Open Access   Article Go Back

Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review

K.Kanagalakshmi 1 , Joycy K.Antony2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 107-110, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.107110

Online published on Oct 31, 2019

Copyright © K.Kanagalakshmi, Joycy K.Antony . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Kanagalakshmi, Joycy K.Antony, “Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.107-110, 2019.

MLA Style Citation: K.Kanagalakshmi, Joycy K.Antony "Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review." International Journal of Computer Sciences and Engineering 7.10 (2019): 107-110.

APA Style Citation: K.Kanagalakshmi, Joycy K.Antony, (2019). Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review. International Journal of Computer Sciences and Engineering, 7(10), 107-110.

BibTex Style Citation:
@article{K.Antony_2019,
author = {K.Kanagalakshmi, Joycy K.Antony},
title = {Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {107-110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4903},
doi = {https://doi.org/10.26438/ijcse/v7i10.107110}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.107110}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4903
TI - Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - K.Kanagalakshmi, Joycy K.Antony
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 107-110
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
504 232 downloads 138 downloads
  
  
           

Abstract

Biometric Templates are majorly used as an authentication and identification metric of a person in different industries. The Biometric templates are generated through various mechanisms like key, index and transformation based. This paper focuses on a study of fingerprint Biometric and various existing pattern transformation approaches based on fingerprint.

Key-Words / Index Term

Biometrics, Cancellable Templates, Fingerprint

References

[1] Dr. E. Chandra, K. Kanagalakshmi . (2011). Noise Elimination in Fingerprint Image Using Median Filter. Int. J. Advanced Networking and Applications (0975 – 8887) Volume: 02, Issue: 06, Pages: 950-955.
[2] Fingerprint Analysis and Representation (2003). In: Handbook of Fingerprint Recognition. Springer Professional Computing. Springer, New York.
[3] Cavoukian, Ann. "Privacy by design: origins, meaning, and prospects for assuring privacy and trust in the information era." Privacy protection measures and technologies in business organizations: aspects and standards. IGI Global, 2012. 170-208.
[4] Sadhya, Debanjan, and Sanjay Kumar Singh. "Privacy preservation for soft biometrics based multimodal recognition system." Computers & Security 58 (2016): 160-179.
[5] Z. Jin, M. Lim, A. B. J. Teoh, B. Goi and Y. H. Tay, "Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 10, pp. 1415-1428, Oct. 2016.
[6] Dr. E. Chandra, K. Kanagalakshmi. (2014, March). Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints. International Journal of Computer Applications (0975 – 8887) Volume 89 – No 20.
[7] Jianjiang Feng, Jie Zhou, Proposed, “Orientation Field Estimation for Latent Fingerprint Enhancement” IEEE Trans, pattern anal, and machine intelligence, Vol. 35, no. 4, pp. 925-939, April 2013.
[8] T. H. Nguyen, Y. Wang, Y. Ha and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," in IET Biometrics, vol. 4, no. 1, pp. 29-39, 3 2015.
[9] Dr. E. Chandra, K. Kanagalakshmi. (2011, April) "Performance evaluation of filters in noise removal of fingerprint image," 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp. 117-121
[10] Li.S. and KotA. C., “Privacy protection from fingerprint database,” IEEE Signal Process. Let., Vol. 18, no. 2, pp. 115–118, Feb. 2011.
[11] L. Ghammam, M. Barbier and C. Rosenberger, "Enhancing the Security of Transformation Based Biometric Template Protection Schemes," 2018 International Conference on Cyberworlds (CW), Singapore, 2018, pp. 316-323.
[12] RathaN. K., ChikkerurS., ConnellJ. H., and BolleR. M., “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., Vol. 29, no. 4, pp. 561–72, Apr. 2007.
[13] RossA. and OthmanA., “Mixing fingerprints for template security and privacy,” Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
[14] Sheng Li, Student Member, IEEE, and Alex C. Kot, Fellow, Fingerprint Combination for Privacy Protection IEEE Transactions on information forensics and security, Vol. 8, no. 2, pp. 350-360, February 2013.
[15] E. Liu and K. Cao, "Minutiae Extraction From Level 1 Features of Fingerprint," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1893-1902, Sept. 2016
[16] D. M. Sabah, D. A. A. Majeed and H. S. Hatem, "Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm," 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), Baghdad, Iraq, 2018, pp. 48-50
[17] S. M. T. Toapanta, A. A. C. Cruz, L. E. M. Gallegos and J. A. O. Trejo, "Algorithms for Efficient Biometric Systems to Mitigate the Integrity of a Distributed Database," 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, 2018, pp. 1-5
[18] X. Dong, Z. Jin and K. Wong, "A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code," 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, HI, USA, 2018, pp. 908-915.
[19] B. Yan and L. You, "A novel public key encryption model based on transformed biometrics," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 424-428.
[20] B. O. Mohammed and S. M. Shamsuddin, "Feature level Fusion for Multi-biometric with identical twins," 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, 2018, pp. 1-6.
[21] Z. Li, W. Lei and W. Zhang, "Improvement for distortion resistance of Delaunay triangulation net-based fingerprint templates," in IET Biometrics, vol. 8, no. 5, pp. 325-331, 9 2019.