Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review

Authors

  • K Kanagalakshmi Dept. of Computer Science, Kamalam College of Arts and Science, Tamil Nadu, India
  • Antony JK Dept. of Computer Science, Nehru Arts And Science College, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v7i10.107110

Keywords:

Biometrics, Cancellable Templates, Fingerprint

Abstract

Biometric Templates are majorly used as an authentication and identification metric of a person in different industries. The Biometric templates are generated through various mechanisms like key, index and transformation based. This paper focuses on a study of fingerprint Biometric and various existing pattern transformation approaches based on fingerprint.

References

[1] Dr. E. Chandra, K. Kanagalakshmi . (2011). Noise Elimination in Fingerprint Image Using Median Filter. Int. J. Advanced Networking and Applications (0975 – 8887) Volume: 02, Issue: 06, Pages: 950-955.

[2] Fingerprint Analysis and Representation (2003). In: Handbook of Fingerprint Recognition. Springer Professional Computing. Springer, New York.

[3] Cavoukian, Ann. "Privacy by design: origins, meaning, and prospects for assuring privacy and trust in the information era." Privacy protection measures and technologies in business organizations: aspects and standards. IGI Global, 2012. 170-208.

[4] Sadhya, Debanjan, and Sanjay Kumar Singh. "Privacy preservation for soft biometrics based multimodal recognition system." Computers & Security 58 (2016): 160-179.

[5] Z. Jin, M. Lim, A. B. J. Teoh, B. Goi and Y. H. Tay, "Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 10, pp. 1415-1428, Oct. 2016.

[6] Dr. E. Chandra, K. Kanagalakshmi. (2014, March). Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints. International Journal of Computer Applications (0975 – 8887) Volume 89 – No 20.

[7] Jianjiang Feng, Jie Zhou, Proposed, “Orientation Field Estimation for Latent Fingerprint Enhancement” IEEE Trans, pattern anal, and machine intelligence, Vol. 35, no. 4, pp. 925-939, April 2013.

[8] T. H. Nguyen, Y. Wang, Y. Ha and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," in IET Biometrics, vol. 4, no. 1, pp. 29-39, 3 2015.

[9] Dr. E. Chandra, K. Kanagalakshmi. (2011, April) "Performance evaluation of filters in noise removal of fingerprint image," 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp. 117-121

[10] Li.S. and KotA. C., “Privacy protection from fingerprint database,” IEEE Signal Process. Let., Vol. 18, no. 2, pp. 115–118, Feb. 2011.

[11] L. Ghammam, M. Barbier and C. Rosenberger, "Enhancing the Security of Transformation Based Biometric Template Protection Schemes," 2018 International Conference on Cyberworlds (CW), Singapore, 2018, pp. 316-323.

[12] RathaN. K., ChikkerurS., ConnellJ. H., and BolleR. M., “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., Vol. 29, no. 4, pp. 561–72, Apr. 2007.

[13] RossA. and OthmanA., “Mixing fingerprints for template security and privacy,” Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.

[14] Sheng Li, Student Member, IEEE, and Alex C. Kot, Fellow, Fingerprint Combination for Privacy Protection IEEE Transactions on information forensics and security, Vol. 8, no. 2, pp. 350-360, February 2013.

[15] E. Liu and K. Cao, "Minutiae Extraction From Level 1 Features of Fingerprint," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1893-1902, Sept. 2016

[16] D. M. Sabah, D. A. A. Majeed and H. S. Hatem, "Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm," 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), Baghdad, Iraq, 2018, pp. 48-50

[17] S. M. T. Toapanta, A. A. C. Cruz, L. E. M. Gallegos and J. A. O. Trejo, "Algorithms for Efficient Biometric Systems to Mitigate the Integrity of a Distributed Database," 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, 2018, pp. 1-5

[18] X. Dong, Z. Jin and K. Wong, "A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code," 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, HI, USA, 2018, pp. 908-915.

[19] B. Yan and L. You, "A novel public key encryption model based on transformed biometrics," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 424-428.

[20] B. O. Mohammed and S. M. Shamsuddin, "Feature level Fusion for Multi-biometric with identical twins," 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, 2018, pp. 1-6.

[21] Z. Li, W. Lei and W. Zhang, "Improvement for distortion resistance of Delaunay triangulation net-based fingerprint templates," in IET Biometrics, vol. 8, no. 5, pp. 325-331, 9 2019.

Downloads

Published

2019-10-31
CITATION
DOI: 10.26438/ijcse/v7i10.107110
Published: 2019-10-31

How to Cite

[1]
K. K and J. K. Antony, “Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 107–110, Oct. 2019.