Open Access Open Access  Restricted Access Subscription or Fee Access

Detection of PARD Attack Using Key Based Biometric Authentication System Based on Fingerprint Impression

Lovelesh Khard, Uday Chourasia, Raju Baraskar

Abstract


Biometric authentication plays a major role in security as these are by nature unique for every human. But the security is compromised when the pattern matching system is not accurate. Authentication system like fingerprint recognition is most commonly used biometric authentication system. In this paper, survey is done on fingerprint recognition techniques. And different approaches are studied in terms of accuracy and performance. As fingerprint may also contain noise; so, image de-noising techniques are also studied cross ridge frequency analysis of fingerprint images is performed by means of statistical measures and weighted mean phase is calculated. These different features along with ridge reliability or ridge center frequency are given as inputs to a fuzzy c-means classifier.

Full Text:

PDF

References


Y. Han, C. Ryu, J. Moon, H. Kim, H. Choi. A study on evaluating the uniqueness of fingerprints using statistical analysis, Int Conf Inform Secur Cryptol. 2004; 467–77p. [2] Zwiesele, A. Munde, C. Busch, H. Daum. BioIS study. Comparative study of biometric identification systems, In: Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on Security and Technology. 2000; 60–3p. [3] M. Espinoza, C. Champod, P Margot. Vulnerabilities of fingerprint reader to fake fingerprints attacks, Forensic Sci Int. 2011; 204(1): 41–9p. [4] M. Espinoza, C. Champod. Risk evaluation for spoofing against a sensor supplied with liveness detection, Forensic Sci Int. 2011; 204(1): 162–8p. [5] J. Galbally, J. Fierrez, F. AlonsoFernandez, M. Martinez-Diaz. Evaluation of direct attacks to fingerprint verification systems, Telecommun Syst. 2011; 47(3-4): 243–54p. [6] H. Kang, B. Lee, H. Kim, D. Shin, J. Kim. A study on performance evaluation of the liveness detection for various fingerprint sensor modules, In: International Conference on Knowledge-Based and Intelligent Information and

Engineering Systems. Sep 32003, 1245–53p. [7] T. Van der Putte, J. Keuning. Biometrical fingerprint recognition: don’t get your fingers burned, Smart Card Res Adv Appl. 2000, 289–303p. [8] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems, Electron Imaging. 2002. 275–89p. [9] Wiehe, T. Søndrol, O.K. Olsen, F. Skarderud. Attacking Fingerprint Sensors. Gjøvik University College; 2004. [10] S. Memon, M. Sepasian, W Balachandran. Review of fingerprint sensing technologies, Proc INMIC. 2008, 8p. [11] S. Prabhakar, A. Jain, S. Pankanti. Learning fingerprint minutiae location and type Number 8, 2003, 1847–57p. [12] S. Prabhakar, A. Jain, J. Wang, S. Pankanti, R. Bolle. Minutiae verification and classification for fingerprint maching, In: International Conference on Pattern. 2000, Vol. 1. [13] C.-Y. Wen, C.-C. Yu. Fingerprint enhancement using am-fm reaction diffusion systems, J Forensic Sci. 2003; 48(5). [14] K. Nilsson, J. Bigun. Localization of corresponding points in fingerprints by complex filtering, Pattern Recognit Lett. 2003; 24p. [15] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems, In: Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques IV. 2002; 8577. [16] D. Maio, D. Maltoni, A.K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition. Springer Verlag; 2003. [17] T. Jea, V.K. Chavan, V. Govindaraju, J.K. Schneider. Security and matching of partial fingerprint recognition systems, In: Proceeding of SPIE. number 5404, 2004, 39–50p. [18] Jain, S. Prabhakar, L. Hong, S. Pankanti. Filterbank-based fingerprint matching, Trans Image Process. 2000; 9: 846–59p. [19] J. Gu, J. Zhou. A novel model for orientation field of fingerprints, In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2003. [20] M.D. Garris, C.I. Watson, R.M. McCabe, C.L. Wilson. Users guide to

nist fingerprint image software (nfis), Technical Report NISTIR 6813. National Institute of Standards and Technology, 2002. [21] S. Prabhakar, S. Pankanti, A.K. Jain. Biometric recognition: security and privacy concerns, IEEE Secur Privacy Mag. 2003; 1(2): 33–42p. [22] P. Ramo, M. Tico, V. Onnia, J. Saarinen. Optimized singular point detection algorithm for fingerprint images, IEEE Trans Image Process. 2001; 3: 242–5p.




DOI: https://doi.org/10.37628/ijoippr.v3i1.207

Refbacks

  • There are currently no refbacks.