Abstract

AbstractBiometric systems are now proliferating in the very physical and informational fibres of our society, and with the usage of Biometric technology at widespread scale like AADHAAR India, the security risks it poses has gained wide attention as the pervasive hands of identity theft are spreading at an epidemic scale. To combat this, several biometric protection schemes have been proposed now and then. One of the most frequently applied techniques for identifying or authenticating individuals is the fingerprint recognition or authentication system. This survey focuses on the feature transformation schemes present at large in fingerprint and their comparative analysis describing strengths and weaknesses in terms of various performance metrics. Feature transformation methods make use of user-dependent invertible transform (F) or a transformation function (F′) that is non-invertible to transform acquired biometric characteristics from the registered or enrolled biometric sample. A summary of the key feature transformation schemes contained in the literature is discussed briefly in this survey.KeywordsFeature transformationTemplate protectionFingerprint securityBiometric security

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.