• +1 (510) 396 3894
  • +44 (0) 74832 14871
  • +60 (12) 570 1114
  • +91 99216 92381

What is Fusion Biometrics?

Fusion Biometrics is use of multiple biometric inputs, in a single session to create a multi-layered approach in Authenticating Users. Biometric fusion can be defined broadly as the use of multiple types of biometric data or methods of processing to improve the performance of biometric systems. A variety of such systems have been implemented and used successfully over the years, including ones based on fingerprints, irises, facial images, hand geometry, and speaker recognition are among others. EZMCOM’s Face Recognition coupled with Voice Recognition or Touch ID provides a seameless frictionless experience to secure user access.

Less than 30 Seconds to Enroll

Enrolment has three steps:


The system captures a user’s physical or behavioural characteristic, such as a fingerprint.

Feature Extraction

The software enhances the input from the sensor, removing the noise and unwanted elements to achieve the desired format for efficient feature extraction. Distinctive and repeatable features are selected.

Template Creation & Store

The cleansed and enhanced user data is stored in the feature template, which is stored in a database for later retrieval. Unwanted elements are removed to reduce the template’s size. The template is then used for matching in the future

Authenticate by just being you !

Biometric devices consist of three components:


A reader/scanner

Software that converts the capture information into digital form

A database that stores the biometric data so it can be compared to the previous record associated with an individual

Real-time Verification

Verification consists of two steps:


Comparison/Classification – The biometric data is compared with the stored template.

Decision Making – The system decides whether the new data is a match or a non-match based on a threshold match score.

The Technology

Ezmcom’s biometric authentication was designed with two key criteria in mind: Security & Ease of use.Ease of use is a fairly straightforward concept; we wanted a fast and easy training procedure that would take under 20 seconds to enroll. We also wanted a fast access approach that could be done with one hand holding the phone and entrance into a device or application in a matter of a second. And we wanted to accomplish this without any unnatural or intrusive maneuvers. Finally, the goal was to give the right user the ability to get in without a lot of repeated attempts to enter.

Ease of use for Ezmcom was a major design criteria, and in our comparison assessment we gave it the highest rating, equal to that of face alone, which we believe is the least intrusive and easiest to use of all biometrics. We believe we have been successful in accomplishing our criteria for ease of use, and we welcome you to try out our technology, test it, and judge for yourself.The Ezmcom authentication system was initially designed to achieve excellent performance on existing public face databases such as Color FERET and YaleB. However, these databases are not very representative of the mobile device authentication challenge, so we also immediately began work on collecting a proprietary database of video and audio recorded directly from mobile devices using just the standard front-facing camera and microphone, across a wide range of environmental conditions. Our current primary dataset includes almost 200 individuals each with roughly 10-30 sessions recorded across a range of conditions.

The collection guidelines assume cooperative users who are attempting to authenticate under the expected range of environmental conditions in which a phone may be used.Ezmcom continues to use some public databases as test sets to investigate particular research concerns, but our algorithms are tuned to maximize accuracy for the mobile device application, accounting for the sensors and computing power available as well as the conditions likely to be encountered. We continue to expand our internal dataset, adding more subjects and sessions.Thus with a borderless IT landscape, the focus needs to shift from device based security to an application based security. One must also take note that while there is nothing like 100% security, a multi-layered security approach with new generation authentication including matured technologies like Voice Biometrics and Face Recognition can present a fighting chance for organisation against cyber attackers.

Fingerprint ID

Face Recognition

Voice Recognition

Our software is easily dropped into any
existing infrastructure

Appliance independent and requires no changes to networking infrastructure

Download Fusion Biometrcis Whitepaper for a deep dive into the Biometrcis environment & Technology

Download the Fusion Biometrics Solution paper for a quick overview of the concept.

Download the EZMCOM’s Product Literature