Is Australia late to the Biometric Identification Trend?

Biometric Identification

Image displaying forms of biometric identification such as iris scan & fingerprint.
Image displaying forms of biometric identification such as iris scan & fingerprint. Source: Leszek Leszczynski, Flickr, some rights reserved.

Recently, implementing biometric technology for identification purposes has become an increasingly viable option due to costs decreasing rapidly and increased promotion of biometrics use in developing countries by global corporations and donors such as the World Bank (Kloppenburg & Ploeg, 2020, p.57).

What is Biometric Identification?

Biometric identification is a method that identifies individuals by automatically recognising a particular physical and/or behavioural characteristic such as fingerprints and iris patterns (Kloppenburg et. al., 2020, p.57).

There are 2 types of biometric methods:

  1. Physiological Biometrics – based on physiological characteristics such as fingerprints, hand geometry and retina patterns (Deane et. al., 1995, p.225)
  2. Behavioural Biometrics – based on behavioural aspects such as signature, voice, keystroke and point patterns (Deane et. al., 1995, p.225)
Image showing examples from 2 different biometrics classification.
Image showing examples from 2 different biometrics classification. Source: Alessio Damato, some rights reserved.

History of Biometrics

The need for trustworthy identification of people originated as early as the ancient times where the Middle and the Far East used bodily features such as height and weight to confirm the people’s identity (Otti, 2017, p.164). Fingerprint identification became adopted in New York State Prisons in 1903 to verify criminals’ identity which attributed to the development of the fingerprint analysis department of FBI in 1921 (Otti, 2017, p.164). However, automated fingerprint identification was not yet developed until the 1960s (Otti, 2017, p.164).

Picture portraying the evolution of fingerprint biometrics.
Picture portraying the evolution of fingerprint biometrics. Source: Leonardo Sam Waterson, Flickr, all rights reserved.

Aadhaar, India’s controversial biometric identification operation, was launched in 2009 and rolled out from 2014, intending to improve the monitoring of potential terrorists and decrease national criminal activity (Bhatia & Bhabha, 2017, pp.64-65). It is a voluntary identity acquisition that qualifies Indian citizens to receive benefits and use government and financial services with an Aadhaar card: an identity token holding a 12-digit number connected to the resident’s demographic and biometric information such as retina scans and fingerprints (Bhatia et al., 2017, pp.64-65).

However, the costs of utilising this method have arisen that outweigh its advantages which include fraud prevention and accessing benefits such as free school meals and fuel subsidies (Doshi, 2018). Increasing concerns about data privacy, data gathering accuracy, card connectivity issues and card connectivity access have threatened the viability of public acceptance. The biometrics’ reliability in India has been further undermined by existing cases where villagers were denied because of faulty card scanners and businesses stole client’s rations by falsely ‘claiming’ that the scanner was dysfunctional (Khera, 2018, p.340). Although signing up is optional, the Indian government has made “Aadhaar registration mandatory for access to many crucial government services” (Doshi, 2018), leaving marginalised communities and undocumented workers from Bangladesh and elsewhere who were not born in India without access (Biswas, 2018).

Video concerning India’s Aadhaar Biometric Database Scheme. Source: FRANCE 24 English, Youtube.

Seeing India’s current biometric identification scheme and its presented advantages and flaws, should Australia implement these systems?

Should Australia implement biometric identification methods?

Let’s discuss both perspectives behind implementing biometric identification methods.


‘The body does not lie’

Biometrics assumingly provide more secure identification and verification because of the certainty results from presumed unchangeable and unique nature of the individual biometric features. This contrasts tokens, cards and passwords that can be lost, copied, forged and shared (Jain & Ross, 2008, p.1).

Potential Verification ‘Invisibility’

Behavioural biometric methods in particular provide an unobtrusive and less intrusive method to verify users compared to physiological processes. It is only when a user’s behaviour becomes deviant that explicit verification prompts would become necessary (Deane et. al., 1995, p.226). Furthermore, the familiar process involved in behavioural biometric identification and the absence of designing and remembering passwords would enhance the user’s convenience and be less time-consuming to adapt to (Jain et. al., 2008, p.3).

A Surveillance Tool and its Negative Recognition Feature

Biometrics can be a valuable security measure as it provides the raw data of who-is-where (Kim, 1995, p. 212). In an organisational setting, it would result in a timely decision and adequate prevention of various forms of abuse and fraud through the automatic record and audit analysis of employee’s action patterns (Kim, 1995, pp.212-213).

This system can also prohibit impostors from claiming multiple benefits under different names through negative recognition. This is when a “system determines that a certain individual is enrolled in the system although the individual might deny it” (Jain et. al., 2008, p.3).

Image showing access denied for biometric impostors.
Image showing access denied for biometric impostors. Source: Elchinator, Pixabay, all rights reserved.


‘The body changes over time’ 

Although ‘the body does not lie’, ‘the body does change over time’. Individuals who acquire physical constraints or not distinctive enough traits for the system to recognise may be unable to enrol in a system (Pato & Millet, cited in Kloppenburg et. al., 2020, p.58). The system neglects the body’s fragility over time and how fingerprints can become worn especially for manual workers and how weight gains and losses, ageing, scarring and plastic surgery can alter an individual’s appearance (Kloppenburg et. al., 2020, p.62).

The normality assumption is also built into the equipment which sets a limited range of variation of human bodily features a system can cope with (Kloppenburg et. al., 2020, p.62). For example, cameras to scan faces may be aimed at a specific height or optimised for particular light and colour ranges and the accompanying face recognition software may have been wired to suit those that fall within a particular shade range of skin colour (Kloppenburg et. al., 2020, p.62). Consequently, many marginalised people such as people with disabilities and people of colour experiencing difficulties to enrol in a biometric system.

Error Tolerance (or Threshold) Setting

With all technology, there are technical errors which impact its ability to be widely accepted and relied upon. In biometric identification systems, 2 potential errors stem from its error tolerance (or threshold) setting.

  1. Type 1 Error: False Alarm Rate (FAR) – If the threshold is set to prevent impostors, some legitimate users may experience difficulties to gain access which results in a high FAR (Kim, 1995, p.207).
  2. Type 2 Error: Impostor Pass Rate (IPR) – If authorised users easily gain access, impostors may slip through the system with relative ease which increases the IPR (Kim, 1995, p.207).

To reduce type 1 error rates, it can only be achieved at the cost of increased type 2 error rates (Kim, 1995, p.207).

For biometric identification to be viable in Australia, the maintenance of the error tolerance setting must be carefully monitored to prevent fraud and inaccessibility to the system for authorised users.

Privacy Issues  

Many have argued that implementing these identification schemes results in a loss of privacy due to the increased concern about the confidentiality of personal details provided to the system. If impostors obtain either the database with the templates or transmission of an individual’s biometrics due to the error tolerance setting loophole, they can impersonate that user, exposing that user to privacy violation (Kim, 1995, p.212). In the case that this occurs, genuine users are unable to be protected as it is difficult to invalidate fraudulent claims and easily alter a ‘biometric password’ (Kim, 1995, p.212).

Also, governments can manipulate the system for personal gain such as for population monitoring purposes (Kim, 1995, p.212). With the use of biometrics as surveillance tools, it poses risks to personal data protection as little transparency is provided with how biometric data is being used (Kim, 1995).

Video concerning the privacy risks involved when using biometrics. Source: Tedx Talks, Youtube.


Implementing biometric identification systems can be a costly alternative to current identification methods. Biometric equipment for iris scanning and fingerprint imaging, although highly accurate and reliable, cost relatively higher than equipment required to verify an individual’s signature or typing patterns (Deane et. al., 1995, p.226). However, a recent increase in the adoption of biometric devices has made it more affordable where small businesses and even individuals can easily purchase them for business and personal security (Thakkar, 2020).

Final Verdict

Despite biometric identification provides a secure alternative to verifying citizen identity and a surveillance tool to prevent fraud, there are various factors such as reliability and data privacy risks that deem it as unviable for the Australian context. For Australia to implement this system, a strong emphasis on earning the user’s trust through transparency about how the data is being collected and stored is of paramount importance to prevent Australian’s current hesitant acceptance and for successful system implementation (Deane et. al., 1995, p.229).


Hypertextual Article Reference List

Bhatia, A. & Bhabha, J. (2017). India’s Aadhaar scheme and the promise of inclusive social

protection. Oxford Development Studies, 45 (1): 64-79. doi: 10.1080/13600818.2016.1263726


Biswas, S. (2018). Aadhaar: Is India’s biometric ID scheme hurting the poor?.

Retrieved from:


Doshi, V. (2018). A security breach in India has left a billion people at risk of identity theft.

Retrieved from:


Frank D., Kate B., Ron H., & Doug M.. (1995). Perceived acceptability of biometric security

systems. Computers & Security, 14 (3), 225-231. ISSN 0167-4048.


Jain A.K., & Ross A. (2008). Introduction to Biometrics. In Jain A.K., Flynn P., Ross

A.A. (eds), Handbook of Biometrics. doi: 10.1007/978-0-387-71041-9_1.


Khera, R. (2018). The Aadhaar debate: Where are the sociologists?. Contributions to Indian

Sociology, 52 (3), 336–342. doi: 10.1177/0069966718787029.


Kim, H. (1995). Biometrics, is it a viable proposition for identity authentication and

access control?. Computers & Security, 14 (3), 205-214. ISSN 0167-4048.


Kloppenburg, S. & Ploeg, I. (2020) Securing Identities: Biometric Technologies and the

Enactment of Human Bodily Differences. Science as Culture, 29 (1), 57-76, doi: 10.1080/09505431.2018.1519534.



Faculty of Engineering Hunedoara, 15(2), 163-168.


Thakkar, D. (2020). Biometric Devices: Cost, Types and Comparative Analysis.

Retrieved from:


Multimedia Reference List

Damato, A. (2007). Biometrics traits classification. Wikimedia Commons. Retrieved from:


Doshi, V. (2018). A security breach in India has left a billion people at risk of identity theft.

Retrieved from:


Elchinator. (2020). No access access denied monitor. Pixabay. Retrieved from:


FRANCE 24 English (Publisher). (2018). What is the Aadhaar biometric database scheme,

upheld by India’s Supreme Court? [Video]. YouTube. Retrieved from:



Lane, I. (2020). ‘Really concerning’: Facial recognition tech sparks fears as government

ramps up rollout. Retrieved from:


Leszczynski, L. (2011). Eye and Finger. Flickr. Retrieved from:


Tedx Talks (Publisher). (2019). The business of biometrics | Madhumita Murgia |

TEDxGateway [Video]. YouTube. Retrieved from:


Waterson, L. (2018). Biometrics: History, Origin & How It Affects Our Lives. Flickr.

Retrieved from:


About Christy Ma 6 Articles
Just a doughnut, dance and musical theatre lover wanting to make Jesus known 🤗