Security and Accuracy of Fingerprint-Based Biometrics: A Review
Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest...
Saved in:
Published in | Symmetry (Basel) Vol. 11; no. 2; p. 141 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.02.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper. |
---|---|
AbstractList | Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper. |
Author | Wang, Song Valli, Craig Zheng, Guanglou Yang, Wencheng Hu, Jiankun |
Author_xml | – sequence: 1 givenname: Wencheng orcidid: 0000-0001-7800-2215 surname: Yang fullname: Yang, Wencheng – sequence: 2 givenname: Song orcidid: 0000-0002-0239-7991 surname: Wang fullname: Wang, Song – sequence: 3 givenname: Jiankun surname: Hu fullname: Hu, Jiankun – sequence: 4 givenname: Guanglou orcidid: 0000-0002-2307-9562 surname: Zheng fullname: Zheng, Guanglou – sequence: 5 givenname: Craig surname: Valli fullname: Valli, Craig |
BookMark | eNptkE9LAzEQxYNUsGpPfoGAR1lNMkm660XaYlUoCP45LzE7kZQ2W5NU2W_vSj0UcS4zA783b3jHZBDagISccXYJULGr1K05Z4JxyQ_IULAxFGVVycHefERGKS1ZX4opqdmQ3Dyj3UafO2pCQye2X4ztaOvo3Id3jJvoQy6mJmFDp75dY47epms6oU_46fHrlBw6s0o4-u0n5HV--zK7LxaPdw-zyaKwoGUu3rht0KJwjmsntbZOV9oCSKWRaz4GoyXnDrSRTJWirARnZWMMYOmgKhWckPPd3U1sP7aYcr1stzH0lrVQiokxCICeuthRNrYpRXR1___axK7mrP4Jqd4Lqaf5H9r6bLJvQ47Gr_7VfAPwWWnm |
CitedBy_id | crossref_primary_10_1016_j_chaos_2023_113614 crossref_primary_10_1002_spy2_124 crossref_primary_10_1007_s11554_023_01349_w crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_1177_02666669221085709 crossref_primary_10_1109_ACCESS_2020_3043689 crossref_primary_10_1080_09720529_2022_2075089 crossref_primary_10_1038_s41598_021_94815_z crossref_primary_10_1016_j_engappai_2025_110586 crossref_primary_10_1007_s42044_021_00081_7 crossref_primary_10_3390_app10248994 crossref_primary_10_1049_ise2_12024 crossref_primary_10_1088_1742_6596_1804_1_012043 crossref_primary_10_1038_s41528_024_00367_3 crossref_primary_10_32604_csse_2023_031893 crossref_primary_10_38124_ijisrt_IJISRT24JUN1024 crossref_primary_10_1038_s41598_019_49792_9 crossref_primary_10_21833_ijaas_2024_06_010 crossref_primary_10_1016_j_patrec_2023_08_006 crossref_primary_10_1088_2631_8695_ada667 crossref_primary_10_3390_su142214915 crossref_primary_10_1007_s13042_025_02587_z crossref_primary_10_1038_s41598_021_04652_3 crossref_primary_10_1109_JIOT_2022_3199995 crossref_primary_10_3390_electronics13142849 crossref_primary_10_1145_3422816 crossref_primary_10_1109_JBHI_2021_3109595 crossref_primary_10_1007_s11042_020_10291_z crossref_primary_10_1007_s11831_021_09560_3 crossref_primary_10_1109_ACCESS_2025_3539502 crossref_primary_10_21202_2782_2923_2024_4_912_925 crossref_primary_10_1155_2021_5545488 crossref_primary_10_1088_2631_8695_adbb3c crossref_primary_10_48175_IJARSCT_22659 crossref_primary_10_1109_JSEN_2022_3176248 crossref_primary_10_3390_bios12090700 crossref_primary_10_3390_s21186163 crossref_primary_10_1016_j_patcog_2021_108074 crossref_primary_10_47277_IJCNCS_8_6_1 crossref_primary_10_54569_aair_1303116 crossref_primary_10_1016_j_inffus_2021_10_004 crossref_primary_10_28925_2663_4023_2024_25_200214 crossref_primary_10_1088_1742_6596_1714_1_012016 crossref_primary_10_1007_s10067_022_06353_2 crossref_primary_10_1016_j_cose_2021_102583 crossref_primary_10_1007_s42044_023_00157_6 crossref_primary_10_3390_technologies7020034 crossref_primary_10_1080_19393555_2021_1873464 crossref_primary_10_3390_s23010508 crossref_primary_10_1109_TIP_2024_3381771 crossref_primary_10_1007_s11042_023_15710_5 crossref_primary_10_3390_electronics9122143 crossref_primary_10_1007_s13369_021_05390_4 crossref_primary_10_1016_j_jisa_2022_103209 crossref_primary_10_32478_leadership_v6i1_2771 crossref_primary_10_1002_adsr_202300074 crossref_primary_10_3390_s23073566 crossref_primary_10_1007_s11042_022_13070_0 crossref_primary_10_3390_app13137811 crossref_primary_10_3390_mti6120107 crossref_primary_10_1109_ACCESS_2021_3076756 crossref_primary_10_1002_sdtp_16620 crossref_primary_10_4018_IJSSCI_300358 crossref_primary_10_1007_s11042_024_19692_w crossref_primary_10_1155_2022_2309934 crossref_primary_10_1109_ACCESS_2019_2932400 crossref_primary_10_1186_s13635_022_00129_6 crossref_primary_10_1002_jsid_1060 crossref_primary_10_1016_j_patcog_2020_107735 crossref_primary_10_1049_cit2_12283 crossref_primary_10_1016_j_cose_2019_101690 crossref_primary_10_1016_j_compeleceng_2021_107387 crossref_primary_10_3390_electronics13224499 crossref_primary_10_2478_ama_2024_0040 crossref_primary_10_1002_spy2_305 crossref_primary_10_1007_s10462_024_10847_7 crossref_primary_10_3390_s24154805 crossref_primary_10_1007_s12065_023_00850_2 crossref_primary_10_1007_s11042_020_09529_7 crossref_primary_10_1016_j_compeleceng_2024_109894 crossref_primary_10_1016_j_procs_2023_10_622 crossref_primary_10_1007_s11042_020_10095_1 crossref_primary_10_1002_sdtp_16182 crossref_primary_10_4018_IJISMD_2020010103 crossref_primary_10_1109_JIOT_2024_3408031 crossref_primary_10_1155_2022_3502463 crossref_primary_10_1109_ACCESS_2022_3218335 crossref_primary_10_1080_19393555_2020_1813354 crossref_primary_10_1007_s10044_022_01080_5 crossref_primary_10_48175_IJARSCT_3588 crossref_primary_10_1109_LED_2022_3189211 crossref_primary_10_1016_j_compeleceng_2024_109485 crossref_primary_10_1007_s12652_021_03316_4 crossref_primary_10_1016_j_procs_2024_08_009 crossref_primary_10_1007_s40010_025_00917_y crossref_primary_10_1109_JIOT_2024_3361801 crossref_primary_10_29026_oea_2024_240122 |
Cites_doi | 10.1016/j.jnca.2009.12.003 10.1016/j.patcog.2016.01.001 10.1007/11527923_32 10.1016/j.patcog.2013.10.003 10.1007/s10623-005-6343-z 10.1016/j.neucom.2016.06.083 10.1145/319709.319714 10.1109/ICIEA.2011.5975740 10.1109/MSECP.2003.1193209 10.1109/TCSVT.2003.818349 10.1007/s00500-018-3182-1 10.1007/3-540-45344-X_32 10.1109/TPAMI.2006.20 10.1007/978-3-319-05885-6_3 10.1109/TIFS.2015.2398817 10.1016/j.cose.2011.02.003 10.1007/978-3-642-40597-6_12 10.1155/2008/579416 10.1109/LSP.2016.2636158 10.1109/CISP.2013.6743946 10.1038/nature14539 10.1016/j.future.2010.11.024 10.1109/TSMCB.2007.896999 10.1109/TPAMI.2010.52 10.1109/CISP.2013.6743950 10.1142/S0219467808003209 10.1155/2018/7107295 10.1109/JSEN.2016.2633973 10.1109/MSP.2015.2427849 10.1007/978-0-387-71041-9 10.1049/iet-bmt.2017.0171 10.1016/j.patcog.2004.04.011 10.1109/PST.2016.7907000 10.1109/INFOMAN.2018.8392815 10.1109/TPAMI.2007.1004 10.1109/BTAS.2013.6712750 10.1109/ICB2018.2018.00019 10.1109/TIFS.2007.908165 10.1007/s11227-018-2266-0 10.1109/CISP.2008.742 10.1016/j.patcog.2018.01.026 10.1007/978-3-540-45226-3_169 10.1109/ICARCV.2010.5707945 10.1109/TPAMI.2014.2302450 10.1109/ACCESS.2015.2445336 10.1007/978-981-10-7895-8_15 10.1109/JBHI.2016.2546300 10.1109/TrustCom.2012.23 10.1109/TPAMI.2014.2330609 10.1049/iet-bmt.2016.0008 10.1016/j.patcog.2013.10.001 10.1147/sj.403.0614 10.1007/s10489-018-1311-2 10.1049/el.2018.0621 10.1016/j.jnca.2018.04.013 10.1108/SR-07-2017-0131 10.1109/TIFS.2012.2215326 10.1007/978-3-540-24676-3_31 10.1016/j.patcog.2016.08.017 10.1016/j.patrec.2010.12.015 10.17512/jamcm.2017.2.14 10.1016/j.patcog.2012.05.004 10.1587/elex.4.724 10.1109/RAIT.2018.8389007 10.1016/S1363-4127(02)00407-7 |
ContentType | Journal Article |
Copyright | 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7SC 7SR 7U5 8BQ 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO H8D HCIFZ JG9 JQ2 L6V L7M L~C L~D M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
DOI | 10.3390/sym11020141 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Engineered Materials Abstracts Solid State and Superconductivity Abstracts METADEX Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One ProQuest Central Aerospace Database SciTech Premium Collection Materials Research Database ProQuest Computer Science Collection ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Engineering Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering collection |
DatabaseTitle | CrossRef Publicly Available Content Database Materials Research Database Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences Aerospace Database Engineered Materials Abstracts ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection METADEX Computer and Information Systems Abstracts Professional ProQuest One Academic UKI Edition Materials Science & Engineering Collection Solid State and Superconductivity Abstracts ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 2073-8994 |
ExternalDocumentID | 10_3390_sym11020141 |
GeographicLocations | Australia United States--US |
GeographicLocations_xml | – name: United States--US – name: Australia |
GroupedDBID | 5VS 8FE 8FG AADQD AAYXX ABDBF ABJCF ACUHS ADBBV ADMLS AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS AMVHM BCNDV BENPR BGLVJ CCPQU CITATION E3Z ESX GX1 HCIFZ IAO J9A KQ8 L6V M7S MODMG M~E OK1 PHGZM PHGZT PIMPY PROAC PTHSS TR2 TUS 7SC 7SR 7U5 8BQ 8FD ABUWG AZQEC DWQXO H8D JG9 JQ2 L7M L~C L~D PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c364t-b1cdece2ff16f466cf696c33456e16173a6411f36a40582892108daa3e8f39853 |
IEDL.DBID | BENPR |
ISSN | 2073-8994 |
IngestDate | Fri Jul 25 11:59:27 EDT 2025 Thu Apr 24 23:03:24 EDT 2025 Tue Jul 01 03:25:18 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c364t-b1cdece2ff16f466cf696c33456e16173a6411f36a40582892108daa3e8f39853 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7800-2215 0000-0002-2307-9562 0000-0002-0239-7991 |
OpenAccessLink | https://www.proquest.com/docview/2550273233?pq-origsite=%requestingapplication% |
PQID | 2550273233 |
PQPubID | 2032326 |
ParticipantIDs | proquest_journals_2550273233 crossref_primary_10_3390_sym11020141 crossref_citationtrail_10_3390_sym11020141 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-02-01 |
PublicationDateYYYYMMDD | 2019-02-01 |
PublicationDate_xml | – month: 02 year: 2019 text: 2019-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Symmetry (Basel) |
PublicationYear | 2019 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Wang (ref_42) 2016; 54 ref_14 Teoh (ref_56) 2007; 4 ref_13 ref_57 ref_12 ref_11 ref_55 ref_10 Yang (ref_75) 2018; 74 ref_53 Alam (ref_67) 2018; 115 Jung (ref_28) 2018; 54 Jin (ref_34) 2004; 37 ref_52 ref_51 Ratha (ref_33) 2007; 29 ref_18 Schuckers (ref_22) 2002; 7 ref_15 Cappelli (ref_70) 2006; 28 Liu (ref_76) 2011; 32 Yang (ref_77) 2014; 47 Yang (ref_48) 2018; 2018 Riaz (ref_2) 2017; 38 ref_61 Tipton (ref_17) 2014; 3 ref_24 ref_68 ref_23 ref_66 ref_21 Prabhakar (ref_3) 2003; 1 ref_20 ref_64 ref_62 Rattani (ref_84) 2018; 7 ref_29 Arora (ref_73) 2014; 36 Wojciechowska (ref_83) 2017; 16 LeCun (ref_69) 2015; 521 Ferrara (ref_45) 2012; 7 Wang (ref_40) 2012; 45 ref_71 Jain (ref_16) 2004; 14 Li (ref_60) 2010; 33 Lee (ref_35) 2007; 37 Cappelli (ref_44) 2010; 32 Spolaor (ref_82) 2016; 14 Galbally (ref_26) 2012; 28 Cao (ref_72) 2014; 36 Nandakumar (ref_74) 2015; 32 ref_36 ref_79 Zheng (ref_6) 2017; 21 ref_31 ref_30 Menotti (ref_78) 2015; 10 Yang (ref_50) 2018; 78 Zheng (ref_5) 2016; 17 Zheng (ref_7) 2015; 3 Nandakumar (ref_58) 2007; 2 Zhang (ref_59) 2011; 30 Sandhya (ref_49) 2017; 6 ref_38 ref_37 Ratha (ref_32) 2001; 40 ref_81 ref_80 Wang (ref_41) 2014; 47 Jain (ref_19) 2008; 2008 ref_47 ref_46 ref_43 Juels (ref_54) 2006; 38 ref_1 Coli (ref_25) 2008; 8 Wang (ref_39) 2017; 61 ref_9 Kim (ref_27) 2017; 24 ref_8 Karthi (ref_63) 2013; 2 ref_4 Liu (ref_65) 2017; 259 |
References_xml | – volume: 33 start-page: 207 year: 2010 ident: ref_60 article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2009.12.003 – ident: ref_9 – volume: 54 start-page: 14 year: 2016 ident: ref_42 article-title: A blind system identification approach to cancelable fingerprint templates publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2016.01.001 – ident: ref_57 doi: 10.1007/11527923_32 – volume: 47 start-page: 1321 year: 2014 ident: ref_41 article-title: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2013.10.003 – volume: 38 start-page: 237 year: 2006 ident: ref_54 article-title: A fuzzy vault scheme publication-title: Des. Codes Cryptogr. doi: 10.1007/s10623-005-6343-z – volume: 259 start-page: 3 year: 2017 ident: ref_65 article-title: Encrypted domain matching of fingerprint minutia cylinder-code (MCC) with I1 minimization publication-title: Neurocomputing doi: 10.1016/j.neucom.2016.06.083 – ident: ref_52 doi: 10.1145/319709.319714 – ident: ref_62 doi: 10.1109/ICIEA.2011.5975740 – volume: 3 start-page: 482 year: 2014 ident: ref_17 article-title: iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id publication-title: Int. J. Comput. Inf. Technol. – volume: 1 start-page: 33 year: 2003 ident: ref_3 article-title: Biometric recognition: Security and privacy concerns publication-title: IEEE Secur. Priv. doi: 10.1109/MSECP.2003.1193209 – volume: 14 start-page: 4 year: 2004 ident: ref_16 article-title: An introduction to biometric recognition publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.818349 – ident: ref_31 doi: 10.1007/s00500-018-3182-1 – ident: ref_18 doi: 10.1007/3-540-45344-X_32 – ident: ref_61 – volume: 28 start-page: 3 year: 2006 ident: ref_70 article-title: Performance evaluation of fingerprint verification systems publication-title: IEEE Trans. Pattern Anal. Mach. Intel. doi: 10.1109/TPAMI.2006.20 – ident: ref_4 doi: 10.1007/978-3-319-05885-6_3 – volume: 10 start-page: 864 year: 2015 ident: ref_78 article-title: Deep representations for iris, face, and fingerprint spoofing detection publication-title: IEEE Trans. Inf. Foren. Sec. doi: 10.1109/TIFS.2015.2398817 – volume: 30 start-page: 311 year: 2011 ident: ref_59 article-title: A pitfall in fingerprint bio-cryptographic key generation publication-title: Comput. Secur. doi: 10.1016/j.cose.2011.02.003 – ident: ref_8 doi: 10.1007/978-3-642-40597-6_12 – volume: 2008 start-page: 1 year: 2008 ident: ref_19 article-title: Biometric template security publication-title: EURASIP J. Adv. Signal Process. doi: 10.1155/2008/579416 – volume: 24 start-page: 51 year: 2017 ident: ref_27 article-title: Fingerprint liveness detection using local coherence patterns publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2016.2636158 – ident: ref_66 doi: 10.1109/CISP.2013.6743946 – volume: 521 start-page: 436 year: 2015 ident: ref_69 article-title: Deep learning publication-title: Nature doi: 10.1038/nature14539 – ident: ref_10 – volume: 28 start-page: 311 year: 2012 ident: ref_26 article-title: A high performance fingerprint liveness detection method based on quality related features publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2010.11.024 – volume: 37 start-page: 980 year: 2007 ident: ref_35 article-title: Alignment-free cancelable fingerprint templates based on local minutiae information publication-title: IEEE Trans. Syst. Man Cybern. Part B Cybern. doi: 10.1109/TSMCB.2007.896999 – volume: 32 start-page: 2128 year: 2010 ident: ref_44 article-title: Minutia cylinder-code: A new representation and matching technique for fingerprint recognition publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2010.52 – ident: ref_81 doi: 10.1109/CISP.2013.6743950 – volume: 8 start-page: 495 year: 2008 ident: ref_25 article-title: Fingerprint silicon replicas: Static and dynamic features for vitality detection using an optical capture device publication-title: Int. J. Image Graphics doi: 10.1142/S0219467808003209 – volume: 2018 start-page: 17 year: 2018 ident: ref_48 article-title: Biometrics based Privacy-Preserving Authentication and Mobile Template Protection publication-title: Wirel. Commun. Mobile Comput. doi: 10.1155/2018/7107295 – volume: 17 start-page: 562 year: 2016 ident: ref_5 article-title: Ideas and challenges for securing wireless implantable medical devices: A review publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2016.2633973 – ident: ref_13 – volume: 32 start-page: 88 year: 2015 ident: ref_74 article-title: Biometric template protection: Bridging the performance gap between theory and practice publication-title: IEEE Signal Process. Mag. doi: 10.1109/MSP.2015.2427849 – ident: ref_1 doi: 10.1007/978-0-387-71041-9 – volume: 7 start-page: 423 year: 2018 ident: ref_84 article-title: Convolutional neural networks for gender prediction from smartphone-based ocular images publication-title: IET Biom. doi: 10.1049/iet-bmt.2017.0171 – volume: 37 start-page: 2245 year: 2004 ident: ref_34 article-title: Biohashing: Two factor authentication featuring fingerprint data and tokenised random number publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2004.04.011 – ident: ref_20 – ident: ref_23 doi: 10.1109/PST.2016.7907000 – ident: ref_80 doi: 10.1109/INFOMAN.2018.8392815 – volume: 14 start-page: 87 year: 2016 ident: ref_82 article-title: Biometric authentication methods on smartphones: A survey publication-title: PsychNology J. – ident: ref_53 – volume: 29 start-page: 561 year: 2007 ident: ref_33 article-title: Generating cancelable fingerprint templates publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2007.1004 – ident: ref_30 – ident: ref_71 doi: 10.1109/BTAS.2013.6712750 – ident: ref_24 – ident: ref_47 doi: 10.1109/ICB2018.2018.00019 – volume: 2 start-page: 744 year: 2007 ident: ref_58 article-title: Fingerprint-based fuzzy vault: Implementation and performance publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2007.908165 – volume: 74 start-page: 4893 year: 2018 ident: ref_75 article-title: ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures publication-title: J. Supercomput. doi: 10.1007/s11227-018-2266-0 – ident: ref_36 doi: 10.1109/CISP.2008.742 – volume: 78 start-page: 242 year: 2018 ident: ref_50 article-title: A fingerprint and finger-vein based cancelable multi-biometric system publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2018.01.026 – ident: ref_11 – ident: ref_21 doi: 10.1007/978-3-540-45226-3_169 – ident: ref_38 doi: 10.1109/ICARCV.2010.5707945 – volume: 2 start-page: 381 year: 2013 ident: ref_63 article-title: Hybrid multimodal template protection technique using fuzzy extractor and random projection publication-title: IJRCCT – volume: 36 start-page: 1847 year: 2014 ident: ref_72 article-title: Segmentation and enhancement of latent fingerprints: A coarse to fine ridgestructure dictionary publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2014.2302450 – ident: ref_37 – ident: ref_14 – volume: 3 start-page: 825 year: 2015 ident: ref_7 article-title: Encryption for implantable medical devices using modified one-time pads publication-title: IEEE Access doi: 10.1109/ACCESS.2015.2445336 – ident: ref_29 doi: 10.1007/978-981-10-7895-8_15 – volume: 21 start-page: 655 year: 2017 ident: ref_6 article-title: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks publication-title: IEEE J. Biomed. Health Inf. doi: 10.1109/JBHI.2016.2546300 – ident: ref_64 doi: 10.1109/TrustCom.2012.23 – volume: 36 start-page: 2452 year: 2014 ident: ref_73 article-title: Latent fingerprint matching: Performance gain via feedback from exemplar prints publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2014.2330609 – volume: 6 start-page: 173 year: 2017 ident: ref_49 article-title: Securing fingerprint templates using fused structures publication-title: IET Biom. doi: 10.1049/iet-bmt.2016.0008 – volume: 47 start-page: 1309 year: 2014 ident: ref_77 article-title: An Alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2013.10.001 – ident: ref_79 – volume: 40 start-page: 614 year: 2001 ident: ref_32 article-title: Enhancing security and privacy in biometrics-based authentication systems publication-title: IBM Syst. J. doi: 10.1147/sj.403.0614 – ident: ref_51 doi: 10.1007/s10489-018-1311-2 – volume: 54 start-page: 564 year: 2018 ident: ref_28 article-title: Fingerprint liveness map construction using convolutional neural network publication-title: Electron. Lett. doi: 10.1049/el.2018.0621 – volume: 115 start-page: 20 year: 2018 ident: ref_67 article-title: An alignment-free cancelable fingerprint template for bio-cryptosystems publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2018.04.013 – ident: ref_46 – volume: 38 start-page: 120 year: 2017 ident: ref_2 article-title: Biometric template security: An overview publication-title: Sensor Rev. doi: 10.1108/SR-07-2017-0131 – ident: ref_12 – volume: 7 start-page: 1727 year: 2012 ident: ref_45 article-title: Non-invertible minutia cylinder-code representation publication-title: IEEE Trans. Inf. Foren. Sec. doi: 10.1109/TIFS.2012.2215326 – ident: ref_55 doi: 10.1007/978-3-540-24676-3_31 – ident: ref_15 – volume: 61 start-page: 447 year: 2017 ident: ref_39 article-title: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2016.08.017 – volume: 32 start-page: 666 year: 2011 ident: ref_76 article-title: A key binding system based on n-nearest minutiae structure of fingerprint publication-title: Pattern Recogn. Lett. doi: 10.1016/j.patrec.2010.12.015 – volume: 16 start-page: 173 year: 2017 ident: ref_83 article-title: The overview of trends and challenges in mobile biometrics publication-title: J. Appl. Mathem. Comput. Mech. doi: 10.17512/jamcm.2017.2.14 – volume: 45 start-page: 4129 year: 2012 ident: ref_40 article-title: Alignment-free cancellable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach publication-title: Pattern Recogn. doi: 10.1016/j.patcog.2012.05.004 – ident: ref_43 – volume: 4 start-page: 724 year: 2007 ident: ref_56 article-title: Secure biometric template protection in fuzzy commitment scheme publication-title: IEICE Electron. Exp. doi: 10.1587/elex.4.724 – ident: ref_68 doi: 10.1109/RAIT.2018.8389007 – volume: 7 start-page: 56 year: 2002 ident: ref_22 article-title: Spoofing and anti-spoofing measures publication-title: Inf. Secur. Tech. Rep. doi: 10.1016/S1363-4127(02)00407-7 |
SSID | ssj0000505460 |
Score | 2.536971 |
SecondaryResourceType | review_article |
Snippet | Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 141 |
SubjectTerms | Accuracy Biometrics Boundaries Financial services Fingerprinting Fingerprints Law enforcement Passwords Recognition Security Security management Sensors Smartphones Systems design User interface |
Title | Security and Accuracy of Fingerprint-Based Biometrics: A Review |
URI | https://www.proquest.com/docview/2550273233 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NT8IwFH9RuHgx4kdEkfTAQU0aGC1d58WAYRATiTGScFu6bj3pQDcP_Pe-bgUlMR6btTu8l773ex99P4BOwBJE2T1NFYIFyoViNDZcUyMkwyNJ4JVsDU8zMZ3zx8Vg4RJuuWur3NjE0lAnS21z5F2Evnb0Sp-x-9UHtaxRtrrqKDT2oY4mWMoa1Efj2fPLNstiedq46FUP8xjG9918_Y4er2_7G3dd0a4lLt1LeASHDheSYaXIBuyl2TE03M3LybUbD31zgvDaUc4RlSVkqHGh9JosDQnLFJ3N1BV0hN4pISP7uN7O4M_vyJBUdYBTmIfj14cpdTQIVDPBCxp7Okl12jfGE4YLoY0IhGYMoU9qoxOmBPc8w4RC8GUDKIziZKIUS6VhAbrjM6hlyyw9B-KbgHMfpRhLn8cDI30pjC3tGR1g4CWacLuRSKTdjHBLVfEWYaxgxRf9El8TOtvNq2o0xt_bWhvRRu5-5NGPNi_-_3wJB_iXoOqTbkGt-PxKrxAGFHEb9mU4aTuN42qy8L4B4HGyVQ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDI6mcYALYjzEYEAOQwKkaGuTZS0SQhtQNvY4bdJupU2bE3SDDqH9KX4jdh-DSYjbjlWSHhzH_uzE_gip2jwAlF1XzAOwwIT0OPO1UExLi8OSwDYStobBUHbG4mnSmBTIV14Lg88qc5uYGOpgqjBHXgPoi61XTM5vZ28MWaPwdjWn0EjVohcuPiFki2-697C_56bpPIzuOixjFWCKSzFnvqGCUIWm1obUQkqlpS0V54AkQgT73JPCMDSXHmAZjEcgKLICz-OhpbltIUsEmPwNwcGTY2W687jM6SArnJD1tAwQxuu1ePEK_tXE15Srjm_V7ifOzNkh2xkKpa1UbUqkEEa7pJSd85heZM2oL_cAzGcEd9SLAtpS8OGpBZ1q6iQJQcwLzlkbfGFA21jKjx3_42vaoumtwz4Zr0U8B6QYTaPwkNCmtoVowp75VlP4DW01LanxIlErG8I8WSZXuURclXUkR2KMFxciExSf-0t8ZVJdTp6ljTj-nlbJRetmpzF2f3Tn6P_hM7LZGQ36br877B2TLfijnb7QrpDi_P0jPAEAMvdPk12n5HndavYNKe7qvA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEF5KC-JFrA98VN1DBRWWNtntJhFEWmtprRYRC73FZJM9aVpNRfrX_HXONJtqQbx5DNnkMDO7881j5yOk6vEIUHZdsQDAAhMy4CzUQjEtXQ6fRJ41Z2u4G8juUNyMGqMC-czvwmBbZX4mzg_qaKwwR14D6IujV2zOa9q0Rdy3O5eTV4YMUlhpzek0MhPpx7MPCN_Si14bdH1s253rx6suMwwDTHEppiy0VBSr2NbaklpIqbT0pOIcUEWMwJ8HUliW5jIAXIOxCQRIbhQEPHY191xkjIDjv-RgVFQkpdb14P5hkeFBjjgh69mlQM69ei2dvYC3tbG3ctkNLnuBuWvrrJM1g0lpMzOiMinEyQYpm12f0hMzmvp0E6C9obujQRLRpoKHQM3oWNPOPD2IWcIpa4FnjGgLL_bj_P_0nDZpVoPYIsN_EdA2KSbjJN4h1NGeEA5oMHQdETa067hSY1lRKw-CPrlLznKJ-MrMJ0eajGcf4hQUn_9DfLukulg8ycZy_L6skovWN3sz9b8tae_v10dkBUzMv-0N-vtkFX7oZe3aFVKcvr3HB4BGpuGhUTslT_9taV_3rvBO |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+Accuracy+of+Fingerprint-Based+Biometrics%3A+A+Review&rft.jtitle=Symmetry+%28Basel%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Hu%2C+Jiankun&rft.au=Zheng%2C+Guanglou&rft.date=2019-02-01&rft.issn=2073-8994&rft.eissn=2073-8994&rft.volume=11&rft.issue=2&rft.spage=141&rft_id=info:doi/10.3390%2Fsym11020141&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_sym11020141 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-8994&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-8994&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-8994&client=summon |