How AI is Revolutionising Biometric Verification
As we discuss in our latest digital identity verification research, AI is heavily used in biometric verification methods; either as the underlying mechanism of the primary verification method or as part of any additional checks that may run alongside the primary verification method.
There are two key examples of this:
Fingerprints
The most familiar form of biometric verification for many is fingerprint scans. This technology takes a scan of the user’s fingerprint and creates a digital impression of it.
This is not an exact representation of the print, but what the scanner does is record a series of distinct points, normally made up of where ridges and valleys end or meet. These points are called minutiae. When the finger is then scanned for verification, the scanner is comparing the minutiae it has on record to the minutiae of the finger on the scanner. This adds an additional layer of security, as if the data is stolen, the user’s fingerprint itself has not been taken, and currently there is no way to recreate a fingerprint from the minutiae stored for verification. This makes fingerprints an extremely secure piece of data to use for verification.
Fingerprint scanners have become a common feature of smartphones with even many lower-end models having fingerprint scanners integrated into the device. These were originally incorporated for easier and more secure access to the device, but are currently often incorporated into verification methods. It is now relatively common for apps that store sensitive data, such as banking apps. This is then incorporated into MFA to add additional layers of security. Many forms of digital identification use fingerprints as a form of verification, to ensure the individual trying to use the digital identity is the correct person. This incorporation into mobile devices makes verification quick and simple, with the user only needing to place their finger on the sensor.
This can be used to verify a user as the owner of an identity when onboarding. As part of the onboarding process a digital identity, linked to the user’s fingerprint, can be used to provide the users PII, with the user being confirmed as the owner of the identity using their fingerprint.
The security of fingerprints is predicated on the ideas that every fingerprint is unique, and the minutiae cannot be used to recreate a fingerprint. The science on whether fingerprints are truly unique is still not settled. Two identical fingerprints have never been found but it is also the case that this has never been studied to a sufficient degree to be proven. That is not to say they are not unique, it has just never been proven that they are. If fingerprints were not unique, it could call into question the security of fingerprint verification. It is also not impossible that one day fingerprints could be reconstructed form the minutiae. If so, fingerprints would become at risk from data breaches, just as many other forms of verification are.
Fingerprint scanners can be vulnerable to spoofing. Older fingerprint scanners could be tricked by a high-definition picture of the finger, but this will not work on modern scanners. To spoof modern scanners, a 3D-version of the fingerprint needs to be created. If the spoofers had access to an image of the fingerprint, it could be possible to engrave the print into a material. It is also possible to 3D-print a mould of the finger, which soft materials like glue or silicon could be poured into. However, most commercially available 3D printers cannot print with the detail to create a good enough fake to trick a modern scanner.
Iris
Iris recognition systems take images of the eye using infrared light. As iris melanin is transparent under infrared light, its detail is revealed, regardless of the eye colour. An algorithm uses this to build a representation of the user’s iris pattern, which future iris scans can be checked against.
There are two types of iris checks, close-up and iris at a distance. Close-up recognition hardware is used to illuminate the eye and capture the iris image. The hardware for this is relatively easy to implement. Iris at a distance is more difficult, with images needing to be captured at one to five meters’ distance. This can be implemented with commercially available equipment, but is less reliable.
Iris recognition has a very low false match rate, meaning it is good for ensuring that the right person is accessing an account. It can be difficult to get good scans of an iris from a large picture of the user’s eye, leading to higher false non-matches, which can negatively affect user experience. The scan can also struggle to recognise they iris when the user is wearing contact lenses.
The biggest threat to an iris scan is a presentation attack. This is an attack where an image of an individual’s iris with sufficient detail is used to spoof the iris scan. This generally requires a very high detailed image but early iris scans have been spoofed using general-purpose cameras. Patterned contact lenses can also be used to recreate an iris pattern, spoofing the scan. To protect against these forms of fraud, liveness checks can be implemented. This can include measuring the change in location of reflections of light caused by the moving of a pupil. This is an effect that a 2D image would be unable to recreate, and contact lenses can affect how light is reflected within the eye.
Latest research, whitepapers & press releases
-
ReportFebruary 2026Telecoms & ConnectivityMobile Messaging Market: 2026-2030Juniper Research’s Mobile Messaging research suite provides mobile messaging vendors, mobile network operators, and enterprises with intelligence on how to capitalise on changing market dynamics within the mobile messaging market.
VIEW -
ReportFebruary 2026Fintech & PaymentsKYC/KYB Systems Market: 2026-2030Our KYC/KYB Systems research suite provides a detailed and insightful analysis of an evolving market; enabling stakeholders such as financial institutions, eCommerce platforms, regulatory agencies and technology vendors to understand future growth, key trends and the competitive environment.
VIEW -
ReportFebruary 2026Telecoms & ConnectivityRCS for Business: 2026-2030Our comprehensive RCS for Business research suite provides an in‑depth evaluation of a market poised for rapid expansion over the next five years. It equips stakeholders with clear insight into the most significant opportunities emerging over the next two years.
VIEW -
ReportFebruary 2026Fintech & PaymentsMobile Money in Emerging Markets: 2026-2030Our Mobile Money in Emerging Markets research report provides detailed evaluation and analysis of the ways in which the mobile financial services space is evolving and developing.
VIEW -
ReportJanuary 2026IoT & Emerging TechnologyPost-quantum Cryptography Market: 2026-2035Juniper Research’s Post-quantum Cryptography (PQC) research suite provides a comprehensive and insightful analysis of this market; enabling stakeholders, including PQC-enabled platform providers, specialists, cybersecurity consultancies, and many others, to understand future growth, key trends, and the competitive environment.
VIEW -
ReportJanuary 2026Telecoms & ConnectivityMVNO in a Box Market: 2026-2030Juniper Research’s MVNO in a Box research suite provides Mobile Virtual Network Enablers, Mobile Virtual Network Aggregators, and other players with detailed analysis and strategic recommendations for monetising demand for MVNO in a Box services.
VIEW
-
WhitepaperFebruary 2026Telecoms & ConnectivityHow Social Media Will Disrupt Mobile Messaging Channels in 2026
Our complimentary whitepaper, How Social Media Will Disrupt Mobile Messaging Channels in 2026, explores the challenges and opportunities for operators and enterprises as social media traffic continues to increase.
VIEW -
WhitepaperFebruary 2026Telecoms & ConnectivityProtecting Users from Scam Ads: A Call for Social Media Platform Accountability
In this new whitepaper commissioned by Revolut, Juniper Research examines how scam advertising has become embedded across major social media platforms, quantifies the scale of user exposure and financial harm, and explains why current detection and enforcement measures are failing to keep pace.
VIEW -
WhitepaperFebruary 2026Fintech & PaymentsKnow Your Agents (KYA): The Next Frontier in KYC/KYB Systems
Our complimentary whitepaper, Know Your Agents (KYA): The Next Frontier in KYC/KYB Systems, examines the state of the KYC/KYB systems market; considering the impact of regulatory development, emerging risk factors such as identity enabled fraud, and how identity and business verification is evolving beyond traditional customer and merchant onboarding toward agent-level governance.
VIEW -
WhitepaperFebruary 2026Telecoms & Connectivity3 Key Strategies for Capitalising on RCS Growth in 2026
Our complimentary whitepaper, 3 Key Strategies for Capitalising on RCS Growth in 2026, explores key trends shaping the RCS for Business market and outlines how mobile operators and platforms can accelerate adoption and maximise revenue over the next 12 months.
VIEW -
WhitepaperFebruary 2026Fintech & PaymentsThe Next Steps for Mobile Money – Interoperability and Openness
Our complimentary whitepaper, The Next Steps for Mobile Money – Interoperability and Openness, analyses how interoperability and open platforms can drive new growth opportunities through partnerships with key stakeholders.
VIEW -
WhitepaperJanuary 2026IoT & Emerging TechnologyPreparing for Q-Day: Post-quantum Security Shift
Our complimentary whitepaper, Preparing for Q-Day: Post-quantum Security Shift, assesses the factors which are increasing interest in adopting PQC, and challenges to PQC adoption. Additionally, it includes a forecast summary of the global spend on PQC by 2035.
VIEW
-
Telecoms & Connectivity
MVNO Subscriber Revenue to Exceed $50 Billion Globally in 2030
March 2026 -
Fintech & Payments
QUBE Events is excited to bring back the 24th NextGen Payments & RegTech Forum - Switzerland
February 2026 -
Telecoms & Connectivity
OTT Messaging Apps to Exceed 5 Billion Users Globally by 2028; Driving Shift in Enterprise Communication Strategies
February 2026 -
Fintech & Payments
Calling All Fintech & Payment Innovators: Future Digital Awards Now Open for 2026
February 2026 -
Telecoms & Connectivity
Operator RCS for Business Revenue to Reach $3 Billion Globally by 2027, Growing 150% in Two Years
February 2026 -
Fintech & Payments
KYC & KYB Systems Spend Outside Financial Sector to Grow 105% by 2030 Globally, as KYC Moves Beyond Banking
February 2026