2019
DOI: 10.3390/sym11020141
|View full text |Cite
|
Sign up to set email alerts
|

Security and Accuracy of Fingerprint-Based Biometrics: A Review

Abstract: Biometric systems are increasingly replacing traditional password-and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of exis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
99
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 173 publications
(101 citation statements)
references
References 69 publications
0
99
2
Order By: Relevance
“…For example, by touching a surface, someone fingerprint could be captured. 25 A biometric system is susceptible to attack in about eight different points. 26 The vulnerable points of attack are numbered as shown in Figure 2.…”
Section: Biometric Security and Privacy Challengesmentioning
confidence: 99%
“…For example, by touching a surface, someone fingerprint could be captured. 25 A biometric system is susceptible to attack in about eight different points. 26 The vulnerable points of attack are numbered as shown in Figure 2.…”
Section: Biometric Security and Privacy Challengesmentioning
confidence: 99%
“…Fingerprint authentication involves two stages: enrolment and verification [15,16]. During the enrolment stage, a fingerprint image is acquired from a sensor and is then processed in order to extract unique features.…”
Section: Fingerprint Authenticationmentioning
confidence: 99%
“…In their study, the user"s identity is concealed in the thinned fingerprint image during enrollment and a fingerprint template stored in an online database for authentication. They claimed that applying such a system, it is impracticable for the attacker to expose the individuality of the user from stealing the template collected from a compromised online template database [21]. www.ijacsa.thesai.org [51], [53] Matching scores transmission Hill climbs Trusted sensor (Mutual authentication); Secure channel [53], [54], [57] Manipulation of match score Secure channel; Communal authentication between matcher and decision components [53] Component replacement ("yes machine") Significant components [53] Decision Hill climbs Communal Authentication; Secure channel [53], [54], [57] Communication to application Eavesdropping Data Transmitted over an encrypted path/secure [51]- [54] Manipulation of match decision Data Transmitted over an encrypted path [53] Liu et al [22] considered a cryptographic technique of secret transmission encryption to encode a plaintext for multi recipients and hide the recipients" identities.…”
Section: A Vulnerabilities Attacks Of Biometric Template In the Datamentioning
confidence: 99%