Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Review Article

Progression in Biometric Recognition Systems and its Security

Author(s): Ambika Annavarapu, Surekha Borra and Rohit Thanki*

Volume 16, Issue 1, 2022

Published on: 18 September, 2020

Article ID: e201021186068 Pages: 16

DOI: 10.2174/1872212114999200918122905

Price: $65

Abstract

The security of information is the major problem faced in today’s digital environment. Biometric Systems help in achieving high-end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric-based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech, and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on the information security of biometric systems and their performance requirements.

Keywords: Biometrics, authentication, verification, recognition, security, template.

Graphical Abstract

[1]
K. Nandakumar, Multibiometric systems: Fusion strategies and template security. michigan state univ east lansing dept of computer science/engineering, 2008.
[2]
R.M. Thanki, V.J. Dwivedi, and K.R. Borisagar, Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications., Springer, 2018.
[http://dx.doi.org/10.1007/978-3-319-73183-4]
[3]
A. Kamal, S. Bhatt, and R.D. Reany, U.S. ,"Systems and methods for provisioning digital identities to authenticate users”, Patent No. 10,650,632, 2020
[4]
N. Rogmann, and M. Krieg, "Liveness detection in biometrics", Biometrics Special Interest Group (BIOSIG), In: 2015 International Conference of the IEEE, Shenyang, China, 2015
[http://dx.doi.org/10.1109/BIOSIG.2015.7314611]
[5]
P. Connor, and A. Ross, "Biometric recognition by gait: A survey of modalities and features", Comput. Vis. Image Underst., vol. 167, pp. 1-27, 2018.
[http://dx.doi.org/10.1016/j.cviu.2018.01.007]
[6]
T. Sabhanayagam, V.P. Venkatesan, and K. Senthamaraikannan, "A comprehensive survey on various biometric systems", Int. J. Appl. Eng. Res., vol. 13, no. 5, pp. 2276-2297, 2018.
[7]
D. Zhong, X. Du, and K. Zhong, "Decade progress of palmprint recognition: a brief survey", Neurocomputing, 2018.
[8]
R. Kiran, and S. Soni, "A Survey on Keystroke Dynamics Based Authentication System", Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 3, no.3, 2018
[9]
R. Damaševičius, R. Maskeliūnas, E. Kazanavičius, and M. Woźniak, "Combining cryptography with EEG biometrics", Comput. Intell. Neurosci., vol. 2018, 2018.
[http://dx.doi.org/10.1155/2018/1867548] [PMID: 29951089]
[10]
M. Smith, M. Mann, and G. Urbas, Biometrics, Crime and Security., Routledge, 2018.
[http://dx.doi.org/10.4324/9781315182056]
[11]
"Rajeswari, P., Raju, S.V., Ashour, A. S., & Dey, N. (2017). Multifingerprint unimodel-based biometric authentication supporting cloud computing", Intelligent techniques in signal processing for multimedia security, Springer, Cham, pp. 469-485, 2017.
[12]
K. Dharavath, F.A. Talukdar, R.H. Laskar, and N. Dey, Face recognition under dry and wet face conditions, Intelligent techniques in signal processing for multimedia security., Springer: Cham, 2017, pp. 253-271.
[http://dx.doi.org/10.1007/978-3-319-44790-2_12]
[13]
B. Surekha, K.J. Nazare, S.V. Raju, and N. Dey, Attendance recording system using partial face recognition algorithm. Intelligent techniques in signal processing for multimedia security., Springer: Cham, 2017, pp. 293-319.
[http://dx.doi.org/10.1007/978-3-319-44790-2_14]
[14]
M.O. Oloyede, and G.P. Hancke, "Unimodal and multimodal biometric sensing systems: a review", IEEE Access, vol. 4, pp. 7532-7555, 2016.
[http://dx.doi.org/10.1109/ACCESS.2016.2614720]
[15]
N.K. Jayant, and S. Borra, "Attendance management system using hybrid face recognition techniques", In: Advances in signal processing (CASP), Conference on IEEE, Pune, India, 2016, pp. 412-417.
[http://dx.doi.org/10.1109/CASP.2016.7746206]
[16]
I.M. Alsaadi, "Physiological biometric authentication systems, advantages, disadvantages and future development: A Review", Int. J. Sci.Tech. Res., vol. 4, no. 8, pp. 285-289, 2015.
[17]
M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and cross-enterprise biometric identification", Expert Syst. Appl., vol. 42, no. 21, pp. 7905-7916, 2015.
[http://dx.doi.org/10.1016/j.eswa.2015.06.025]
[18]
G. Kaur, G. Singh, and V. Kumar, "A review on biometric recognition. Int", J. Biosci. Biotechnol., vol. 6, no. 4, pp. 69-76, 2014.
[19]
J.A. Unar, W.C. Seng, and A. Abbasi, "A review of biometric technology along with trends and prospects", Pattern Recognit., vol. 47, no. 8, pp. 2673-2688, 2014.
[http://dx.doi.org/10.1016/j.patcog.2014.01.016]
[20]
M. Dey, N. Dey, S.K. Mahata, S. Chakraborty, S. Acharjee, and A. Das, "Electrocardiogram feature based inter-human biometric authentication system", In: Electronic Systems, Signal Processing and Computing Technologies (ICESC) 2014 International Conference IEEE, Nagpur, India, 2014, pp. 300-304.
[http://dx.doi.org/10.1109/ICESC.2014.57]
[21]
H. Srivastava, “A Comparison Based Study on Biometrics for Human Recognition.”, IOSR J. Comp. Eng., vol.15, 2013, pp. 22-29.
[22]
A. Babich, "Biometric Authentication", Types of biometric identifiers, 2012.
[23]
S. Bharadwaj, M. Vatsa, and R. Singh, "Biometric quality: a review of fingerprint, iris, and face", EURASIP J. Image Video Process., vol. 2014, no. 1, p. 34, 2014.
[http://dx.doi.org/10.1186/1687-5281-2014-34]
[24]
P. Vidyasree, G. Madhavi, S. Viswanadharaju, and S. Borra, A Bio-application for Accident Victim Identification Using Biometrics. Classification in BioApps. Lecture Notes in Computational Vision and Biomechanics., vol.26. Springer: Cham, 2018.
[http://dx.doi.org/10.1007/978-3-319-65981-7_15]
[25]
A. Tharwat, T. Gaber, and A.E. Hassanien, "Two biometric approaches for cattle identification based on features and classifiers fusion", Int. J. Image Min, vol. 1, no. 4, pp. 342-365, 2015.
[http://dx.doi.org/10.1504/IJIM.2015.073902]
[26]
R. Gade, and T.B. Moeslund, "Thermal cameras and applications: a survey", Mach. Vis. Appl., vol. 25, no. 1, pp. 245-262, 2014.
[http://dx.doi.org/10.1007/s00138-013-0570-5]
[27]
M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "Identification using encrypted biometrics", International Conference on Computer Analysis of Images and Patterns, 2013pp. 440-448
[http://dx.doi.org/10.1007/978-3-642-40246-3_55]
[28]
R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, and A.W. Senior, Guide to biometrics., Springer Science & Business Media, 2013.
[29]
J. Chirillo, and S. Blaul, Implementing biometric security., Hungry Minds, Incorporated, 2003.
[30]
A. Jain, L. Hong, and S. Pankanti, "Biometric identification", Commun. ACM, vol. 43, no. 2, pp. 90-98, 2000.
[http://dx.doi.org/10.1145/328236.328110]
[31]
C. Yuan, X. Sun, and R. Lv, "Fingerprint liveness detection based on multi-scale LPQ and PCA", China Commun., vol. 13, no. 7, pp. 60-65, 2016.
[http://dx.doi.org/10.1109/CC.2016.7559076]
[32]
L.Q. Zhu, and S.Y. Zhang, "Multimodal biometric identification system based on finger geometry, knuckle print and palm print", Pattern Recognit. Lett., vol. 31, no. 12, pp. 1641-1649, 2010.
[http://dx.doi.org/10.1016/j.patrec.2010.05.010]
[33]
S. Tyagi, S. Som, and Q.P. Rana, "Trust based dynamic multicast group routing ensuring reliability for ubiquitous environment in MANETs", Int. J. Ambient Comput. Intell., vol. 8, no. 1, pp. 70-97, 2017. [IJACI].
[http://dx.doi.org/10.4018/IJACI.2017010104]
[34]
M.E. Caceres, Y.L. Li, and M.P.C. De Andrada, "Universal enrollment using biometric PKI", U.S. Patent No.9, 871, 783, 2018.
[35]
J.T. Apostolos, W. Mouyos, J. Feng, and D.T. Jeffrey, “Fingerprint based smartphone user verification”, U.S. Patent No. 9,432,366, 2014.
[36]
Y. Liu, J. Ling, Z. Liu, J. Shen, and C. Gao, "Finger vein secure biometric template generation based on deep learning", Soft Comput., vol. 22, no. 7, pp. 2257-2265, 2018.
[http://dx.doi.org/10.1007/s00500-017-2487-9]
[37]
D.M. Uliyan, S. Sadeghi, and H.A. Jalab, "Anti-spoofing method for fingerprint recognition using patch based deep learning machine", Eng. Sci. Technol. an Int. J., vol. 23, no. 2, pp. 264-273, 2020.
[38]
F. Battaglia, G. Iannizzotto, and L.L. Bello, "A biometric authentication system based on face recognition and RFID tags", Mondo Digitale, vol. 13, no. 49, pp. 340-346, 2014.
[39]
S. Sghaier, W. Farhat, and C. Souani, "Novel technique for 3D Face Recognition using anthropometric methodology", Int. J. Ambient Comput. Intell., vol. 9, no. 1, pp. 60-77, 2018. [IJACI].
[http://dx.doi.org/10.4018/IJACI.2018010104]
[40]
T. Phillips, X. Zou, F. Li, and N. Li, "Enhancing biometric-capsule-based authentication and facial recognition via deep learning", Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019pp. 141-146
[http://dx.doi.org/10.1145/3322431.3325417]
[41]
A. Mohammadi, S. Bhattacharjee, and S. Marcel, "Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets", In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).IEEE, Barcelona, Spain, 2020, pp. 2947-2951.
[42]
A. Kong, D. Zhang, and M. Kamel, "A survey of palmprint recognition", Pattern Recognit., vol. 42, no. 7, pp. 1408-1418, 2009.
[43]
M. Izadpanahkakhk, S.M. Razavi, M. Taghipour-Gorjikolaie, S.H. Zahiri, and A. Uncini, "Novel mobile palmprint databases for biometric authentication", Int. J. Grid Util. Comput., vol. 10, no. 5, pp. 465-474, 2019.
[http://dx.doi.org/10.1504/IJGUC.2019.102016]
[44]
A. Rattani, and R. Derakhshani, "Ocular biometrics in the visible spectrum: A survey", Image Vis. Comput., vol. 59, pp. 1-16, 2017.
[http://dx.doi.org/10.1016/j.imavis.2016.11.019]
[45]
K.W. Bowyer, K.P. Hollingsworth, and P.J. Flynn, A survey of iris biometrics research: 2008–2010.Handbook of iris recognition., Springer: London, 2013, pp. 15-54.
[http://dx.doi.org/10.1007/978-1-4471-4402-1_2]
[46]
I.A. Saleh, and L.M. Alzoubiady, "Decision level fusion of iris and signature biometrics for personal identification using ant colony optimization", Int. J. Eng. Innov. Technol., vol. 3, no. 11, pp. 35-42, 2014.
[47]
S. Bazrafkan, and P. Corcoran, Enhancing iris authentication on handheld devices using deep learning derived segmentation techniques.In: 2018 IEEE international conference on consumer electronics (ICCE)., IEEE: Taiwan, China, 2018, pp. 1-2.
[48]
S. Arora, and M. P. S. Bhatia, "Presentation attack detection for iris recognition using deep learning", Int. J. Syst. Assur. Eng. Manag., pp. 1-7, 2020.
[http://dx.doi.org/10.1007/s13198-020-00948-1]
[49]
P. Bandal, D. Pawar, A. Shrishrimal, P. Sonawane, and D.A. Godse, "Biometric Identification Using 3D Ear Recognition System", Int. J. Eng. Sci., p. 3567, 2016.
[50]
G.D. Shubinsky, and A. Sobel, U.S. Patent No. 9,076,048
[51]
D. Narayan, and S. Dubey, "A Survey Paper on Human Identification using Ear Biometrics", Int J Innov Res Sci mod Eng, vol. 2, no. 10, pp. 9-13, 2014.
[52]
A. Kumar, and T.S.T. Chan, "Robust ear identification using sparse representation of local texture descriptors", Pattern Recognit., vol. 46, no. 1, pp. 73-85, 2013.
[http://dx.doi.org/10.1016/j.patcog.2012.06.020]
[53]
A. Kamboj, R. Rani, and A. Nigam, “EarLocalizer: A Deep-Learning-Based Ear Localization Model for Side Face Images in the Wild.”, Design and Implementation of Healthcare Biometric Systems IGI Global, pp. 137-159, 2019.
[http://dx.doi.org/10.4018/978-1-5225-7525-2.ch006]
[54]
A.A. Schoon, A.M. Curran, and K.G. Furton, Odor biometricsEncyclopedia of biometrics. 2015, pp. 1178-1183.
[http://dx.doi.org/10.1007/978-1-4899-7488-4_279]
[55]
M. Shu, Y. Liu, and H. Fang, "Identification authentication scheme using human body odour", In: Control Science and Systems Engineering (CCSSE), 2014 IEEE International Conference IEEE, 2014, pp. 171-174.
[http://dx.doi.org/10.1109/CCSSE.2014.7224531]
[56]
S. Angle, R. Bhagtani, and H. Chheda, "Biometrics: A further echelon of security", In: UAE International Conference on Biological and Medical Physics, Al-Ain, UAE, 2005.
[57]
S. Kumar, and N. Nagarajan, "Integrated network topological control and key management for securing wireless sensor networks", Int. J. Ambient Comput. Intell., vol. 5, no. 4, pp. 12-24, 2013. [IJACI]
[http://dx.doi.org/10.4018/ijaci.2013100102]
[58]
C.P. Huynh, and A. Robles-Kelly, "Hyperspectral imaging for skin recognition and biometrics", In: Image Processing (ICIP), 2010 17th IEEE International Conference on IEEE, Hong Kong, Hong Kong, 2010, pp. 2325-2328.
[http://dx.doi.org/10.1109/ICIP.2010.5654042]
[59]
M. Merone, P. Soda, M. Sansone, and C. Sansone, "ECG databases for biometric systems: A systematic review", Expert Syst. Appl., vol. 67, pp. 189-202, 2017.
[http://dx.doi.org/10.1016/j.eswa.2016.09.030]
[60]
M. Abo-Zahhad, S.M. Ahmed, and S.N. Abbas, "Biometric authentication based on PCG and ECG signals: present status and future directions", Signal Image Video Process., vol. 8, no. 4, pp. 739-751, 2014.
[http://dx.doi.org/10.1007/s11760-013-0593-4]
[61]
D. Belo, N. Bento, H. Silva, A. Fred, and H. Gamboa, "ECG biometrics using deep learning and relative score threshold classification", Sensors (Basel), vol. 20, no. 15, p. 4078, 2020.
[http://dx.doi.org/10.3390/s20154078] [PMID: 32707861]
[62]
K.M. Fouad, B.M. Hassan, and M.F. Hassan, "User authentication based on dynamic keystroke recognition", Int. J. Ambient Comput. Intell., vol. 7, no. 2, pp. 1-32, 2016. [IJACI].
[http://dx.doi.org/10.4018/IJACI.2016070101]
[63]
L. Sun, B. Cao, J. Wang, W. Srisa-an, P. Yu, A.D. Leow, and S. Checkoway, "KOLLECTOR: Detecting fraudulent activities on mobile devices using deep learning", IEEE Trans. Mobile Comput., 2020.
[http://dx.doi.org/10.1109/TMC.2020.2964226]
[64]
J. Poddar, V. Parikh, and S.K. Bharti, "Offline signature recognition and forgery detection using deep learning", Procedia Comput. Sci., vol. 170, pp. 610-617, 2020.
[http://dx.doi.org/10.1016/j.procs.2020.03.133]
[65]
E. Alajrami, B.A. Ashqar, B.S. Abu-Nasser, A.J. Khalil, M.M. Musleh, A.M. Barhoom, and S.S. Abu-Naser, "Handwritten signature verification using deep learning", J. Interdiscip. Multidiscip. Res., vol. 3, no. 12, pp. 39-44, 2020. [IJAMR].
[66]
S.E. Zohora, A.K. Srivastava, and N. Dey, "Gas Sensing techniques in electronic nose and its applications: A review", In: 3rd International Conference of Electrical, Electronics, Engineering Trends. Communication, Optimization and Sciences, Andhrapradesh, India 2016, pp. 178-183.
[67]
J.A. Trivedi, “Voice identification system using neuro-fuzzy approach”, Int. j. adv. res. comput. sci. tech, vol 2, 2014.
[68]
J. Jangir, B.K. Singh, and M.I. Ali, "Voice Identification Secure System by Statistical Model of Speech Signal Using Normalization Technique", Int. J. Eng., vol. 3, no. 1, 2014.
[69]
T. Bhattacharya, S. Hore, N. Dey, and S.B. Chaudhuri, "Stationary wavelet transform based audio authentication technique", In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, Coimbatore, India, 2012, pp. 575-579.
[http://dx.doi.org/10.1145/2393216.2393312]
[70]
S. Cunningham, and R. Picking, "Sounds Relaxing-Looks Cool: Audio and Visual Selections for Computer Systems that Support Wellness", Int. J. Ambient Comput. Intell., vol. 4, no. 1, pp. 40-53, 2012. [IJACI].
[http://dx.doi.org/10.4018/jaci.2012010104]
[71]
A. Boles, and P. Rad, "Voice biometrics: Deep learning-based voiceprint authentication system", In: 2017 12th System of Systems Engineering Conference (SoSE), Waikoloa, Hawaii, USA, 2017
[72]
D. Lymberopoulos, J. Liu, and H. Wang, “User-authentication gestures”, U.S. Patent No. 9,710,632, 2015.
[73]
A.S. George, E. Roy, A. Antony, and M. Job, "An efficient gait recognition system for human identification using", Neural Netw., 2017.
[74]
S. Angadi, and S. Nandyal, "Human identification system based on spatial and temporal features in the video surveillance system", Int. J. Ambient Comput. Intell., vol. 11, no. 3, pp. 1-21, 2020. [IJACI]
[http://dx.doi.org/10.4018/IJACI.2020070101]
[75]
G.V. Kale, and V.H. Patil, "A study of vision based human motion recognition and analysis", Int. J. Ambient Comput. Intell., vol. 7, no. 2, pp. 75-92, 2016. [IJACI].
[http://dx.doi.org/10.4018/IJACI.2016070104]
[76]
Q. Zou, Y. Wang, Q. Wang, Y. Zhao, and Q. Li, "Deep Learning-Based Gait Recognition Using Smartphones in the Wild", IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3197-3212, 2020.
[77]
C.M. Travieso, J. Zhang, P. Miller, and J.B. Alonso, "Using a Discrete Hidden Markov Model Kernel for lip-based biometric identification", Image Vis. Comput., vol. 32, no. 12, pp. 1080-1089, 2014.
[http://dx.doi.org/10.1016/j.imavis.2014.10.001]
[78]
C. Wright, and D. Stewart, "One-shot-learning for visual lip-based biometric authentication", In: International Symposium on Visual Computing, Lake Tahoe, NV, USA, 2019, pp. 405-417.
[79]
A. Weiss, A. Ramapanicker, P. Shah, S. Noble, and L. Immohr, Mouse movements biometric identification: A feasibility study. Proc. Student/Faculty Research Day CSIS., Pace University: White Plains, NY, 2007.
[80]
M. Antal, and N. Fejér, "Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae", Informatica, vol. 12, no. 1, pp. 39-50, 2020.
[81]
A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity-authentication system using fingerprints", Proc. IEEE, vol. 85, no. 9, pp. 1365-1388, 1997.
[http://dx.doi.org/10.1109/5.628674]
[82]
M. Chowdhury, J. Gao, and R. Islam, "Biometric authentication using facial recognition", International Conference on Security and Privacy in Communication Systems, 2016pp. 287-295
[83]
S.C. Chong, A.B.J. Teoh, and D.C.L. Ngo, "Iris authentication using privatized advanced correlation filter", In: International Conference on Biometrics, Hong Kong, China, 2006, pp. 382-388.
[84]
C.C. Han, H.L. Cheng, C.L. Lin, and K.C. Fan, "Personal authentication using palm-print features", Pattern Recognit., vol. 36, no. 2, pp. 371-381, 2003.
[http://dx.doi.org/10.1016/S0031-3203(02)00037-7]
[85]
P. Yan, and K.W. Bowyer, "Biometric recognition using 3D ear shape", IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 8, pp. 1297-1308, 2007.
[http://dx.doi.org/10.1109/TPAMI.2007.1067] [PMID: 17568136]
[86]
M. Ortega, C. Marino, M.G. Penedo, M. Blanco, and F. Gonzalez, "Biometric authentication using digital retinal images", In: Proceedings of the 5th WSEAS international conference on Applied computer science, Hangzhou, China, 2006, pp. 422-427.
[87]
M. Shahin, A. Badawi, and M. Kamel, "Biometric authentication using fast correlation of near infrared hand vein patterns", Int J Biol Med Sci, vol. 2, no. 3, pp. 141-148, 2007.
[88]
I. Odinaka, P.H. Lai, A.D. Kaplan, J.A. O’Sullivan, E.J. Sirevaag, and J.W. Rohrbaugh, "ECG biometric recognition: A comparative analysis", IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1812-1824, 2012.
[http://dx.doi.org/10.1109/TIFS.2012.2215324]
[89]
M. Karnan, M. Akila, and N. Krishnaraj, "Biometric personal authentication using keystroke dynamics: A review", Appl. Soft Comput., vol. 11, no. 2, pp. 1565-1573, 2011.
[http://dx.doi.org/10.1016/j.asoc.2010.08.003]
[90]
A. Kholmatov, and B. Yanikoglu, "Identity authentication using improved online signature verification method", Pattern Recognit. Lett., vol. 26, no. 15, pp. 2400-2408, 2005.
[http://dx.doi.org/10.1016/j.patrec.2005.04.017]
[91]
M. Marzotti, and C. Nardini, "Biometric authentication using voice", TDDC03 Projects, Spring, 2006.
[92]
M. Hashiyada, "Development of biometric DNA ink for authentication security", Tohoku J. Exp. Med., vol. 204, no. 2, pp. 109-117, 2004.
[http://dx.doi.org/10.1620/tjem.204.109] [PMID: 15383691]
[93]
Q. Zheng, M. Yang, Q. Zhang, and X. Zhang, "Fine-grained image classification based on the combination of artificial features and deep convolutional activation features", In: 2017 IEEE/CIC International Conference on Communications in China (ICCC), Qingdao, China, 2017, pp. 1-6.
[http://dx.doi.org/10.1109/ICCChina.2017.8330485]
[94]
Q. Zheng, M. Yang, J. Yang, Q. Zhang, and X. Zhang, "Improvement of generalization ability of deep CNN via implicit regularization in two-stage training process", IEEE Access, vol. 6, pp. 15844-15869, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2810849]
[95]
Q. Zheng, X. Tian, N. Jiang, and M. Yang, "Layer-wise learning based stochastic gradient descent method for the optimization of deep convolutional neural network", J. Intell. Fuzzy Syst., vol. 37, no. 4, pp. 5641-5654, 2019.
[http://dx.doi.org/10.3233/JIFS-190861]
[96]
Q. Zheng, X. Tian, M. Yang, Y. Wu, and H. Su, "PAC-Bayesian framework based drop-path method for 2D discriminative convolutional network pruning", Multidimens. Syst. Signal Process., vol. 30, no. 4, pp. 1-35, 2019.
[http://dx.doi.org/10.1007/s11045-019-00686-z]
[97]
Q. Zheng, M. Yang, X. Tian, N. Jiang, and D. Wang, "A full stage data augmentation method in deep convolutional neural network for natural image classification", Discrete Dyn. Nat. Soc., vol.2020, 2020.
[http://dx.doi.org/10.1155/2020/4706576]
[98]
R. Giot, M. El-Abed, and C. Rosenberger, "Fast computation of the performance evaluation of biometric systems: Application to multibiometrics", Future Gener. Comput. Syst., vol. 29, no. 3, pp. 788-799, 2013.
[http://dx.doi.org/10.1016/j.future.2012.02.003]
[99]
N.K. Ratha, J.H. Connell, and R.M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
[http://dx.doi.org/10.1147/sj.403.0614]
[100]
A.K. Jain, and K. Nandakumar, "Biometric authentication: system security and user privacy", IEEE Computer, vol. 45, no. 11, pp. 87-92, 2012.
[http://dx.doi.org/10.1109/MC.2012.364]
[101]
A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security", EURASIP J. Adv. Signal Process., vol. 2008, p. 113, 2008.
[http://dx.doi.org/10.1155/2008/579416]
[102]
A.K. Jain, A. Ross, and S. Pankanti, "Biometrics: a tool for information security", IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 125-143, 2006.
[http://dx.doi.org/10.1109/TIFS.2006.873653]
[103]
A.K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition", IEEE Trans. Circ. Syst. Video Tech., vol. 14, no. 1, pp. 4-20, 2004.
[http://dx.doi.org/10.1109/TCSVT.2003.818349]
[104]
A.K. Jain, and U. Uludag, "Hiding biometric data", IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 11, pp. 1494-1498, 2003.
[http://dx.doi.org/10.1109/TPAMI.2003.1240122]
[105]
V. Joshi, M. Raval, P. Rege, and S. Parulkar, "Multistage VQ based exact authentication for biometric images. Computer Society of India (CSI)", J. Comput., vol. 2, no. 1-2, pp. R3-R25, 2013.
[106]
M.V. Joshi, V.B. Joshi, and M.S. Raval, Multilevel semi-fragile watermarking technique for improving biometric fingerprint system security.Intelligent interactive technologies and multimedia., Springer: Berlin, Heidelberg, 2013, pp. 272-283.
[http://dx.doi.org/10.1007/978-3-642-37463-0_25]
[107]
C. Li, B. Ma, Y. Wang, and Z. Zhang, "Protecting biometric templates using authentication watermarking", In: Pacific-Rim Conference on Multimedia, Shanghai, China, 2010, pp. 709-718.
[108]
W.G. Kim, and H. Lee, "Multimodal biometric image watermarking using two-stage integrity verification", Signal Processing, vol. 89, no. 12, pp. 2385-2399, 2009.
[http://dx.doi.org/10.1016/j.sigpro.2009.04.014]
[109]
T. Hoang, D. Tran, and D. Sharma, "Remote multimodal biometric authentication using bit priority-based fragile watermarking", In: Pattern Recognition, 2008. ICPR 2008. 19th International Conference IEEE, Tampa, Florida, USA, 2008, pp 1-4.
[110]
R. Thanki, V. Dwivedi, K. Borisagar, and S. Borra, "A watermarking algorithm for multiple watermarks protection using svd and compressive sensing", Informatica, vol. 41, no. 4, pp. 479-493, 2017.
[111]
P. Singh, B. Raman, and P.P. Roy, "A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform", Multimedia Tools Appl., vol. 76, no. 3, pp. 3871-3897, 2017.
[http://dx.doi.org/10.1007/s11042-016-4048-0]
[112]
V.S. Inamdar, and P.P. Rege, "Dual watermarking technique with multiple biometric watermarks", Sadhana, vol. 39, no. 1, pp. 3-26, 2014.
[http://dx.doi.org/10.1007/s12046-013-0208-3]
[113]
M. Paunwala, and S. Patnaik, "Biometric template protection with DCT-based watermarking", Mach. Vis. Appl., vol. 25, no. 1, pp. 263-275, 2014.
[http://dx.doi.org/10.1007/s00138-013-0533-x]
[114]
A. Javed, M. Fasihullah, M.A. Munir, I. Usman, M.F. Shafique, T. Bashir, and M.A. Khan, "A new additive watermarking technique for multimodal biometric identification", J. Basic Appl. Sci. Res., vol. 3, no. 7, pp. 935-942, 2013.
[115]
P.T. Selvy, V. Palanisamy, and S. Elakkiya, "A novel watermarking of images based on wavelet based contourlet transform energized by biometrics", WSEAS Trans. Comput., vol. 12, pp. 105-115, 2013.
[116]
P. Rege, "Biometric Watermarking", In: National Seminar on Computer Vision and Image Processing, Rajkot, India, 2012
[117]
V. Inamdar, and P. Rege, "Face features based biometric watermarking of digital image using singular value decomposition for fingerprinting", International journal of security and its applications, vol. 6, no. 2, pp. 47-60, 2012.
[118]
M.R.M. Isa, and S. Aljareh, "Biometric image protection based on discrete cosine transform watermarking technique", Engineering and Technology (ICET), 2012pp. 1-5
[http://dx.doi.org/10.1109/ICEngTechnol.2012.6396130]
[119]
P. Bedi, R. Bansal, and P. Sehgal, "Multimodal biometric authentication using PSO based watermarking", Procedia Technology, vol. 4, pp. 612-618, 2012.
[http://dx.doi.org/10.1016/j.protcy.2012.05.098]
[120]
B. Ma, C. Li, Z. Zhang, and Y. Wang, "Sparse reconstruction-based watermarking for secure biometric authentication", In: Chinese Conference on Biometric Recognition, Zhuzhou, China, 2011, pp. 244-251.
[http://dx.doi.org/10.1007/978-3-642-25449-9_31]
[121]
V. Inamdar, P. Rege, and M. Arya, "Offline handwritten signature based blind biometric watermarking and authentication technique using biorthogonal wavelet transform", Int. J. Comput. Appl., vol. 11, no. 1, pp. 19-27, 2010.
[122]
V. Jundale, and S. Patil, "Biometric speech watermarking technique in images using wavelet transform", IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), pp. 33-39, 2010.
[123]
A. Annavarapu, and P. Kora, "ECG-based atrial fibrillation detection using different orderings of Conjugate Symmetric–Complex Hadamard Transform", Int J Cardiovasc Acad., vol. 2, no. 3, pp. 151-154, 2016.
[http://dx.doi.org/10.1016/j.ijcac.2016.08.001]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy