International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 10, Issue - 47, March 2020
  1. 1
    Google Scholar
  2. 4
    Impact Factor
A survey of biometric approaches of authentication

Nuhu Yusuf, Kamalu Abdullahi Marafa, Kamila Ladan Shehu, Hussaini Mamman and Mustapha Maidawa

Abstract

The increasing need for better authentication methods against hackers has called for the use of the biometric authentication method to guard against unauthorized access into the systems. The used of human characteristics for biometrics provides authentication for different kind of systems. However, poor quality of authentication still allows hackers gaining access to these systems. Many biometrics authentication approaches have been proposed to improve the authentication accuracy and other related quality measures. This survey aims to provide a state-of-the-art fingerprint and password biometric authentication approaches. Their challenges have been presented and discussed in terms of biometric authentication. Furthermore, the strengths and weaknesses of each of the fingerprint and password biometric authentication are discussed and compared. The findings show that fingerprint image quality and password authentication is still an active research area where performance requires improvement. Also, the graphical password indicates a promising future direction for enhancing password methods.

Keyword

Biometrics, Authentication, Fingerprint, Password, Information security.

Cite this article

Yusuf N, Marafa KA, Shehu KL, Mamman H, Maidawa M

Refference

[1][1]Bharathi S, Sudhakar R. Biometric recognition using finger and palm vein images. Soft Computing. 2019; 23:1843-55.

[2][2]Padma P, Srinivasan S. A survey on biometric based authentication in cloud computing. In international conference on inventive computation technologies 2016 (pp. 1-5). IEEE.

[3][3]Prasad PS, Devi BS, Reddy MJ, Gunjan VK. A survey of fingerprint recognition systems and their applications. In international conference on communications and cyber physical engineering 2018 (pp. 513-20). Springer, Singapore.

[4][4]Tekade P, Shende P. Enhancement of security through fused multimodal biometric system. In international conference on computing, communication, control and automation 2017 (pp. 1-5). IEEE.

[5][5]Parkavi R, Babu KC, Kumar JA. Multimodal biometrics for user authentication. In 11th international conference on intelligent systems and control 2017 (pp. 501-5). IEEE.

[6][6]Kakkad V, Patel M, Shah M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design. 2019; 2:233-48.

[7][7]Nakanishi I, Maruoka T. Biometric authentication using evoked potentials stimulated by personal ultrasound. In international conference on telecommunications and signal processing (TSP) 2019 (pp. 365-8). IEEE.

[8][8]Vittori P. Ultimate password: is voice the best biometric to beat hackers?. Biometric Technology Today. 2019; 2019(9):8-10.

[9][9]Rahmawati E, Listyasari M, Aziz AS, Sukaridhoto S, Damastuti FA, Bachtiar MM, et al. Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone. In international electronics symposium on engineering technology and applications (IES-ETA) 2017 (pp. 234-8). IEEE.

[10][10]Kamelia L, Hamidi EA, Darmalaksana W, Nugraha A. Real-time online attendance system based on fingerprint and GPS in the smartphone. In international conference on wireless and telematics 2018 (pp. 1-4). IEEE.

[11][11]Goicoechea-Telleria I, Garcia-Peral A, Husseis A, Sanchez-Reillo R. Presentation attack detection evaluation on mobile devices: simplest approach for capturing and lifting a latent fingerprint. In international carnahan conference on security technology 2018 (pp. 1-5). IEEE.

[12][12]Hwang D, Lee H, Bae G, Son S, Kim J. Fingerprint template management for higher accuracy in user authentication. In international conference on electronics, information, and communication 2018 (pp. 1-4). IEEE.

[13][13]You L, Wang T. A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Computing. 2019; 23(11):3843-51.

[14][14]Lin Y, Zhu X, Zheng Z, Dou Z, Zhou R. The individual identification method of wireless device based on dimensionality reduction and machine learning. The Journal of Supercomputing. 2019; 75:3010-27.

[15][15]Ma L, Jin N, Zhang Y, Xu Y. RSRP difference elimination and motion state classification for fingerprint-based cellular network positioning system. Telecommunication Systems. 2019; 71:191-203.

[16][16]Sadhukhan P. Performance analysis of clustering-based fingerprinting localization systems. Wireless Networks. 2019; 25:2497-510.

[17][17]Engelsma JJ, Arora SS, Jain AK, Paulter NG. Universal 3D wearable fingerprint targets: advancing fingerprint reader evaluations. IEEE Transactions on Information Forensics and Security. 2018; 13(6):1564-78.

[18][18]Sun S, Guo Z. Sweat glands extraction in optical coherence tomography fingerprints. In international conference on security, pattern analysis, and cybernetics 2017 (pp. 579-84). IEEE.

[19][19]Valdes-Ramirez D, Medina-Pérez MA, Monroy R, Loyola-González O, Rodríguez J, Morales A, et al. A review of fingerprint feature representations and their applications for latent fingerprint identification: trends and evaluation. IEEE Access. 2019; 7:48484-99.

[20][20]Makhija S, Khatwani A, Roja MM. Performance analysis of latent fingerprint enhancement techniques. In international conference on innovative mechanisms for industry applications 2017 (pp. 96-100). IEEE.

[21][21]Al Maqbali F, Mitchell CJ. AutoPass: an automatic password generator. In international carnahan conference on security technology 2017 (pp. 1-6). IEEE.

[22][22]Rahiemy MZ, Sukarno P, Jadied EM. Hardening the virtual password authentication scheme. In international conference on information and communication technology 2018 (pp. 429-34). IEEE.

[23][23]Tabrez S, Sai DJ. Pass-Matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system. In international conference on intelligent computing and control systems 2017 (pp. 776-81). IEEE.

[24][24]Zhang S, Zeng J, Zhang Z. Password guessing time based on guessing entropy and long-tailed password distribution in the large-scale password dataset. In international conference on anti-counterfeiting, security, and identification 2017 (pp. 6-10). IEEE.

[25][25]Erdem E, Sandıkkaya MT. OTPaaS—one time password as a service. IEEE Transactions on Information Forensics and Security. 2018; 14(3):743-56.

[26][26]Mohamedali IA, Fadlalla Y. Securing password in static password-based authentication: a review. In sudan conference on computer science and information technology 2017 (pp. 1-5). IEEE.

[27][27]Zheng W, Jia C. CombinedPWD: a new password authentication mechanism using separators between keystrokes. In international conference on computational intelligence and security 2017 (pp. 557-60). IEEE.

[28][28]Hwang MS, Cahyadi EF, Chou YC, Yang CY. Cryptanalysis of kumars remote user authentication scheme with smart card. In international conference on computational intelligence and security 2018 (pp. 416-20). IEEE.

[29][29]Wu CJ, Chiu CT. Dry fingerprint detection for multiple image resolutions using ridge features. In international workshop on signal processing systems 2017 (pp. 1-5). IEEE.

[30][30]Tang Y, Jiang L, Hou Y, Wang R. Contactless fingerprint image enhancement algorithm based on hessian matrix and STFT. In international conference on multimedia and image processing 2017 (pp. 156-60). IEEE.

[31][31]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.

[32][32]Koptyra K, Ogiela MR. Multiply information coding and hiding using fuzzy vault. Soft Computing. 2019; 23:4357-66.

[33][33]Patel MB, Patel RB, Parikh SM, Patel AR. An improved OGorman filter for fingerprint image enhancement. In international conference on energy, communication, data analytics and soft computing 2017 (pp. 200-9). IEEE.

[34][34]Sudiro SA, Wardhani IP, Wardijono BA, Handias B. Fingerprint matching application using hardware based artificial neural network with matlab. In 5th international conference on electrical, electronics and information engineering 2017 (pp. 66-70). IEEE.

[35][35]Kim H, Cui X, Kim MG, Nguyen TH. Fingerprint generation and presentation attack detection using deep neural networks. In conference on multimedia information processing and retrieval 2019 (pp. 375-8). IEEE.

[36][36]Cao K, Jain A. Fingerprint synthesis: evaluating fingerprint search at scale. In international conference on biometrics 2018 (pp. 31-8). IEEE.

[37][37]Nuraisha S, Shidik GF. Evaluation of normalization in fake fingerprint detection with heterogeneous sensor. In international seminar on application for technology of information and communication 2018 (pp. 83-6). IEEE.

[38][38]Han K, Wang Z, Chen Z. Fingerprint image enhancement method based on adaptive median filter. In 24th Asia-Pacific conference on communications 2018 (pp. 40-4). IEEE.

[39][39]Taufiq M, Ogi D. Implementing one-time password mutual authentication scheme on sharing renewed finite random sub-passwords using raspberry pi as a room access control to prevent replay attack. In international conference on electrical engineering and informatics 2018 (pp. 13-8). IEEE.

[40][40]Zaki MH, Husain A, Umar MS, Khan MH. Secure pattern-key based password authentication scheme. In international conference on multimedia, signal processing and communication technologies 2017 (pp. 171-4). IEEE.

[41][41]Lekshmi K, Krishnaveni KS, Aparna VK. A hopfield neural network approach for authentication of password based on fuzzy logic. In international conference on advances in computing, communications and informatics 2018 (pp. 2471-4). IEEE.

[42][42]Bhola G, Kaur D, Raj M. Dynamic password authentication protocol using android device and one-way function. In international conference on wireless communications, signal processing and networking 2017 (pp. 1863-6). IEEE.

[43][43]Scaria BA, Megalingam RK. Enhanced e-commerce application security using three-factor authentication. In second international conference on intelligent computing and control systems 2018 (pp. 1588-91). IEEE.

[44][44]Bilgi B, Tugrul B. A shoulder-surfing resistant graphical authentication method. In international conference on artificial intelligence and data processing 2018 (pp. 1-4). IEEE.

[45][45]Fayyadh BE, Mansour K, Mahmoud KW. A new password authentication mechanism using 2D shapes. In international conference on computer science and information technology 2018 (pp. 113-8). IEEE.

[46][46]Zhang X, Sun H, Yao B, Liu X. A technique based on the module-K super graceful labelling for designing new-type graphical passwords. In advanced information management, communicates, electronic and automation control conference 2018 (pp. 1495-9). IEEE.

[47][47]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.

[48][48]Szymkowski M, Saeed K. A novel approach to fingerprint identification using method of sectorization. In international conference on biometrics and kansei engineering 2017 (pp. 55-9). IEEE.

[49][49]Mehrubeoglu M, Nguyen V. Real-time eye tracking for password authentication. In international conference on consumer electronics 2018 (pp. 1-4). IEEE.

[50][50]Othman NA, Rahman MA, Sani AS, Ali FH. Directional based graphical authentication method with shoulder surfing resistant. In conference on systems, process and control 2018 (pp. 198-202). IEEE.

[51][51]Sudramurthy B, Al Obaidy M, Maata RL. Analysis of authentication on online purchase using honey password. In international conference on computational intelligence and computing research 2017 (pp. 1-3). IEEE.