A Brief Review about Biometrics Systems in Modern Context
Main Article Content
Abstract
Authentication systems employ various access mechanisms for the data validation process.Nowadays there are many proposals focused on solving the traditional problems that exist to validate the records of installations in public or private places.With the appearance of COVID-19, the use of technology has intensified to avoid contact with physical devices and achieve successful access.This article shows a compilation of work dedicated to methods and techniques for access to facilities by reading modern biometric systems.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
K. Okereafor, I. Ekong, I. Markson and K. Enwere. “Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmissionâ€, in JMIR Biomedical Engineering. 5. 1-15. 10.2196/19623, 2020
Y. Guo. “Impact on Biometric Identification Systems of COVID-19â€, in Scientific Programming. 2021. 1-7. 10.1155/2021/3225687, 2021.
R. Gupta and P. Sehgal. “A survey of attacks on iris biometric systemsâ€, in International Journal of Biometrics, 8. 145. 10.1504/IJBM.2016.077833, 2016.
A. S. Zimik and C. Keishing. “A Study on the Performance of Biometric Devices with Reference to Employee Interfaceâ€, in Indian Journal of Management and Language. 1. 8-12. 10.54105/ijml.C2039.041322, 2020.
I. Buciu and A. Gacsadi. “Biometrics Systems and Technologies: A surveyâ€, in International Journal of Computers Communications & Control. 11. 315. 10.15837/ijccc.2016.3.2556, 2016.
S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic. (2017) “Evaluating behavioral biometrics for continuous authentication: Challenges and metricsâ€, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 386–399, 2017.
F. Cherifi, B. Hemery, R. Giot, M. Pasquet, and C. Rosenberger. “Performance evaluation of behavioral biometric systemsâ€, in Behavioral biometrics for human identification: Intelligent applications, pp. 57–74, IGI Global, 2010.
S. Neware. “Biometrics System an Overviewâ€, in International Journal of Computer Sciences and Engineering. 6. 313-319. 10.26438/ijcse/v6i1.313319, 2018.
R. Malathi et al. “An integrated approach of physical biometric authentication systemâ€, in Procedia Computer Science, vol. 85, pp. 820–826, 2016.
A. Wójtowicz and K. Joachimiak. “Model for adaptable context-based biometric authentication for mobile devicesâ€, in Personal and Ubiquitous Computing, vol. 20, no. 2, pp. 195–207, 2016.
P.-C. Huang, C.-C. Chang, Y.-H. Li, and Y. Liu. “Efficient access control system based on aesthetic QR codeâ€, in Personal and Ubiquitous Computing, vol. 22, no. 1, pp. 81–91, 2018.
H. Kang, K.-H. Lee, and G.-J. Kim. “Safe and convenient personal authentication method using moiré 3d authentication based on biometric authenticationâ€, in Cluster Computing, vol. 22, no. 1, pp. 2017–2026, 2019.
E. B. Tarif, S. Wibowo, S. Wasimi and A. Tareef. “A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication systemâ€, in Multimedia Tools and Applications, vol. 77, no. 2, pp. 2485–2503, 2018.
E. R. Isaac, S. Elias, S. Rajagopalan, and K. Easwarakumar. “Gait verification system through multiperson signature matching for unobtrusive biometric authenticationâ€, in Journal of Signal Processing Systems, vol. 91, no. 2, pp. 147–161, 201
E. Sujatha and A. Chilambuchelvan. “Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded DWTâ€, in Wireless Personal Communications, vol. 99, no. 1, pp. 23–34, 2018.
L. Catuogno, C. Galdi and D. Riccio. “Off-line enterprise rights management leveraging biometric key binding and secure hardwareâ€, in Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 7, pp. 2883–2894, 2019.
D. M. Kaburu, J. Sansa-Otim, K. Mayanja, D. P. Mirembe, and T. Bulega. “A usability-based approach to designing continuous user biometric authentication systemâ€. Quality and User Experience, vol. 3, no. 1, pp. 1–14, 2018.
S. Sahmim and H. Gharsellaoui. “Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a reviewâ€, in Procedia computer science, vol. 112, pp. 1516–1522, 2017.
M. H. Ozcanhan, G. Dalkilic, and S. Utku. “Criptographically supported NFC Tags in medication for better inpatient safetyâ€, in Journal of medical systems, vol. 38, no. 8, pp. 1-15, 2014.
K.Chatterjee et al. “Biometric re-authentication: An approach towars achieving transparency in user authenticationâ€. Multimedia Tools and Applications, vol 78, no. 6, pp. 6679-6700, 2019.
H. Amintoosi an A. J. Taresh. “Sparce coding-based feature extraction for a biometric remote authentication in inter of thingsâ€. SN Applied Sciences, vol. 1, no. 9, pp 1-5, 2019.
S. D. Kaul and D. Hatzinakos. “Intelligent RFID biometric enables dual security lock in the banking environnmentâ€, in Jornal of Banking a Financial Technology, vol. 4, no. 2, pp. 159-173, 2020.
Sarkar and B. K. Singh. “A review on performance, security and various biometric template protection schemes for a biometric authentication systemâ€. Multimedia Tools and Applications, vol. 79, no. 37, pp. 27721-27776, 2020.
B. Meden, P. Rot, P. Terhorst, N. Damer, A Kuijper, W. J. Scheirer, A Ross, P. Peer and V. Struc. “Privacy-enhancing face biometrics: A compressive surveyâ€, in IEEE Transactions on Information Forensics and Security, 2021.
M. Obaidat, J. Brown, S. Obeidat and M. Rawashdeh. “A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authenticationâ€, in MDPI, Sensors, 20, pp. 1-32, 2020.
D. Anguiano-Cervantes, G. Saaduddin, Y. Li. and M. Xie. (2016) “Comparison between Fingerprint and Behavioral Biometric Authentication Using 2D and 3D Gesturesâ€, in 2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016, 2016.
Doshi, N. Patel, C. “A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card†in 2018 IEEE, conference paper, 2018
P. Baraki and V. Ramaswamy. “Biometric Authentication of a User using Online Dynamic Signatureâ€. IEEE, 2016
B. Naidu, K. V. L. Bhavani, C. Rao and P. V. G. D. Reddy. “Comparative Analysis of Three Single Trait Biometric Authentication Modelsâ€. 0956-0959. 10.1109/ICCSP.2019.8698041, 2019.
D. Shah, V. Bharadi, V. Kaul, and S. Amrutia. “End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Nodeâ€. 52-59. 10.1109/ICCUBEA.2015.19, 2015.
S. Sivaranjani, and S. Sumathi. “Implementation of fingerprint and newborn footprint feature extraction on Raspberry Piâ€. 10. 1-6. 10.1109/ICIIECS.2015.7193087, 2015.
Nagamma, N.N. & Lakshmaiah, Mv & Narmada, T. “Raspberry Pi based biometric authentication vehicle door locking systemâ€. 2348-2351. 10.1109/ICPCSI.2017.8392138, 2017.
V. Govindraj, P. V., Yashwanth, S. Bhat, and T. K. Ramesh. “Smart Door Using Biometric NFC Band and OTP Based Methodsâ€. 1-4. 10.1109/INCET49848.2020.9153970, 2020.
P. Huang, L. Guo, M. Li and Y. Fang. “Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcareâ€, inIEEE Internet of Things Journal. 10.1109/JIOT.2019.2929087, 2019.
Y. Liang, S. Samtani, B. Guo, and Z. Yu. “Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspectiveâ€, in IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2020.3004077, 2020.
S. Cherupally, S. Yin, D. Kadetotad, C. Bae, S. Kim, and J. Seo. “A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV, and SRAM PUF for Authentication and Secret Key Generationâ€, in IEEE Journal of Solid-State Circuits. 55. 1-1. 10.1109/JSSC.2020.3010705, 2020.
R. Cordeiro, D. Gajaria, A. Limaye, T. Adegbija, N. Karimian and F. Tehranipoor. “ECG-Based Authentication Using Timing-Aware Domain-Specific Architectureâ€, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39. 3373-3384. 10.1109/TCAD.2020.3012169, 2020.
R. D. Findling, M. Hölzl, and R. Mayrhofer. “Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometricsâ€, in IEEE Transactions on Mobile Computing. PP. 1-1. 10.1109/TMC.2018.2812883, 2018.
J. Klonovs, C. Petersena H. Olesen, A. Hammershoj. “ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication Systemâ€, in Vehicular Technology Magazine, IEEE. 8. 81-89. 10.1109/MVT.2012.2234056, 2013.