrics, it natively supports Prox, iClass, MIFARE, DESFire cards and PIN codes.

Contact Details

Star Technology for light current systems Co. Headquarter:-Address: 15 Al Fareek Ali Amer St. Nasr City Tel: +(202) 22730200 – 22730300 – 22730400 GSM: + (2 012)02013020 GSM: + (2 011)54000933 GSM: + (2 011)54000939 E-Mail: mramadan@stc-security.com Website: https://www.stc-security.com Sales Department  01150007381 – 01148009052 – 01142954520 – 01149044332
04 Dec 2019

Idemia MorphoWave Compact Delivering frictionless access everywhere

protect their premises, organizations need access control solutions that are thorough, dependable and do not slow people down. IDEMIA relied on its patented, touchless 3D fingerprint technology to develop first a product meeting these needs in high-traffic environments: MorphoWave Tower has rapidly become the benchmark in frictionless access. The overwhelming success of MorphoWave Tower deployments in major Fortune 500 companies across the globe not only proves the technology delivers on its promise, but also confirms the possibility to use it everywhere. MorphoWave Compact, as indicated by its name, is a more compact and more performant evolution of the MorphoWave Tower. It is 86% smaller and 93% lighter, while retaining the same large fingerprint scanning volume and delivering the same field-proven performance. MorphoWave Compact acquires four fingers in 3D for maximum accuracy, with one pass of the hand over the sensor. This ergonomic touchless solution delivers an unmatched combination of security, convenience and throughput. MorphoWave Compact’s reduced size also comes with a very competitive cost of ownership, an IP65 rating and a rich feature set that includes time & attendance functions. Thanks to this solution, organizations can now ensure a frictionless access experience everywhere to authorized users… with a simple wave of their hand.
Convenience & security
Users are positively identified with a simple wave of the hand. The patented touchless sensor technology scans four fingers in 3D in less than one second, ensuring the most accurate and reliable fingerprint matching for maximum security.
Versatile, easy deployment
IP65 rated and Powered over the Ethernet (PoE+), the compact wall-mount reader ensures that MorphoWave technology can be deployed at every location. MorphoWave Compact is already integrated with more than 20 of the industry’s leading access control systems.
Multifactor authentication
MorphoWave Compact natively supports Prox, iClass, MIFARE, DESFire cards and PIN code, in addition to biometrics. It is also capable of scanning QR codes for visitor management.
03 Mar 2018


Idemia MORPHO BIOMETRICS Biometry literally means "measurement of life". In a broader sense, it designates the quantitative study of living beings. It covers a wide range of applications, including anthropology and medicine. The term biometrics also refers to all processes used to recognize, authenticate and identify persons based on certain physical or behavioral characteristics. THESE CHARACTERISTICS MUST BE: UNIVERSAL so that everybody can use them + UNIQUE to unequivocally distinguish between different persons + INVARIABLE to ensure they can be used throughout a person's lifetime + RECORDABLE so they can be collected and stored + MEASURABLE to enable comparisons WHAT ARE THE DIFFERENT TYPES OF BIOMETRICS?

Biometrics can be divided into three main categories of characteristics:

Idemia MORPHO BIOMETRICS * Morphology: the form and structure of organisms. ** These two biometric types may be considered both morphological and behavioral characteristics.

TO IDENTIFY A PERSON. Identification answers the question: “Who is this person?” Identification (1:N) consists of matching biometric data among a large number of persons registered in a database.
TO AUTHENTICATE A PERSON’S IDENTITY. Authentication answers the question: “Is this person really Mr. X?”  Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.
TO AUTHENTICATE A PERSON'S IDENTITY. Authentication answers the question: "Is this person really Mr. X?"  Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.

Each biometric has its advantages and drawbacks, depending on its degree of variability over time, the quality of capture and how often is used. For example, a person’s voice may be subject to occasional or even permanent changes.

Idemia MORPHO BIOMETRICS is specialized in the three major biometric modalities, namely fingerprintface and iris recognition. These three types of biometrics are especially reliable and effective, while being easy to deploy and use.


Each person has his or her own unique fingerprints – even identical twins have different fingerprints. A fingerprint comprises about a hundred major features, called minutiae. In most cases, a match between around a dozen minutiae is needed to prove that two fingerprints are identical, and establish a person’s identity to a very high degree of certainty.


Facial recognition software is capable of identifying an individual according to their facial morphology. Its effectiveness depends on several key factors, including the quality of the captured image, the power of the identification algorithms (which compare, for example, spacing between the eyes), as well as the reliability of the databases used (the larger the database, the greater the probability of identifying a person), etc.


The iris is the colored part of the eye, behind the cornea. It is formed before birth and its appearance changes very little during a person’s life. A person’s right iris is as different from the left iris as it is from another person’s iris. And the irises of identical twins are as different from each other as are the irises of two persons chosen at random. This distinction makes iris recognition a very reliable identification technique, even if the person concerned is wearing glasses or contact lenses. Idemia MORPHO BIOMETRICS

The fast-growing number of connected devices (smartphones, tablets, etc.) goes hand in hand with the increasingly critical nature of the applications and content we can find on them. Times have changed, and we live in a world where mobility reigns. However, the typical uses and security behaviors that worked at home on a PC are more difficult to apply on the move, where passwords have reached their limits. But, more than ever, we still have to protect our data, transactions and our identity.

Idemia MORPHO BIOMETRICS is one answer: a simple wave of the hand, pressing a finger on a scanner, or looking at a camera for a second is enough to authenticate our identity. Biometrics facilities the life of users who are increasingly mobile and connected, offering a simple alternative authentication solution to the traditional password and PIN.


Biometrics means you no longer have to use unwieldy passwords. To be effective, a password has to meet four demanding criteria: it has to be changed frequently, be complex, you must not use the same one for different accounts and, above all, it must not be written down! For people on the move, biometric authentication is easier than entering a complex password several times a day.


Unlike passwords, biometrics is the only method that establishes a link between our physical and digital identities. This helps us prevent identity theft, enabling us to prove that a person accessing an account or device is really who he or she claims to be. Stealing biometric data without the person’s knowledge, and then reproducing it in a useable form is not as easy as stealing a password and using it remotely.


While it’s relatively easy to access thousands of accounts with stolen passwords in just a few seconds, it’s much harder to hack biometric databases. In addition to gaining access to biometric data, thieves also have to be able to produce fakes for each stolen element, and use them with the appropriate detector – thus eliminating the possibility of any large-scale attack. While the number of PIN codes is limited to the digits between 0000 and 9999, biometric data is unlimited.