(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-10 Issue-47 March-2020
Full-Text PDF
Paper Title : A survey of biometric approaches of authentication
Author Name : Nuhu Yusuf, Kamalu Abdullahi Marafa, Kamila Ladan Shehu, Hussaini Mamman and Mustapha Maidawa
Abstract :

The increasing need for better authentication methods against hackers has called for the use of the biometric authentication method to guard against unauthorized access into the systems. The used of human characteristics for biometrics provides authentication for different kind of systems. However, poor quality of authentication still allows hackers gaining access to these systems. Many biometrics authentication approaches have been proposed to improve the authentication accuracy and other related quality measures. This survey aims to provide a state-of-the-art fingerprint and password biometric authentication approaches. Their challenges have been presented and discussed in terms of biometric authentication. Furthermore, the strengths and weaknesses of each of the fingerprint and password biometric authentication are discussed and compared. The findings show that fingerprint image quality and password authentication is still an active research area where performance requires improvement. Also, the graphical password indicates a promising future direction for enhancing password methods.

Keywords : Biometrics, Authentication, Fingerprint, Password, Information security.
Cite this article : Yusuf N, Marafa KA, Shehu KL, Mamman H, Maidawa M. A survey of biometric approaches of authentication. International Journal of Advanced Computer Research. 2020; 10(47):96-104. DOI:10.19101/IJACR.2019.940152.
References :
[1]Bharathi S, Sudhakar R. Biometric recognition using finger and palm vein images. Soft Computing. 2019; 23:1843-55.
[Crossref] [Google Scholar]
[2]Padma P, Srinivasan S. A survey on biometric based authentication in cloud computing. In international conference on inventive computation technologies 2016 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[3]Prasad PS, Devi BS, Reddy MJ, Gunjan VK. A survey of fingerprint recognition systems and their applications. In international conference on communications and cyber physical engineering 2018 (pp. 513-20). Springer, Singapore.
[Crossref] [Google Scholar]
[4]Tekade P, Shende P. Enhancement of security through fused multimodal biometric system. In international conference on computing, communication, control and automation 2017 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[5]Parkavi R, Babu KC, Kumar JA. Multimodal biometrics for user authentication. In 11th international conference on intelligent systems and control 2017 (pp. 501-5). IEEE.
[Crossref] [Google Scholar]
[6]Kakkad V, Patel M, Shah M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design. 2019; 2:233-48.
[Crossref] [Google Scholar]
[7]Nakanishi I, Maruoka T. Biometric authentication using evoked potentials stimulated by personal ultrasound. In international conference on telecommunications and signal processing (TSP) 2019 (pp. 365-8). IEEE.
[Crossref] [Google Scholar]
[8]Vittori P. Ultimate password: is voice the best biometric to beat hackers?. Biometric Technology Today. 2019; 2019(9):8-10.
[Google Scholar]
[9]Rahmawati E, Listyasari M, Aziz AS, Sukaridhoto S, Damastuti FA, Bachtiar MM, et al. Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone. In international electronics symposium on engineering technology and applications (IES-ETA) 2017 (pp. 234-8). IEEE.
[Crossref] [Google Scholar]
[10]Kamelia L, Hamidi EA, Darmalaksana W, Nugraha A. Real-time online attendance system based on fingerprint and GPS in the smartphone. In international conference on wireless and telematics 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[11]Goicoechea-Telleria I, Garcia-Peral A, Husseis A, Sanchez-Reillo R. Presentation attack detection evaluation on mobile devices: simplest approach for capturing and lifting a latent fingerprint. In international carnahan conference on security technology 2018 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[12]Hwang D, Lee H, Bae G, Son S, Kim J. Fingerprint template management for higher accuracy in user authentication. In international conference on electronics, information, and communication 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[13]You L, Wang T. A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Computing. 2019; 23(11):3843-51.
[Crossref] [Google Scholar]
[14]Lin Y, Zhu X, Zheng Z, Dou Z, Zhou R. The individual identification method of wireless device based on dimensionality reduction and machine learning. The Journal of Supercomputing. 2019; 75:3010-27.
[Crossref] [Google Scholar]
[15]Ma L, Jin N, Zhang Y, Xu Y. RSRP difference elimination and motion state classification for fingerprint-based cellular network positioning system. Telecommunication Systems. 2019; 71:191-203.
[Crossref] [Google Scholar]
[16]Sadhukhan P. Performance analysis of clustering-based fingerprinting localization systems. Wireless Networks. 2019; 25:2497-510.
[Crossref] [Google Scholar]
[17]Engelsma JJ, Arora SS, Jain AK, Paulter NG. Universal 3D wearable fingerprint targets: advancing fingerprint reader evaluations. IEEE Transactions on Information Forensics and Security. 2018; 13(6):1564-78.
[Crossref] [Google Scholar]
[18]Sun S, Guo Z. Sweat glands extraction in optical coherence tomography fingerprints. In international conference on security, pattern analysis, and cybernetics 2017 (pp. 579-84). IEEE.
[Crossref] [Google Scholar]
[19]Valdes-Ramirez D, Medina-Pérez MA, Monroy R, Loyola-González O, Rodríguez J, Morales A, et al. A review of fingerprint feature representations and their applications for latent fingerprint identification: trends and evaluation. IEEE Access. 2019; 7:48484-99.
[Crossref] [Google Scholar]
[20]Makhija S, Khatwani A, Roja MM. Performance analysis of latent fingerprint enhancement techniques. In international conference on innovative mechanisms for industry applications 2017 (pp. 96-100). IEEE.
[Crossref] [Google Scholar]
[21]Al Maqbali F, Mitchell CJ. AutoPass: an automatic password generator. In international carnahan conference on security technology 2017 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[22]Rahiemy MZ, Sukarno P, Jadied EM. Hardening the virtual password authentication scheme. In international conference on information and communication technology 2018 (pp. 429-34). IEEE.
[Crossref] [Google Scholar]
[23]Tabrez S, Sai DJ. Pass-Matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system. In international conference on intelligent computing and control systems 2017 (pp. 776-81). IEEE.
[Crossref] [Google Scholar]
[24]Zhang S, Zeng J, Zhang Z. Password guessing time based on guessing entropy and long-tailed password distribution in the large-scale password dataset. In international conference on anti-counterfeiting, security, and identification 2017 (pp. 6-10). IEEE.
[Crossref] [Google Scholar]
[25]Erdem E, Sandıkkaya MT. OTPaaS—one time password as a service. IEEE Transactions on Information Forensics and Security. 2018; 14(3):743-56.
[Crossref] [Google Scholar]
[26]Mohamedali IA, Fadlalla Y. Securing password in static password-based authentication: a review. In sudan conference on computer science and information technology 2017 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[27]Zheng W, Jia C. CombinedPWD: a new password authentication mechanism using separators between keystrokes. In international conference on computational intelligence and security 2017 (pp. 557-60). IEEE.
[Crossref] [Google Scholar]
[28]Hwang MS, Cahyadi EF, Chou YC, Yang CY. Cryptanalysis of kumars remote user authentication scheme with smart card. In international conference on computational intelligence and security 2018 (pp. 416-20). IEEE.
[Crossref] [Google Scholar]
[29]Wu CJ, Chiu CT. Dry fingerprint detection for multiple image resolutions using ridge features. In international workshop on signal processing systems 2017 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[30]Tang Y, Jiang L, Hou Y, Wang R. Contactless fingerprint image enhancement algorithm based on hessian matrix and STFT. In international conference on multimedia and image processing 2017 (pp. 156-60). IEEE.
[Crossref] [Google Scholar]
[31]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[32]Koptyra K, Ogiela MR. Multiply information coding and hiding using fuzzy vault. Soft Computing. 2019; 23:4357-66.
[Crossref] [Google Scholar]
[33]Patel MB, Patel RB, Parikh SM, Patel AR. An improved OGorman filter for fingerprint image enhancement. In international conference on energy, communication, data analytics and soft computing 2017 (pp. 200-9). IEEE.
[Crossref] [Google Scholar]
[34]Sudiro SA, Wardhani IP, Wardijono BA, Handias B. Fingerprint matching application using hardware based artificial neural network with matlab. In 5th international conference on electrical, electronics and information engineering 2017 (pp. 66-70). IEEE.
[Crossref] [Google Scholar]
[35]Kim H, Cui X, Kim MG, Nguyen TH. Fingerprint generation and presentation attack detection using deep neural networks. In conference on multimedia information processing and retrieval 2019 (pp. 375-8). IEEE.
[Crossref] [Google Scholar]
[36]Cao K, Jain A. Fingerprint synthesis: evaluating fingerprint search at scale. In international conference on biometrics 2018 (pp. 31-8). IEEE.
[Crossref] [Google Scholar]
[37]Nuraisha S, Shidik GF. Evaluation of normalization in fake fingerprint detection with heterogeneous sensor. In international seminar on application for technology of information and communication 2018 (pp. 83-6). IEEE.
[Crossref] [Google Scholar]
[38]Han K, Wang Z, Chen Z. Fingerprint image enhancement method based on adaptive median filter. In 24th Asia-Pacific conference on communications 2018 (pp. 40-4). IEEE.
[Crossref] [Google Scholar]
[39]Taufiq M, Ogi D. Implementing one-time password mutual authentication scheme on sharing renewed finite random sub-passwords using raspberry pi as a room access control to prevent replay attack. In international conference on electrical engineering and informatics 2018 (pp. 13-8). IEEE.
[Crossref] [Google Scholar]
[40]Zaki MH, Husain A, Umar MS, Khan MH. Secure pattern-key based password authentication scheme. In international conference on multimedia, signal processing and communication technologies 2017 (pp. 171-4). IEEE.
[Crossref] [Google Scholar]
[41]Lekshmi K, Krishnaveni KS, Aparna VK. A hopfield neural network approach for authentication of password based on fuzzy logic. In international conference on advances in computing, communications and informatics 2018 (pp. 2471-4). IEEE.
[Crossref] [Google Scholar]
[42]Bhola G, Kaur D, Raj M. Dynamic password authentication protocol using android device and one-way function. In international conference on wireless communications, signal processing and networking 2017 (pp. 1863-6). IEEE.
[Crossref] [Google Scholar]
[43]Scaria BA, Megalingam RK. Enhanced e-commerce application security using three-factor authentication. In second international conference on intelligent computing and control systems 2018 (pp. 1588-91). IEEE.
[Crossref] [Google Scholar]
[44]Bilgi B, Tugrul B. A shoulder-surfing resistant graphical authentication method. In international conference on artificial intelligence and data processing 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[45]Fayyadh BE, Mansour K, Mahmoud KW. A new password authentication mechanism using 2D shapes. In international conference on computer science and information technology 2018 (pp. 113-8). IEEE.
[Crossref] [Google Scholar]
[46]Zhang X, Sun H, Yao B, Liu X. A technique based on the module-K super graceful labelling for designing new-type graphical passwords. In advanced information management, communicates, electronic and automation control conference 2018 (pp. 1495-9). IEEE.
[Crossref] [Google Scholar]
[47]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[48]Szymkowski M, Saeed K. A novel approach to fingerprint identification using method of sectorization. In international conference on biometrics and kansei engineering 2017 (pp. 55-9). IEEE.
[Crossref] [Google Scholar]
[49]Mehrubeoglu M, Nguyen V. Real-time eye tracking for password authentication. In international conference on consumer electronics 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[50]Othman NA, Rahman MA, Sani AS, Ali FH. Directional based graphical authentication method with shoulder surfing resistant. In conference on systems, process and control 2018 (pp. 198-202). IEEE.
[Crossref] [Google Scholar]
[51]Sudramurthy B, Al Obaidy M, Maata RL. Analysis of authentication on online purchase using honey password. In international conference on computational intelligence and computing research 2017 (pp. 1-3). IEEE.
[Crossref] [Google Scholar]