Biometric has been for long the target of future authentication that expected that biometric authentication will largely displace other means of our current authentication and access control. Biometric systems can be used in two distinct modes as follows.

  • Verification (1–1): determining whether a person is who he claims to be. In the verification mode, the system validates the person’s identity by comparing the captured biometric data with the template stored in the database.
  • Identification (1-n): determining who the person is. In the identification mode, the system identifies the person by searching the templates of all users in the database for a match.

A biometric system operates by firstly acquiring biometric data from an individual, then extracting feature set from the data, and finally comparing the feature set with the template in the database as shown in the below figure.

#authentication #biometrics #computer-vision #artificial-intelligence

Biometric Authentication Methods
1.40 GEEK