2015
DOI: 10.11591/ijece.v5i3.pp579-585
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Authentication Schemes for Mobile Devices

Abstract: In certain applications, fingerprint authentication systems require templates to be stored in databases. The possible leakage of these fingerprint templates can lead to serious security and privacy threats. Therefore, with the frequent use of fingerprint authentication on mobile devices, it has become increasingly important to keep fingerprint data safe. Due to rapid developments in optical equipment, biometric systems are now able to gain the same biometric images repeatedly, so strong features can be selecte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Bioinformatics interaction is the interaction that uses unique biodata of the player who interacts with the game. Examples of this interaction are finger scan [40], iris scan, heart rates (show in Figure 15) and eye movements. This interaction type can be used to identify real users, choose profiles, and solve bot problems.…”
Section: Bioinformatics Interactionmentioning
confidence: 99%
“…Bioinformatics interaction is the interaction that uses unique biodata of the player who interacts with the game. Examples of this interaction are finger scan [40], iris scan, heart rates (show in Figure 15) and eye movements. This interaction type can be used to identify real users, choose profiles, and solve bot problems.…”
Section: Bioinformatics Interactionmentioning
confidence: 99%
“…In this paper we have tried to implement lock gate system by using a fingerprint scaner interfaced with Arduino microcontroller [11][12][13]. Any fingerprint scanner has two functions: get an image of a fingerprint, called verification and check its pattern for matching with other patterns in the database, called identification [14].…”
Section: Introductionmentioning
confidence: 99%
“…Among all biometric technologies, fingerprint analysis is universally used due to its easy acquisition, high distinctiveness, persistence, and acceptance by the public [2,3]; however, other technologies, such as ECG waveform features, are also found in the literature [4]. Fingerprint recognition has been used in home safety, forensic applications, smartphones, security boxes, smart homes, and even as a work or classroom attendance system [5][6][7][8][9]. Any fingerprint recognition system includes four phases: acquisition, representation (template), feature extraction, and matching [10].…”
Section: Introductionmentioning
confidence: 99%