Improving biometrics to address privacy, scale and accuracy

Issue 3 2022 Editor's Choice, Access Control & Identity Management, News & Events

Faces are very important to us. Our brains can recognise a face in milliseconds, even if we retain no other information about that person. Recording and recalling faces is so intuitive that there is even a condition called prosopagnosia, which occurs when someone struggles to remember faces. Not surprisingly, scientists have discovered our brains have areas dedicated solely to managing information about faces.

Humans are very social creatures, and we rely on quickly identifying friends from foes in a group of faces. Ever since we invented computers, we’ve aimed to endow them with the same abilities. Today, we have computers that understand human speech, translate languages, and recognise our faces. Facial recognition biometrics are today more accurate than the human eye can ever be.

Facial recognition is already used extensively to identify individuals, help prevent crimes such as fraud and make it easier for people to authenticate and access services through their digital identity. We already unlock our phones with a glance many times a day. Imagine if we could pop into the doctor’s office or breeze through airports using our faces to unlock everything, safely and securely.

Until recently, there have been two key limitations around facial recognition. The first is scale. Finding a face amongst thousands, millions, or billions without any reference, like an ID, to narrow the search is like looking for a needle in a haystack. It’s very intensive and time-consuming, sometimes more so than what makes the process worthwhile.

Then there are important privacy concerns. For such a system to work fast, it often relies on other personal data, such as your ID, email address or mobile number. If someone were to access that data used alongside your photo, they could learn a lot about you.

Exciting new developments in this space are resolving these issues. Specifically, a technology called CryptoNets, using fully homomorphic encryption, is changing how fast and securely computers can identify a face. (Homomorphic Encryption refers to a new type of encryption technology that allows computation to be directly on encrypted data, without requiring any decryption in the process.)

CryptoNets uses artificial intelligence and a new type of encryption to deliver on two fronts. It is very fast, locating a face among countless others in milliseconds without the need to have any other data to narrow the search. It is also highly efficient, requiring far fewer computing resources than other types of facial recognition when making one-to-many comparisons or the traditional one-to-one face comparisons.

The technology is also great for privacy. Information encrypted through CryptoNets becomes anonymised data and no longer contains personal information. It is useless without the system, which itself doesn’t need to decrypt the information to use it. So, there is no point in stealing that personal information. Notably, CryptoNets technology converts material such as photos or voiceprints into a different data format that cannot be used outside the CryptoNets context.

The result is a new biometric technology that is much faster, far more secure, naturally compliant with personal information laws such as PoPIA and GDPR, and applicable to different forms of recognition. CryptoNets technology also supports voice, fingerprints and so on. And because of how it works, CryptoNets can quickly identify someone using only one element, such as a photo (no need to give your ID number every time you verify yourself), and does so in near real-time, so it works even in large crowds.

Many of us become nervous when we think of facial recognition. There is always scope for abuse and mistakes. But facial recognition is not going away – it’s just too helpful. So, we should instead ask how we can make it more responsible and respectful of our privacy.

CryptoNets technology achieves privacy and efficiency goals with incredible results. As it grows more popular, it will improve biometric recognition of all types while keeping our personal information safer. It aligns nicely with a wave of improvements in the sector that promotes better ethics and greater accuracy.

Facial recognition is controversial for many reasons. These are being resolved through breakthroughs such as CryptoNets. From fraud prevention to opening your front door with your voice, it will improve many aspects of our lives in fantastic ways without compromising our safety and privacy.

Digital identity orchestration company, Contactable, will be the first organisation in Africa to pioneer this technology as part of its extended product offerings in the market.

For more information, contact Contactable, +27 10 100 3647, info@staycontactable.com, www.contactable.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.