Open Access   Article Go Back

On Biometrics Feature Extraction and Template Security Schemes

Mahapara Khurshid1 , Arvind Selwal2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-03 , Page no. 1-7, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si3.17

Online published on Apr 30, 2018

Copyright © Mahapara Khurshid, Arvind Selwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mahapara Khurshid, Arvind Selwal, “On Biometrics Feature Extraction and Template Security Schemes,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.1-7, 2018.

MLA Style Citation: Mahapara Khurshid, Arvind Selwal "On Biometrics Feature Extraction and Template Security Schemes." International Journal of Computer Sciences and Engineering 06.03 (2018): 1-7.

APA Style Citation: Mahapara Khurshid, Arvind Selwal, (2018). On Biometrics Feature Extraction and Template Security Schemes. International Journal of Computer Sciences and Engineering, 06(03), 1-7.

BibTex Style Citation:
@article{Khurshid_2018,
author = {Mahapara Khurshid, Arvind Selwal},
title = {On Biometrics Feature Extraction and Template Security Schemes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {06},
Issue = {03},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {1-7},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=308},
doi = {https://doi.org/10.26438/ijcse/v6i3.17}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.17}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=308
TI - On Biometrics Feature Extraction and Template Security Schemes
T2 - International Journal of Computer Sciences and Engineering
AU - Mahapara Khurshid, Arvind Selwal
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 03
VL - 06
SN - 2347-2693
ER -

           

Abstract

Effective response to identification and authentication of individuals in complex environment demands replacement of traditional authentication techniques. It should occur concurrently with the increased pace of the digital world and increasing population. Many unimodal template security systems have been published, but in one or the other way, they are associated with some technical flaws, which prevents them from claiming to be reliable models. After doing the critical review of many published articles and case studies, many design characteristics of template security systems like security level, reliability, privacy level, acceptability, performance, uniqueness and cost, were taken into consideration for analyzing the various available models. However, no model was found to be associated with all the design parameters, which could claim to be a highly secure and reliable model. On review basis, it was found that many design characteristics were underestimated, if taken into consideration for development and implementation, could revolutionize biometric based template security systems.

Key-Words / Index Term

Biometrics, Feature Extraction, Unimodal systems, Multimodal systems, Template Security Scheme

References

[1] A. M. P. Canuto, F. Pintro, and M. C. Fairhurst, “An effective template protection method for face and voice cancellable identification,” vol. 11, pp. 157–166, 2014.
[2] Handbook of Biometrics Handbook of Biometrics. .
[3] Y. J. Chin, T. S. Ong, A. B. J. Teoh, and K. O. M. Goh, “Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion,” Inf. FUSION, 2013.
[4] D. T. Meva, “Comparative Study of Different Fusion Techniques in Multimodal Biometric Authentication,” vol. 66, no. 19, pp. 16–19, 2013.
[5] S. R. S. Sree and N. Radha, “A Survey on Fusion Techniques for Multimodal Biometric Identification,” pp. 7493–7497, 2014.
[6] A. Selwal and S. K. Gupta, “Region Coded Hashing based Template Security Scheme for Multi-biometric System,” no. 3, 2016.
[7] M. A. Rahman, F. Anwar, and M. S. Azad, “A simple and effective technique for human verification with hand geometry,” Proc. Int. Conf. Comput. Commun. Eng. 2008, ICCCE08 Glob. Links Hum. Dev., pp. 1177–1180, 2008.
[8] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, no. January, pp. 1–20, 2008.
[9] C. Lee and J. Kim, “Journal of Network and Computer Applications Cancelable fingerprint templates using minutiae-based bit-strings,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 236–246, 2010.
[10] N. K. Ratha, S. Chikkerur, and S. Member, “Generating Cancelable Fingerprint Templates,” vol. 29, no. 4, pp. 561–572, 2007.
[11] V. Rani, M. Kaur, and M. Student, “TC,” vol. 3, no. 9, pp. 351–355, 2017.
[12] A. Mm and S. Gr, “Biometric Template Protection,” vol. 1, no. 2, pp. 1–8, 2016.
[13] C. Rathgeb, J. Wagner, B. Tams, and C. Busch, “PREVENTING THE CROSS-MATCHING ATTACK IN BLOOM FILTER-BASED CANCELABLE BIOMETRICS da / sec - Biometrics and Internet Security Research Group , Hochschule Darmstadt , Germany Institute for Mathematical Stochastics , University of G ¨,” 2015.
[14] R. Á. Mariño, F. H. Álvarez, and L. H. Encinas, “A crypto-biometric scheme based on iris-templates with fuzzy extractors,” vol. 195, pp. 91–102, 2012.
[15] B. Choudhury, P. Then, V. Raman, B. Issac, M. K. Haldar, and G. L. Co-, “Cancelable Iris Biometrics Based on Data Hiding Schemes,” pp. 1–6, 2016.
[16] R. Jeng and W. Chen, “Two Feature-Level Fusion Methods with Feature Scaling and Hashing for Multimodal Biometrics,” vol. 4602, no. March, 2016.
[17] A. Selwal, S. K. Gupta, and Surender, “Low overhead octet indexed template security scheme for multi-modal biometric system,” J. Intell. Fuzzy Syst., vol. 32, no. 5, pp. 3325–3337, 2017.
[18] J. Aravinth, S. Valarmathy, J. Aravinth, and S. Valarmathy, “modal biometric recognition and its application to remote biometrics authentication Multi classi fi er-based score level fusion of multi-modal biometric recognition and its application to remote biometrics authentication,” vol. 2199, no. December, 2016.
[19] S. Sojan and R. K. Kulkarni, “Mixing Fingerprint Features for Template Security,” no. 7, pp. 355–359, 2016.
[20] D. Jagadiswary and D. Saraswady, “Biometric Authentication using Fused Multimodal Biometric,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 109–116, 2016.
[21] M. Lim, S. Verma, G. Mai, and P. C. Yuen, “Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection,” Pattern Recognit., vol. 60, pp. 706–719, 2016.
[22] A. Selwal and S. Kumar, “Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 899–905, 2016.
[23] A. Selwal and S. Kumar, “Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry ଝ,” Perspect. Sci., vol. 8, pp. 705–708, 2016.
[24] Rathgeb C, Busch C, “Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters,” Computers & Security (2014), doi: 10.1016/j.cose.2013.12.005.