My IBM Log in Subscribe

What is biometric authentication?

14 March 2025

Authors

Matthew Kosinski

Enterprise Technology Writer

What is biometric authentication?

Biometric authentication uses the physical characteristics of an individual—such as facial features, iris scans or fingerprints—to verify their identity before granting access to sensitive data or systems. Biometric identification is based on who the person is, rather than special knowledge or something the person has. 

Hackers increasingly target users’ credentials to break into corporate networks and wreak havoc. In fact, according to the IBM Cost of a Data Breach Report, stolen credentials are the most common attack vector behind data breaches.

Many organizations adopt biometric authentication to help thwart these kinds of cyberattacks and protect user accounts. Because biometric information pertains to who a person is, it is typically harder to steal or forge than other credentials, such as passwords and security tokens.

Biometrics can also provide a more convenient user experience because people don’t have to remember anything or carry special items to prove their identities. Biometric technology helps enable passwordless authentication, which can be both more secure and more streamlined than other types of authentication.

Man looking at computer

Strengthen your security intelligence 


Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter. 


Types of biometric authentication

All authentication systems rely on authentication factors, or pieces of evidence that prove a person is who they say they are. Biometric authentication specifically uses physical and behavioral modalities to identify people.

Inherence factors

Inherence factors, also called physical factors, are physical traits unique to a person, such as the pattern of blood vessels in their retina.

Biometric authentication systems use physical identifiers that are measurable, distinct and highly unlikely to change. Common physical biometric authentication methods include facial recognition and fingerprint scans. Characteristics such as weight and hair color can change, making them inappropriate for authentication.

New options for unique inherence factors are continually being investigated, such as thermal imaging of feet and lip shape.1 

While most inherence factors remain consistent, difficulties might arise if an injury alters a person’s characteristics, such as changing their fingerprints or facial features.

Another potential difficulty with inherence factors is that, if an attacker steals a physical authentication factor (such as pilfering fingerprint scans from a database), it cannot be changed. People can change their passwords, but they can't change their fingerprints.

In addition, there are potential privacy concerns around how organizations use people's biometric data after collecting it.

Inherence factors currently in use or under evaluation include:

Retina or iris recognition

Eye recognition includes scanning of the iris or retina for unique patterns. While this type of biometric authentication is highly accurate, it is also expensive, requiring specialized equipment. It is more practical for government or industrial uses, where security is the most important consideration.

Face recognition

Facial recognition technology is sufficiently accurate to be used for unlocking mobile devices and helping with identification by law enforcement.

However, facial scans can have difficulties: the angle of the live scan might be different than the scan on file, leading to failed authentication. An exaggerated facial expression can also distort a scan.

Voice recognition

The tone, pitch and frequencies in a person’s voice might be as unique as a fingerprint.

While voice recognition verification is highly accurate, easy to use, and comparatively cost-effective, advanced voice cloning technologies can fool it. Some generative AI developers, such as OpenAI, advocate that organizations move away from voice recognition for this reason.2

Fingerprints, palm prints and footprints

Fingerprints are a longstanding biometric authentication method, used as proof of identity in China as early as 300 B.C.3 Their usefulness continues today.

Fingerprints are unique, with only one chance in 64 billion4 of finding an identical fingerprint between two people. (And there are now just over eight billion people on earth.)

Fingerprints are also ideal for today’s digital devices. They are inexpensive to read, collect and analyze, and they do not change as people age.

However, some consumer-grade fingerprint scanners that are found in smartphones and PCs are accessible by using fake prints. Common conditions such as wet, dry or greasy fingers can cause false rejections.

Because of these errors, some scanners now read vascular patterns instead, helping to reduce the number of false positives.

Vein recognition

Vein recognition uses pattern-recognition technology to match the arrangement of a user’s blood vessels in some part of their body to a scan already on file.

While more accurate than many fingerprint scanning methods, the vein scanning process can be cumbersome. Moreover, equipment to scan blood vessel patterns is not yet widely available, so it is mostly used in highly specialized environments. Veins in whole palms and in a person’s forehead7 can also be scanned.

Hand geometry

The shape of a person’s hand can be scanned and stored as a mathematical representation. Measurements include finger length, distances between different parts of the hand and the contours of the valleys between knuckles.

DNA

Of all biometric factors, DNA is often seen as the most accurate. Even “identical twins” don’t usually have truly identical DNA.5

However, the precision of DNA and questions about how DNA samples might be used makes many people uncomfortable with it as a potential authentication factor.

A US government study found that people are far more comfortable providing biometric data in the form of fingerprints than DNA.6

Behavioral factors

Behavioral biometrics uses the unique patterns in a person’s activity to identify them. Common behavioral characteristics that are used for authentication include:

Digital gestures and mouse movement

People often have unique behavioral patterns while working on their devices—for example, how they use a touchscreen, or the frequency and fluidity of mouse movement.

Organizations can use machine learning algorithms to analyze these patterns and build models of a user’s typical behavior. The user’s subsequent behavior can be compared to the model for authentication.

Typing dynamics

A person’s keyboarding patterns can also be unique, including typing speed and the shortcuts they commonly use. Typing dynamics can be monitored remotely and unobtrusively, but they are less accurate than fingerprints or iris scans, and a user’s patterns can change over time.

Gait

The way a person walks can be used for authentication. The stride and foot angles can subtly differ from person to person.

Multimodal biometric authentication

Multimodal biometric authentication (MBA) systems use two or more methods of biometric authentication to identify a person. For example, an MBA system might require both a fingerprint scan and a retinal scan, or facial recognition and typing pattern analysis, before allowing a user in.

The intent of multimodal biometric authentication is to significantly strengthen security measures. It is very hard for a hacker to successfully spoof multiple biometric identifiers during the authentication process.

How biometric authentication works

The basic functions of biometric authentication are straightforward. The first step is the enrollment process, when a record of a person’s biometric information is digitally stored in a biometric system. Whenever the user returns to the system to be authenticated, this original template is compared to the user’s characteristics. If the biometric features match, authentication is confirmed.

To save digital storage space and speed the comparison of verifying factors, templates often store only key points. For example, with facial scans, many systems store only specific features of the face rather than the entire face. Sometimes, such as with fingerprint scans, the entire image is stored.

Stored biometric data requires strong data security measures because, if stolen, the data can be used for identity theft. And because biometric data cannot be changed, theft can potentially create a lifetime of difficulty for the victim, putting further personal data at risk.

Biometric systems often use advanced artificial intelligence (AI) to speed the recognition process. Deep learning—and convolutional neural networks (CNNs or ConvNets) in particular—show great promise for identifying patterns in templates and scans, such as for fingerprints.

Mixture of Experts | 21 March, episode 47

Decoding AI: Weekly News Roundup

Join our world-class panel of engineers, researchers, product leaders and more as they cut through the AI noise to bring you the latest in AI news and insights.

Use cases for biometric authentication

Access control

Establishing a person’s digital identity is crucial before granting that person access to sensitive apps or data. Biometric security systems can help prevent presentation attacks, in which a hacker attempts to gain access to a system by spoofing a valid user’s identity.

Biometric authentication measures can also be used to protect sensitive physical locations. Government agencies might use a microchipped passport that contains a photo and fingerprints of the passport holder so that the individual’s identity can be verified against biometric information on file. In healthcare, biometrics can be used to verify that medications are given to a patient and procedures are conducted on the correct person.

Multifactor authentication

Biometric factors can be used with other authentication factors to provide extra cybersecurity to multifactor authentication (MFA) implementations.

MFA might include both information—such as a password—together with a biometric factor—such as a fingerprint scan. By requesting two or more means of identification—at least one of which cannot easily be stolen—MFA makes it harder for attackers to hijack users’ accounts.

Surveillance

Biometric information can be used to observe individuals and track their movements. For example, law enforcement agencies often use the biometric scanning of facial features and fingerprints to identify individuals of interest.

Payments

The use of biometrics for payment processing can help speed the verification of financial transactions and streamline user experience. For example, people can use fingerprint readers to confirm payments on smartphones or voice recognition to verify online banking instructions.

Some physical retail stores are also experimenting with biometric payments, such as the installation of palm readers in Whole Foods stores.7

Benefits of biometric authentication

Biometric authentication systems can provide significant benefits to organizations and consumers. Being both unforgettable and unique, biometrics are often fast and easy to use, quickly providing trustworthy positive identification.

Stronger security

Passwords and ID cards are easier to steal than fingerprints, whereas copying an iris scan or other physical marker is extremely difficult for a hacker (except maybe in the movies).

This is not to say that biometric security systems are perfect. False rejections—when a system wrongly denies a user access—can still happen. False acceptances can also happen, when systems allow the wrong users in.

Some less sophisticated biometric systems can have vulnerabilities to spoofing, such as facial recognition systems that can be fooled by printed photos or prerecorded videos, whether of real people or deep fakes.

Ease of use

Because biometric authentication relies on a physical aspect of a person, that identification is always available. A palm print remains at hand, while a chipped ID card might be misplaced and a complicated password can be forgotten.

Fast identification

Users might be able to log on to equipment, such as a bar code reader in a retail environment, more quickly using biometrics. It generally takes less time to scan a fingerprint than it does to enter a passcode.

Biometrics can also be more secure than passcodes, which are often as simple as “1111111” on shared equipment in retail and similar environments.

Related solutions

Related solutions

IBM Verify: IAM solutions

Modernize identity and complement existing identity tools while providing secure, frictionless access for any identity to AI, apps and resources on premises, in the cloud or as SaaS.

Explore Verify
Enterprise security solutions

Discover intelligent enterprise security solutions and services to help your business prepare today for the cybersecurity threats of tomorrow.

Explore cybersecurity solutions
Identity and access management (IAM) services

Put your workforce and consumer IAM program on the road to success with skills, strategy and support from identity and security experts.

    Explore IAM services
    Take the next step

    Discover IBM Verify, a leading IAM platform that provides AI-powered capabilities for managing your workforce and customer needs. 

    Explore Verify Discover Verify Identity Protection