A Review on Biometrics Authentication System Using Fingerprint
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.2016Keywords:
Authentication, Biometric, Fingerprint (FP), PatternsAbstract
Technology based on Biometric identification and verification is one leading research area. It deals with the concept analyzing the human body characteristics through Biometric devices for various authentications process. There are many Biometric authentication systems are available for verification process. This paper discusses the role of Fingerprint authentication. FP recognition is highly used biometric technique, because of abundance sources (i.e. ten fingers) availability for collecting data. Discussion on Fingerprint matching techniques, recognition methods and their performance analysis are made in the paper.
References
Y. J. Wang and K. N. Plataniotis, "An analysis of random projection for changeable and privacy-preserving biometric verification," IEEE Transactions on Systems, MAN and Cybernetics, vol. 40, no. 5, pp. 1280-1293, Oct. 2010.
R. Ribalda, G. G. de Rivera, Á. de Castro, and J. Garrido, "A mobile biometric system on-token system for signing digital transactions," IEEE Security & Privacy, vol. 8, no. 2, pp. 13-19, March-April 2010.
M. Bishop and C. Irvine, "New pathways in identity management," vol. 8, no. 6, pp. 64-67, November/December 2010.
S. Kumar and E. Walia, "Analysis of various biometric techniques," International Journal of Computer Science and Information Technologies, vol. 2, no. 4, pp. 1595-1597, January 2011.
Z. M. Win and M. M. Sein, "Fingerprint recognition system for low-quality images," in Proc, the SICE Annual Conference, Waseda University, Tokyo, Japan, pp. 13-18, Sep 2011.
H. Y. Xu, R. N. J. Veldhuis, T. A. M. Kevenaar, and T. A. H. M. Akkermans, "A fast minutiae-based fingerprint recognition system," IEEE Systems Journal, vol. 3, no. 4, Dec. 2009.
J. Luo, S. Z. Lin, J. Y. Ni, and M. Lei, "An improved fingerprint recognition algorithm using EBFNN," Second International Conference on Genetic and Evolutionary Computing, pp. 504-507, IEEE, 2008.
R. Mukesh and V. J. Subashini, "Fingerprint-based authentication system using threshold visual cryptographic technique," IEEE-International Conference on Advances in Engineering, Science and Management, Mar 30-31, pp. 16-19, 2012.
L. F. Lai, S. W. Ho, and H. V. Poor, "Privacy–security trade-offs in biometric security systems—part II: multiple use case," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, March 2011.
B. K. Sy, "Secure computation for biometric data security—application to speaker verification," IEEE Systems Journal, vol. 3, no. 4, December 2009.
L. Gerhardt, D. Crockett, J. Attili, and A. Presler, "Fingerprint imagery using frustrated total internal reflection," in Proc. of the 1986 International Carnahan Conference on Security Technology, pages 251-255, 1986.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.