{"id":362554,"date":"2023-06-23T15:11:25","date_gmt":"2023-06-23T13:11:25","guid":{"rendered":"https:\/\/recogtech.com\/2023\/uncategorized\/5-common-biometric-techniques-compared\/"},"modified":"2025-04-08T08:31:30","modified_gmt":"2025-04-08T06:31:30","slug":"5-common-biometric-techniques-compared","status":"publish","type":"post","link":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/","title":{"rendered":"5 common biometric techniques compared"},"content":{"rendered":"<div><span lang=\"EN-GB\">The best-known forms of biometric security are the fingerprint and iris scan. In addition, facial recognition and vein pattern recognition (of both finger and palm) are also on the rise. In this article, we list the pros and cons of all these forms.<\/span><\/div>\n<h2>1. Fingerprint recognition<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-361458 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/fingerprint600x250.jpg\" alt=\"5 common biometric techniques compared - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/fingerprint600x250.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/fingerprint600x250-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/><\/p>\n<p style=\"font-weight: 400;\">Fingerprint-based identification involves looking at the surface of the finger for special features in the line pattern. The splices, endpoints and islands that form this line pattern are thereby stored as an image.<\/p>\n<p style=\"font-weight: 400;\">The disadvantage of an image with external features is that it can be replicated. Even if stored encrypted. An image remains an image and can therefore be compared, after which you can basically generate the same code. &#8216;Spoofing&#8217;* of fingerprints is already possible with relatively low-threshold technology. Last but not least, a finger presented for recognition doesn\u2019t necessarily needs to be attached to a body anymore\u2026<\/p>\n<p>There are also line patterns that are so similar that, in practice, this leads to a high false acceptance rate.** In addition, fingerprints can wear off; as you get older or as a result of the work you do. As a result, some fingerprints may not be recognised (false rejection**) or may not even be registered. There is even a known hereditary condition that causes people to be born without a finger line pattern(!)<\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, fingerprint-based identification is already known to a wide public, so the method is accepted by many users. The technology is also relatively inexpensive and easy to use. But beware: there are major quality differences between different fingerprint recognition systems, with false acceptance rates and false rejection rates varying enormously.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><em>* Biometric spoofing is offering a falsified biometric to be identified as someone else. This can be something like a counterfeit fingerprint or a contact lens with a fake iris pattern. Spoofing poses a particular risk with forms of biometrics based on superficial external characteristics.<\/em><\/p>\n<p style=\"padding-left: 40px;\"><em>** <span lang=\"EN-GB\">Read more about false acceptance and false rejection in our article <\/span>\u2018<a href=\"#\" target=\"_blank\" rel=\"noopener\">FAR en FRR: security level versus ease of use<\/a>\u2019.<\/em><\/p>\n<div><span lang=\"EN-GB\">Recogtech is the specialist in biometric security. <a href=\"https:\/\/recogtech.com\/en\/palm-id-pro\/\">View our solutions<\/a>.<\/span><\/div>\n<h2>2. Facial recognition<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-361456 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/face-recognition600x250.jpg\" alt=\"5 common biometric techniques compared - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/face-recognition600x250.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/face-recognition600x250-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/><\/p>\n<p style=\"font-weight: 400;\">Facial recognition looks at the extent to which parts of the face match in terms of shape, position and location. Sometimes this also involves paying attention to surface features, such as the skin.<\/p>\n<p>The use of facial recognition for security purposes stems from the deployment of face detection technology: searching for faces in more complex images, which may contain multiple faces. As this technology has developed significantly in recent years, it is a prime candidate for remote recognition. Another plus of the technique is &#8216;negative identification&#8217;, or excluding faces. This makes it a lot easier to scan a crowd for suspicious individuals.<\/p>\n<p>However, facial recognition also has some significant drawbacks. For instance, the technique usually focuses on the face itself, i.e. from the hairline. This usually requires looking straight at the camera to enable recognition. And although the technology is still under development, the level of security so far is not comparable to that of iris scanning or vein pattern recognition.<\/p>\n<h2>3. Iris recognition<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-361460 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/irisherkenning600x250.jpg\" alt=\"5 common biometric techniques compared - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/irisherkenning600x250.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/irisherkenning600x250-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/><\/p>\n<p style=\"font-weight: 400;\">In an iris scan, a scanner reads the unique characteristics of an iris, which are then converted into an encrypted (bar) code. Iris scanning is known as a very good security technique, especially if it is done using infrared light.<\/p>\n<p style=\"font-weight: 400;\">However, a common problem in implementing the technology is user resistance. Quite a few people find it very annoying to have their eyes scanned. People with eye conditions in particular may find the beam of light in their eyes uncomfortable. In addition, one has to adopt a certain posture for the scanner to read the iris, which can cause discomfort. Hygiene is also often cited as an objection, as many systems require users to place their chin on a holder. The same holder that has been used by so many people before.<\/p>\n<p><span style=\"font-weight: 400;\">Finally, it is important to realise that security using an iris scan may come at the expense of speed. Incidentally, systems that can read the iris from a (limited) distance have recently come to exist.<\/span><\/p>\n<p><a href=\"https:\/\/recogtech.com\/en\/contact\/\"><button class=\"button-blog1 button-blog2\">Contact us<\/button><\/a><\/p>\n<h2>4. Finger vein pattern recognition<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-361457 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/finger-vein600x250.jpg\" alt=\"5 common biometric techniques compared - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/finger-vein600x250.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/finger-vein600x250-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/>In recognition based on vein patterns, the endpoints and branches of the veins in the finger are captured as images, digitised and converted into an encrypted code. That, and the fact that veins are not on the surface of the skin but underneath, immediately makes this technique much more secure than fingerprint-based identification. It also works faster and is even easier to use. However, the method is more expensive.<\/p>\n<p><span style=\"font-weight: 400;\">Also something to keep in mind: very cold fingers and &#8216;dead&#8217; fingers (e.g. in the case of so-called Raynaud&#8217;s syndrome) cannot be read (properly) using finger vein pattern recognition. But perhaps the biggest drawback is that this technique is still relatively unknown.<\/span><\/p>\n<h2>5. Palm vein pattern recognition<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-361459 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/handpalm-veins600x250.jpg\" alt=\"5 common biometric techniques compared - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/handpalm-veins600x250.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/handpalm-veins600x250-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/>This technique is also based on recognition of unique vein patterns. But because this occurs at even more reference points than vein pattern recognition in the finger, palm vein pattern recognition is an even safer and simpler means of identification. The technique, which is very difficult if not impossible to copy, is currently considered the best available method in biometric security, along with iris recognition. Palm scanning works quickly and accurately, and the ease of use is great.<\/p>\n<p style=\"font-weight: 400;\">Access control based on the vein pattern in the palm of the hand is a very secure system. As a result, it is mainly used within industries with high security requirements, such as the government, judicial and banking sectors.<\/p>\n<p><span style=\"font-weight: 400;\">Note: it is still sometimes the case that this form of recognition is confused with hand geometry. However, that is an outdated form of biometrics, which is based on the shape of the hand and has even fewer unique features than the fingerprint. <\/span>Want to know more or looking for a biometric security solution for your organisation?<\/p>\n<p><a href=\"https:\/\/recogtech.com\/en\/contact\/\"><button class=\"button-blog1 button-blog2\">Contact us<\/button><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The best-known forms of biometric security are the fingerprint and iris scan. In addition, facial recognition and vein pattern recognition (of both finger and palm) are also on the rise.<\/p>\n","protected":false},"author":2,"featured_media":362107,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[35],"tags":[],"class_list":["post-362554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 common biometric techniques | Recogtech<\/title>\n<meta name=\"description\" content=\"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 common biometric techniques | Recogtech\" \/>\n<meta property=\"og:description\" content=\"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com\" \/>\n<meta property=\"og:url\" content=\"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/\" \/>\n<meta property=\"og:site_name\" content=\"Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-23T13:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T06:31:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Justi Veenhof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justi Veenhof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/\"},\"author\":{\"name\":\"Justi Veenhof\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\"},\"headline\":\"5 common biometric techniques compared\",\"datePublished\":\"2023-06-23T13:11:25+00:00\",\"dateModified\":\"2025-04-08T06:31:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/\"},\"wordCount\":982,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-04.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/\",\"name\":\"5 common biometric techniques | Recogtech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-04.jpg\",\"datePublished\":\"2023-06-23T13:11:25+00:00\",\"dateModified\":\"2025-04-08T06:31:30+00:00\",\"description\":\"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#primaryimage\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-04.jpg\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-04.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"De basics van biometrie - Recogtech\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/5-common-biometric-techniques-compared\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 common biometric techniques compared\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"name\":\"Recogtech - Biometrische beveiliging\",\"description\":\"High-end Biometric Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/recogtech.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\",\"name\":\"Recogtech B.V.\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"width\":600,\"height\":111,\"caption\":\"Recogtech B.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\",\"name\":\"Justi Veenhof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"caption\":\"Justi Veenhof\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 common biometric techniques | Recogtech","description":"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/","og_locale":"en_US","og_type":"article","og_title":"5 common biometric techniques | Recogtech","og_description":"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com","og_url":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/","og_site_name":"Recogtech - Biometrische beveiliging","article_published_time":"2023-06-23T13:11:25+00:00","article_modified_time":"2025-04-08T06:31:30+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg","type":"image\/jpeg"}],"author":"Justi Veenhof","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Justi Veenhof","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#article","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/"},"author":{"name":"Justi Veenhof","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735"},"headline":"5 common biometric techniques compared","datePublished":"2023-06-23T13:11:25+00:00","dateModified":"2025-04-08T06:31:30+00:00","mainEntityOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/"},"wordCount":982,"commentCount":0,"publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg","articleSection":["Insights"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/","url":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/","name":"5 common biometric techniques | Recogtech","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#primaryimage"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg","datePublished":"2023-06-23T13:11:25+00:00","dateModified":"2025-04-08T06:31:30+00:00","description":"What are the main advantages and disadvantages of biometric techniques? Read it now on recogtech.com","breadcrumb":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#primaryimage","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-04.jpg","width":1920,"height":1080,"caption":"De basics van biometrie - Recogtech"},{"@type":"BreadcrumbList","@id":"https:\/\/recogtech.com\/en\/insights-en\/5-common-biometric-techniques-compared\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/recogtech.com\/en\/"},{"@type":"ListItem","position":2,"name":"5 common biometric techniques compared"}]},{"@type":"WebSite","@id":"https:\/\/recogtech.com\/en\/#website","url":"https:\/\/recogtech.com\/en\/","name":"Recogtech - Biometrische beveiliging","description":"High-end Biometric Security","publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/recogtech.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/recogtech.com\/en\/#organization","name":"Recogtech B.V.","url":"https:\/\/recogtech.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","width":600,"height":111,"caption":"Recogtech B.V."},"image":{"@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735","name":"Justi Veenhof","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","caption":"Justi Veenhof"}}]}},"_links":{"self":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/comments?post=362554"}],"version-history":[{"count":2,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362554\/revisions"}],"predecessor-version":[{"id":365086,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362554\/revisions\/365086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media\/362107"}],"wp:attachment":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media?parent=362554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/categories?post=362554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/tags?post=362554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}