Biometric recognition acts within an information system as the automated process used to identify individuals based on their biological traits or behavioral characteristics. Examples include fingerprint recognition, face recognition, iris scanning, and voice recognition. Users’ biometric data could consist of their fingerprints, hand geometry, palm veins, height, retina, iris color and size, voice, and signature.
Biometric systems consist of sensing, feature extraction, and feature matching, which carry out the biometric recognition algorithms. Biometric sensors, such as a fingerprint sensor, scan the individual’s biometric trait to generate its digital representation. The system can then analyze the data and reconstruct that identity, able to recognize it going forward.
Biometric recognition information systems function mainly in two capacities – User Verification, i.e., biometric authentication, and User Identification. Biometric authentication is a security identification system used to match biometric characteristics to a user to verify that they are who they claim. User identification then takes the systems-based approach to cross-reference that information against a database and check for any associated patterns or account information.
Biometric recognition uses vary across industries and platforms, ranging from law enforcement and government agencies to retail and financial institutions. Many people will encounter it daily to unlock phones or for home access control.