Author : Ashish Vijayanand Chakole 1
Date of Publication :7th February 2017
Abstract: Now a day’s security is terribly essential as a result of the fords area unit increasing day by day. Everywhere we have a tendency to would like security. To provide security and to offer access to the correct person authentication is extremely vital. In the traditional time for authentication purpose we have a tendency to use secret, pins but currently a day’s theses authentication schemes area unit not sufficient. From this biometric is invented to give the authentication. Biometrics deals with human are physical as well as activity characteristics. The biometric data that is extracted from the human’s physical as well as activity characteristics is fingerprint, palm print, face, retina and thus several. This biometric data is used for authentication and verification purpose and save in info as a biometric templet. Mostly fingerprint is used as a biometric attribute. To give access to the proper person is that the nice challenge to the biometric system. In this paper research is finished on numerous biometric templet security schemes. Initially the biometric is introduced in the paper later the operating of biometric system in introduce. There area unit sure attack area unit doable on biometric system those attack of biometric system are introduced later. Attack on biometric system move this to study the prevailing biometric templet attacks and also the numerous techniques that area unit used for securing the biometric template. While storing the biometric templet in the info will increase the prospect of compromising it. Security of the biometric system is the most challenging task. This paper proposed the review of numerous techniques that area unit used for securing the biometric templet. Biometric is initially introduced in the paper presently preprocessing step area unit given. There area unit sure attacks area unit doable on the 2 sections of biometric system that are enrollment and authentication phase. One of the attack is feasible during storing the templet within the info. To secure from this attack various technique area unit used. Review is done on those techniques.
Reference :
-
- Rubal Jain and Dr. Chander Kant, “A Novel Approach for Securing Fingerprint Template using Steganography”, International Journal of Innovations & Advancement in Computer Science, ISSN 2347 – 8616, Volume 4, Issue 6, pp. 503–512, June 2015.
- S.Usha and M.Karthik, “A Robust Digital Image Watermarking for Biometric Template Protection Applications”, International Journal of Advanced Research in Electrical, Electronics, and Instrumentation Engineering, ISSN 2320-3765, Volume 4, Issue 4, pp. 2067-2072, 2015.
- V.Wagh and S.Sonvane, “Minutiae Point Extraction using Biometric Fingerprint Enhancement”, Journal on International Research in Engineering and Advance Technology, ISSN 2320-8791 Volume 2, Issue 1, pp. 777-789 March 2014.
- N.Hajare, A.Borage, N.Kamble, and S.Shinde, “Biometric Template Security using Visual Cryptography”, International Journal of Engineering Research and Application, ISSN 2248-9622, Volume 3, Issue 2, pp. 1320-1323, March 2013
- S.Sowakarthika and N.Radha, “Securing Iris and Fingerprint Templates using Fuzzy Vault and Symmetric Algorithm”, International Conference on Intelligent System and Control (ISCO), pp. 189-193, 2013.
- Thi Hanh Nguyen, Yi Wang, “A Fingerprint Fuzzy Vault Scheme using a Fast ChaffPoint Generation Algorithm”, Signal Processing, Communication and Coming(ICSPCC), IEEE International Conference, pp. 1-6, 2013.
- S. Ponnarasi and M.Rajaram, “Impact of Algorithm for Extraction of Minutiae Points in Fingerprint Image”, Journal of Computer Science, Volume 8, Issue 9, pp. 1467-1672, 2012.
- R. Verma, A. Gole, “ Wavelet Application in Fingerprint Recognition”, International Journal of Soft Computing and Engineering, Volume 1, Issue 4, pp. 129-134, 2011.
- A. Nagar, K. Nandakumar, and A. Jain, “Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptor,” International Conference on Pattern Recognition, Volume 6, pp. 822-825, 2008.
- K. Nandakumar, A. Jain, S. Pankanti, “Fingerprint-Based Fuzzy Vault: Implementation and Performance”, IEEE Transaction on Information Forensics and Security, Volume 2, Issue 4, pp. 744- 754, 2007.
- N. Raha, S. Chikkerur, and J. Connell, “Generating Cancelable Fingerprint Template”, IEEE Transaction on Pattern Analysis and Machine Intelligence, Volume 29, Issue 4, pp. 561-572, 2007
- Geetika, & Kaur, M. (2013, April). Fuzzy Vault with Iris and Retina: A Review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(4).
- Jain, A., Nandakumar, K., & Nagar, A. (2008). Biometric Template Security. EURASIP Journal on Advances in Signal Processing (2008).