2021
DOI: 10.7717/peerj-cs.707
|View full text |Cite
|
Sign up to set email alerts
|

Hand-based multibiometric systems: state-of-the-art and future challenges

Abstract: The traditional methods used for the identification of individuals such as personal identification numbers (PINs), identification tags, etc., are vulnerable as they are easily compromised by the hackers. In this paper, we aim to focus on the existing multibiometric systems that use hand based modalities for the identification of individuals. We cover the existing multibiometric systems in the context of various feature extraction schemes, along with an analysis of their performance using one of the performance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 157 publications
0
5
0
Order By: Relevance
“…Owing to the rapid development and variety of IIoT devices, decentralized systems, third-party contractor access, inconsistent segmentation for various connections, and network dead spots should all be considered vulnerability protection considerations. Given that GBI decision-making participants may be spread out and possibly at a distance from one another, as well as the possibility that they may use mobile devices for data collection, reporting, and other purposes, biometric methods and tools [1,35] can be used for authentication and access for secure collaboration. A security analysis of communications and ongoing monitoring of transmission and processing delays are required to prevent cyber security incidents and to boost security.…”
Section: Security and Ethical Issuesmentioning
confidence: 99%
“…Owing to the rapid development and variety of IIoT devices, decentralized systems, third-party contractor access, inconsistent segmentation for various connections, and network dead spots should all be considered vulnerability protection considerations. Given that GBI decision-making participants may be spread out and possibly at a distance from one another, as well as the possibility that they may use mobile devices for data collection, reporting, and other purposes, biometric methods and tools [1,35] can be used for authentication and access for secure collaboration. A security analysis of communications and ongoing monitoring of transmission and processing delays are required to prevent cyber security incidents and to boost security.…”
Section: Security and Ethical Issuesmentioning
confidence: 99%
“…The multi-biometric systems that identify people using hand-based modalities are the subject of this work. Additionally, it discusses alternative feature extraction strategies and analyses their effectiveness using one of the biometric systems' performance indicators [26]. The proposed bio-cryptosystem maintains cancellable feature vectors online in encrypted form, which was utilised to identify or validate the subjects following decryptions [27].…”
Section: Introductionmentioning
confidence: 99%
“…This new combined biometric data are used for feature extraction. 5 • Feature level: in this sort of fusion, biometric traits are taken from the sensor. These traits are reprocessed, and features are extracted and combined to form a fused feature vector, which is utilized for authentication.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, it integrates samples gathered from a single biometric using the same or separate sensors. This new combined biometric data are used for feature extraction 5 …”
Section: Introductionmentioning
confidence: 99%