How AI is Revolutionising Biometric Verification
As we discuss in our latest digital identity verification research, AI is heavily used in biometric verification methods; either as the underlying mechanism of the primary verification method or as part of any additional checks that may run alongside the primary verification method.
There are two key examples of this:
Fingerprints
The most familiar form of biometric verification for many is fingerprint scans. This technology takes a scan of the user’s fingerprint and creates a digital impression of it.
This is not an exact representation of the print, but what the scanner does is record a series of distinct points, normally made up of where ridges and valleys end or meet. These points are called minutiae. When the finger is then scanned for verification, the scanner is comparing the minutiae it has on record to the minutiae of the finger on the scanner. This adds an additional layer of security, as if the data is stolen, the user’s fingerprint itself has not been taken, and currently there is no way to recreate a fingerprint from the minutiae stored for verification. This makes fingerprints an extremely secure piece of data to use for verification.
Fingerprint scanners have become a common feature of smartphones with even many lower-end models having fingerprint scanners integrated into the device. These were originally incorporated for easier and more secure access to the device, but are currently often incorporated into verification methods. It is now relatively common for apps that store sensitive data, such as banking apps. This is then incorporated into MFA to add additional layers of security. Many forms of digital identification use fingerprints as a form of verification, to ensure the individual trying to use the digital identity is the correct person. This incorporation into mobile devices makes verification quick and simple, with the user only needing to place their finger on the sensor.
This can be used to verify a user as the owner of an identity when onboarding. As part of the onboarding process a digital identity, linked to the user’s fingerprint, can be used to provide the users PII, with the user being confirmed as the owner of the identity using their fingerprint.
The security of fingerprints is predicated on the ideas that every fingerprint is unique, and the minutiae cannot be used to recreate a fingerprint. The science on whether fingerprints are truly unique is still not settled. Two identical fingerprints have never been found but it is also the case that this has never been studied to a sufficient degree to be proven. That is not to say they are not unique, it has just never been proven that they are. If fingerprints were not unique, it could call into question the security of fingerprint verification. It is also not impossible that one day fingerprints could be reconstructed form the minutiae. If so, fingerprints would become at risk from data breaches, just as many other forms of verification are.
Fingerprint scanners can be vulnerable to spoofing. Older fingerprint scanners could be tricked by a high-definition picture of the finger, but this will not work on modern scanners. To spoof modern scanners, a 3D-version of the fingerprint needs to be created. If the spoofers had access to an image of the fingerprint, it could be possible to engrave the print into a material. It is also possible to 3D-print a mould of the finger, which soft materials like glue or silicon could be poured into. However, most commercially available 3D printers cannot print with the detail to create a good enough fake to trick a modern scanner.
Iris
Iris recognition systems take images of the eye using infrared light. As iris melanin is transparent under infrared light, its detail is revealed, regardless of the eye colour. An algorithm uses this to build a representation of the user’s iris pattern, which future iris scans can be checked against.
There are two types of iris checks, close-up and iris at a distance. Close-up recognition hardware is used to illuminate the eye and capture the iris image. The hardware for this is relatively easy to implement. Iris at a distance is more difficult, with images needing to be captured at one to five meters’ distance. This can be implemented with commercially available equipment, but is less reliable.
Iris recognition has a very low false match rate, meaning it is good for ensuring that the right person is accessing an account. It can be difficult to get good scans of an iris from a large picture of the user’s eye, leading to higher false non-matches, which can negatively affect user experience. The scan can also struggle to recognise they iris when the user is wearing contact lenses.
The biggest threat to an iris scan is a presentation attack. This is an attack where an image of an individual’s iris with sufficient detail is used to spoof the iris scan. This generally requires a very high detailed image but early iris scans have been spoofed using general-purpose cameras. Patterned contact lenses can also be used to recreate an iris pattern, spoofing the scan. To protect against these forms of fraud, liveness checks can be implemented. This can include measuring the change in location of reflections of light caused by the moving of a pupil. This is an effect that a 2D image would be unable to recreate, and contact lenses can affect how light is reflected within the eye.
Latest research, whitepapers & press releases
-
ReportDecember 2025AI Agents for Customer Experience Platforms Market: 2025-2030
Our comprehensive AI Agents for Customer Experience Platforms research suite comprises detailed assessment of a market that is set to disrupt mobile communications. It provides stakeholders with insight into the key opportunities within the AI agents for customer experience platforms market over the next two years.
VIEW -
ReportDecember 2025Fintech & PaymentseCommerce Fraud Prevention Market: 2025-2030
Our eCommerce Fraud Prevention research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from financial institutions, law enforcement agencies, regulatory bodies and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW -
ReportNovember 2025Telecoms & ConnectivityeSIMs & iSIMs Market: 2025-2030
Juniper Research’s eSIMs and iSIMs research suite offers insightful analysis of a market set to experience significant growth in the next five years. The research suite provides mobile network operators (MNOs), original equipment manufacturers (OEMs), and eSIM management and platforms vendors with intelligence on how to capitalise on the market growth, and guidance on how eSIM-only devices and sensors, SGP.42, in-factory provisioning, and iSIMs will change the competitive landscape.
VIEW -
ReportNovember 2025Fintech & PaymentsModern Card Issuing Platforms Market: 2025-2030
Our Modern Card Issuing Platforms Market research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from banks, financial institutions, fintech companies, and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW -
ReportNovember 2025Fintech & PaymentsDigital Wallets Market: 2025-2030
Our digital wallets research suite provides detailed analysis of this rapidly changing market; allowing digital wallet providers to gain an understanding of key payment trends and challenges, potential growth opportunities, and the competitive environment.
VIEW -
ReportOctober 2025Fintech & PaymentsDigital Identity Market: 2025-2030
Juniper Research’s Digital Identity research suite provides a comprehensive and insightful analysis of this market; enabling stakeholders, including digital identity platform providers, digital identity verification providers, government agencies, banks, and many others, to understand future growth, key trends, and the competitive environment.
VIEW
-
WhitepaperDecember 2025Telecoms & ConnectivityHuman + AI: Drivers of Customer Experience AI Agents in 2026
Our complimentary whitepaper, Human + AI: Drivers of Customer Experience AI Agents in 2026, examines the key drivers of the AI agents for customer experience platforms market in 2025.
VIEW -
WhitepaperDecember 2025Fintech & PaymentsBeyond Chargebacks: The True Cost of Fraud for Digital Commerce
Our complimentary whitepaper, Beyond Chargebacks: The True Cost of Fraud for Digital Commerce, examines the state of the eCommerce fraud prevention market; considering the impact of evolving digital fraud strategies, including key trends such as identity theft, account takeovers, chargebacks, policy abuse and friendly fraud.
VIEW -
WhitepaperNovember 2025Telecoms & ConnectivityeSIM-only Devices: The Impact on Operators, Consumers, and IoT
Our complimentary whitepaper, eSIM-only Devices: The Impact on Operators, Consumers, and IoT, explores the challenges and opportunities for the three segments, with a particular focus on eSIM-only smartphones and SGP.42.
VIEW -
WhitepaperNovember 2025Fintech & PaymentsUnlocking the Next Stage of Growth for Modern Card Issuing Platforms
This free whitepaper analyses key trends shaping the modern card issuing space, and the ways in which modern card issuing platforms can capture growth.
VIEW -
WhitepaperNovember 2025Fintech & PaymentsTop 10 Fintech & Payments Trends 2026
Fintech is evolving fast. From stablecoins to agentic AI, our annual guide reveals the shifts redefining payments, digital identity, and the future of money in 2026. Download your copy today.
VIEW -
WhitepaperNovember 2025Fintech & PaymentsDigital Wallets: Empowering Financial Inclusivity
Our complimentary whitepaper, Digital Wallets: Empowering Financial Inclusivity, examines the state of the digital wallets market; considering the impact of digital wallets on different geographies, how they are shaping the modern payments landscape through lower transaction fees and promoting financial inclusivity for underbanked populations, and how they are competing with established payment methods.
VIEW
-
IoT & Emerging Technology
Juniper Research Unveils Top 10 Emerging Tech Trends to Watch in 2026
January 2026 -
Fintech & Payments
Digital Identity App Usage to Hit 6.2 Billion by 2030, Driven by Shift to Decentralised Models
December 2025 -
Telecoms & Connectivity
Travel eSIM Margins Under Pressure as Revenue per Gigabyte Falls 10% Globally in Two Years
December 2025 -
Telecoms & Connectivity
AI Agents to Power 1,000% More Customer Interactions for Enterprises Globally by 2027
December 2025 -
IoT & Emerging Technology
Global D2C Revenue Set for $370 Million Surge, But Satellite Operators Should Not Chase Full MNO Status
December 2025 -
Fintech & Payments
Digital Goods Fraud to Cost eCommerce Merchants $27 Billion Globally by 2030 as AI Tools Accelerate Attacks
December 2025