CFP last date
20 May 2024
Reseach Article

A Review on Security of Multimodal Biometrics

by Muskaan, Tarun Gulati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 8
Year of Publication: 2015
Authors: Muskaan, Tarun Gulati
10.5120/20763-3193

Muskaan, Tarun Gulati . A Review on Security of Multimodal Biometrics. International Journal of Computer Applications. 118, 8 ( May 2015), 10-13. DOI=10.5120/20763-3193

@article{ 10.5120/20763-3193,
author = { Muskaan, Tarun Gulati },
title = { A Review on Security of Multimodal Biometrics },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 8 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number8/20763-3193/ },
doi = { 10.5120/20763-3193 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:06.998771+05:30
%A Muskaan
%A Tarun Gulati
%T A Review on Security of Multimodal Biometrics
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 8
%P 10-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The unique parts of body that identifies a person are known as biometrics. The different biometrics used now-a-days are fingerprints, iris, face recognition, handwriting, gesture, retina, ear height etc. The biometrics when used in conjunction for the identification or verification of an individual are called as MULTIMODAL BIOMETRICS. This is assumed to be a better approach for security. It overcomes some of the limitations of single biometrics as this approach is more reliable. ID cards, Access cards, Punch, PIN, USER ID, passwords are used for identification but ID cards can be stolen or can be lost and user id s and passwords can be forgotten. So biometrics overcomes all these and has become the emerging trend. Further the security of the database is improved using cryptosystem. It takes a key and changes plain text into cipher text and back.

References
  1. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, Review Article Biometric Template Security, Department of Computer Science and Engineering, Michigan State University, 3115 Engineering Building, East Lansing, MI48824, USA.
  2. A. K. Jain, R. Bolle, and S. Pankanti, eds. , Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
  3. T. Gulati, M. Pal, "Interpreting Low Resolution CT Scan Images Using Interpolation Functions," International Journal of Computer Applications, Vol 74– No. 3, July 2013, pp. 50-57.
  4. A. Juels and M. Sudan, "A fuzzy vault scheme," in Proceedings of the IEEE International Symposium on Information Theory, p. 408, Piscataway, NJ, USA, June-July 2002.
  5. Binsu C. Kovoor, Supriya M. H. and K. Poulose Jacob, "Effectiveness of feature detection operators on the performance of iris biometric recognition system", International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 5, September 2013
  6. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007.
  7. Y. Sutcu, H. T. Sencar, and N. Memon, "A secure biometric authentication scheme based on robust hashing," in Proceedings of the 7thMultimedia and SecurityWorkshop (MMand Sec '05), pp. 111–116, New York, NY, USA, August 2006.
  8. T. Gulati, H. P. Sinha, "Interpreting Low Resolution MRI Images Using Polynomial Based Interpolation," International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 13 - Apr 2014, pp. 626-631.
  9. Debnath Bhattacharya, Rahul Ranjan, Farkhod Alisherov A. and Minkyu Choi," Biometric Authentication: A Review", International Journal of u- and e- Service, Science and Technology, Vol. 2, No. 3, September, 2009.
  10. RajkumarYadav, Rahul Rishi &SudhirBatra, "A New Steganography Method for Gray Level Images using Parity Checker",International Journal of Computer Applications (0975-8887) Volume 11-No. 11, December 2010
  11. RajkumarYadav et al. / International Journal on Computer Science and Engineering (IJCSE)
  12. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, Berlin, Germany, 2003.
  13. Abhishek Sagar,Karthik Nandakumar, Anil K. Jain,"Multi biometric cryptosystems based on feature level fusion" ,Department of Computer Science and Engineering,Michigan State University, 3115 Engineering Building, East Lansing, MI48824, USA.
  14. Wayman, J. L. , "A path forward for multi-biometrics,"ICASSP '06.
  15. R. N. Kankrale, Prof. S. D. Sapkal, " Template Level Fusion of Iris and Fingerprint in Multimodal Biometric Identification Systems", Department of Information Technology SRES.
  16. A Ross and A. K. Jain, "Information fusion in biometrics", Pattern Recognition Letters, vol. 24, no. 13, pp. 2115–2125,
  17. 2003.
  18. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of
  19. Multibiometrics, Springer-Verlag edition, 2006.
  20. L. Lan and C. Y Suen, ?Application of majority voting to pattern recognition,? IEEE Transactions on Systems, Man,
  21. and Cybernetics, Part A: Systems and Humans, vol. 27, no.
  22. 5, pp. 553–568, 1997.
  23. G Hemantha Kumar and Mohammad Imran," Research avenues in multimodal biometrics", IJCA, RTIPPR, 2010.
  24. J. Heo, S. Kong, B. Abidi, and M. Abidi, ?Fusion of visible and thermal signatures with eyeglass removal forrobust face recognition,? in IEEE workshop on Object Tracking and Classification Beyond the visible spectrum in conjunction with (CVPR-2004), Washington, DC, USA, 2004, pp. 94–99.
  25. Poonam, Santosh Kumar Mishra, "Encryption of secutiy of multimodal biometric using Encryption method", IJAGET, vol-2, issue-09, September 2014.
  26. Sulochna Sonkamble, DR. Ravindra Thool, Balwant Sonkamble,"Survey of biometic recognition systems and their applications",JATIT,2005.
  27. Renu Bhatia,'Biometrics and face recognition techniques',IJARCSSE, vol-3, issue-5, May 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Recognition Security Biometric Retina Multi modal