On Biometrics Feature Extraction and Template Security Schemes
Mahapara Khurshid1 , Arvind Selwal2
Section:Research Paper, Product Type: Journal Paper
Volume-06 ,
Issue-03 , Page no. 1-7, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.17
Online published on Apr 30, 2018
Copyright © Mahapara Khurshid, Arvind Selwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Mahapara Khurshid, Arvind Selwal, “On Biometrics Feature Extraction and Template Security Schemes,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.1-7, 2018.
MLA Citation
MLA Style Citation: Mahapara Khurshid, Arvind Selwal "On Biometrics Feature Extraction and Template Security Schemes." International Journal of Computer Sciences and Engineering 06.03 (2018): 1-7.
APA Citation
APA Style Citation: Mahapara Khurshid, Arvind Selwal, (2018). On Biometrics Feature Extraction and Template Security Schemes. International Journal of Computer Sciences and Engineering, 06(03), 1-7.
BibTex Citation
BibTex Style Citation:
@article{Khurshid_2018,
author = {Mahapara Khurshid, Arvind Selwal},
title = {On Biometrics Feature Extraction and Template Security Schemes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {06},
Issue = {03},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {1-7},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=308},
doi = {https://doi.org/10.26438/ijcse/v6i3.17}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.17}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=308
TI - On Biometrics Feature Extraction and Template Security Schemes
T2 - International Journal of Computer Sciences and Engineering
AU - Mahapara Khurshid, Arvind Selwal
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 03
VL - 06
SN - 2347-2693
ER -




Abstract
Effective response to identification and authentication of individuals in complex environment demands replacement of traditional authentication techniques. It should occur concurrently with the increased pace of the digital world and increasing population. Many unimodal template security systems have been published, but in one or the other way, they are associated with some technical flaws, which prevents them from claiming to be reliable models. After doing the critical review of many published articles and case studies, many design characteristics of template security systems like security level, reliability, privacy level, acceptability, performance, uniqueness and cost, were taken into consideration for analyzing the various available models. However, no model was found to be associated with all the design parameters, which could claim to be a highly secure and reliable model. On review basis, it was found that many design characteristics were underestimated, if taken into consideration for development and implementation, could revolutionize biometric based template security systems.
Key-Words / Index Term
Biometrics, Feature Extraction, Unimodal systems, Multimodal systems, Template Security Scheme
References
[1] A. M. P. Canuto, F. Pintro, and M. C. Fairhurst, “An effective template protection method for face and voice cancellable identification,” vol. 11, pp. 157–166, 2014.
[2] Handbook of Biometrics Handbook of Biometrics. .
[3] Y. J. Chin, T. S. Ong, A. B. J. Teoh, and K. O. M. Goh, “Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion,” Inf. FUSION, 2013.
[4] D. T. Meva, “Comparative Study of Different Fusion Techniques in Multimodal Biometric Authentication,” vol. 66, no. 19, pp. 16–19, 2013.
[5] S. R. S. Sree and N. Radha, “A Survey on Fusion Techniques for Multimodal Biometric Identification,” pp. 7493–7497, 2014.
[6] A. Selwal and S. K. Gupta, “Region Coded Hashing based Template Security Scheme for Multi-biometric System,” no. 3, 2016.
[7] M. A. Rahman, F. Anwar, and M. S. Azad, “A simple and effective technique for human verification with hand geometry,” Proc. Int. Conf. Comput. Commun. Eng. 2008, ICCCE08 Glob. Links Hum. Dev., pp. 1177–1180, 2008.
[8] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, no. January, pp. 1–20, 2008.
[9] C. Lee and J. Kim, “Journal of Network and Computer Applications Cancelable fingerprint templates using minutiae-based bit-strings,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 236–246, 2010.
[10] N. K. Ratha, S. Chikkerur, and S. Member, “Generating Cancelable Fingerprint Templates,” vol. 29, no. 4, pp. 561–572, 2007.
[11] V. Rani, M. Kaur, and M. Student, “TC,” vol. 3, no. 9, pp. 351–355, 2017.
[12] A. Mm and S. Gr, “Biometric Template Protection,” vol. 1, no. 2, pp. 1–8, 2016.
[13] C. Rathgeb, J. Wagner, B. Tams, and C. Busch, “PREVENTING THE CROSS-MATCHING ATTACK IN BLOOM FILTER-BASED CANCELABLE BIOMETRICS da / sec - Biometrics and Internet Security Research Group , Hochschule Darmstadt , Germany Institute for Mathematical Stochastics , University of G ¨,” 2015.
[14] R. Á. Mariño, F. H. Álvarez, and L. H. Encinas, “A crypto-biometric scheme based on iris-templates with fuzzy extractors,” vol. 195, pp. 91–102, 2012.
[15] B. Choudhury, P. Then, V. Raman, B. Issac, M. K. Haldar, and G. L. Co-, “Cancelable Iris Biometrics Based on Data Hiding Schemes,” pp. 1–6, 2016.
[16] R. Jeng and W. Chen, “Two Feature-Level Fusion Methods with Feature Scaling and Hashing for Multimodal Biometrics,” vol. 4602, no. March, 2016.
[17] A. Selwal, S. K. Gupta, and Surender, “Low overhead octet indexed template security scheme for multi-modal biometric system,” J. Intell. Fuzzy Syst., vol. 32, no. 5, pp. 3325–3337, 2017.
[18] J. Aravinth, S. Valarmathy, J. Aravinth, and S. Valarmathy, “modal biometric recognition and its application to remote biometrics authentication Multi classi fi er-based score level fusion of multi-modal biometric recognition and its application to remote biometrics authentication,” vol. 2199, no. December, 2016.
[19] S. Sojan and R. K. Kulkarni, “Mixing Fingerprint Features for Template Security,” no. 7, pp. 355–359, 2016.
[20] D. Jagadiswary and D. Saraswady, “Biometric Authentication using Fused Multimodal Biometric,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 109–116, 2016.
[21] M. Lim, S. Verma, G. Mai, and P. C. Yuen, “Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection,” Pattern Recognit., vol. 60, pp. 706–719, 2016.
[22] A. Selwal and S. Kumar, “Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 899–905, 2016.
[23] A. Selwal and S. Kumar, “Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry ଝ,” Perspect. Sci., vol. 8, pp. 705–708, 2016.
[24] Rathgeb C, Busch C, “Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters,” Computers & Security (2014), doi: 10.1016/j.cose.2013.12.005.