Introduction to Biometric Technology

Biometric Technology has contributed tremendously to boost the advancement in digital electronics.It has made it easier to authenticate a trusted user. More importantly, it has sped up the authentication process and it is 100% secure when multiple authentication methods are used together. Despite the fact that there exist some drawbacks, it is a boon to the digital world. To understand its significance, you can compare the age old pattern based authentication and one touch finger scan on your smartphone.

Biometrics comprises of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Certain characteristics of every human being such as fingerprint, iris, retina, voice, face, DNA differ from each other. Biometric authentication makes use of these characteristics to identify individuals. In information technology, in particular, biometrics is used as a form of identity access management and access control. Biometric Technology is also used to identify individuals in groups.

Biometric characteristics can be divided into two main classes: Physiological and Behavioral. 

  • Physiological: This is related to the shape of the body. Examples include fingerprint, face recognition, DNA, hand and palm geometry, iris recognition etc.
  • Behavioral: This is related to the behavior of a person. Examples include typing rhythm, voice, and gait. Some researchers have coined the term behaviometrics for this class of biometrics. Strictly speaking, the voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

Suggested Read:

How does the biometric authentication work?

The biometric authentication is a two-step process.

  1. In the first step, the biometric information from an individual is captured and stored. This is called the enrollment phase.
  2. In the second step, the stored data is detected and compared with the information stored at the time of enrollment. If the data matches then the user is considered to be authentic.

The following picture explains the biometric authentic process. (image source – wiki)

Biometric Authentication process

Every biometric authentication process needs a device/sensor to read input samples. This data is called a template. For a single biometric authentication method, thousands of image combinations are generated. Biometrics system makes use of a database storage to store a combination of templates. 

The authentication process is divided into verification and identification modes.

In the verification mode, following three steps are involved.

  1. In the first step, reference models for all the users are generated and stored in the model database.
  2. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold.
  3. The third step is the testing step. This process may use a smart card, username or ID to indicate which template should be used for comparison.

In the identification mode, the system performs a one-to-many comparison against a biometric database in an attempt to establish the identity of an unknown individual


Some of the commonly used Biometrics are:

  • Fingerprints – A fingerprint includes patterns found on a fingertip. There are a variety of approaches for the fingerprint verification, such as traditional police based method and using pattern-matching devices. Fingerprint scanning seems to be a good choice for in-house systems. It can be easily found on smartphones and laptops.
  • Hand geometry – This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where the user accesses the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.
  • Retina – A retina-based biometric authentication involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low-intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. It is mainly used in high-security laboratories to permit only trusted users.
  • Iris – An iris-based biometric authentication involves analyzing features found in the colored circular tissue that surrounds the pupil. The color of the iris determines the color of the eye. This uses a conventional camera element that helps to capture high-resolution images depicting the structure of the iris. Further, it is more reliable and results in highest pattern matching.
  • Face Facial recognition involves identifying a person based on the high-resolution images captured. Thousands of patterns of the face are captured by the facial recognition device and stored in its database. In subsequent uses, this data is used to match and authenticate a person. This kind of matching is mostly used in the police and intelligence departments. Read more on Face Identification and Recognition.
  • Voice – Voice biometric authentication is on the edge of replacing other methods because of its simplicity.  In this method, the user needs to speak through a microphone and the software stores the user’s voice samples. In subsequent uses, the stored records are used to authenticate a user.  Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names. But voice will be a complementary technique for finger scan as both are fast and simple enough to authenticate a user. Barclays Wealth and Investment Management is first in the world to introduce voice based authentication to verify customers automatically as they speak. Google Assistant application introduced in Android nougat 7.0 is making use of the voice biometrics to unlock smartphones and assisting the user to google search.This enhances the search experience.

Some of the disadvantages involved in the Biometric Technology are:

  • Security of the biometric data: It is crucial that the storage and retrieval of the biometric data is highly secured. There is a chance that the thieves will stalk and assault the property owner to gain access. With the increase in cybercrimes, ransomware attacks such systems must be kept under high surveillance and the data should be encrypted using custom algorithms.
  • Biometric data cannot be re-issued: If an unusual activity is detected against your account passwords, PINs can be re-issued and your account can be reprotected but in the case of biometrics, you cannot do that. If someone’s face is compromised from a database, you cannot cancel or reissue it.
  • Biological characteristics may change: With age and growth certain physiological characteristics may change and the biometric authentication may not work. One has to keep updating the records over a period of time.
  • The match may fail: There could be a case that the system may find few identical records and may not be able to finalize the match.

Biometric Devices:

There are thousands of biometric devices readily available in the market. To name a few: 

Wrapping up:

This technology is getting better every day and spreading globally at a faster rate. Voice and fingerprint authentication is being collaborated with most of the electronic devices.  In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram) signals have emerged. We hope for many such advancements in the field of the biometrics.

Of course, every technology has some drawbacks, we should concentrate on overcoming these drawbacks instead of crushing the technology. 

Ravi Bandakkanavar

A Techie, Blogger, Web Designer, Programmer by passion who aspires to learn new Technologies every day. A founder of Krazytech. It's been 10+ years since I am publishing articles and enjoying every bit of it. I want to share the knowledge and build a great community with people like you.

Leave a Comment
Published by
Ravi Bandakkanavar

Recent Posts

Everything You Need To Know About Create React App

The configuration of resources can be a time-consuming and difficult operation while creating a React…

3 weeks ago

Causes of CyberCrime and Preventive Measures

          Rapid technological growth and developments have provided vast areas of…

1 month ago

How Data Lineage will Improve Business Practices

How often have you thought about changing the way that you store and use data?…

1 month ago

10 Dominating Programming Language for Mobile App In 2022

Programming Languages are a set of rules that aid in transforming a concept into a…

1 month ago

What is Serverless Edge Computing? Features | Benefits

Serverless edge computing is a new technology with a lot of promise, but it can…

1 month ago

Are Your Accounts Protected Against Cyberattacks?

Do any of your passwords include personal names, date of birth, or pet names? If…

2 months ago