How AI is Revolutionising Biometric Verification
As we discuss in our latest digital identity verification research, AI is heavily used in biometric verification methods; either as the underlying mechanism of the primary verification method or as part of any additional checks that may run alongside the primary verification method.
There are two key examples of this:
Fingerprints
The most familiar form of biometric verification for many is fingerprint scans. This technology takes a scan of the user’s fingerprint and creates a digital impression of it.
This is not an exact representation of the print, but what the scanner does is record a series of distinct points, normally made up of where ridges and valleys end or meet. These points are called minutiae. When the finger is then scanned for verification, the scanner is comparing the minutiae it has on record to the minutiae of the finger on the scanner. This adds an additional layer of security, as if the data is stolen, the user’s fingerprint itself has not been taken, and currently there is no way to recreate a fingerprint from the minutiae stored for verification. This makes fingerprints an extremely secure piece of data to use for verification.
Fingerprint scanners have become a common feature of smartphones with even many lower-end models having fingerprint scanners integrated into the device. These were originally incorporated for easier and more secure access to the device, but are currently often incorporated into verification methods. It is now relatively common for apps that store sensitive data, such as banking apps. This is then incorporated into MFA to add additional layers of security. Many forms of digital identification use fingerprints as a form of verification, to ensure the individual trying to use the digital identity is the correct person. This incorporation into mobile devices makes verification quick and simple, with the user only needing to place their finger on the sensor.
This can be used to verify a user as the owner of an identity when onboarding. As part of the onboarding process a digital identity, linked to the user’s fingerprint, can be used to provide the users PII, with the user being confirmed as the owner of the identity using their fingerprint.
The security of fingerprints is predicated on the ideas that every fingerprint is unique, and the minutiae cannot be used to recreate a fingerprint. The science on whether fingerprints are truly unique is still not settled. Two identical fingerprints have never been found but it is also the case that this has never been studied to a sufficient degree to be proven. That is not to say they are not unique, it has just never been proven that they are. If fingerprints were not unique, it could call into question the security of fingerprint verification. It is also not impossible that one day fingerprints could be reconstructed form the minutiae. If so, fingerprints would become at risk from data breaches, just as many other forms of verification are.
Fingerprint scanners can be vulnerable to spoofing. Older fingerprint scanners could be tricked by a high-definition picture of the finger, but this will not work on modern scanners. To spoof modern scanners, a 3D-version of the fingerprint needs to be created. If the spoofers had access to an image of the fingerprint, it could be possible to engrave the print into a material. It is also possible to 3D-print a mould of the finger, which soft materials like glue or silicon could be poured into. However, most commercially available 3D printers cannot print with the detail to create a good enough fake to trick a modern scanner.
Iris
Iris recognition systems take images of the eye using infrared light. As iris melanin is transparent under infrared light, its detail is revealed, regardless of the eye colour. An algorithm uses this to build a representation of the user’s iris pattern, which future iris scans can be checked against.
There are two types of iris checks, close-up and iris at a distance. Close-up recognition hardware is used to illuminate the eye and capture the iris image. The hardware for this is relatively easy to implement. Iris at a distance is more difficult, with images needing to be captured at one to five meters’ distance. This can be implemented with commercially available equipment, but is less reliable.
Iris recognition has a very low false match rate, meaning it is good for ensuring that the right person is accessing an account. It can be difficult to get good scans of an iris from a large picture of the user’s eye, leading to higher false non-matches, which can negatively affect user experience. The scan can also struggle to recognise they iris when the user is wearing contact lenses.
The biggest threat to an iris scan is a presentation attack. This is an attack where an image of an individual’s iris with sufficient detail is used to spoof the iris scan. This generally requires a very high detailed image but early iris scans have been spoofed using general-purpose cameras. Patterned contact lenses can also be used to recreate an iris pattern, spoofing the scan. To protect against these forms of fraud, liveness checks can be implemented. This can include measuring the change in location of reflections of light caused by the moving of a pupil. This is an effect that a 2D image would be unable to recreate, and contact lenses can affect how light is reflected within the eye.
Latest research, whitepapers & press releases
-
ReportSeptember 2025Fintech & Payments
Instant Payments Market: 2025-2030
Juniper Research’s Instant Payments research suite provides a wide-ranging and strategic analysis of this market; enabling stakeholders - from banks, infrastructure providers, regulators, and businesses - to understand future growth, key trends, and the competitive environment.
VIEW -
ReportSeptember 2025Fintech & Payments
Anti-money Laundering Systems Market: 2025-2030
Our AML Systems research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from financial institutions, law enforcement agencies, regulatory bodies and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW -
ReportSeptember 2025Fintech & Payments
A2A Payments Market: 2025-2030
Our A2A Payments research suite provides detailed analysis of this rapidly changing market; enabling A2A payments service providers to gain an understanding of key payment trends and challenges, potential growth opportunities, and the competitive environment.
VIEW -
ReportSeptember 2025Telecoms & Connectivity
Mobile Messaging Fraud Prevention Market: 2025-2030
Our Mobile Messaging Fraud Prevention research suite provides a detailed and insightful analysis of a market set for significant disruption over the next five years. It enables stakeholders from mobile operators, enterprises, and mobile messaging fraud prevention vendors to understand how the market for mobile messaging fraud will evolve, as well as the impact of AI, RCS, and the evolving competitive environment.
VIEW -
ReportSeptember 2025Sustainability & Smart Cities
Smart Grid Market: 2025-2030
Our cutting-edge Smart Grid research suite provides a comprehensive view of a market at the forefront of the global energy transition. It examines the major disruptions transforming the sector, from the integration of distributed energy resources and the rise of virtual power plants to the growing role of AI-driven intelligence and the mounting need for robust cyber security and compliance.
VIEW -
ReportSeptember 2025Fintech & Payments
eCommerce Payments Market: 2025-2030
Juniper Research’s eCommerce Payments research suite provides a comprehensive and insightful analysis of this market; enabling stakeholders, from eCommerce payment platform providers to merchants and payment service providers, to understand future growth, key trends, and the competitive environment.
VIEW
-
WhitepaperSeptember 2025Fintech & Payments
Core Banking Transformation - A Strategic Conversation with SAP Fioneer
Core banking transformation is no longer optional, as regulatory change, rising compliance costs, and shifting customer expectations make legacy systems unsustainable. Anna Koritz, Global Head of Transaction Banking at SAP Fioneer, shares how banks can overcome cultural and technical hurdles and why SAP Fioneer’s modular, cloud-ready approach enables confident modernisation.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
From Detection to Prevention: The Next Era of Anti-money Laundering
Our complimentary whitepaper, From Detection to Prevention: The Next Era of Anti-money Laundering, examines the state of the AML systems market; considering the impact that a changing regulatory environment and a growing number of use cases is having on the market. Additionally, it includes a forecast summary of the total value of the AML systems market in 2030.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
Ascending-to-Ailing: The Deceleration of A2A Adoption
Our complimentary whitepaper, Ascending-to-Ailing: The Deceleration of A2A Adoption, examines the state of the A2A payments market; considering the impact of this payment method and how it is shaping the modern payments landscape through lower fees and enriched user experience.
VIEW -
WhitepaperSeptember 2025Telecoms & Connectivity
RCS Fraud: Emerging Threats in Next-gen Messaging
Our complimentary whitepaper, RCS Fraud: Emerging Threats in Next-gen Messaging, examines the future of the messaging fraud prevention market, with a particular focus on the latest trends within RCS Business Messaging (RBM). Additionally, it includes a forecast summary of the total cost of fraud over RBM to subscribers in 2030.
VIEW -
WhitepaperSeptember 2025
Decentralising the Smart Grid: Opportunities & Challenges
Our complimentary whitepaper, Decentralising the Smart Grid: Opportunities & Challenges, explores how distributed energy resources, renewable integration, and virtual power plants are reshaping grid management.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
Going Glocal ~ Why Local Payment Methods Are Driving eCommerce
Our complimentary whitepaper, Going Glocal ~ Why Local Payment Methods Are Driving eCommerce, assesses how local payment methods are driving the increasing accessibility to eCommerce, and challenges to eCommerce growth.
VIEW
-
Fintech & Payments
AML Systems Market to Surpass $75 Billion by 2030 Globally, With LexisNexis Risk Solutions, Oracle, and Experian Leading the Defence
September 2025 -
Fintech & Payments
B2B Payments to Hit $224 Trillion by 2030 Globally, Driven by Emerging Market Expansion
September 2025 -
Fintech & Payments
A2A Transaction Value to Reach $195 Trillion in 2030 Globally, Driven by Advanced Value-added Services
September 2025 -
Telecoms & Connectivity
ReveNet: Operators Must Act to Restore Trust & Transparency to $55bn A2P SMS Ecosystem
September 2025 -
Telecoms & Connectivity
RCS Business Messaging Fraud to Cost Mobile Subscribers $4.3 Billion Globally Over the Next 5 Years
September 2025 -
Sustainability & Smart Cities
Smart Grids to Support 43% of Global Electricity Supply by 2030, Driven by Virtual Power Plants
September 2025