Articles
| Open Access | ADVANCED SECURITY MEASURES FOR FINGERPRINT BIOMETRICS
Shashi Sharma , Dept. of Electronics and Communication Engineering St Joseph Engineering College, Vamanjoor, IndiaAbstract
Fingerprint biometrics represent a widely adopted method for personal identification and authentication due to their uniqueness and convenience. However, ensuring the security and reliability of fingerprint-based systems is crucial in safeguarding sensitive personal and organizational data. This abstract explores advanced security measures implemented in fingerprint biometrics to mitigate vulnerabilities and enhance overall system robustness. Key strategies include the utilization of encrypted templates, robust anti-spoofing techniques, and continuous monitoring for anomaly detection. The paper discusses the technological advancements and best practices employed to protect against emerging threats such as spoofing attacks and data breaches. Additionally, the abstract highlights the integration of multi-factor authentication and biometric fusion approaches to further strengthen security. By examining these measures, this paper aims to provide insights into enhancing the security posture of fingerprint biometric systems in various applications, from mobile devices to enterprise-level authentication solutions.
Keywords
Fingerprint Biometrics, Biometric Security, Authentication
References
Sheng Li and Alex C. Kot, “Fingerprint Combination for Privacy Protection” IEEE Trans. Information Forensics and Security, vol. 8, no. 2, pp. 350-360, Feb. 2013.
B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp.2245–2255, 2004.
K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprintbased fuzzy vault: Implementation and performance,” IEEE Trans. Inf. ForensicsSecurity, vol. 2, no. 4, pp. 744–57, Dec.2007.
S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp.115–118, Feb. 2011.
A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
L. Hong, Y. F. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 20, no. 8, pp. 777–789, Aug. 1998.
S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform..Forensics and Security (WIFS), Foz doIguacu, Brazil, Nov. 29–Dec. 2, 2011.
A. Ross and A. Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 561–72, Apr.2007.
S. Chikkerur and N. Ratha, “Impact of singular point detection on fingerprint matching performance,” in Proc. Fourth IEEE Workshop on Automat. Identification Advanced Technologies, Oct. 2005, pp. 207–212.
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Shashi Sharma

This work is licensed under a Creative Commons Attribution 4.0 International License.