A Brief Review about Biometrics Systems in Modern Context
Abstract
Authentication systems employ various access mechanisms for the data validation process.Nowadays there are many proposals focused on solving the traditional problems that exist to validate the records of installations in public or private places.With the appearance of COVID-19, the use of technology has intensified to avoid contact with physical devices and achieve successful access.This article shows a compilation of work dedicated to methods and techniques for access to facilities by reading modern biometric systems.
Keywords
Full Text:
PDFReferences
K. Okereafor, I. Ekong, I. Markson and K. Enwere. “Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmission”, in JMIR Biomedical Engineering. 5. 1-15. 10.2196/19623, 2020
Y. Guo. “Impact on Biometric Identification Systems of COVID-19”, in Scientific Programming. 2021. 1-7. 10.1155/2021/3225687, 2021.
R. Gupta and P. Sehgal. “A survey of attacks on iris biometric systems”, in International Journal of Biometrics, 8. 145. 10.1504/IJBM.2016.077833, 2016.
A. S. Zimik and C. Keishing. “A Study on the Performance of Biometric Devices with Reference to Employee Interface”, in Indian Journal of Management and Language. 1. 8-12. 10.54105/ijml.C2039.041322, 2020.
I. Buciu and A. Gacsadi. “Biometrics Systems and Technologies: A survey”, in International Journal of Computers Communications & Control. 11. 315. 10.15837/ijccc.2016.3.2556, 2016.
S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic. (2017) “Evaluating behavioral biometrics for continuous authentication: Challenges and metrics”, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 386–399, 2017.
F. Cherifi, B. Hemery, R. Giot, M. Pasquet, and C. Rosenberger. “Performance evaluation of behavioral biometric systems”, in Behavioral biometrics for human identification: Intelligent applications, pp. 57–74, IGI Global, 2010.
S. Neware. “Biometrics System an Overview”, in International Journal of Computer Sciences and Engineering. 6. 313-319. 10.26438/ijcse/v6i1.313319, 2018.
R. Malathi et al. “An integrated approach of physical biometric authentication system”, in Procedia Computer Science, vol. 85, pp. 820–826, 2016.
A. Wójtowicz and K. Joachimiak. “Model for adaptable context-based biometric authentication for mobile devices”, in Personal and Ubiquitous Computing, vol. 20, no. 2, pp. 195–207, 2016.
P.-C. Huang, C.-C. Chang, Y.-H. Li, and Y. Liu. “Efficient access control system based on aesthetic QR code”, in Personal and Ubiquitous Computing, vol. 22, no. 1, pp. 81–91, 2018.
H. Kang, K.-H. Lee, and G.-J. Kim. “Safe and convenient personal authentication method using moiré 3d authentication based on biometric authentication”, in Cluster Computing, vol. 22, no. 1, pp. 2017–2026, 2019.
E. B. Tarif, S. Wibowo, S. Wasimi and A. Tareef. “A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system”, in Multimedia Tools and Applications, vol. 77, no. 2, pp. 2485–2503, 2018.
E. R. Isaac, S. Elias, S. Rajagopalan, and K. Easwarakumar. “Gait verification system through multiperson signature matching for unobtrusive biometric authentication”, in Journal of Signal Processing Systems, vol. 91, no. 2, pp. 147–161, 201
E. Sujatha and A. Chilambuchelvan. “Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded DWT”, in Wireless Personal Communications, vol. 99, no. 1, pp. 23–34, 2018.
L. Catuogno, C. Galdi and D. Riccio. “Off-line enterprise rights management leveraging biometric key binding and secure hardware”, in Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 7, pp. 2883–2894, 2019.
D. M. Kaburu, J. Sansa-Otim, K. Mayanja, D. P. Mirembe, and T. Bulega. “A usability-based approach to designing continuous user biometric authentication system”. Quality and User Experience, vol. 3, no. 1, pp. 1–14, 2018.
S. Sahmim and H. Gharsellaoui. “Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review”, in Procedia computer science, vol. 112, pp. 1516–1522, 2017.
M. H. Ozcanhan, G. Dalkilic, and S. Utku. “Criptographically supported NFC Tags in medication for better inpatient safety”, in Journal of medical systems, vol. 38, no. 8, pp. 1-15, 2014.
K.Chatterjee et al. “Biometric re-authentication: An approach towars achieving transparency in user authentication”. Multimedia Tools and Applications, vol 78, no. 6, pp. 6679-6700, 2019.
H. Amintoosi an A. J. Taresh. “Sparce coding-based feature extraction for a biometric remote authentication in inter of things”. SN Applied Sciences, vol. 1, no. 9, pp 1-5, 2019.
S. D. Kaul and D. Hatzinakos. “Intelligent RFID biometric enables dual security lock in the banking environnment”, in Jornal of Banking a Financial Technology, vol. 4, no. 2, pp. 159-173, 2020.
Sarkar and B. K. Singh. “A review on performance, security and various biometric template protection schemes for a biometric authentication system”. Multimedia Tools and Applications, vol. 79, no. 37, pp. 27721-27776, 2020.
B. Meden, P. Rot, P. Terhorst, N. Damer, A Kuijper, W. J. Scheirer, A Ross, P. Peer and V. Struc. “Privacy-enhancing face biometrics: A compressive survey”, in IEEE Transactions on Information Forensics and Security, 2021.
M. Obaidat, J. Brown, S. Obeidat and M. Rawashdeh. “A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication”, in MDPI, Sensors, 20, pp. 1-32, 2020.
D. Anguiano-Cervantes, G. Saaduddin, Y. Li. and M. Xie. (2016) “Comparison between Fingerprint and Behavioral Biometric Authentication Using 2D and 3D Gestures”, in 2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016, 2016.
Doshi, N. Patel, C. “A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card” in 2018 IEEE, conference paper, 2018
P. Baraki and V. Ramaswamy. “Biometric Authentication of a User using Online Dynamic Signature”. IEEE, 2016
B. Naidu, K. V. L. Bhavani, C. Rao and P. V. G. D. Reddy. “Comparative Analysis of Three Single Trait Biometric Authentication Models”. 0956-0959. 10.1109/ICCSP.2019.8698041, 2019.
D. Shah, V. Bharadi, V. Kaul, and S. Amrutia. “End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Node”. 52-59. 10.1109/ICCUBEA.2015.19, 2015.
S. Sivaranjani, and S. Sumathi. “Implementation of fingerprint and newborn footprint feature extraction on Raspberry Pi”. 10. 1-6. 10.1109/ICIIECS.2015.7193087, 2015.
Nagamma, N.N. & Lakshmaiah, Mv & Narmada, T. “Raspberry Pi based biometric authentication vehicle door locking system”. 2348-2351. 10.1109/ICPCSI.2017.8392138, 2017.
V. Govindraj, P. V., Yashwanth, S. Bhat, and T. K. Ramesh. “Smart Door Using Biometric NFC Band and OTP Based Methods”. 1-4. 10.1109/INCET49848.2020.9153970, 2020.
P. Huang, L. Guo, M. Li and Y. Fang. “Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare”, inIEEE Internet of Things Journal. 10.1109/JIOT.2019.2929087, 2019.
Y. Liang, S. Samtani, B. Guo, and Z. Yu. “Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective”, in IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2020.3004077, 2020.
S. Cherupally, S. Yin, D. Kadetotad, C. Bae, S. Kim, and J. Seo. “A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV, and SRAM PUF for Authentication and Secret Key Generation”, in IEEE Journal of Solid-State Circuits. 55. 1-1. 10.1109/JSSC.2020.3010705, 2020.
R. Cordeiro, D. Gajaria, A. Limaye, T. Adegbija, N. Karimian and F. Tehranipoor. “ECG-Based Authentication Using Timing-Aware Domain-Specific Architecture”, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39. 3373-3384. 10.1109/TCAD.2020.3012169, 2020.
R. D. Findling, M. Hölzl, and R. Mayrhofer. “Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics”, in IEEE Transactions on Mobile Computing. PP. 1-1. 10.1109/TMC.2018.2812883, 2018.
J. Klonovs, C. Petersena H. Olesen, A. Hammershoj. “ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication System”, in Vehicular Technology Magazine, IEEE. 8. 81-89. 10.1109/MVT.2012.2234056, 2013.
DOI: https://doi.org/10.26483/ijarcs.v13i3.6829
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 International Journal of Advanced Research in Computer Science

