A Brief Review about Biometrics Systems in Modern Context

Main Article Content

Hector Caballero
Leopoldo Gil-Antonio
Erika Lopez

Abstract

Authentication systems employ various access mechanisms for the data validation process.Nowadays there are many proposals focused on solving the traditional problems that exist to validate the records of installations in public or private places.With the appearance of COVID-19, the use of technology has intensified to avoid contact with physical devices and achieve successful access.This article shows a compilation of work dedicated to methods and techniques for access to facilities by reading modern biometric systems.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Hector Caballero, Tecnologico de Estudios Superiores de Jocotitlan

Professor

Leopoldo Gil-Antonio, Tecnologico de Estudios Superiores de Jocotitlan

Professor

Erika Lopez, Tecnologico de Estudios Superiores de Jocotitlan

Professor

References

K. Okereafor, I. Ekong, I. Markson and K. Enwere. “Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmissionâ€, in JMIR Biomedical Engineering. 5. 1-15. 10.2196/19623, 2020

Y. Guo. “Impact on Biometric Identification Systems of COVID-19â€, in Scientific Programming. 2021. 1-7. 10.1155/2021/3225687, 2021.

R. Gupta and P. Sehgal. “A survey of attacks on iris biometric systemsâ€, in International Journal of Biometrics, 8. 145. 10.1504/IJBM.2016.077833, 2016.

A. S. Zimik and C. Keishing. “A Study on the Performance of Biometric Devices with Reference to Employee Interfaceâ€, in Indian Journal of Management and Language. 1. 8-12. 10.54105/ijml.C2039.041322, 2020.

I. Buciu and A. Gacsadi. “Biometrics Systems and Technologies: A surveyâ€, in International Journal of Computers Communications & Control. 11. 315. 10.15837/ijccc.2016.3.2556, 2016.

S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic. (2017) “Evaluating behavioral biometrics for continuous authentication: Challenges and metricsâ€, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 386–399, 2017.

F. Cherifi, B. Hemery, R. Giot, M. Pasquet, and C. Rosenberger. “Performance evaluation of behavioral biometric systemsâ€, in Behavioral biometrics for human identification: Intelligent applications, pp. 57–74, IGI Global, 2010.

S. Neware. “Biometrics System an Overviewâ€, in International Journal of Computer Sciences and Engineering. 6. 313-319. 10.26438/ijcse/v6i1.313319, 2018.

R. Malathi et al. “An integrated approach of physical biometric authentication systemâ€, in Procedia Computer Science, vol. 85, pp. 820–826, 2016.

A. Wójtowicz and K. Joachimiak. “Model for adaptable context-based biometric authentication for mobile devicesâ€, in Personal and Ubiquitous Computing, vol. 20, no. 2, pp. 195–207, 2016.

P.-C. Huang, C.-C. Chang, Y.-H. Li, and Y. Liu. “Efficient access control system based on aesthetic QR codeâ€, in Personal and Ubiquitous Computing, vol. 22, no. 1, pp. 81–91, 2018.

H. Kang, K.-H. Lee, and G.-J. Kim. “Safe and convenient personal authentication method using moiré 3d authentication based on biometric authenticationâ€, in Cluster Computing, vol. 22, no. 1, pp. 2017–2026, 2019.

E. B. Tarif, S. Wibowo, S. Wasimi and A. Tareef. “A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication systemâ€, in Multimedia Tools and Applications, vol. 77, no. 2, pp. 2485–2503, 2018.

E. R. Isaac, S. Elias, S. Rajagopalan, and K. Easwarakumar. “Gait verification system through multiperson signature matching for unobtrusive biometric authenticationâ€, in Journal of Signal Processing Systems, vol. 91, no. 2, pp. 147–161, 201

E. Sujatha and A. Chilambuchelvan. “Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded DWTâ€, in Wireless Personal Communications, vol. 99, no. 1, pp. 23–34, 2018.

L. Catuogno, C. Galdi and D. Riccio. “Off-line enterprise rights management leveraging biometric key binding and secure hardwareâ€, in Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 7, pp. 2883–2894, 2019.

D. M. Kaburu, J. Sansa-Otim, K. Mayanja, D. P. Mirembe, and T. Bulega. “A usability-based approach to designing continuous user biometric authentication systemâ€. Quality and User Experience, vol. 3, no. 1, pp. 1–14, 2018.

S. Sahmim and H. Gharsellaoui. “Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a reviewâ€, in Procedia computer science, vol. 112, pp. 1516–1522, 2017.

M. H. Ozcanhan, G. Dalkilic, and S. Utku. “Criptographically supported NFC Tags in medication for better inpatient safetyâ€, in Journal of medical systems, vol. 38, no. 8, pp. 1-15, 2014.

K.Chatterjee et al. “Biometric re-authentication: An approach towars achieving transparency in user authenticationâ€. Multimedia Tools and Applications, vol 78, no. 6, pp. 6679-6700, 2019.

H. Amintoosi an A. J. Taresh. “Sparce coding-based feature extraction for a biometric remote authentication in inter of thingsâ€. SN Applied Sciences, vol. 1, no. 9, pp 1-5, 2019.

S. D. Kaul and D. Hatzinakos. “Intelligent RFID biometric enables dual security lock in the banking environnmentâ€, in Jornal of Banking a Financial Technology, vol. 4, no. 2, pp. 159-173, 2020.

Sarkar and B. K. Singh. “A review on performance, security and various biometric template protection schemes for a biometric authentication systemâ€. Multimedia Tools and Applications, vol. 79, no. 37, pp. 27721-27776, 2020.

B. Meden, P. Rot, P. Terhorst, N. Damer, A Kuijper, W. J. Scheirer, A Ross, P. Peer and V. Struc. “Privacy-enhancing face biometrics: A compressive surveyâ€, in IEEE Transactions on Information Forensics and Security, 2021.

M. Obaidat, J. Brown, S. Obeidat and M. Rawashdeh. “A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authenticationâ€, in MDPI, Sensors, 20, pp. 1-32, 2020.

D. Anguiano-Cervantes, G. Saaduddin, Y. Li. and M. Xie. (2016) “Comparison between Fingerprint and Behavioral Biometric Authentication Using 2D and 3D Gesturesâ€, in 2016 IEEE Conference on Communications and Network Security (CNS): IEEE CNS 2016, 2016.

Doshi, N. Patel, C. “A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card†in 2018 IEEE, conference paper, 2018

P. Baraki and V. Ramaswamy. “Biometric Authentication of a User using Online Dynamic Signatureâ€. IEEE, 2016

B. Naidu, K. V. L. Bhavani, C. Rao and P. V. G. D. Reddy. “Comparative Analysis of Three Single Trait Biometric Authentication Modelsâ€. 0956-0959. 10.1109/ICCSP.2019.8698041, 2019.

D. Shah, V. Bharadi, V. Kaul, and S. Amrutia. “End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Nodeâ€. 52-59. 10.1109/ICCUBEA.2015.19, 2015.

S. Sivaranjani, and S. Sumathi. “Implementation of fingerprint and newborn footprint feature extraction on Raspberry Piâ€. 10. 1-6. 10.1109/ICIIECS.2015.7193087, 2015.

Nagamma, N.N. & Lakshmaiah, Mv & Narmada, T. “Raspberry Pi based biometric authentication vehicle door locking systemâ€. 2348-2351. 10.1109/ICPCSI.2017.8392138, 2017.

V. Govindraj, P. V., Yashwanth, S. Bhat, and T. K. Ramesh. “Smart Door Using Biometric NFC Band and OTP Based Methodsâ€. 1-4. 10.1109/INCET49848.2020.9153970, 2020.

P. Huang, L. Guo, M. Li and Y. Fang. “Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcareâ€, inIEEE Internet of Things Journal. 10.1109/JIOT.2019.2929087, 2019.

Y. Liang, S. Samtani, B. Guo, and Z. Yu. “Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspectiveâ€, in IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2020.3004077, 2020.

S. Cherupally, S. Yin, D. Kadetotad, C. Bae, S. Kim, and J. Seo. “A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV, and SRAM PUF for Authentication and Secret Key Generationâ€, in IEEE Journal of Solid-State Circuits. 55. 1-1. 10.1109/JSSC.2020.3010705, 2020.

R. Cordeiro, D. Gajaria, A. Limaye, T. Adegbija, N. Karimian and F. Tehranipoor. “ECG-Based Authentication Using Timing-Aware Domain-Specific Architectureâ€, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39. 3373-3384. 10.1109/TCAD.2020.3012169, 2020.

R. D. Findling, M. Hölzl, and R. Mayrhofer. “Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometricsâ€, in IEEE Transactions on Mobile Computing. PP. 1-1. 10.1109/TMC.2018.2812883, 2018.

J. Klonovs, C. Petersena H. Olesen, A. Hammershoj. “ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication Systemâ€, in Vehicular Technology Magazine, IEEE. 8. 81-89. 10.1109/MVT.2012.2234056, 2013.