Security and Accuracy of Fingerprint-Based Biometrics: A Review

Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest...

Full description

Saved in:
Bibliographic Details
Published inSymmetry (Basel) Vol. 11; no. 2; p. 141
Main Authors Yang, Wencheng, Wang, Song, Hu, Jiankun, Zheng, Guanglou, Valli, Craig
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.02.2019
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper.
AbstractList Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper.
Author Wang, Song
Valli, Craig
Zheng, Guanglou
Yang, Wencheng
Hu, Jiankun
Author_xml – sequence: 1
  givenname: Wencheng
  orcidid: 0000-0001-7800-2215
  surname: Yang
  fullname: Yang, Wencheng
– sequence: 2
  givenname: Song
  orcidid: 0000-0002-0239-7991
  surname: Wang
  fullname: Wang, Song
– sequence: 3
  givenname: Jiankun
  surname: Hu
  fullname: Hu, Jiankun
– sequence: 4
  givenname: Guanglou
  orcidid: 0000-0002-2307-9562
  surname: Zheng
  fullname: Zheng, Guanglou
– sequence: 5
  givenname: Craig
  surname: Valli
  fullname: Valli, Craig
BookMark eNptkE9LAzEQxYNUsGpPfoGAR1lNMkm660XaYlUoCP45LzE7kZQ2W5NU2W_vSj0UcS4zA783b3jHZBDagISccXYJULGr1K05Z4JxyQ_IULAxFGVVycHefERGKS1ZX4opqdmQ3Dyj3UafO2pCQye2X4ztaOvo3Id3jJvoQy6mJmFDp75dY47epms6oU_46fHrlBw6s0o4-u0n5HV--zK7LxaPdw-zyaKwoGUu3rht0KJwjmsntbZOV9oCSKWRaz4GoyXnDrSRTJWirARnZWMMYOmgKhWckPPd3U1sP7aYcr1stzH0lrVQiokxCICeuthRNrYpRXR1___axK7mrP4Jqd4Lqaf5H9r6bLJvQ47Gr_7VfAPwWWnm
CitedBy_id crossref_primary_10_1016_j_chaos_2023_113614
crossref_primary_10_1002_spy2_124
crossref_primary_10_1007_s11554_023_01349_w
crossref_primary_10_1109_OJCS_2022_3183003
crossref_primary_10_1177_02666669221085709
crossref_primary_10_1109_ACCESS_2020_3043689
crossref_primary_10_1080_09720529_2022_2075089
crossref_primary_10_1038_s41598_021_94815_z
crossref_primary_10_1016_j_engappai_2025_110586
crossref_primary_10_1007_s42044_021_00081_7
crossref_primary_10_3390_app10248994
crossref_primary_10_1049_ise2_12024
crossref_primary_10_1088_1742_6596_1804_1_012043
crossref_primary_10_1038_s41528_024_00367_3
crossref_primary_10_32604_csse_2023_031893
crossref_primary_10_38124_ijisrt_IJISRT24JUN1024
crossref_primary_10_1038_s41598_019_49792_9
crossref_primary_10_21833_ijaas_2024_06_010
crossref_primary_10_1016_j_patrec_2023_08_006
crossref_primary_10_1088_2631_8695_ada667
crossref_primary_10_3390_su142214915
crossref_primary_10_1007_s13042_025_02587_z
crossref_primary_10_1038_s41598_021_04652_3
crossref_primary_10_1109_JIOT_2022_3199995
crossref_primary_10_3390_electronics13142849
crossref_primary_10_1145_3422816
crossref_primary_10_1109_JBHI_2021_3109595
crossref_primary_10_1007_s11042_020_10291_z
crossref_primary_10_1007_s11831_021_09560_3
crossref_primary_10_1109_ACCESS_2025_3539502
crossref_primary_10_21202_2782_2923_2024_4_912_925
crossref_primary_10_1155_2021_5545488
crossref_primary_10_1088_2631_8695_adbb3c
crossref_primary_10_48175_IJARSCT_22659
crossref_primary_10_1109_JSEN_2022_3176248
crossref_primary_10_3390_bios12090700
crossref_primary_10_3390_s21186163
crossref_primary_10_1016_j_patcog_2021_108074
crossref_primary_10_47277_IJCNCS_8_6_1
crossref_primary_10_54569_aair_1303116
crossref_primary_10_1016_j_inffus_2021_10_004
crossref_primary_10_28925_2663_4023_2024_25_200214
crossref_primary_10_1088_1742_6596_1714_1_012016
crossref_primary_10_1007_s10067_022_06353_2
crossref_primary_10_1016_j_cose_2021_102583
crossref_primary_10_1007_s42044_023_00157_6
crossref_primary_10_3390_technologies7020034
crossref_primary_10_1080_19393555_2021_1873464
crossref_primary_10_3390_s23010508
crossref_primary_10_1109_TIP_2024_3381771
crossref_primary_10_1007_s11042_023_15710_5
crossref_primary_10_3390_electronics9122143
crossref_primary_10_1007_s13369_021_05390_4
crossref_primary_10_1016_j_jisa_2022_103209
crossref_primary_10_32478_leadership_v6i1_2771
crossref_primary_10_1002_adsr_202300074
crossref_primary_10_3390_s23073566
crossref_primary_10_1007_s11042_022_13070_0
crossref_primary_10_3390_app13137811
crossref_primary_10_3390_mti6120107
crossref_primary_10_1109_ACCESS_2021_3076756
crossref_primary_10_1002_sdtp_16620
crossref_primary_10_4018_IJSSCI_300358
crossref_primary_10_1007_s11042_024_19692_w
crossref_primary_10_1155_2022_2309934
crossref_primary_10_1109_ACCESS_2019_2932400
crossref_primary_10_1186_s13635_022_00129_6
crossref_primary_10_1002_jsid_1060
crossref_primary_10_1016_j_patcog_2020_107735
crossref_primary_10_1049_cit2_12283
crossref_primary_10_1016_j_cose_2019_101690
crossref_primary_10_1016_j_compeleceng_2021_107387
crossref_primary_10_3390_electronics13224499
crossref_primary_10_2478_ama_2024_0040
crossref_primary_10_1002_spy2_305
crossref_primary_10_1007_s10462_024_10847_7
crossref_primary_10_3390_s24154805
crossref_primary_10_1007_s12065_023_00850_2
crossref_primary_10_1007_s11042_020_09529_7
crossref_primary_10_1016_j_compeleceng_2024_109894
crossref_primary_10_1016_j_procs_2023_10_622
crossref_primary_10_1007_s11042_020_10095_1
crossref_primary_10_1002_sdtp_16182
crossref_primary_10_4018_IJISMD_2020010103
crossref_primary_10_1109_JIOT_2024_3408031
crossref_primary_10_1155_2022_3502463
crossref_primary_10_1109_ACCESS_2022_3218335
crossref_primary_10_1080_19393555_2020_1813354
crossref_primary_10_1007_s10044_022_01080_5
crossref_primary_10_48175_IJARSCT_3588
crossref_primary_10_1109_LED_2022_3189211
crossref_primary_10_1016_j_compeleceng_2024_109485
crossref_primary_10_1007_s12652_021_03316_4
crossref_primary_10_1016_j_procs_2024_08_009
crossref_primary_10_1007_s40010_025_00917_y
crossref_primary_10_1109_JIOT_2024_3361801
crossref_primary_10_29026_oea_2024_240122
Cites_doi 10.1016/j.jnca.2009.12.003
10.1016/j.patcog.2016.01.001
10.1007/11527923_32
10.1016/j.patcog.2013.10.003
10.1007/s10623-005-6343-z
10.1016/j.neucom.2016.06.083
10.1145/319709.319714
10.1109/ICIEA.2011.5975740
10.1109/MSECP.2003.1193209
10.1109/TCSVT.2003.818349
10.1007/s00500-018-3182-1
10.1007/3-540-45344-X_32
10.1109/TPAMI.2006.20
10.1007/978-3-319-05885-6_3
10.1109/TIFS.2015.2398817
10.1016/j.cose.2011.02.003
10.1007/978-3-642-40597-6_12
10.1155/2008/579416
10.1109/LSP.2016.2636158
10.1109/CISP.2013.6743946
10.1038/nature14539
10.1016/j.future.2010.11.024
10.1109/TSMCB.2007.896999
10.1109/TPAMI.2010.52
10.1109/CISP.2013.6743950
10.1142/S0219467808003209
10.1155/2018/7107295
10.1109/JSEN.2016.2633973
10.1109/MSP.2015.2427849
10.1007/978-0-387-71041-9
10.1049/iet-bmt.2017.0171
10.1016/j.patcog.2004.04.011
10.1109/PST.2016.7907000
10.1109/INFOMAN.2018.8392815
10.1109/TPAMI.2007.1004
10.1109/BTAS.2013.6712750
10.1109/ICB2018.2018.00019
10.1109/TIFS.2007.908165
10.1007/s11227-018-2266-0
10.1109/CISP.2008.742
10.1016/j.patcog.2018.01.026
10.1007/978-3-540-45226-3_169
10.1109/ICARCV.2010.5707945
10.1109/TPAMI.2014.2302450
10.1109/ACCESS.2015.2445336
10.1007/978-981-10-7895-8_15
10.1109/JBHI.2016.2546300
10.1109/TrustCom.2012.23
10.1109/TPAMI.2014.2330609
10.1049/iet-bmt.2016.0008
10.1016/j.patcog.2013.10.001
10.1147/sj.403.0614
10.1007/s10489-018-1311-2
10.1049/el.2018.0621
10.1016/j.jnca.2018.04.013
10.1108/SR-07-2017-0131
10.1109/TIFS.2012.2215326
10.1007/978-3-540-24676-3_31
10.1016/j.patcog.2016.08.017
10.1016/j.patrec.2010.12.015
10.17512/jamcm.2017.2.14
10.1016/j.patcog.2012.05.004
10.1587/elex.4.724
10.1109/RAIT.2018.8389007
10.1016/S1363-4127(02)00407-7
ContentType Journal Article
Copyright 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SC
7SR
7U5
8BQ
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
H8D
HCIFZ
JG9
JQ2
L6V
L7M
L~C
L~D
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.3390/sym11020141
DatabaseName CrossRef
Computer and Information Systems Abstracts
Engineered Materials Abstracts
Solid State and Superconductivity Abstracts
METADEX
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One
ProQuest Central
Aerospace Database
SciTech Premium Collection
Materials Research Database
ProQuest Computer Science Collection
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Engineering Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering collection
DatabaseTitle CrossRef
Publicly Available Content Database
Materials Research Database
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
Aerospace Database
Engineered Materials Abstracts
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Engineering Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
METADEX
Computer and Information Systems Abstracts Professional
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Solid State and Superconductivity Abstracts
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2073-8994
ExternalDocumentID 10_3390_sym11020141
GeographicLocations Australia
United States--US
GeographicLocations_xml – name: United States--US
– name: Australia
GroupedDBID 5VS
8FE
8FG
AADQD
AAYXX
ABDBF
ABJCF
ACUHS
ADBBV
ADMLS
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
AMVHM
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
E3Z
ESX
GX1
HCIFZ
IAO
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
PHGZM
PHGZT
PIMPY
PROAC
PTHSS
TR2
TUS
7SC
7SR
7U5
8BQ
8FD
ABUWG
AZQEC
DWQXO
H8D
JG9
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c364t-b1cdece2ff16f466cf696c33456e16173a6411f36a40582892108daa3e8f39853
IEDL.DBID BENPR
ISSN 2073-8994
IngestDate Fri Jul 25 11:59:27 EDT 2025
Thu Apr 24 23:03:24 EDT 2025
Tue Jul 01 03:25:18 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c364t-b1cdece2ff16f466cf696c33456e16173a6411f36a40582892108daa3e8f39853
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7800-2215
0000-0002-2307-9562
0000-0002-0239-7991
OpenAccessLink https://www.proquest.com/docview/2550273233?pq-origsite=%requestingapplication%
PQID 2550273233
PQPubID 2032326
ParticipantIDs proquest_journals_2550273233
crossref_primary_10_3390_sym11020141
crossref_citationtrail_10_3390_sym11020141
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-02-01
PublicationDateYYYYMMDD 2019-02-01
PublicationDate_xml – month: 02
  year: 2019
  text: 2019-02-01
  day: 01
PublicationDecade 2010
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Symmetry (Basel)
PublicationYear 2019
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Wang (ref_42) 2016; 54
ref_14
Teoh (ref_56) 2007; 4
ref_13
ref_57
ref_12
ref_11
ref_55
ref_10
Yang (ref_75) 2018; 74
ref_53
Alam (ref_67) 2018; 115
Jung (ref_28) 2018; 54
Jin (ref_34) 2004; 37
ref_52
ref_51
Ratha (ref_33) 2007; 29
ref_18
Schuckers (ref_22) 2002; 7
ref_15
Cappelli (ref_70) 2006; 28
Liu (ref_76) 2011; 32
Yang (ref_77) 2014; 47
Yang (ref_48) 2018; 2018
Riaz (ref_2) 2017; 38
ref_61
Tipton (ref_17) 2014; 3
ref_24
ref_68
ref_23
ref_66
ref_21
Prabhakar (ref_3) 2003; 1
ref_20
ref_64
ref_62
Rattani (ref_84) 2018; 7
ref_29
Arora (ref_73) 2014; 36
Wojciechowska (ref_83) 2017; 16
LeCun (ref_69) 2015; 521
Ferrara (ref_45) 2012; 7
Wang (ref_40) 2012; 45
ref_71
Jain (ref_16) 2004; 14
Li (ref_60) 2010; 33
Lee (ref_35) 2007; 37
Cappelli (ref_44) 2010; 32
Spolaor (ref_82) 2016; 14
Galbally (ref_26) 2012; 28
Cao (ref_72) 2014; 36
Nandakumar (ref_74) 2015; 32
ref_36
ref_79
Zheng (ref_6) 2017; 21
ref_31
ref_30
Menotti (ref_78) 2015; 10
Yang (ref_50) 2018; 78
Zheng (ref_5) 2016; 17
Zheng (ref_7) 2015; 3
Nandakumar (ref_58) 2007; 2
Zhang (ref_59) 2011; 30
Sandhya (ref_49) 2017; 6
ref_38
ref_37
Ratha (ref_32) 2001; 40
ref_81
ref_80
Wang (ref_41) 2014; 47
Jain (ref_19) 2008; 2008
ref_47
ref_46
ref_43
Juels (ref_54) 2006; 38
ref_1
Coli (ref_25) 2008; 8
Wang (ref_39) 2017; 61
ref_9
Kim (ref_27) 2017; 24
ref_8
Karthi (ref_63) 2013; 2
ref_4
Liu (ref_65) 2017; 259
References_xml – volume: 33
  start-page: 207
  year: 2010
  ident: ref_60
  article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2009.12.003
– ident: ref_9
– volume: 54
  start-page: 14
  year: 2016
  ident: ref_42
  article-title: A blind system identification approach to cancelable fingerprint templates
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2016.01.001
– ident: ref_57
  doi: 10.1007/11527923_32
– volume: 47
  start-page: 1321
  year: 2014
  ident: ref_41
  article-title: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2013.10.003
– volume: 38
  start-page: 237
  year: 2006
  ident: ref_54
  article-title: A fuzzy vault scheme
  publication-title: Des. Codes Cryptogr.
  doi: 10.1007/s10623-005-6343-z
– volume: 259
  start-page: 3
  year: 2017
  ident: ref_65
  article-title: Encrypted domain matching of fingerprint minutia cylinder-code (MCC) with I1 minimization
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2016.06.083
– ident: ref_52
  doi: 10.1145/319709.319714
– ident: ref_62
  doi: 10.1109/ICIEA.2011.5975740
– volume: 3
  start-page: 482
  year: 2014
  ident: ref_17
  article-title: iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id
  publication-title: Int. J. Comput. Inf. Technol.
– volume: 1
  start-page: 33
  year: 2003
  ident: ref_3
  article-title: Biometric recognition: Security and privacy concerns
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSECP.2003.1193209
– volume: 14
  start-page: 4
  year: 2004
  ident: ref_16
  article-title: An introduction to biometric recognition
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2003.818349
– ident: ref_31
  doi: 10.1007/s00500-018-3182-1
– ident: ref_18
  doi: 10.1007/3-540-45344-X_32
– ident: ref_61
– volume: 28
  start-page: 3
  year: 2006
  ident: ref_70
  article-title: Performance evaluation of fingerprint verification systems
  publication-title: IEEE Trans. Pattern Anal. Mach. Intel.
  doi: 10.1109/TPAMI.2006.20
– ident: ref_4
  doi: 10.1007/978-3-319-05885-6_3
– volume: 10
  start-page: 864
  year: 2015
  ident: ref_78
  article-title: Deep representations for iris, face, and fingerprint spoofing detection
  publication-title: IEEE Trans. Inf. Foren. Sec.
  doi: 10.1109/TIFS.2015.2398817
– volume: 30
  start-page: 311
  year: 2011
  ident: ref_59
  article-title: A pitfall in fingerprint bio-cryptographic key generation
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2011.02.003
– ident: ref_8
  doi: 10.1007/978-3-642-40597-6_12
– volume: 2008
  start-page: 1
  year: 2008
  ident: ref_19
  article-title: Biometric template security
  publication-title: EURASIP J. Adv. Signal Process.
  doi: 10.1155/2008/579416
– volume: 24
  start-page: 51
  year: 2017
  ident: ref_27
  article-title: Fingerprint liveness detection using local coherence patterns
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2016.2636158
– ident: ref_66
  doi: 10.1109/CISP.2013.6743946
– volume: 521
  start-page: 436
  year: 2015
  ident: ref_69
  article-title: Deep learning
  publication-title: Nature
  doi: 10.1038/nature14539
– ident: ref_10
– volume: 28
  start-page: 311
  year: 2012
  ident: ref_26
  article-title: A high performance fingerprint liveness detection method based on quality related features
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2010.11.024
– volume: 37
  start-page: 980
  year: 2007
  ident: ref_35
  article-title: Alignment-free cancelable fingerprint templates based on local minutiae information
  publication-title: IEEE Trans. Syst. Man Cybern. Part B Cybern.
  doi: 10.1109/TSMCB.2007.896999
– volume: 32
  start-page: 2128
  year: 2010
  ident: ref_44
  article-title: Minutia cylinder-code: A new representation and matching technique for fingerprint recognition
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2010.52
– ident: ref_81
  doi: 10.1109/CISP.2013.6743950
– volume: 8
  start-page: 495
  year: 2008
  ident: ref_25
  article-title: Fingerprint silicon replicas: Static and dynamic features for vitality detection using an optical capture device
  publication-title: Int. J. Image Graphics
  doi: 10.1142/S0219467808003209
– volume: 2018
  start-page: 17
  year: 2018
  ident: ref_48
  article-title: Biometrics based Privacy-Preserving Authentication and Mobile Template Protection
  publication-title: Wirel. Commun. Mobile Comput.
  doi: 10.1155/2018/7107295
– volume: 17
  start-page: 562
  year: 2016
  ident: ref_5
  article-title: Ideas and challenges for securing wireless implantable medical devices: A review
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2016.2633973
– ident: ref_13
– volume: 32
  start-page: 88
  year: 2015
  ident: ref_74
  article-title: Biometric template protection: Bridging the performance gap between theory and practice
  publication-title: IEEE Signal Process. Mag.
  doi: 10.1109/MSP.2015.2427849
– ident: ref_1
  doi: 10.1007/978-0-387-71041-9
– volume: 7
  start-page: 423
  year: 2018
  ident: ref_84
  article-title: Convolutional neural networks for gender prediction from smartphone-based ocular images
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2017.0171
– volume: 37
  start-page: 2245
  year: 2004
  ident: ref_34
  article-title: Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2004.04.011
– ident: ref_20
– ident: ref_23
  doi: 10.1109/PST.2016.7907000
– ident: ref_80
  doi: 10.1109/INFOMAN.2018.8392815
– volume: 14
  start-page: 87
  year: 2016
  ident: ref_82
  article-title: Biometric authentication methods on smartphones: A survey
  publication-title: PsychNology J.
– ident: ref_53
– volume: 29
  start-page: 561
  year: 2007
  ident: ref_33
  article-title: Generating cancelable fingerprint templates
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2007.1004
– ident: ref_30
– ident: ref_71
  doi: 10.1109/BTAS.2013.6712750
– ident: ref_24
– ident: ref_47
  doi: 10.1109/ICB2018.2018.00019
– volume: 2
  start-page: 744
  year: 2007
  ident: ref_58
  article-title: Fingerprint-based fuzzy vault: Implementation and performance
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2007.908165
– volume: 74
  start-page: 4893
  year: 2018
  ident: ref_75
  article-title: ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-018-2266-0
– ident: ref_36
  doi: 10.1109/CISP.2008.742
– volume: 78
  start-page: 242
  year: 2018
  ident: ref_50
  article-title: A fingerprint and finger-vein based cancelable multi-biometric system
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2018.01.026
– ident: ref_11
– ident: ref_21
  doi: 10.1007/978-3-540-45226-3_169
– ident: ref_38
  doi: 10.1109/ICARCV.2010.5707945
– volume: 2
  start-page: 381
  year: 2013
  ident: ref_63
  article-title: Hybrid multimodal template protection technique using fuzzy extractor and random projection
  publication-title: IJRCCT
– volume: 36
  start-page: 1847
  year: 2014
  ident: ref_72
  article-title: Segmentation and enhancement of latent fingerprints: A coarse to fine ridgestructure dictionary
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2014.2302450
– ident: ref_37
– ident: ref_14
– volume: 3
  start-page: 825
  year: 2015
  ident: ref_7
  article-title: Encryption for implantable medical devices using modified one-time pads
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2015.2445336
– ident: ref_29
  doi: 10.1007/978-981-10-7895-8_15
– volume: 21
  start-page: 655
  year: 2017
  ident: ref_6
  article-title: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks
  publication-title: IEEE J. Biomed. Health Inf.
  doi: 10.1109/JBHI.2016.2546300
– ident: ref_64
  doi: 10.1109/TrustCom.2012.23
– volume: 36
  start-page: 2452
  year: 2014
  ident: ref_73
  article-title: Latent fingerprint matching: Performance gain via feedback from exemplar prints
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2014.2330609
– volume: 6
  start-page: 173
  year: 2017
  ident: ref_49
  article-title: Securing fingerprint templates using fused structures
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2016.0008
– volume: 47
  start-page: 1309
  year: 2014
  ident: ref_77
  article-title: An Alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2013.10.001
– ident: ref_79
– volume: 40
  start-page: 614
  year: 2001
  ident: ref_32
  article-title: Enhancing security and privacy in biometrics-based authentication systems
  publication-title: IBM Syst. J.
  doi: 10.1147/sj.403.0614
– ident: ref_51
  doi: 10.1007/s10489-018-1311-2
– volume: 54
  start-page: 564
  year: 2018
  ident: ref_28
  article-title: Fingerprint liveness map construction using convolutional neural network
  publication-title: Electron. Lett.
  doi: 10.1049/el.2018.0621
– volume: 115
  start-page: 20
  year: 2018
  ident: ref_67
  article-title: An alignment-free cancelable fingerprint template for bio-cryptosystems
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2018.04.013
– ident: ref_46
– volume: 38
  start-page: 120
  year: 2017
  ident: ref_2
  article-title: Biometric template security: An overview
  publication-title: Sensor Rev.
  doi: 10.1108/SR-07-2017-0131
– ident: ref_12
– volume: 7
  start-page: 1727
  year: 2012
  ident: ref_45
  article-title: Non-invertible minutia cylinder-code representation
  publication-title: IEEE Trans. Inf. Foren. Sec.
  doi: 10.1109/TIFS.2012.2215326
– ident: ref_55
  doi: 10.1007/978-3-540-24676-3_31
– ident: ref_15
– volume: 61
  start-page: 447
  year: 2017
  ident: ref_39
  article-title: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2016.08.017
– volume: 32
  start-page: 666
  year: 2011
  ident: ref_76
  article-title: A key binding system based on n-nearest minutiae structure of fingerprint
  publication-title: Pattern Recogn. Lett.
  doi: 10.1016/j.patrec.2010.12.015
– volume: 16
  start-page: 173
  year: 2017
  ident: ref_83
  article-title: The overview of trends and challenges in mobile biometrics
  publication-title: J. Appl. Mathem. Comput. Mech.
  doi: 10.17512/jamcm.2017.2.14
– volume: 45
  start-page: 4129
  year: 2012
  ident: ref_40
  article-title: Alignment-free cancellable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
  publication-title: Pattern Recogn.
  doi: 10.1016/j.patcog.2012.05.004
– ident: ref_43
– volume: 4
  start-page: 724
  year: 2007
  ident: ref_56
  article-title: Secure biometric template protection in fuzzy commitment scheme
  publication-title: IEICE Electron. Exp.
  doi: 10.1587/elex.4.724
– ident: ref_68
  doi: 10.1109/RAIT.2018.8389007
– volume: 7
  start-page: 56
  year: 2002
  ident: ref_22
  article-title: Spoofing and anti-spoofing measures
  publication-title: Inf. Secur. Tech. Rep.
  doi: 10.1016/S1363-4127(02)00407-7
SSID ssj0000505460
Score 2.536971
SecondaryResourceType review_article
Snippet Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 141
SubjectTerms Accuracy
Biometrics
Boundaries
Financial services
Fingerprinting
Fingerprints
Law enforcement
Passwords
Recognition
Security
Security management
Sensors
Smartphones
Systems design
User interface
Title Security and Accuracy of Fingerprint-Based Biometrics: A Review
URI https://www.proquest.com/docview/2550273233
Volume 11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NT8IwFH9RuHgx4kdEkfTAQU0aGC1d58WAYRATiTGScFu6bj3pQDcP_Pe-bgUlMR6btTu8l773ex99P4BOwBJE2T1NFYIFyoViNDZcUyMkwyNJ4JVsDU8zMZ3zx8Vg4RJuuWur3NjE0lAnS21z5F2Evnb0Sp-x-9UHtaxRtrrqKDT2oY4mWMoa1Efj2fPLNstiedq46FUP8xjG9918_Y4er2_7G3dd0a4lLt1LeASHDheSYaXIBuyl2TE03M3LybUbD31zgvDaUc4RlSVkqHGh9JosDQnLFJ3N1BV0hN4pISP7uN7O4M_vyJBUdYBTmIfj14cpdTQIVDPBCxp7Okl12jfGE4YLoY0IhGYMoU9qoxOmBPc8w4RC8GUDKIziZKIUS6VhAbrjM6hlyyw9B-KbgHMfpRhLn8cDI30pjC3tGR1g4CWacLuRSKTdjHBLVfEWYaxgxRf9El8TOtvNq2o0xt_bWhvRRu5-5NGPNi_-_3wJB_iXoOqTbkGt-PxKrxAGFHEb9mU4aTuN42qy8L4B4HGyVQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDI6mcYALYjzEYEAOQwKkaGuTZS0SQhtQNvY4bdJupU2bE3SDDqH9KX4jdh-DSYjbjlWSHhzH_uzE_gip2jwAlF1XzAOwwIT0OPO1UExLi8OSwDYStobBUHbG4mnSmBTIV14Lg88qc5uYGOpgqjBHXgPoi61XTM5vZ28MWaPwdjWn0EjVohcuPiFki2-697C_56bpPIzuOixjFWCKSzFnvqGCUIWm1obUQkqlpS0V54AkQgT73JPCMDSXHmAZjEcgKLICz-OhpbltIUsEmPwNwcGTY2W687jM6SArnJD1tAwQxuu1ePEK_tXE15Srjm_V7ifOzNkh2xkKpa1UbUqkEEa7pJSd85heZM2oL_cAzGcEd9SLAtpS8OGpBZ1q6iQJQcwLzlkbfGFA21jKjx3_42vaoumtwz4Zr0U8B6QYTaPwkNCmtoVowp75VlP4DW01LanxIlErG8I8WSZXuURclXUkR2KMFxciExSf-0t8ZVJdTp6ljTj-nlbJRetmpzF2f3Tn6P_hM7LZGQ36br877B2TLfijnb7QrpDi_P0jPAEAMvdPk12n5HndavYNKe7qvA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEF5KC-JFrA98VN1DBRWWNtntJhFEWmtprRYRC73FZJM9aVpNRfrX_HXONJtqQbx5DNnkMDO7881j5yOk6vEIUHZdsQDAAhMy4CzUQjEtXQ6fRJ41Z2u4G8juUNyMGqMC-czvwmBbZX4mzg_qaKwwR14D6IujV2zOa9q0Rdy3O5eTV4YMUlhpzek0MhPpx7MPCN_Si14bdH1s253rx6suMwwDTHEppiy0VBSr2NbaklpIqbT0pOIcUEWMwJ8HUliW5jIAXIOxCQRIbhQEPHY191xkjIDjv-RgVFQkpdb14P5hkeFBjjgh69mlQM69ei2dvYC3tbG3ctkNLnuBuWvrrJM1g0lpMzOiMinEyQYpm12f0hMzmvp0E6C9obujQRLRpoKHQM3oWNPOPD2IWcIpa4FnjGgLL_bj_P_0nDZpVoPYIsN_EdA2KSbjJN4h1NGeEA5oMHQdETa067hSY1lRKw-CPrlLznKJ-MrMJ0eajGcf4hQUn_9DfLukulg8ycZy_L6skovWN3sz9b8tae_v10dkBUzMv-0N-vtkFX7oZe3aFVKcvr3HB4BGpuGhUTslT_9taV_3rvBO
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+Accuracy+of+Fingerprint-Based+Biometrics%3A+A+Review&rft.jtitle=Symmetry+%28Basel%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Hu%2C+Jiankun&rft.au=Zheng%2C+Guanglou&rft.date=2019-02-01&rft.issn=2073-8994&rft.eissn=2073-8994&rft.volume=11&rft.issue=2&rft.spage=141&rft_id=info:doi/10.3390%2Fsym11020141&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_sym11020141
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-8994&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-8994&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-8994&client=summon