- Open Access
- Article
Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility – A Review
by Diptadip Maiti 1
, Madhuchhanda Basak 2
and Debashis Das 3
![]()
1 Department of CSE, Techno India University, West Bengal, 700091, India
2 Department of CSE, Brainware University, West Bengal, 700125, India
3 Departmentof CSE , Dr. Sudhir Chandra Sur Institute of Technology & Sports Complex, West Bengal, 700074, India
* Author to whom correspondence should be addressed.
Journal of Engineering Research and Sciences, Volume 3, Issue 9, Page # 26-60, 2024; DOI: 10.55708/js0309003
Keywords: Biometric Authentication, Fingerprint Identification System, Biometric Security, Biometric Application
Received: 07 August 2024, Revised: 14 September 2024, Accepted: 17 September 2024, Published Online: 22 September 2024
(This article belongs to the Special Issue Special Issue on Multidisciplinary Sciences and Advanced Technology 2024 & Section Computer Science and Information Technology: Cybernetics – Computer Science (CYC))
APA Style
Maiti, D., Basak, M., & Das, D. (2024). Fingerprint bio-metric: Confronting challenges, embracing evolution, and extending utility-A review. Journal of Engineering Research and Sciences, 3(9), 26-60. https://doi.org/10.55708/js0309003
Chicago/Turabian Style
Maiti, Diptadip, Madhuchhanda Basak, and Debashis Das. “Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility-A Review.” Journal of Engineering Research and Sciences 3, no. 9 (2024): 26-60. https://doi.org/10.55708/js0309003.
IEEE Style
D. Maiti, M. Basak, and D. Das, “Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility-A Review,” Journal of Engineering Research and Sciences, vol. 3, no. 9, pp. 26-60, 2024, doi: 10.55708/js0309003.
As documented in recent research, this review offers a thorough examination of the intricate subject of fingerprint authentication, including a wide range of issues and applications. Addressing problems like non-linear deformations and enhancing picture quality, which are frequently reduced by sophisticated improvement and alignment techniques are important components of fingerprint image authentication. Countering security concerns such as spoofing is a major focus of Automated Fingerprint Identification Systems and necessitates the use of sophisticated cryptographic techniques and liveness detection. In order to accomplish speedier identification processes, the paper emphasizes the advancements made in fingerprint indexing and retrieval, with a focus on deep learning technologies and minutiae-based methodologies. Furthermore, fingerprint authentication is used for a variety of age groups, including neonates, where it is essential for identification verification and the management of medical records. The paper also highlights the wider uses of fingerprint technology, such as improved crime detection skills, insights into age-related features, and contributions to medical diagnostics. This review provides a thorough overview of the latest developments and potential future directions in fingerprint authentication by combining state-of-the-art methodologies and analysing technical details, implementation challenges, and security issues. This captures the dynamic and important role of this biometric technology.
1. Introduction
In the rapidly evolving landscape of biometric technology, fingerprint authentication has emerged as a cornerstone of identity verification and security systems. The intricate and unique ridge patterns present on human fingertips provide a reliable and convenient means of confirming individuals’ identities. As societies transition towards dig- italization and interconnectedness, the role of fingerprint biometrics becomes increasingly crucial in ensuring secure access to systems, facilities, and personal information. This paper delves into the intricate web of fingerprint biometric research, offering a comprehensive overview of the chal- lenges faced, innovative solutions devised, and emerging trends that collectively shape the present and future of this dynamic field. Figure 1 depicts a few fingerprint images that have been collected through different technologies. Figure 1(a) represents fingerprint collected by ink and paper method, Figure 1(b) shows fingerprint collected by a digital scanner and Figure 1(c) shows fingerprint collected from a crime scene.
We will go through a number of fingerprint biometric dimensions in this exploration, each with its own opportunities and limitations. The challenge of authenticating unformatted fingerprint photos is significant because of non-linear deformations, different pressures during acquisition, and a range of environmental factors. [1]. In response, researchers have developed intricate algorithms harnessing machine learning, convolutional networks, and auto encoders to enhance image quality and improve matching accuracy. Security vulnerabilities inherent in Automated Fingerprint Identification Systems (AFIS) call for advanced strategies to safeguard against threats such as spoofing and data tampering. Biometric cryptosystems and cancellable templates are among the innovative solutions that fuse cryptographic techniques with biometric data, forging new frontiers in secure authentication [2]. The realm of fast fingerprint indexing and searching is another pivotal arena, demanding the fusion of speed and precision in matching large datasets. Leveraging fingerprint features and deep learning algorithms, researchers have crafted strategies to expedite the matching process while ensuring accurate results. Furthermore, the application of fingerprint biometrics extends beyond traditional identity verification. From diagnosing medical conditions through changes in fingerprint patterns to detecting drug consumption and even deter- mining handedness, the fingerprint’s unique attributes are being harnessed for a diverse array of purposes. As this exploration unfolds, it underscores not only the strides made in fingerprint biometrics but also the ethical considerations and societal implications that accompany the growing integration of biometric data into various aspects of modern life. As researchers continue to innovate and push the boundaries of what is possible, fingerprint biometrics remain a cornerstone in the pursuit of a secure and interconnected future [3].

The objective of this review is to comprehensively explore the landscape of fingerprint authentication as documented in previous literature. It aims to delve into the technical challenges encountered in fingerprint image authentication, including addressing non-linear deformations, enhancing image quality, and implementing alignment methods. The review also seeks to examine the security considerations within Automated Fingerprint Identification Systems (AFIS), focusing on strategies to combat spoofing through liveness detection and advanced cryptographic measures. Addition- ally, it aims to analyse the methodologies and advancements in rapid fingerprint indexing and retrieval, particularly em- phasizing minutiae-based approaches and the integration of deep learning techniques. Furthermore, the review intends to assess the diverse applications of fingerprint authentication, from identity verification in infants to its implications for medical history tracking, as well as its broader roles in medical diagnostics, age-related studies, handedness detection, and crime prevention. Through a thematic analysis of existing literature, this review aims to provide insights into the current state-of-the-art methodologies, implementation challenges, and security concerns within the field of fingerprint authentication.
To present a thorough overview of developments in the field of biometric authentication, we carefully reviewed publications published in the past ten years as part of the data collecting and analysis for this review study. Each study was methodically identified and categorized accord- ing to its purported benefits and drawbacks, accuracy measures, and procedures used. To comprehend these research’ methods to algorithmic processing, performance evalua- tion, and biometric data gathering, we carefully examined their techniques. The study aimed to evaluate the effi- cacy and accuracy rates of various biometric approaches, taking into account the advantages and disadvantages of each method. Through the consolidation of this data, we were able to identify patterns and breakthroughs, evaluate the development of biometric technologies, and provide perspectives on the condition of the technology sector at large. This comprehensive study seeks to offer a fair assessment of the advancements made, point out areas in need of development, and determine future paths for biometric authentication research.
In this study, we attempt to investigate various state-of-the-art developments in finger print biometric practical application. The format of this essay is as follows: The difficulties and security risks associated with latent fingerprint authentication and automatic fingerprint authentication systems are discussed in Section 2. The method for all-purpose fingerprint user identification is described in Section 3. Fast fingerprint indexing and searching are covered in Section 4. The difficulties and solutions for analysing and identifying infants’ fingerprints are described in Section 5. Multi-modal biometric techniques are discussed in Section 6. Comparative comparison of various approaches is the main topic of Section 7. Section 8 concludes with some final thoughts.
2. Challenges in Authentication
2.1. Authentication of Unformatted Fingerprint Image
In the field of fingerprint authentication, raw fingerprint images can be obtained from different sources, such as rolled ink prints, live scans, and latent prints. These images often suffer from non-linear deformations and poor quality, mak- ing authentication challenging. Non-linear deformations can arise due to variations in finger pressure and improper finger placement during image acquisition. These deformations can lead to unsatisfactory matching scores and impact the accuracy of fingerprint authentication systems. Low-quality fingerprint images can also result from factors like image scanner noise, partial prints collected from crime scenes (latent prints), and various skin conditions. These low-quality prints can be categorized as dry, wet, damaged, dotted, and blurred. Dry prints have minimal contact with the scanning surface, while wet prints result in smudged ridges and valleys due to extensive contact. Damaged prints may arise from scars or skin issues, while dotted prints are caused by excessive sweating. Blurred prints occur when motion or unclear ridges during scanning lead to image blurriness. To address these challenges, various techniques have been developed for fingerprint enhancement and alignment. Traditional methods such as Gabor filtering and adaptive boosted spectral filtering are commonly used for enhancing fingerprint images. Alignment techniques and cluster-based methods aim to rectify non-linear deforma- tions, improving the accuracy of matching in automated fingerprint identification systems (AFIS). Figure 2 shows fingerprint feature extraction using convolution neural network, where three parallel CNN extract features from the fingerprint image and after the merging of the three features to form a unique feature descriptor, which is passed to a classifier for classification task.
Because of their high dimensionality, minutiae descriptors, which are widely used in fingerprint identification algorithms, face considerable hurdles. These descriptors are robust for fingerprint pattern identification because they capture fine features. However, the noise and volatility present in real-world settings might have a significant impact on their performance. Noise may cause mismatches during matching procedures by distorting minute points. This noise can originate from various sources, such as defective sensors or low-quality images. Accurate identification is made more difficult by unpredictable variations in finger- print traits, such as ageing or changes brought on by injuries. Thus, even though minutiae descriptors are excellent at collecting distinctive fingerprint features, their effectiveness depends on how well noise and unpredictability are handled to provide safe and dependable biometric identification systems.

A novel latent fingerprint matching approach is presented by [4], which makes use of a descriptor-based Hough transform for latent prints together with a robust alignment technique. Their approach achieved a noteworthy rank-1 accuracy of 53.5% on NIST SD27, outperforming two commercial matchers and a non-commercial algorithm. Singular point-based alignment is a problem, as performance depends on the quantity of minutiae and the overall print quality. Refining features with top-down information from an exemplar print, in [5], the authors presented a feedback system for latent fingerprint matching. When combined with a cutting-edge matcher, it improved identification accuracy in the NIST SD27 and WVU databases by 0.5–3.5%. Finding a balance between the advantages of feedback and the complexity of the system, as well as the example print quality, is a challenge. Deformable Minutiae Clustering was proposed by [6] for latent fingerprint recognition, improving minutiae matching via cluster merging and Thin Plate Spline modelling. It outperformed previous techniques with up to 85.6% (Cylinder-Codes) and 83.3% (m-triplets) accuracy across different fingerprint databases. Scalability issues for latent-to-latent identification and algorithm speed are among the limitations. Using feature selection and random decision forest classification, the authors in [7] provided an adaptive latent fingerprint segmentation approach that achieved state-of-the-art performance on three databases. In order to balance accuracy and selection time, their method includes a unique SIVV-based metric for segmentation evaluation and modified RELIEF feature selection. Constraints about the applicability of the SIVV metric and assumptions about consistent ground truth are examples of limitations. A collaborative filtering paradigm for fingerprint enhancement was proposed by [8]. It involves pre-enhancing using Gabor filters and spatial patch-based enhancement utilizing spectral diffusion after that. Test findings on FVC2004 datasets showed that this approach was better than other approaches such as the Gabor filter and VeriFinger Algorithm Demo. The study is limited by fixed patch size effects and sensitivity to input fingerprint quality, which calls for additional investigation to fully evaluate resilience. FingerNet, a CNN-based method for latent fingerprint enhancement, was introduced by [9]. It has shared convolution and deconvolution layers for orientation guiding and noise reduction. It demonstrated potential for improvement with larger datasets and ground truth ROI annotations, as demonstrated by its top-1 matching accuracy of 47.7% when tested on NIST SD27 using data collected from SD4. Using Convolutional Neural Networks (ConvNets) for ridge flow estimation and minutia descriptor extraction. In [10], the authors proposed an automated latent finger- print recognition system that achieved rank 1 identification accuracies of 64.7% and 75.3% on NIST SD27 and WVU latent databases. Poor ridge quality, background noise, a tiny friction ridge area, reliance on manual ROI selection, long processing times, and scaling issues are some of the limitations. A technique to improve Automated Fingerprint Identification Systems (AFIS) by utilizing uncommon minutiae was suggested by [11]. This involves altering similarity scores that are based on least squares fitting mistakes in order to improve matching accuracy. It greatly improves the rank identification accuracy of minutiae-based matchers, as demonstrated by tests conducted on the GCDB forensic database. Future study on generalization and database size effects is suggested by the challenges of dataset restrictions and manual intervention for latent AFIS. An end-to-end latent fingerprint recognition system with automated ROI cropping, minutiae extraction based on deep learning, and texture template creation was promoted by [12]. Tested against a background of rolled prints on many datasets, yielding rank-1 retrieval rates varying from 7.6% to 69.4%. Among the drawbacks are difficulties in identifying fine details on low-quality photos, trimming dry latents, and the requirement for more varied operating databases for thorough training. By utilizing fine-coarse parallelism and asynchronous processing for latent fingerprint recognition. In [13], the authors invented ALFI and achieved a 22x speed gain over state-of-the-art approaches with equivalent ac- curacy. Tested on NIST SD27, they report accuracy using Equal Error Rate and F1-score, recognizing dataset size constraints, restricted classification strategies, and unknown uses beyond fingerprints, such as DNA analysis. LQMetric, an automated method for evaluating latent fingerprint quality and forecasting the probability of a rank-1 hit in the FBI’s NGI AFIS system, was suggested by [14]. It produced a 61.4% match with human examiner assessments using local clarity maps and image analysis tools; it worked well for NGI searches but was not uniformly applicable to other AFIS methods. For improving latent fingerprint images. In [15], the authors provide a progressive GAN-based technique that consists of off-line training and repeated on-line testing phases. Based on CMC curve metrics, evaluation on the NIST SD27 dataset demonstrates better performance than previous models. Constraints on dataset quantity, processing cost, and possible inefficiency with subtle ridge features in latent prints are some of the limitations. An automated latent fingerprint identification system using DCNN-FFT augmentation for minutiae extraction and matching was described by [16]. It achieved 100% rank-1 identification on the FVC2002 and FVC2004 databases and 84.5% on the NIST SD27. The results show increased recall, F1 scores, and precision; however, computational time and dataset diversity are acknowledged as constraints. Using synthetic data for training. In [17], the author provide a deep nested UNets architecture for automated latent fingerprint segmentation and improvement. It performs better than current methods in fingerprint recognition and segmentation accuracy when tested on the NIST SD27 and IIITD-MOLF databases. One of the main drawbacks is the lack of high- quality and low-quality coupled fingerprint picture pairs in the current databases. This can be overcome by creating synthetic latent images for training. Using dense fingerprint patch alignment and matching. In [18], the authors promoted a non-minutia latent fingerprint registration method that outperformed previous techniques in registration when tested on the NIST27 and MOLF datasets. Its drawbacks include its dependence on 2D data, higher processing requirements, and possible inadequacy for poor-quality picture data. Using an algorithm based on Lindeberg’s scale selection method. In [19], the authors revealed integrating pores (level 3 characteristics) alongside minutiae for latent fingerprint identification. When combined with pores, as opposed to just minutiae matching, greatly improves recognition rates on the IIITD Latent database. A small dataset size, a focus plane restriction for pore extraction, and computational costs that affect matching time are among the limitations. For latent fingerprint identification. In [20], the authors proposed the “Ratio of Minutiae Triangles” (RMT) algorithm, which makes use of local minutiae arrangements without pre-alignment. tested with Rank-1 recognition accuracy of 80% and 63.8% on the FVC2004 and NIST SD27 databases, respectively. Poor quality latent cases and the requirement for better feature extraction and matching phase integration for large databases are acknowledged constraints. In order to achieve accurate latent fingerprint enhancement and segmentation. In [21], the researchers proposed a hybrid model that combines the Chan-Vese approach for segmentation and Edge Adaptive Directional Total Variation (EDTV) for enhancement. Accurate Rank-1 identification was achieved with 61.24% and 70.16% on NIST SD27 and WVU DB databases, respectively. Restrictions include the size of the database and the requirement for additional testing on intricate latent fingerprints. Using Chan-Vese, an adaptive latent fingerprint segmentation and matching strategy based on the EDTV model was given by [22]. On the NIST SD27 dataset, this approach achieved AUCs of 72% and 70.59% for ROC and CMC curves, respectively. Limitation includes poor accuracy of existing techniques for latent fingerprint segmentation. Using scale and rotation invariant minutiae characteristics. In [23], the authors proposed an automatic latent fingerprint identifica- tion system that significantly improved Rank-1 identification accuracy on NIST SD27 and FVC2004 datasets. On NIST SD27, CLMP-NRS produced the maximum Rank-1 accuracy of 93.80%. Handling incomplete fingerprints with limited minutiae characteristics and relying on the quantity of retrieved minutiae for matching performance are two limitations. MinNet, a minutia patch embedding network for latent fingerprint identification that optimizes spatial and angular minutiae distribution, is introduced by [24]. Reaching cutting-edge outcomes, assessed on many public and private datasets, such as FVC-Latent and NIST SD27, with rank-1 accuracies of 85.88% and 92.39%, respectively. Its limitations include the inability to handle fingerprints that are partially or substantially deformed and its reliance on high-quality latent pictures for precise minutiae extraction. To achieve state-of-the-art accuracy and efficiency in latent fingerprint indexing, the authors in [25] offer a multi-scale fixed-length representation technique. performed better than other indexing techniques like PDC and DeepPrint when tested on a variety of datasets, including Hisign and NIST SD27. possibility performance variance on simulated fingerprints and scope-limited optimization are among the limitations, indicating possibility for more improvements in feature representation. Using a residual encoder-decoder architecture and frequency-domain loss function optimization, the authors in [26] proposed a deep learning model for latent fingerprint enhancement. superior than current methods in terms of rank-25 and rank-50 accuracy when evaluated using the IIIT-Delhi MOLF database. The ridge- based approach of the technology and the requirement for additional refinement in deleting undesired portions of images and testing on a variety of databases are its limitations. With an emphasis on fairness in prediction and decision- making, the authors in [27] provided a technique to and reduce biases in automated algorithms working with latent fingerprint pictures. They evaluate the effect on automatic matching of latent fingerprints using covariate-specific ROC curves produced from regression models taking quality and demographics into account. Results demonstrate that, compared to assessments without quality, the suggested covariate-adjusted ROC curves conditioned on image qual- ity and demographics offer a more informative assessment. The quality measurement algorithm’s underlying assump- tions and dataset restrictions are examples of limitations. It is believed that more research on a variety of datasets is crucial for method validation. ULPrint, a Universal Latent Fingerprint Enhancer, was introduced by [28], who used Mix Visual Transformer (MiT) SegFormer-B5 encoder ar- chitecture and Ridge Segmentation with UNet. By using directed blending of predicted ridge masks, the technique improves latent fingerprints and addresses issues with a variety of latent types. Tests conducted on both synthetic and actual datasets show notable gains in accuracy; nonethe- less, there are still issues such as annotator subjectivity and limited databases. FingerGAN, a GAN-based technique for latent fingerprint enhancement, was presented by [29]. It optimizes minute information through adversarial, perceptual, and reconstruction losses. Tested on NIST SD27 and IIIT-Delhi MOLF, FingerGAN outperforms state-of-the-art techniques, however it has drawbacks such as computational complexity and dependence on high-quality rolled fingerprints for data production. For latent fingerprint recognition, the authors in [30] suggest a hybrid method integrating local (minutiae and virtual minutiae) and global features (AFR-Net embeddings). With a multi-stage matching paradigm and Squeeze U-Net CNN for augmentation, they attain an average rank-1 retrieval rate of 71.22% on multiple datasets. Failure instances including severe rotations and overlapping patterns are noted, as are challenges such as low contrast and occlusion. ACSACO, a hybrid approach combining Cuckoo Search and Ant Colony Optimization for latent fingerprint identification, was proposed by [31]. AC- SACO beats individual algorithms when tested on the NIST SD-27 dataset, achieving excellent precision and recall for prints of good quality but lower accuracy for prints of poor or ugly quality. Complex backdrop problems and overlapping prints are among the limitations, indicating the need for additional optimization strategies and wider dataset validation. In order to enhance DeepPrint for recognition systems, in [32], the authors developed a CycleGAN-based technique to create artificial latent fingerprints. Their approach improves TDR at 0.01% FAR from 23.64% (MSP) to 45.45% (synthetic) when tested on NIST SD27. Reliance on a single matcher and the lack of functional latent databases are among the limitations.
Latent fingerprint identification is the painstaking process of locating and examining fingerprints from crime scenes, frequently with the aid of cutting-edge methods to improve their contrast and visibility. New levels of security are introduced when these latent prints are scanned and input into automatic fingerprint identification systems (AFIS). This meticulous manual process is essential for correct identification. Although AFIS significantly improves fingerprint matchings scalability and efficiency, it also brings with it potential vulnerabilities that were not as noticeable in manual systems. Problems like algorithmic flaws, spoofing attempts, and data breaches emphasize the necessity of strict security protocols to preserve the accuracy of fingerprint data. In order to guarantee that the improvements in fingerprint identification technology do not jeopardize its dependability and efficacy, it is crucial to comprehend the shift from manual latent fingerprint analysis to automated methods.
2.2. Security Threats in AFIS
Digital user authentication through fingerprint biometrics relies on Automated Fingerprint Identification Systems (AFIS) to verify individuals’ identities. The concept of AFIS was initially developed by the US Federal Bureau of Investigation (FBI). The AFIS process can be divided into two phases: Enrolment and Identification. In the Enrolment phase, users’ fingerprints are registered in the system. The Identification phase matches query fingerprints against stored templates for authentication. During Enrolment, fingerprint images undergo preprocessing, feature extraction, and template creation. In the Identification phase, query fingerprints are processed and matched against stored templates to identify valid users. Securing a biometric system is crucial due to the non-changeable nature of biometric traits. An AFIS needs robust security measures to safeguard user information from potential attackers. Various components within an AFIS can be exploited by attackers. These attack points include potential vulnerabilities in the biometric data acquisition process, template extraction, and communication channels. Several known attacks can compromise the security of an AFIS, including spoofing (presenting fake biometric data), exploiting similarity, zero-effort attempts (using attacker’s own biometric to impersonate a legitimate user), physical destruction of the biometric sensor, replay attacks (intercepting and replaying biometric signals), communication channel attacks (cutting or altering channels), and more. These attacks can lead to unauthorized access, denial of service, and other security breaches.
2.2.1. Liveness Detection
To address these security challenges, researchers have developed preventive measures and countermeasures, such as liveness detection to determine if a fingerprint is from a living person or a spoof. Various methods have been pro- posed to detect spoof attacks that use materials like wood, glue, and gelatine to fabricate fingerprint spoofs. Figure 3 shows the process of liveness detection using auto encoder where live and spoof fingerprint images are passed to a encoder to learnt two different latent representation of the image and then it is passed to decoder to reconstruct the live and spoof fingerprint, this way the architecture knows the difference between a spoof and live image and can detect them.

In order to improve the resilience of biometric authentication systems against spoofing attacks, the authors in [33] present an approach that combines SURF, PHOG, and Gabor wavelets with low-level characteristics and shape analysis to detect liveness in fingerprint images. Achieving an average EER of 3.95%, their algorithm, which uses PCA for dimensionality reduction and various classifiers, such as SVM and Random Trees—beams above the previous record of 9.625%, validated across several databases, including LivDet 2011 and LivDet 2013. However, more testing on a range of sensors and materials is acknowledged for a thorough robustness assessment. A software-based fingerprint liveness detection technique is presented by [34]. It uses image gradient co-occurrence arrays for feature extraction and SVM classification. It attains greater accuracy on LivDet09DB and LivDet11DB datasets than state-of-the-art methods, in spite of drawbacks like quantization-induced information loss and high-dimensional feature vectors derived from higher-order co-occurrence arrays. Convolutional neural networks could improve gradient measurement; however, dimensionality reduction methods could be needed to handle higher-order arrays. In order to achieve state-of-the-art accuracy across LivDet datasets, the authors in [35] proposed a CNN-based technique for fingerprint spoof attack detection that makes use of local patches centred on minutiae for fine-grained analysis. The approach shows effectiveness against different spoof materials and testing settings, with an average accuracy of 99.03% on LivDet 2015, beating the 95.51% of competition winners. The need for more diverse datasets and ethical concerns about the use of biometric data are two acknowledged constraints, though. A fingerprint liveness detection technique using a BP neural network and difference co-occurrence matrices for improved textural features was suggested by [36]. The system builds input data based on these matrices and uses pre-trained networks to forecast classification accuracy, achieving higher detection accuracy on the LivDet 2013 database over earlier techniques. One of the limitations is the lack of diagonal direction difference co-occurrence matrices, which could more accurately represent the properties of the image. For real-time fingerprint liveness detection, the authors in [37] promoted a semi-supervised stacked autoencoder-based method that substitutes learnt representations for hand-designed features. Exhibiting efficaciousness on the LivDet 2011 and 2013 datasets, the approach attains satisfactory performance, but with a recognition of constraints including dataset magnitude, model initialization, and difficulties with substandard quality, excessive brightness, or noisy images. Adversarial attacks on deep neural network-based fingerprint liveness detection were described by [38], ex- posing flaws in cutting-edge models. By applying FGSM, MI-FGSM, and Deepfool techniques, they illustrated how models might mistakenly identify phony fingerprints as real ones with minute variations. The evaluation of the LivDet 2013 and LivDet 2015 datasets made clear that deep learning applications require more reliable detection models and anti- adversarial techniques. With a score-level fusion approach that combines liveness detection and fingerprint matching, the authors in [39] took first place with 96.88% accuracy in the Fingerprint Liveness Detection Competition 2019. It was evaluated using the LivDet2015 and LivDet2019 datasets, taking into account restrictions on finger pressure and device time that may effect detection accuracy. It used ONNS for similarity, Slim-ResCNN for FLD score, and LR classifiers for fusion. A DenseNet optimized with a genetic algorithm was provided by [40] for fingerprint liveness detection, and it achieved 98.22% accuracy on a mixed Livdet dataset. De- spite constraints in dataset size and computational cost for real-time applications, the method outperforms state-of-the- art efforts on LivDet 2009, 2011, 2013, and 2015 datasets by utilizing ROI extraction and specialized mutation operators. A liveness identification approach utilizing the Circular Gabor Wavelet (CGW) algorithm and SVM was presented by [41], which achieved 99.968% accuracy in differentiating between real and false fingerprints. The approach, which has been tested on 272 samples from optical and capacitive sensors, yields encouraging results but still needs to be assessed further against spoofing techniques used in the real world. A multi-modal liveness detection method incorporating fingerprint and iris inputs, leveraging statistical texture features and spatial analysis, was advocated by [42]. The approach outperforms sum-rule and product- based approaches with high precision (94.7%) for fingerprint detection and 97.8% accuracy for decision-level fusion. recognizing its limits, such as its reliance on dataset size and its usefulness against particular attack types. Using the LivDet 2013 and 2015 datasets, the authors in [43] presented FLDNet, a lightweight CNN architecture for fingerprint liveness detection that achieves state-of-the-art performance. FLDNet solves problems such as accuracy on tiny size fin- gerprints and robustness against unknown spoof materials, and achieves 1.76% Average Classification Error (ACE) over all sensors with a redesigned dense block and attention pooling layer. A one-class convolutional auto encoder for fingerprint presentation attack detection is proposed by [44], and it achieves a D-EER of 2.00% on a dataset of 24,050 fingerprint images. Among the method’s drawbacks include its inability to generalize to additional modalities, the requirement for distinct models for various attack substrates, and uncertainties about robustness and adversarial attacks. A weighted multi-modal CNN-based FLD technique was introduced by [45], which used ROI operation and feature fusion for improved performance. It achieves excellent accuracy in different evaluation circumstances, outperforming current approaches on LivDet 2011, 2013, 2015, and NUAA datasets. Two drawbacks are the need for extensive training datasets and performance variability brought on by sensor diversity. EaZy learning, an adaptive ensemble learning model for fingerprint liveness detection, was suggested by [46]. On LivDet 2011, 2013, and 2015 datasets, it achieved average accuracies of 60.49% and 67.80%. It solves drawbacks such as reliance on clustering techniques and dataset size, as well as potential performance concerns in unknown contexts due to lack of variety in training data by clustering training data and integrating predictions using weighted majority voting. A novel approach using transformers and GANs to improve fingerprint presentation attack detection (PAD) generalization across sensors and materials was developed by [47]. With LivDet2015, the approach achieves an accuracy gain from 68.52% to 83.12%, addressing the limits of accuracy degradation in cross-sensor situations and inadequate generalization. Using a “transient liveness factor” (TLF) and picture quality measures, the authors in [48] suggest a person-specific FPAD technique that achieves 100% accuracy in spoof presentation detection. They admit constraints such as the short dataset size and the difficulty of generalizing across different materials while conducting experiments with a dataset of 30 live photos and 138 spoof samples from various attackers. In comparison to previous methods, the authors in [49] proposed a Fingerprint Liveness Detection (FLD) technique that improved accuracy by 1.0% on average by integrating AlexNet, VGG16, and ResNet CNNs with a genetic algorithm for feature weighting. Enhancing detection performance on several Livedet datasets, the strategy addresses the drawbacks of fixed-scale inputs and possible challenges in training the model due to over-abundance of features. A CNN-based fingerprint liveness detection technique was suggested by [50], which outperformed SVM and CNN+SVM hybrid techniques on the LivDet2015 dataset. Measured by precision, specificity, F1 score, and accuracy metrics, preprocessing approaches and feature extraction methods improve classification accuracy. Given that different materials provide different obstacles when it comes to creating false fingerprints, more study is necessary to improve classification performance in these scenarios. A multi-filter framework for finger- print liveness detection utilizing hand-crafted features was promoted by [51], who achieved improved performance on LivDet test datasets. The method achieves an average accuracy of 99.15% and an average classification error of 0.85% on the LivDet 2015 dataset, outperforming state-of- the-art techniques. It involves procedures such as data augmentation, preprocessing, feature fusion, and dimensionality reduction. The authors recognize that lengthy processing times and complex parameter setting are real usability barriers. In order to counteract forced and phony fingerprint attacks, the authors in [52] introduced MFAS, a Micro-Behavioural Fingerprint Analysis System that records fingertip micro-behaviour throughout time. After being tested on 24 subjects, MFAS achieves 100% accuracy in identifying voluntary versus forced fingerprint placements, as well as 100% true positives. Though encouraging, the system can run into problems in realistic situations, requiring more study to improve technology and comprehend its application. The incremental learning model A-iLearn, pro- posed by [53], addresses the stability-plasticity conundrum in spoof fingerprint detection by adaptively integrating base classifiers. A-iLearn increases accuracy on new fake materials by up to 49.57% without appreciable stability loss when compared to baseline models. It is tested on LivDet 2011, 2013, and 2015 datasets using a variety of spoof materials and sensors. Some drawbacks include the possibility of over fitting and the requirement for more research into feature integration techniques. By combining texture and sweating pore characteristics, the authors in [54] provided a static-based fingerprint liveness detection technique. An auto encoder minimizes feature dimensionality for binary classification using a softmax classifier by quantifying textural properties and pore activity. Testing the approach on LivDet 2013 and LivDet 2015, with an ACE of 0.11-0.24%, it recognizes the difficulties in maintaining several algorithms for hardware-based detection while addressing restricted pore feature-based techniques. A lightweight fingerprint liveness detection network called LFLDNet is proposed by [55]. It makes use of style transfer, foreground extraction, and an enhanced ResNet with MHSA. 95.27% accuracy on small-area fingerprints and 1.72% average classification error across sensors were achieved during evaluation on the LivDet2011, LivDet2013, and LivDet2015 datasets. The authors intend to investigate improved FLD technologies and GAN-based models for cross-sensor generalization against fingerprint deception assaults, while acknowledging the possibility of speed variations. Using CNNs and adversarial data augmentation, the authors in [56] proposed an FPAD technique and won the LivDet2021 competition. The method uses clean and adversarial fingerprints for a three- stage training process that yields good accuracy metrics and an EER of 0.036. The size restrictions of the dataset and possible susceptibilities to adversarial assaults are acknowledged by the authors. Using LPDJH image descriptors and deep learning, the authors in [57] introduced a fingerprint liveness detection technique that achieved good accuracy across LivDet datasets. Their approach shows competitive results on the LivDet 2011 dataset, with an average EER of 3.95%. Because there aren’t enough test samples, the authors point out possible difficulties in identifying low-resolution fingerprints and calculating accuracy for particular sensors. A CNN-based fingerprint liveness detection technique was introduced by [58] using the Socofing dataset. The model performed well, achieving 98.964% accuracy with a FAR of 0.215% and a FRR of 7.251%. Computational limitations, inconsistent fingerprint quality, and unequal dataset distribution are some of the restrictions.
By addressing the crucial problem of separating real biometric samples from fake or artificial copies, fingerprint liveness detection makes sure that the system authenticates the submitted fingerprints. By stopping unauthorized access, this procedure is crucial for preserving the integrity of bio- metric systems. However, biometric cryptographic systems use biometric information like fingerprints to strengthen security by using cryptographic methods. This way, bio- metric identifiers are safely encrypted and shielded from unwanted access. The interdependence of liveness detection technologies and the efficacy of biometric cryptography systems highlights the relationship between these two domains. Robust liveness detection essentially acts as a cornerstone supporting the security of biometric cryptography systems, emphasizing the need for integrated solutions that handle biometric sample authenticity as well as biometric data management securely.
2.2.2. Biometric Cryptosystem
Biometric cryptosystems are mechanisms that enhance the security of biometric systems by embedding biometric templates with secret keys or auxiliary data. This approach ensures protection against malicious use and data tampering. Figure 4 shows the block diagram of biometric cryptosystem, which consist of two parts one is for enrolment where template are generated from the fingerprint images and stored in the dataset and the second part is authentication where template is generated from a query fingerprint and matched with the stored template to provide access to a system.

Pair-polar minutiae structures were used by [59] to present an alignment-free fingerprint cryptosystem. Their approach achieves robust security and improves privacy by changing minute structures. It has been tested on several databases and performs better than other systems in terms of Genuine Acceptance Rate (GAR) and False Acceptance Rate (FAR); nonetheless, a security risk arises from its dependence on the complexity of brute force attacks. In order to maximize security and efficiency, the authors in [60] suggest a feature-level sequential fusion algorithm for biometric cryptosystems. Experiments conducted on a finger vein database show that the algorithm performs better than the OR rule, decreasing input needs and obtaining a 1.47% False Acceptance Rate. Although the paper admits its limits in analysing some external security concerns, it shows that it is resilient to well-considered attacks. An ECC-free biometric key binding approach employing graph- based Hamming Embedding (GHE) and minutia-vicinity decomposition (MVD) for fingerprint minutiae-based representation was proposed by [61]. The strategy obtains GAR of 89% (FRR=11%, FAR=0.16%) for DB1 and GAR of 97% (FRR=3%, FAR=0.061%) for DB2, when tested on the FVC2002 datasets. The method balances security and performance trade-offs, but it is still susceptible to privacy attacks such as ARM and SKI, and it can only match fingerprint photos of the same finger taken under various circumstances or at different times. In [62], the authors provide a method to improve biometric template security that is based on a 2D logistic sine map (2DLSM). The technique employs diffusion and confusion processes, demonstrating effectiveness against a range of threats, by using chaotic streams from 2DLSM. Effectiveness has been evaluated on iris and finger- print templates; nevertheless, real-time template production problems and noise sensitivity are among the constraints. A safe cryptographic authentication approach utilizing bio- metrics and the discrete logarithm problem was suggested by [63]. The approach produces cryptographic keys using a function F using iris codes, which allows it to handle mistake bits and achieve high accuracy rates. Promising results are shown by the CASIA iris database evaluation, which also notes that iris codes still require work in order to be improved in the future. BioKEY, a biometric-based cryptographic key generation technique based on convolution coding principles, was promoted by [64]. Unique cryptographic keys are created without saving templates by using fingerprint characteristics and applying convolution coding to specific locations. Tests conducted on common fingerprint databases such as MIAS, FVC2002, and FVC2004 show good accuracy and effectiveness; nevertheless, there are certain drawbacks such as difficulties with noisy or hazy fingerprints and a higher processing overhead in comparison to other techniques. ECC-based mutual authentication strategy for Smart Grid communications with biometric authentication integration for improved security and privacy was proposed by [65]. To safeguard against different types of security risks, the protocol consists of start-up, registration, and authentication stages. Notwithstanding its shortcomings, which include parameter sensitivity and vulnerability to certain assaults, the system shows efficiency through communication and computing cost comparisons with current protocols even if it does not offer precise accuracy measurements. In order to safeguard templates in multi-modal biometric systems, the authors in [66] provide a fuzzy vault technique that uses encryption to keep authentic templates safe from copycats. The approach satisfies optimal biometric security requirements with low FAR (0.1062) and zero FRR when tested on a simulated face and fingerprint database. In order to get the best security and accuracy, the authors recommend avoiding function creep attacks and balancing key length with chaff points. Hyper elliptic curve cryptography (HECC) for template encryption was used by [67] to introduce an improved iris recognition technique that achieves great security and accuracy. With the use of fuzzy logic matching and 2D Gabor filter for feature extraction, the system achieves 99.74% maximum accuracy and short identification time. Superior performance with reduced FAR, FRR, and EER measures is demonstrated by evaluation on the IITD and CASIA Iris V-4 iris datasets. A multi biometric cryptosystem for client-server network authentication is presented by [68], guaranteeing computation security and privacy. The approach enhances efficiency by achieving equivalent accuracy with less user input by using iris and fingerprint modalities from a dataset of 100 participants. The authors request protocol enhancements for increased security and verification speed, acknowledging the limitations in accuracy caused by biometric variability. A multi-biometric template security technique based on graph creation was proposed by [69] for cloud authentication. A branching factor graph with a low Equal Error Rate (ERR) of 0.66% is created using fingerprint and palm print features. The authors point out important benefits over conventional authentication techniques while also acknowledging limitations with regard to the encryption process and the quality of the input sample. Using the Diffie-Hellman algorithm and minute characteristics, the authors in [70] proposed a fingerprint-based crypto-biometric system for secure communication. Tested using FVC2002 and the NIST special database 4, the system reports metrics such as FAR, FRR, GAR, and EER, demonstrating privacy protection. The authors have acknowledged the restrictions pertaining to the irreversibility of biometric data, possible data distortions, and key creation. A multi-modal biometric cryptosystem utilizing fingerprint and ear characteristics was promoted by [71], which included preprocessing, feature extraction, and classification stages. The approach achieves excellent accuracy (98.76%) with a dataset that includes photos of ears and fingerprints. Performance is analysed using metrics such as sensitivity, specificity, accuracy, false positive rate, and false negative rate. The lack of multi-modal databases and the dependence on multi-modal systems because particular bio- metrics, such as ear characteristics, are unreliable are among the limitations. However, the method offers an efficient fix for identity and security systems. A biometric cryptosystem using random projection and back propagation neural net- work (BPNN) for template protection is introduced by [72]. Original biometric traits are transformed into unlinkable projected vectors by random projection, and BPNN is then used to map these vectors to secure keys. Better security and performance than current techniques are demonstrated via experimental assessment on a variety of biometric datasets. The authors stress the necessity for more investigation into novel ciphers for biometric template security and the improvement of security through multiple-biometric template protection. A novel fingerprint biometric cryptosystem using fuzzy commitment and CNN-based automated texture descriptor discretization was presented by [73]. Tests conducted on the FVC2000 DB2-A database show encouraging outcomes: 1.25% for FAR, 1.15% for FRR, and 2.83% for EER. The restricted number of photos per identification class presents challenges, such as precisely identifying reference points and producing a bigger training set. An effective cancelable biometric authentication framework using a Genetic Encryption Algorithm (GA) for increased security is presented by [74]. The process entails using GA for increased security, choosing the best sub-images, and permuting biometric templates. Promising findings were obtained via evaluation on a variety of datasets, such as the face and fingerprint datasets; nevertheless, more validation on bigger and more diverse datasets is required to ensure generalizability. A cancellable biometric security system using sophisticated chaotic maps to improve fingerprint identification was provided by [75]. Using various chaotic maps, chaos-based picture encryption produces convolution kernels that are then used to construct encrypted biometric templates. With an EER of 0.593% and a high detection probability of 96.139%), the augmented quadratic map 3 performs best in the system. The invertibility of biometric transformations and the requirement to investigate cancellable recognition in alternative biometrics are among the limitations. The Cancelable Biometrics Vault (CBV) was introduced by [76], who used winnowing and chaffing to create safe biometric templates for cryptographic key encoding. Experimental results demonstrate that, regardless of key size, the CBV’s use of an extended BioEncoding scheme is acceptable for bit strings such as iris-codes, and that its decoding accuracy is equivalent to that of the underlying CB construct. The reliance on an appropriate CB scheme for the biometric representation and computational complexity unfit for real-time applications are among the limitations. A multi-biometric cryptosystem employing Modulus Fuzzy Vault, augmenting input data with BDPHE and segmenting pictures with MBIRCH, was proposed by [77]. Features are extracted by the bidirectional deer hunting optimization algorithm, fused using score level and normalized feature fusion, and then safely stored. The approach enhances revocability and security while producing superior ROC, FAR, FRR, and GAR metrics; nonetheless, it has drawbacks related to algorithm focus and dataset authenticity. A machine vision gait-based biometric cryptosystem using a fuzzy commitment strategy was invented by [78]. Robust bits are chosen for the fuzzy commitment scheme after gait characteristics are retrieved using LTP and GEl. Tested on the CASIA A and CMU MoBo datasets, obtaining 0% FAR and FRR under certain scenarios. One limitation is that it might be challenging to identify people with complicated backgrounds or occlusions. An asymmetric cryptosystem integrating the elliptic curve method and optical scanning cryptography (OSC) was proposed by [79]. Using ECC from biometric pictures, the approach encodes things into holograms, guaranteeing excellent decryption accuracy and key sensitivity. The technique has to be optimized for speed and handles vulnerabilities to ciphertext-only assaults, even though security and key management have improved. In order to pre-process biometric images, the authors in [80] promoted the use of a fuzzy extractor that leverages deep learning, together with code-based cryptosystems to generate robust keys utilizing face biometrics. Promising accuracy metrics are found while evaluating the LFW and CelebA datasets. There is need for improvement in data privacy and security, as evidenced by limitations such as storage requirements and attack vulnerability. ElGamal encryption and Shamir’s secret sharing are two cryptographic algorithms that are used in the blockchain-based user re-enrolment approach for biometric authentication systems proposed by [81]. Key security characteristics are satisfied by simulations that show secure re-enrolment in a matter of seconds; nevertheless, scalability and adversarial assumptions are acknowledged limits. More research is needed to determine the implementation specifics and practical viability. Based on Lagrange’s interpolation, the authors in [82] provide a secure multi-biometric template protection method that uses irreversible and unlinkable image transformation. By utilizing feature-level fusion, the technique combines the properties of the fingerprint, iris, and palm print, attaining a high accuracy of 99.9816% when applied to high-resolution picture datasets. Issues include growing database sizes and possible departures from ISO/IEC 24745 standards, and privacy protection is still a problem. Biometric attributes can be randomly shuffled using a 3D chaotic map, as proposed by [83], to create a safe cancellable biometric cryptosystem. Larger datasets and other attacks are needed for more re- search, however evaluation on the ORL, FVC, and LFW datasets demonstrates encouraging results with very low Equal Error Rates (6.2460x1013) and high average Area un- der the ROC curve (0.9998). A robust cancellable biometric authentication technique is introduced by [84], which makes use of DNA sequencing theory, PWLCM, logistic map, and 3D chaotic maps. Through dispersion and confusion, the technique produces biometric patterns that are completely undefined while achieving increased security. Although computational complexity is still a barrier, evaluation on a variety of face and palm print datasets shows encouraging results in terms of AROC, FAR, DH, SSIM, and PSNR. An Enhanced Biometric Cryptosystem (BCS) using iris and ear modalities with Binary Robust Independent Elementary Feature (BRIEF) was introduced by [85]. Although vulnerable to database-level assaults, experimental assessment on AMI and UBIPr databases shows better performance across several parameters compared to state-of-the-art approaches, suggesting its applicability for security applications. Using deep learning and crypto-mapping, the authors in [86] provided a multi-biometric secure-storage technique that generated cancellable biometrics from fused pictures of the face, fingerprint, iris, and palm. While ICUB results reveal greater error rates, experimental results on the CASIA V4, MICHE, and MobiFace datasets demonstrate good AUCROC and low EER. The limitations mentioned by the authors include the necessity to strike a compromise between security and recognition performance, hardware requirements, and potential over fitting. In an effort to improve security, the authors in [87] proposed a multi-round AES cryptosystem with hierarchical hardware pipelined structures and biometric key generation. The system outperforms traditional AES systems in terms of space and energy efficiency because to resource sharing and simultaneous XOR operations. The undefined dataset size and the restriction to area and energy efficiency measurements are among the limitations.
Biometric characteristics are combined with cryptographic methods in biometric cryptography systems to protect authentication procedures, guarantee the privacy of biometric data, and prevent unwanted access. However, if the data is hacked, the intrinsic uniqueness of biometric features presents privacy problems. Cancellable biometrics are useful in this situation. In order to reduce the risk of prolonged exposure in the event of a data breach, cancellable biometric approaches convert biometric data into a non-reversible, pseudonymous form that can be updated or revoked as needed. The security architecture gains an extra layer of defence that improves user privacy and adaptability by incorporating cancellable biometrics into biometric cryptography systems. This addresses the reliability of authentication as well as the flexibility of maintaining bio- metric identifiers. This interaction emphasizes how crucial it is to combine cancellable biometric techniques with cryptographic security to offer a thorough and reliable solution to biometric data protection.
2.2.3. Cancellable Biometric
Cancellable biometric templates are introduced to enhance the security of biometric authentication systems by storing irreversible transformed versions of templates rather than original biometric templates. This approach prevents attacks and vulnerabilities while maintaining certain advantages, such as non-revocability. Techniques like mixing mechanisms and many-to-one transfer functions are commonly employed for generating cancellable biometrics. A basic block diagram of cancellable biometric is represented in Figure 5 where template is generated using transfer process, if by any reason the template get compromise then it is very easy to replace the old template with a new one by changing the transformation process. Retaining identifiable biometric information despite transformation efforts aimed at unlinkability, potential mismatches due to lack of adaptation to temporal changes, increased computational demands, privacy risks from potential reconstruction, and usability issues regarding recognition reliability are some of the challenges associated with using high-quality initial biometric images for generating cancellable templates. In order to guarantee the security and usability of cancellable biometric systems in actual applications, it is imperative that these variables are balanced.

A fingerprint template protection technique utilizing fused feature-level structures that produce cancelable templates was presented by [88]. Improved performance was seen with EER ranging from 1.6% to 17.6% in the FVC 2002 and 2004 datasets. Two drawbacks are the expense of computing and the invertibility brought on by fusion. In order to take advantage of flaws in partial fingerprint- based authentication systems, the authors in [89] proposed creating “MasterPrints,” which are artificial or actual partial fingerprints that match recorded templates for a large number of users. Their method proved that it was possible to impersonate users when tested on the FingerPass DB7 and FVC2002 DB1-A datasets; in some situations, Synthetic MasterPrints performed better than Sampled MasterPrints. Limitations include imbalanced datasets and limited application to minutiae-based systems, which have prompted more study into remedies. A one-factor cancellable bio- metric authentication technique using Indexing First Order hashing was suggested by [90]. It was assessed for ac- curacy performance, non-invertibility, renewability, and unlinkability. Tested on six datasets from the FVC 2002 and 2004 databases, yielding metrics for genuine-imposter distribution and Equal Error Rate (EER) that are adequate. Although it separates IDs from biometric templates, it assures unlinkability and is susceptible to standard symmetric key cryptosystem assaults. By using OIOM hash and MSH to create a pseudonymous identification, the authors in [91] promoted a one-factor cancellable palmprint recognition technique that achieved a recognition accuracy of 98.07%. although no specific limitations or restrictions are mentioned, experiments were conducted using the PolyU and TJU palmprint databases. A global multi-biometric system using deep neural networks for cancellable feature creation was proposed by [92], which achieved good performance on iris datasets (IITD Iris and MMU2). The technique acknowledges constraints in sensitivity and adaptability and blends dimensionality reduction, adaptive fusion, and revocability. Aspects of security and privacy are explored, and some adversarial threats are illustrated. In order to provide maximum safety of sensitive data, the authors in [93] provided the Secure Triplet Loss method for training end-to-end deep learning models to build non-invertible and unlinkable biometric templates. The approach is tested on facial recognition and ECG tasks, showing that it can successfully modify pre-trained models or create secure models from scratch. The dataset utilized for experimentation is not stated, despite constraints being addressed, such as sensitivity to certain assaults and the effect of demographic characteristics on system accuracy. Constrained Optimized Similarity-based Attack (CSA) was introduced by [94] as an improvement over earlier similarity-based assaults. It incorporates algorithm-specific limitations to optimize pre- image production for impersonation. The usefulness of CSA is demonstrated through experiments using the labelled Faces in the Wild (LFW) dataset and Index-of-Max (IoM) hashing. The performance measures that are measured include the total success rate, the False Acceptance Impostor (FAI) rate, and the True Acceptance Impostor (TAI) rate. The success of CSA is contingent upon data leakage and constraint identifiability, which may restrict its application in certain biometric systems. In order to prevent unwanted access, the authors in [95] developed a non-invertible cancellable fingerprint template approach based on Delaunay triangulation of minutiae points. When evaluated against the FVC2002 database, the findings show promise in terms of identification accuracy, resilience against fingerprint distortion, and comparison to modern approaches. However, more research is necessary for wider validation due to concerns including hacked acquisition equipment and dataset size restrictions. A safe method for building fingerprint templates that are optimized was disclosed by [96]. This technique uses the quality of minutiae points to generate 3D shell-shaped templates. Tested on nine fingerprint datasets, the method yields a 0% Equal Error Rate (EER) and 100% accuracy in separating authentic individuals from imposters. Nevertheless, low-quality photos could be limiting its performance, indicating a possibility for improvement through multimodal biometric system integration. Using IoM hashing and BioHashing, the authors in [97] developed the first constrained-optimized similarity-based attack (CSA) against cancellable biometrics (CB). By optimizing preimage creation through algorithm-specific limitations, CSA outperforms Genetic Algorithm enabled similarity-based assaults (GASA). Success rate (SAR) and false acceptance index (FAI) of CSA, assessed on the LFW dataset, demonstrate the efficacy of CSA in breaking IoM hashing and BioHashing security. However, there are drawbacks to CSA due to its constant model complexity and dependence on hash code size. A cloud and Internet-of-things-ready method for cancellable biometric template generation was developed by [98]. By using the Greatest Common Divisor (GCD) between hazy biometric pictures, it guarantees authentication accuracy and non-recoverability. It is tested on several biometrics and achieves low EER values (down to 0.04%) and high AROC values (up to 99.59%), while it is recognized to have limits with respect to pre-defined distortions and picture quality. A cancellable biometric authentication system with feature-adaptive random projection that includes feature extraction, transformation, and encrypted domain matching was presented by [99]. EER, GAR, and FAR metrics evaluation on the FVC2002 and FVC2004 databases revealed competitive performance. The need for more dis- criminating feature descriptors and investigation across a range of biometric features are acknowledged constraints. In order to provide biometric data safety and reliable authentication, the authors in [100] suggested a user authentication and key agreement system utilizing cancellable biometrics and PUF in multi-server settings. Their methodology beat state-of-the-art techniques when tested on the LFW dataset and assessed using the CMC, ROC, DIR, and DET curves. Recognized drawbacks include the requirement for assessment against complex assaults and scalability issues with larger data sets, indicating potential directions for further study. BioCanCrypto, a biocryptosystem using fingerprint cancellable templates that combines biocryptosystems and cancellable biometrics, was proposed by [101]. It takes cancellable templates and extracts cryptographic keys using a reusable fuzzy extractor with LDPC coding. tested using the FVC2002 dataset, showing encouraging outcomes despite low FRR and EER. The study is restricted to fingerprint data, though, thus it might be worthwhile to investigate alternative feature spaces or data modalities. A unique biometric template protection approach incorporating watermarking and cancellable transformation was suggested by [102]. The technique uses pair-polar coordinates with cancellable modification of minutiae and binary watermarking obtained from fingerprint minutiae. tested on the BioSecure and FVC2002 DB1 datasets, showing better EER and resilience to assaults than previous approaches. Investigating several biometric modalities to improve accuracy and robustness is one of the future research priorities. Absolute Value Equations Transform (AVET), a non-linear projection technique that ensures irreversibility by depending on the Absolute Value Equations issue, was promoted by [103]. AVET surpassed state-of-the-art approaches in bimodal circumstances and produced competitive performances in unimodal settings after being evaluated on eight datasets for different biometrics. A fixed sample size and susceptibility to brute-force attacks are two limitations. Using deep fusion and deep dream, the authors in [104] propose a multi-biometric cancellable system (MBCS) that creates tamper-proof templates using fingerprint, finger vein, and iris biometrics. It used a dataset with nine pictures per modality, outperforming comparable algorithms in EER, FAR, FRR, and AROC. All quantitative evaluations showed positive results. Larger datasets, high computing demands, and a drawn-out enrolment procedure are among the acknowledged limits. A cancellable multi-biometric identification system using ACM encryption and decimation to combine biometric data into a single template was presented by [105]. Performance measures, which were assessed using FVC 2002 and ICE 2005, included EER and ROC curve analysis. Its stated drawbacks were the need for better parameter estimate techniques and bigger databases. CSMoFN is a revolutionary cancellable multimodal biometrics system that combines face and periocular data, as reported by [106]. It uses pairwise angular loss and ArcFace for training, and it achieves an EER of 6.67% on average across six datasets and 2.12% on Facescrub. The authors warn against potential CB template inversion concerns while highlighting dual template-changeability and acknowledging difficulty in fair comparison. A new cancellable multi-biometric system combining deep learning- based fusion and selective encryption was developed by [107]. AES encryption, PRNG matrix XORing of a chosen ocular picture, and Viola-Jones facial segmentation are all used. Although constrained by the size of the dataset, it surpasses previous efforts with high entropy and low correlation, quicker enrolment, and better metrics like EER and AROC, indicating that medical imaging application is a promising area for future study. A unique cancelable biometric solution using deep learning for fingerprint and face biometrics on smart phones was presented by [108]. It improves security for Internet of Things applications by using Siamese networks with visual and text encoders. Prolonged testing shows improved performance compared to earlier approaches, surpassing ciphering-based systems in EER, FAR, FRR, and AROC, and attaining high accuracy metrics. MBFH, a unique cancellable biometric method that makes use of safe hashing and non-invertible transformations, was invented by [109]. Multi-biometric acquisition, feature ex- traction, Multi-Exposure Fusion (MEF), and SHA-3 hashing are all included in the process. Tests using retina, finger veins, palm, and dorsal vein pictures show high pairwise distances and good performance in generating text and visual templates, indicating flexibility for further improvements such as adding white Gaussian noise. A biometric template protection system for Euclidean and Cosine metrics was introduced by [110]. It used distance-preserving, one-way, and obfuscation modules with location-sensitive hash functions. Effectiveness against similarity-based and linear inequality attacks is demonstrated by evaluation on face datasets such as AR, CASIA, ORL, and LFW. However, this approach is not always the best option and requires pre-processing, which raises the computational costs significantly. Despite defences against assaults, the authors advise against assuming complete security in any situation. Using the chaotic Baker map to encrypt biometric templates, the authors in [111] provide a chaotic-based cancellable face recognition system that is highly accurate (98.43%) and adaptable to a variety of databases. The approach takes care of lighting, occlusion, and emotions, but it also recognizes the necessity for environmental adoption and trade-off between performance and user privacy. A cancellable biometric authentication system using image style transfer is proposed by [112]. During registration, users supply a face picture and a key image to create and store a template. In order to get high AUC values (>0.9) in most circumstances, authentication entails comparing freshly created templates with stored ones. Correlation coefficients and ROC curves are used to evaluate the results. One of the limitations is the possibility of authentication using marginally similar key images. This suggests that future research should put limitations on key image parameters.
Widely utilized in forensic and law enforcement settings, AFIS faces unique security issues such data breaches, spoofing attempts, and system flaws that could jeopardize the integrity and accuracy of fingerprint matching. In a similar vein, these vulnerabilities also affect general-purpose user authentication systems, which use fingerprints for identity verification and access control in common applications. Consumer-grade fingerprint authentication systems can benefit from and benefit from the protective tactics included in AFIS security measures. Developers can better address similar risks in general-purpose systems by knowing the vulnerabilities and countermeasures relevant to AFIS. This will help to ensure that strong security mechanisms are put in place to protect user data and prevent unwanted access. In order to improve overall security and user trust in biometric technology, it is crucial to transfer high-security solutions from specialized applications to more commonly used fingerprint authentication systems.

Using global models, local analysis, and combination approaches, the authors in [113] provide techniques to improve fingerprint orientation extraction, obtaining an EER of 0.206% on the FVC2006 DB2 dataset. In addition to photos and has difficulties identifying pores in occluded or blurred images, the system outperforms previous algorithms and achieves excellent accuracy across touch-based, touch less, and latent fingerprint datasets. Future research may concentrate on creating matching algorithms for diverse fingerprint photos using derived pore properties. A new technique for high-resolution fingerprint pore comparison using rotational invariant edge descriptors and Root-SIFT descriptors was introduced by [2]. EERs and FMR1000s for the FVC2002 datasets are 1.86% and 0.12%, respectively, according to the evaluation. The authors support direct pore comparison methods in spite of the possible loss of actual correspondences, acknowledging the drawbacks of comparing pores only on the basis of geometric distance. In order to improve ridge structures and remove false minutiae, the authors in [121] provide a fingerprint enhancement and reconstruction method based on orientation and phase reconstruction. Despite limitations such as age, dirt, and medical issues impacting picture quality, validation on the FVC2002 and FVC2004 datasets shows promise for enhancing interoperability among minutia encoders and matchers. DeepPoreID was created by [122], which achieved higher performance, especially with tiny picture sizes, by using deep convolutional networks for descriptive pore characteristics in fingerprint matching. Significant gains in EER and FMR100 are shown by evaluation on high-resolution fingerprint databases; nonetheless, there are certain drawbacks, such as a need for a sufficient number of pores and difficulties with occlusion. It is underlined that high-resolution finger- print databases are available as open-source resources for more thorough testing. A homomorphic encryption-based fingerprint authentication system that guarantees access control while protecting biometric template data was investigated by [123]. Tested on FVC2002 DB2, the system shows an EER of 9.23%. The computational time issues that were found encourage research into more effective homomorphic encryption techniques. For a thorough assessment, more testing with bigger datasets and varied scenarios is advised. The Shark Smell Optimization (SSO) technique was used by [124] to study a fingerprint authentication system. Achieved FAR of 0.00%, FRR of 0.00666%, and CVR of 99.334% after evaluation on a dataset of 150 student fingerprint pictures. The size of the dataset, lack of variety, and exclusive dependence on the SSO algorithm are limitations. Future research into more swarm algorithms and bigger datasets is advised to get better results. Using fully homomorphic encryption (FHE) and the TFHE library, the authors in [125] created an effective fingerprint authentication system that preserves privacy while guaranteeing safe processing and storage of fingerprint data. Tested on NIST Special Database 9, the system reaches fingerprint matching in an average of 166 seconds, acknowledging the time consumption of the bootstrapping procedure and suggesting improvements for the future. BioSec, a biometric authentication system using fingerprint authentication for secure communication among edge devices, was introduced by [126]. AES-128 bit encryption is used to protect biometric templates while they are being sent and stored in databases. Assessed using the FVC-2004 DB3 dataset with 70% accuracy, they recognize the limitations of symmetric encryption vulnerability and propose improvements to privacy mechanisms, study of lightweight encryption methods, and investigation of other biometric markers such as iris for enhanced security and usefulness. In [127], the authors invented a blind and reversible fingerprint image watermarking method using the differential method and DCT domains. Assessed on the FVC2002 fingerprint database, the technique employs DCT-transformed sub-vectors to incorporate watermark bits, facilitating direct watermark access throughout the extraction procedure. Evaluation measures included matching score and PSNR, which demonstrated a respectable level of fingerprint image security maintenance. The authors pointed out drawbacks like as noise sensitivity and compression, indicating that a bigger sample size would be necessary to increase performance. A set of two finger- print matching methods, employing mtriplets and cylinder codes, fused with a supervised classifier for latent finger- print recognition, was introduced by [128]. Achieved Rank-1 identification rates of 74.03% and 71.32% were evaluated on NIST SD27, GCDB, and MOLF DB4 databases. This work improves upon earlier approaches by evaluating matches using cumulative match characteristic (CMC) curves and plans to investigate other variables in further research for more accurate matching characterisation. Using attention mechanisms and Monte Carlo drop-out, the authors in [129] improved upon previous approaches by introducing an explainable fingerprint ROI segmentation model. High Jaccard similarity and Dice score measurements were obtained by testing on FVC datasets. Limitations include misclassification of back- ground noise and performance changes caused by the size of the sample. An unsupervised technique for evaluating fingerprint quality based on minutiae detection confidence is called MiDeCon, and it was proposed by [130]. tested on FVC 2006 datasets; verification error and error-vs-reject curves showed superior performance compared to NFIQ1 and NFIQ2. The study did not address the limitations and limits of MiDeCon. ASRA, an Automatic Singular Value Decomposition-based Robust Fingerprint Image Alignment technique, was proposed by [131]. When tested on the FVC2002 and FVC2004 databases, ASRA demonstrated efficacy and efficiency in alignment, but with recognized shortcomings in terms of picture backgrounds and ROI extraction. For approach efficacy, more validation on bigger datasets is recommended. A unique fingerprint template protection and authentication method utilizing visual secret sharing (VSS) and super-resolution was suggested by [132]. The approach demonstrated security and resilience when tested on the FVC2002 DB1 dataset, while there are some acknowledged drawbacks, such as the requirement for higher-quality photos and the possibility of attacks on the super-resolution process. A dual-filter architecture and a novel texture descriptor, sDSIFT, were recommended by [133] to improve spoofing detection in fingerprint authentication systems. Tested using LivDet 2013 and 2015 datasets, the approach combines the dual-filter architecture with sDSIFT to achieve competitive accuracy. Nevertheless, shortcomings include the incapacity to distinguish between different filter kinds and spoofs created using materials that resemble real fingerprints. Three reliable methods utilizing fingerprint, iris, and voice characteristics for multi-modal biometric authentication were presented by [134]. The second technique, which used an SVM classifier and sum FFC, was evaluated on a dataset of 228 image and signal data, and it obtained a 100% classification rate; however, its scalability and real-world resilience were not evaluated. A secure online fingerprint authentication system with a cancellable fingerprint template design for privacy was provided by [135] for Industrial IoT devices over 5G networks. Tested on six public fingerprint databases, the system demonstrates competitive efficiency and performance, however it recognizes the difficulties in preserving security while guaranteeing strong authentication over picture databases of poor quality. Using an Arduino Mega 2560 and a fingerprint sensor, the authors in [136] developed a fingerprint authentication system based on embedded systems. It generates templates using minutiae extraction and provides PIN and fingerprint combinations for smart home access. Although the accuracy is said to be high, low-end embedded systems’ cost and durability against assaults present obstacles. CNN classification and Gabor filter-based feature extraction were used by [137] to investigate a fingerprint authentication technique. The approach beats other modern methods on the FVC2006 database, with a validation accuracy of 99.33%. Smaller training sets are still difficult to manage, despite results. A deep CNN model for fingerprint authentication was studied by [138], with 100% training and validation accuracy. One limitation is the diversity of datasets, which raises the possibility of strengthening robustness and generalizability. A multi-factor authentication approach was created by [139] to reduce False Acceptance Rates (FAR) and False Rejection Rates (FRR) in biometric systems. By combining several fingerprint sample permutations, their method increases system accuracy and fortifies it against impostor assaults. As opposed to single-factor authentication, experimental results on datasets like CASIA-FingerprintV5 and FVC2002 show lower mistake rates; nonetheless, the study admits several limitations, including addressing environmental deterioration and dataset size. InfinityGauntlet, a brute-force attack against smartphone fingerprint authentication (SFA) systems, was revealed by [140]. It uses SPI MITM to circumvent limit attempts and takes use of design flaws. They tested the assault on several devices using inexpensive equipment and a synthetic fingerprint generating technique, and they were able to detect four different types of attacks. One limitation is that security regulations demand the attack to be finished within 72 hours and that sensor hot plugging support be provided. A unified model for fingerprint authentication and spoof detection was developed by [141] using DualHeadMobileNet, a dual-head convolutional neural network. The model, using integrated datasets from FVC 2006 DB2A and LiveDet 2015, delivers low spoof detection error rates and good authentication accuracy. Computational effort and the requirement for bigger, more varied datasets for further studies are among the limitations. Blind-Touch, a privacy-preserving fingerprint authentication system using homomorphic encryption and machine learning, was introduced by [142]. Using PolyU and SOKOTO as benchmark datasets, the system attains great accuracy, with F1-scores of 93.6% and 98.2%, respectively. The influence of feature vector size on calculation time and the computational cost of constructing a traditional CNN with homomorphic encryption are among the challenges. The FingerPIN method, which combines PINs with fingerprints for multi-factor authentication, was proposed by [143]. According to a usability research, FingerPIN is more secure, quick, user-friendly, and efficient than conventional techniques. Restrictions include a limited sample size and a brief period of data collection, indicating the need for more study. An AVAO-enabled Deep Maxout Network (DMN) for fingerprint-based person authentication was proposed by [144]. The technique obtained an accuracy of 0.927 on the CASIA Fingerprint Image Database by employing the AVAO optimization algorithm of the method. The authors pointed out constraints such as the need for strong preprocessing and model training.
Fingerprints are being utilized more and more in general- purpose user identification to confirm identity on a variety of platforms, including secure facilities and mobile devices. This calls for quick and accurate verification procedures. Rapid fingerprint indexing and searching technologies are essential for fulfilling these expectations because they allow fingerprint records to be retrieved and matched quickly, improving system performance and user experience. The time needed for fingerprint verification can be greatly decreased by integrating sophisticated indexing and searching algorithms into general-purpose authentication systems, increasing the process’s efficiency and scalability. This synergy emphasizes how crucial it is to optimize fingerprint search technologies to facilitate secure and seamless user authentication, guaranteeing that the speed and accuracy of the underlying verification procedures meet the convenience of biometric access.
4. Fast Fingerprint Indexing and Searching
In various application domains, the rapid response and high efficiency of an Automated Fingerprint Identification System (AFIS) are paramount. To achieve swift results from large datasets, a common approach involves using a combination of fast and accurate algorithms. This entails employing a fast algorithm to generate a subset of candidate fingerprints, followed by a more precise but slower algorithm for final matching. Efficient fingerprint indexing predominantly revolves around two strategies: (i) utilizing Level-I features like ridge orientation and frequency maps, and (ii) leveraging minutiae features. The primary aim of fingerprint indexing is to reduce search space and time, especially when dealing with massive gallery image datasets. This section highlights several algorithms that exemplify this approach. Figure 7 shows the fingerprint processing and matching in distributed environment where the features from the fingerprint image is extracted at the client side and passed it to a server, where multiple feature matchers run in parallel to match the query feature in large fingerprint database. After matching the result is again send back to the client side.
To analyse huge databases efficiently, the authors in [145] created a distributed fingerprint matching system. The system achieves flexibility and scalability by using a two-level distributed design. Studies using NIST and synthetic fingerprint datasets showed that, when processing nodes and thread counts rose, execution times improved while accuracy remained similar to that of conventional AFIS. By parallelizing database searches, the authors in [146] introduced a GPU-based fingerprint recognition system that achieves fast processing rates. Although the approach can quickly identify millions of fingerprints per second, its practical use is limited by its 2% mistake rate. While highlighting the promise of GPU-based algorithms, the paper also notes that more development and integration into hybrid systems are required to achieve higher accuracy.
Using locality sensitive hashing (LSH) and minute cylinder-code SDK for effective indexing with pose limitations, the authors in [147] developed an absolute registration method for fingerprint indexing. Experiments using databases such as the NIST Special Database 14 and a law enforcement fingerprint database shown increased efficiency and accuracy. Among the drawbacks are the high dimensionality of minutiae descriptors and the requirement for additional study to improve resilience against noise and un- predictability. In [148], the authors presented a fingerprint indexing technique that uses convex core points and minutiae pairs, combining candidate list reduction and k-means clustering to achieve effective indexing. The methodology outperforms state-of-the-art methods on six datasets by using coaxial Gaussian track coding and MBP representation for precise matching. One limitation is that the hardware and software utilized in the trials varied, and there is a lack of information on the values of the parameters.

Improved retrieval efficiency was achieved by [149] using deep convolutional neural networks (DCNN) to build a minutiaecentred fingerprint indexing approach. They achieved superior results on five benchmark databases with their unique aggregating methodology that made use of 1-D CNN. Metrics for evaluation included penetration and error rates; higher penetration rates and lower error rates were noted. Two of the limitations were the high processing costs for MCC-based approaches and the low quality photos in FVC2000 DB3a. To address the shortcomings of minutiae-based approaches, the authors in [150] studied DeepPrint, a deep network for obtaining fixed-length fingerprint representations. Using the NIST SD4 and SD14 datasets, DeepPrint outperformed leading commercial off- the-shelf (COTS) SDKs in terms of accuracy and search speed. DeepPrint showed encouraging results in finger- print identification, despite limits in benchmark saturation. CNNAI, a CNN-based technique for fingerprint recognition utilizing geometrical minutiae arrangements, was studied by [151], and it outperformed state-of-the-art algorithms in terms of identification rates. CNNAI demonstrated its abilities by achieving Rank-1 identification rates of 84.5% and 80% on the FVC2004 and NIST SD27 latent fingerprint datasets, respectively. Reliance on a minimum of eight minutiae points is one of the limitations, and using MINU- EXTRACTNET to extract all minutiae presents difficulties that might potentially impact identification rates. By developing a pore-based indexing technique for high-resolution fingerprints, the authors in [152] significantly reduced pre- selection error rates compared to previous approaches on a variety of databases. The approach outperformed state-of- the-art minutiae-based algorithms on DBI and IITI-HRFP, according to tests conducted on datasets comprising DBI, DBII, IITI-HRFP, and IITI-HRF. Restrictions include decreased efficacy on databases with high-resolution whole fingerprints, which motivates more study into distortion correction methods. A latent fingerprint indexing technique integrating minutiae-based features, global and local matching, and machine learning-based segmentation was suggested by [153]. Up to 94.77% accuracy was shown in experiments on the IIIT- D dataset, with indexing times varying from 5.29 to 25.92 seconds. Managing incomplete perceptions, background noise, inadequate ridge clarity, and nonlinear distortions are among the difficulties. An MCC-based indexing technique for latent fingerprint recognition was described by [154], beating competitors on the NIST SD4 and NIST SD14 databases by at least 1% and 3%, respectively. Although effective, it can have performance issues with different kinds of databases or with less-than-ideal detail extraction, and its temporal complexity prevents real-time applications. Employing graph-based algorithms for indexing and refining, the authors in [155] provided a pore-based fingerprint retrieval technique that outperformed previous approaches on databases DBI and DBII in terms of speed and accuracy. Its shortcomings, however, include the dependence of indexing precision on cluster accuracy and the computational cost that increases with the number of pores. Two fingerprint search strategies utilizing classic inverted index methods were proposed by [156]. They were examined on FVC2002 DB1a and a private dataset, with differences in document generation methodologies and minutiae handling. The second approach’s scalability and sensitivity to low-quality minutiae were found to be limits, despite the fact that it produced reduced error rates. Using highly discriminative embeddings for constant-time identification and k-means or LSH index table generation, the authors in [157] present PalmHashNet, a palm print database indexing technique. Evaluation on four benchmark databases shows above 99% accuracy; nonetheless, there are several constraints, such as assumptions about the positioning of the palm area and unproven scalability on big datasets. By combining GIST descriptors from face, iris, and palm print biometrics, the authors in [158] developed an efficient multidimensional spectral hashing (MDSH) technique for data retrieval from multi biometric databases. Despite computational and memory constraints, experiments conducted on databases from IIT Delhi reveal enhanced accuracy measures that surpass tree-based indexing approaches and random hashing techniques. More efficiency improvements are proposed, such as lower memory use and processing costs, and investigating alternatives to local features. To lessen the computational burden in biometric identification systems, the authors in [159] proposed a nearest quality score-based intelligent search, which resulted in workload reductions of up to 38% for face, 31% for iris, and 29% for fingerprint databases. The technique, tested on the FERET, CASIA, and FVC2002 datasets, effectively indexes queries using sample quality scores that may be applied to a wide range of biometric features. Intraclass variability and susceptibility to various quality estimator techniques affecting the number of comparisons are challenges. FKPIndexNet is an innovative approach for finger-knuckle-print (FKP) identification, developed by [160]. It uses customized autoencoder networks and similarity-preserving hash codes. The PolyU-FKP and IITD FKP databases show 100% hit rate in experimental findings at low penetration rates, indicating that index table creation approaches have limitations. A signal-based fusion approach for indexing biometric databases was presented by [161], which reduced computational effort by up to 70% without sacrificing biometric performance. Promising results are obtained when evaluated on benchmark databases such as FERET and FRGCv2, however these need the recomputation of indexes for new enrolments and high-quality face photos. By utilizing cancellable methods and DNN- based embedding extractors, the authors in [162] developed a novel approach to multi-biometric indexing that preserves privacy while improving biometric performance by 57%. Evaluation using a composite dataset reveals advancements but also points up extractor compatibility and dataset representation constraints. In their investigation of AFR-Net, an attention-driven fingerprint recognition network, the authors in [163] combined CNN-based and attention-based embeddings for improved performance. By utilizing a variety of datasets, AFR-Net surpasses baseline models and attains excellent accuracy metrics in verification and identification tasks. The lack of domain expertise in fingerprints and the requirement for better latent fingerprint preparation methods are among the limitations. An effective Gravitational Search Decision Forest (GSDF) method for fingerprint identification was created by [164] by merging the gravitational search algorithm (GSA) and random forest (RF). Comparing the GSDF technique to conventional machine learning classifiers, it yields higher identification rates for both entire and latent fingerprints. The authors agree that although the technique beats current methods, additional tuning is necessary for the recognition of low-quality latent fingerprints.
Infant fingerprint identification presents a unique set of challenges compared to adult fingerprint identification, which has a well-established sector with reliable techniques and tools for collecting and evaluating mature fingerprint patterns. Because of their fingers’ quick growth and development, infants’ fingerprints are more prone to distortion and have less defined ridges, therefore effective identification requires specific methods and modifications. It is necessary to modify fingerprint capture and processing technologies that have been developed for adults in order to address these issues with newborns. Researchers and practitioners can improve the overall efficacy and accuracy of fingerprint identification systems across all age groups by linking the methodology and technology utilized in both fields. This will guarantee that the systems remain accurate and dependable from infancy through adulthood. For comprehensive fingerprint identification systems that meet the needs of a wide range of demographics, this integration is essential.
5. Infants’ Fingerprint Identification
Emerging as a challenging application, infants’ fingerprint identification plays a crucial role in maintaining accurate records of a child’s vaccination history, nutritional needs, and overall identity throughout their lifetime. Among various biometric options, fingerprinting emerges as one of the most suitable choices due to its stability and uniqueness. While alternative biometrics like iris scanning or facial recognition are less feasible for infants due to practical challenges, fingerprints offer a reliable biomarker. In the field of infants’ fingerprint identification, limited research exists, but several notable contributions have been gathered from the literature. Figure 8 shows fingerprints of an infant at different age, which demonstrate the different density of ridges during different age of a infant.

A cost-effective, high-resolution fingerprint scanner for newborns was created by [165]. They achieved a rank-1 accuracy of 73.98% by building a database with pictures from 16,384 infants. In [166], the authors assessed the accuracy of child fingerprint recognition using NFIQ 2.0 measures in a follow-up research. Using a 500 PPI dataset, they were able to achieve TAR of 99.5% with FAR of 0.1% for children aged 12 months. An inexpensive newborn fingerprint identification system called InfantPrints was created by [167]. It consists of a high-resolution matcher and a specially designed fingerprint scanner. Assessed on a 315 baby longitudinal database, the system demonstrated excellent accuracy from enrolment at 2 months to authentication at 1 year. Among the drawbacks is the lack of a reliable automatic alignment technique for baby fingerprints. Using wavelet feature extraction and K-NN classification, the authors in [168] developed a baby’s footprint identification system. Using a 200×500 pixel ROI and level 4 wavelet decomposition, the system obtained 99.30% accuracy with a dataset consisting of 600 footprint photos and 30 newborns. The modest sample size and the requirement for more testing on a bigger dataset for real-world application are acknowledged constraints. A newborn fingerprint identification technique using deep learning for fingerprint categorization was described by [169]. The approach obtained 78.4% classification accuracy compared to hand classification with a dataset consisting of 1,357 training photos, 166 validation images, and 1,181 test images. The requirement for significant computer resources and the difficulties in obtaining clear fingerprint pictures from some newborns are among the limitations. Using fingerprint, iris, and outer ear shape modalities, the authors in [170] created and assessed biometric recognition systems for babies. For the fingerprint and iris modalities, new hardware and soft- ware were created, but the outer ear shape modality made use of already-existing technologies. At a public clinic, data on newborns and young children under the age of one was gathered. FTA (failure to acquire) and equal error rate (EER) were used as accuracy measures. With an EER of 0.16%, the ear modality performed the best; nevertheless, inadequate reporting, inconsistent devices, and data collection from newborns and young toddlers presented difficulties. A multi-instance contingent fusion approach for newborn fingerprint verification was presented by [171], which combined the left thumb and right index finger prints of infants ranging in age from one day to six months. The approach achieved 73.8%, 69.05%, and 57.14% accuracy for 1-month, 3-month, and 6-month intervals between enrolment and query prints, respectively, by using a 500 ppi fingerprint scanner and NIST feature extractor MINDTCT. Among the limitations were the requirement for fusion with increasing time intervals between photos and the lack of supplemental information in permission forms. M²BRTPC, a new Multi-modal Biometric Recognition for Toddlers and Preschool Children, is presented by [172]. Its goal is to identify children using minimum biometric characteristics such as fingerprints, faces, and iris. Their research, which acknowledged age range restrictions and the inherent difficulties in biometric identification, improved performance by 14.75e18.75% using iris and fingerprint data from over 100 children ages 18 months to 4 years. Using a pre-trained ResNet-50 model, the authors in [173] investigated a fingerprint identification method for infants and toddlers, solving issues with image clarity and quality. The process entails cropping and enhancing images in order to precisely extract fingerprint traits. Using a dataset of 154 participants, the experimentation yielded an accuracy of 82.47%, a false rejection rate of less than 18%, and an authentication duration of about 2 seconds per fingerprint, while taking into account restrictions such as tiny fingerprint size and picture quality limits. Employing the CLCF dataset supplemented with a hybrid technique, the authors in [174] presented Child- CLEF, a CNN-based children detection system employing contactless fingerprints. The suggested Child-CLEF Net model outperforms current systems with 98.46% accuracy and 1.99% equal error rate by extracting minutiae and using BOZOROTH3 for identification. Larger datasets are required, as is the exploration of other enhancement and feature extraction techniques. Future developments should take patch-based newborn identification into consideration. These are some of the limitations.
Biometric identification systems for newborns and toddlers have advanced significantly in terms of accuracy and technological adaptability, but they still face significant obstacles in terms of data quality, moral issues, and practical implementation. Improving algorithms, expanding datasets, strengthening privacy protocols, and improving usability will be crucial in tackling these issues and boosting the dependability and relevance of these systems in paediatric healthcare and other fields.
A key component of biometric authentication is fingerprint identification, which uses distinctive ridge and valley patterns to confirm each person’s identity. Though useful, it can have drawbacks such spoofing, ambient conditions, and differences in fingerprint quality. In order to improve accuracy and reliability, multi-modal identification systems integrate various biometric modalities, such as voice prints, iris patterns, fingerprints, and facial recognition. Multi- modal systems are able to complement fingerprint data with other biometric identifiers, making up for any one modality’s shortcomings and offering a more robust and all- encompassing authentication procedure. This integration makes biometric systems more flexible and user-friendly while simultaneously enhancing overall security. Knowing how techniques might improve fingerprint recognition shows the possibility of developing more flexible and safe biometric systems that take advantage of several biometric properties.
6. Multi-modal Fingerprint Biometric
In [175], the author reported a multi-modal biometric system that combines face, fingerprint, and signature modalities with feature extraction techniques including Principal Component Analysis and Stationary Wavelet Trans- form. In order to address problems like spoof attacks and noisy data, they evaluate system accuracy on the YALE- FVC2002KVKR database by applying score and decision level fusion. Through the use of multi-modal strategies to overcome restrictions, the project aims to boost the dependability of biometric systems. In [176], the authors proposed improved unimodal and multi-modal biometric recognition systems using fingerprints and ECG signals using both traditional approaches and deep learning. When tested on virtual datasets like the FVC2004 fingerprint database and the MIT-BIH ECG database, multi-modal systems perform better than unimodal ones. Some of the drawbacks are the scarcity of ECG databases, the challenge of finding real- world datasets, and the high processing costs related to deep learning models. In [177], the authors have presented a deep learning-based multi-modal biometric fusion model that blends score, feature, and pixel layers to increase identification accuracy. Evaluation on a simulated dataset combining iris, fingerprint, and face data shows 99.6% accuracy using Euclidean distance metric learning and modality-specific network training for practicality. Limitations originating from the dataset’s dependability may affect the accuracy rates. A 98.5% accurate HGSSA-bi LSTM model that combines fingerprint and iris biometrics is presented by [178]. When tested on the CASIA dataset, the model demonstrates excellent sensitivity and precision, but it also acknowledges the cost and complexity of multi-modal systems. In [179], the authors offers “Secure Sense,” a multi-modal biometric system that incorporates face, fingerprint, and iris data and achieves 93% accuracy. The limitations of unimodal systems are addressed by decision-level fusion approach, which enhances strong authentication by utilizing real-time and web-based datasets.
7. Comparative Analysis
The Table 1 provides a comprehensive overview of un- formatted fingerprint image authentication methods, encompassing various techniques aimed at enhancing the quality and recognition accuracy of latent fingerprints. Each method offers unique advantages and faces specific limitations, highlighting the need for ongoing research to address existing challenges and explore new avenues for improvement. Future research in this field should focus on several key directions. Firstly, there is a pressing need to develop robust and scalable algorithms capable of handling diverse and challenging latent fingerprints, including those with low quality, partial information, or distortion. This may involve further exploration of deep learning architectures, such as convolutional neural networks (CNNs) and generative adversarial networks (GANs), to effectively enhance latent fingerprint images while preserving crucial details and minimizing noise. Secondly, efforts should be directed towards standardizing evaluation protocols and benchmark datasets to facilitate fair comparisons between different methods and promote reproducibility across studies. This includes the creation of large-scale, publicly available databases encompassing a wide range of latent fingerprint images captured under various conditions, which can serve as a common test bed for evaluating the performance of different algorithms. Additionally, research should address ethical considerations surrounding the deployment of unformatted fingerprint image authentication systems, including privacy concerns, algorithmic bias, and potential misuse of biometric data. Developing transparent and accountable frameworks for data collection, storage, and usage is essential to ensure the responsible and ethical implementation of these technologies in real-world applications. Furthermore, the integration of multi-modal biometric fusion techniques, such as combining fingerprint with other biometric modalities or contextual information, holds promise for enhancing the robustness and reliability of authentication systems, especially in challenging scenarios or under adversarial conditions. Lastly, advancements in hardware technologies, such as high-resolution sensors and efficient processing units, can significantly contribute to improving the accuracy and efficiency of unformatted fingerprint image authentication methods. Collaborative efforts between academia, industry, and regulatory bodies are essential to drive innovation, address emerging challenges, and ensure the continued advancement and responsible deployment of fingerprint authentication technologies in various domains. By pursuing these research directives, the field of unformatted fingerprint image authentication can continue to evolve and meet the growing demand for secure and reliable biometric authentication solutions.
Table 1: Comparative Analysis of Unformatted Fingerprint Image Authentication Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [4] | 2012 | Robust alignment algorithm, descriptor-based Hough transform | NIST Special Database 27 (NIST SD27) | Rank-1 accuracy | 53.5% | Performance highly correlated with minutiae count and print quality. Not effective for singular point-based alignment. |
2 | [5] | 2014 | Feedback mechanism from exemplar print | NIST SD27, WVU latent databases | Improvement in identification accuracy | 0.5-3.5% | Trade-off between introducing feedback and system complexity. Effectiveness depends on exemplar print quality. |
3 | [6] | 2016 | Deformable Minutiae Clustering | NIST SD27, FVC2002, FVC2004, FVC2006, NIST SD4 | Accuracy | Up to 85.6% (Cylinder- Codes), 83.3% (m-triplets) | Slow speed, scalability issues, not effective for latent-to-latent fingerprint identification. |
4 | [7] | 2017 | Adaptive latent fingerprint segmentation | NIST SD4, NIST SD 27, IITD CLF, | Rank 50 identification | 78.7%, | Assumption of consistent ground truth across examiners, limitations of SIVV based metric. |
5 | [8] | 2018 | Collaborative filtering model for enhancing fingerprint image | FVC2004 | EER, FMR100 | 4.54, 7.5 | Fixed patch size limitation, sensitivity to input quality. |
6 | [9] | 2018 | Convolutional neural network (CNN) FingerNet for latent fingerprint enhancement | NIST SD27 | Matching accuracy | 47.7% | Small dataset size, lack of ground truth for region of interest. |
7 | [10] | 2018 | Automated latent fingerprint recognition system with ConvNets | NIST SD27, WVU latent databases | Rank 1 identification accuracies | 64.7%, 75.3% | Poor ridge quality, background noise, dependence on manual ROI selection, long processing times. |
8 | [11] | 2019 | Minutiae-based matcher improvement using rare minutiae | GCDB | Rank-1 identification | 92.72% | Need for manual intervention, dataset size limitations. |
9 | [12] | 2019 | End-to-end latent fingerprint identification system | NIST SD27, MSP, WVU, N2N, background set of 100K rolled prints | Rank-1 retrieval rates | 65.7%, 69.4%, 65.5%, 7.6% | Challenges in cropping algo- rithm, marking minutiae, and scalability. |
10 | [13] | 2020 | Asynchronous processing for Latent Fingerprint Identification (ALFI) | NIST SD27, FVC 2004, FVC 2006 | F1-score, Equal Error Rate (EER) | 4.18%, 3.36% | Limited test set, single classifi- cation approach, not tested on non-fingerprint latent features. |
11 | [14] | 2020 | LQMetric: objective, automated tool for measuring the quality of latent fingerprints | NIST ELFT-EFS-2 eval- uation | Clarity prediction, AFIS performance | 61.4% | Performance not generally appli- cable to other AFIS algorithms or systems. |
12 | [15] | 2020 | Progressive GAN-based method for latent fingerprint enhancement | NIST SD27 | CMC curve metrics | 76% | Computationally expensive, lim- ited dataset size, may not work well with very weak features. |
13 | [16] | 2020 | End-to-end automated latent fingerprint identification system using DCNN- FFT enhancement | FVC2002, FVC2004, NIST SD27 | Precision, recall, F1 scores | 100% for FVC2002 and FVC2004, 84.5% for NIST SD27 | Computational time for minu- tiae extraction, limited evalua- tion dataset. |
14 | [17] | 2020 | Deep nested UNets architecture for automatic segmen- tation and enhancement | NIST SD27, IIITD- MOLF | PA, MPA, MIoU | 0.96,0.96,0.84 | Lack of publicly available databases with pairs of low- quality latent and high-quality fingerprint images. |
15 | [18] | 2020 | Non-minutia latent fingerprint registration method using dense fingerprint patch alignment | NIST27, MOLF | Deviation between mated minutiae, reg- istration performance | 87.22%, 2.42 | Relying only on 2D information, computationally demanding. |
16 | [19] | 2021 | Fusion of pores and minutiae for latent fingerprint identification | IIITD Latent database | True detection rate, false detection rate | 82.89%,21.2% | Limited database size, computa- tional expense. |
17 | [20] | 2021 | Latent fingerprint identification using Ratio of Minutiae Triangles | FVC2004, NIST SD27 | Rank-1 recognition ac- curacy | 78.75%,86.82% | Handling of partial fingerprint, computational complexity. |
18 | [21] | 2021 | Hybrid model using EDTV for enhancement and ChanVese for segmentation | NIST SD27, WVU DB | Rank-1 identification | 72% | Limited database size, effectiveness in handling complex latent fingerprints. |
19 | [22] | 2021 | Adaptive latent fingerprint segmentation and matching using Chan-Vese based on EDTV | NIST SD27 | RMSE | 0.1837301 | Inadequate accuracy of existing techniques for segmentation. |
20 | [23] | 2022 | Automatic latent fingerprint identification system using scale and rotation invariant minutiae features | FVC2004, NIST SD27 | Rank-1 identification accuracy | 97.5%,88.8% | Handling partial fingerprints, computational complexity. |
21 | [24] | 2022 | Minutia patch embedding network (MinNet) model | EGM Test Dataset, FVC- Latent Test Dataset, Ts- inghua Distorted | Rank-1 Acc | 92.39%, 85.88% | Limited success with partial or severely distorted fingerprints |
22 | [25] | 2022 | Multiscale fixed-length representation approach | Hisign, NIST SD27, MOLF, N2N | Rank-1 Accuracy | 98.8%,99.81% | Performance may vary on simulated fingerprints, optimization limited to study scope |
23 | [26] | 2022 | Residual encoderdecoder architecture | IIIT-Delhi Multi Sensor Latent Fingerprint (MOLF) database | Rank-25, Rank-50 Acc | 48.95%, 70.89% | Ridge-based, limitations in recon- structing some parts of images, evaluation on different databases needed |
24 | [27] | 2022 | Analysis of fairness in latent fingerprint prediction | FBI WVU BioCop 2008 database | AUC, SN, SP, PPV | 65.7%,69.4% | Limited to FBI BioCoP database, quality measurements may not fully represent unbiased quality score, modelling assumptions of LFIQ algorithm may not always be satisfied |
25 | [28] | 2023 | Universal Latent Fingerprint Enhancer (ULPrint) | MSP database, NIST 302 database, Synthetic latent fingerprint | Rank-1 retrival | 29.07% | Scarcity of latent ,Challenges like occlusion, background variation, some failure cases mentioned |
26 | [29] | 2023 | FingerGAN for latent finger- print enhancement | NIST SD27, IIIT-Delhi MOLF | Rank-1 accuracy | 76.36% | Computational complexity, absence of true mates |
27 | [30] | 2023 | Combination of local and global features with automatic seg. | NIST SD 27, NIST SD 302, MSP, MOLF DB1/DB4, MOLF DB2/DB4 | Rank-1 Retrieval Rate | 84.11%,70.43%,62 | .8C6h%allenges like low contrast, occlusion, varying backgrounds, some failure cases mentioned |
28 | [31] | 2023 | Hybrid technique called AC- SACO for latent fingerprint recognition | NIST SD-27 | Precision, Recall, F- score | 82.07%, 98.86%,89.68% | May not work well for complex backgrounds or overlapping latent fingerprints, need to explore other optimization techniques and datasets for validation |
29 | [32] | 2023 | Generation of synthetic latent fingerprints for data augmentation | NIST SD27 ,MSP latent Database | True Detection Rate | 75.19%,77.02% | Use of only one pre-trained fingerprint matcher, lack of publicly available operational latent fingerprint databases |
The Table 2 provides a detailed comparative analysis of various fingerprint liveness detection methods, encompassing a range of techniques such as feature extraction, machine learning, deep learning, and fusion approaches. Each method demonstrates different strengths and limitations in terms of accuracy, dataset applicability, and susceptibility to spoofing attacks. For instance, deep learning-based approaches, such as convolutional neural networks (CNNs) and stacked auto encoders, have shown promising results in achieving high detection accuracy. However, they often require large and diverse datasets for training to generalize well across different sensors and spoofing materials. Future research in fingerprint liveness detection should address several key challenges and explore new avenues for improvement. Firstly, there is a need to enhance the robust- ness and generalization capabilities of existing methods by leveraging larger and more diverse datasets that encompass various sensor types, image qualities, and spoofing materials. Additionally, researchers should focus on developing techniques capable of detecting low-resolution fingerprints and effectively handling imbalanced datasets to mitigate bias and improve overall performance. Secondly, the development of adaptive and resilient liveness detection systems that can dynamically adjust to evolving spoofing attacks is crucial. This may involve exploring novel approaches such as adversarial training, ensemble learning, and anomaly detection to detect and adapt to emerging threats effectively. Moreover, incorporating multi-modal biometric fusion techniques, such as combining fingerprint with iris or face modalities, could further enhance the robustness and reliability of liveness detection systems. Furthermore, research efforts should concentrate on addressing ethical considerations related to the deployment of fingerprint liveness detection systems, including privacy concerns, algorithmic fairness, and transparency in decision-making processes. Developing standards and guidelines for evaluating and benchmarking liveness detection methods could also facilitate fair comparisons and promote reproducibility across different studies. Lastly, advancements in hardware technologies, such as improved sensor designs and embedded processing capabilities, can play a vital role in enhancing the efficiency and real-world applicability of fingerprint liveness detection systems. Collaborative efforts between academia, industry, and regulatory bodies are essential to drive innovation and ensure the responsible development and deployment of liveness detection technologies in various domains, including cyber security, law enforcement, and mobile authentication. By addressing these research directives, the field of fingerprint liveness detection can continue to evolve and meet the growing demand for secure and reliable biometric authentication solutions.
Table 2: Comparative Analysis of Fingerprint Liveness Detection Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [33] | 2016 | Combination of low-level features, shape analysis, and PCA | LivDet 2011, LivDet 2013 | EER | 3.95% | Need for more testing on different sensors and spoofing materials. |
2 | [34] | 2017 | Co-occurrence array-based feature extraction and SVM classification | LivDet09DB, LivDet11DB | Average classifi- cation error | 6.2% | Loss of image information through quantization, large feature dimension. |
3 | [35] | 2018 | Deep CNN using local patches centred on minutiae | LivDet 2011, LivDet 2013, LivDet 2015 | Average accu- racy | 99.03% (LivDet 2015) | Need for more diverse datasets and ethical considerations. |
4 | [36] | 2019 | BP neural network using dif- ference co-occurrence matri- ces | LivDet 2013 | Classification ac- curacy | 5.65% | Lack of diagonal direction difference co-occurrence matrices, challenge in distinguishing poor quality images. |
5 | [37] | 2020 | Semi-supervised stacked auto encoder-based hierar- chical feature learning | LivDet 2011, LivDet 2013 | Average classifi- cation error | 19.62% | Insufficient size of the dataset, difficulty in distinguishing poor quality images. |
6 | [38] | 2020 | Adversarial attacks on deep learning-based liveness de- tection models | LivDet 2013, LivDet 2015 | Error rate, FAR, FRR | 4.3%, 3.7% | Limited diversity of fingerprint databases, simplicity of fingerprint liveness detection models. |
7 | [39] | 2020 | Score-level fusion of finger- print matching and liveness detection | LivDet2015, LivDet2019 | Overall accuracy | 96.88% (LivDet2019) | Influence of finger pressure and duration on detection accuracy. |
8 | [40] | 2020 | Genetic algorithm op- timized DenseNet for liveness detection | LivDet 2009, LivDet 2011, LivDet 2013, LivDet 2015 | Accuracy | 98.22% (mixed Livdet dataset) | Limited size of the dataset, requirement for specific sensor- matched datasets. |
9 | [41] | 2020 | Liveness detection using Cir- cular Gabor Wavelet algorithm and SVM | – | Accuracy | 99.968% (FAR) | Limited experimentation on artificial spoofing methods. |
10 | [42] | 2020 | Fingerprint and iris fusion- based liveness detection using statistical texture fea- tures | ATVS, LivDet2011 | Precision, accu- racy | 94.7% (fingerprint detection), 97.8% (decision-level classification) | Applicability to certain types of attacks, dependency on dataset size. |
11 | [43] | 2020 | FLDNet CNN | LivDet 2013, 2015 | ACE | 1.76% | Improve accuracy on small fingerprints |
12 | [44] | 2021 | One-class Convolutional Auto encoder | – | D-EER | 2.00% | Lack of generality |
13 | [45] | 2021 | Weighted MCNN | LivDet 2011, 2013, 2015, NUAA | Classification ac- curacy | 2.42% | Diversity of sensors |
14 | [46] | 2021 | EaZy Learning | LivDet 2011, 2013, 2015 | Accuracy | 60.49%, 67.80% | Dependence on clustering |
15 | [47] | 2021 | Transformers + GANs | LivDet 2015 | Accuracy | 68.52% – 83.12% | Poor generalization |
16 | [48] | 2021 | Person-specific FPAD | – | Accuracy | 100% | Limited generalization |
17 | [49] | 2021 | Multi-CNNs + Genetic Algo- rithm | Livedet datasets | Accuracy | +1.0% | Fixed-scale input limitation |
18 | [50] | 2022 | CNN | LivDet 2015 | Accuracy | 85.33% | Challenges with various materials |
19 | [51] | 2022 | Multi-filter Framework | LivDet 2009, 2011, 2013, 2015 | ACC, ACE | 99.15%, 0.85% | Extensive parameter configuration |
20 | [52] | 2022 | MFAS | 24 subjects | Accuracy | 100% | Limitations in real-life scenarios |
21 | [53] | 2022 | A-iLearn model for incre- mental learning | LivDet 2011, LivDet 2013, LivDet 2015 | Overall Accu- racy | Up to 49.57% improvement on new fake materials | Possibility of over fitting, need for further investigation of hand crafted and deep features |
22 | [54] | 2022 | Static-based approach with fusion of pores perspiration and texture features | LivDet 2013, LivDet 2015 | Average Clas- sification Error (ACE) | Biometrika: 0.11%, Italdata: 0.24%, Cross match: 0.21% | Limited amount of pore feature- based algorithms, difficulty in maintaining and updating algorithms |
23 | [55] | 2023 | Lightweight FLD network (LFLDNet) with CycleGAN and ResNet with MHSA | LivDet 2011, LivDet 2013, LivDet 2015 | Average Classifi- cation Error | 1.72 across all sensors, 95.27% accuracy on small-area fingerprints | Running speed affected by various factors, need for exploration of more effective FLD technology |
24 | [56] | 2023 | FPAD based on adversar- ial data augmentation and CNNs | LivDet2021 | EER, BPCER, APCER, Liv. ACC | EER: 0.036, BPCER: 0.072, APCER: 0.000, Liv. ACC: 0.965 | Limited dataset size, generaliz- ability to other presentation at- tacks, possibility of adversarial attacks |
25 | [57] | 2023 | Fingerprint liveness detec- tion using deep learning with LPDJH descriptor | LivDet 2009, LivDet 2011, LivDet 2013, LivDet 2015 | Average EER | LivDet 2011: 3.95% | Difficulty in detecting low- resolution fingerprints, estimation difficulty due to limited test samples |
26 | [58] | 2023 | Fingerprint liveness detec- tion utilizing CNNs | Socofing dataset | Accuracy, FAR, FRR | Accuracy: 98.964%, FAR: 0.215%, FRR: 7.251% | Imbalanced distribution in dataset, varying quality and characteristics of fingerprints, computational constraints |
The Table 3 offers a comprehensive comparative analysis of various biometric cryptosystems, shedding light on different methods, datasets, metrics, accuracies, and limitations associated with these approaches. These biometric cryptosystems encompass a wide array of techniques such as fuzzy vault-based fingerprint cryptosystems, biometric key binding schemes, cryptographic authentication schemes based on discrete logarithm problems, and multi-biometric template security mechanisms, among others. Each method demonstrates specific strengths, including high accuracy, robust security, and effectiveness in protecting biometric templates. However, they also encounter challenges such as susceptibility to privacy attacks, computational complexity, limitations in dataset availability, and reliance on specific biometric modalities. Several future research directives emerge from this analysis. Firstly, there is a pressing need for the development of more efficient and secure biometric cryptosystems capable of addressing emerging security threats and vulnerabilities, including adversarial attacks, privacy breaches, and database-level attacks. Secondly, research efforts should focus on enhancing the scalability and usability of biometric cryptosystems, particularly in real-world applications such as secure communication, access control, and identity verification. Thirdly, the exploration of novel cryptographic primitives, deep learning techniques, and hardware implementations could lead to innovative biometric cryptosystems with improved performance and reliability. Moreover, future research should prioritize the development of biometric cryptosystems that are compliant with regulatory requirements such as GDPR and HIPAA, while also ensuring user privacy and data protection. Additionally, efforts should be directed towards standardizing evaluation protocols and benchmarks to facilitate fair comparisons and reproducibility across different biometric cryptosystems. Furthermore, research should focus on the integration of biometric cryptosystems with emerging technologies such as blockchain and IoT to enhance security and interoperability in diverse application scenarios. By addressing these future research directives, the field of biometric cryptosystems can advance towards more secure, efficient, and user-centric solutions, thereby meeting the evolving needs of various domains including cyber security, healthcare, finance, and law enforcement.
Table 3: Comparative Analysis of Biometric Cryptosystems
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [59] | 2015 | Alignment-free fuzzy vault- based fingerprint cryptosystem using highly discriminative pair-polar (P-P) minutiae structures | FVC 2000 (DB1), FVC 2002 (DB1, DB2, DB3, DB4), FVC 2004 (DB2), FVC 2006 (DB2, DB3) | GAR, FAR | 5.78%,0.06% | Security proof relies on complexity of brute force attack |
2 | [60] | 2016 | Feature level sequential fusion algorithm for biometric cryptosystems | Publicly available finger-vein database | FAR | 1.47% FAR | Limited analysis of external security threats |
3 | [61] | 2016 | ECC-free biometric key binding scheme using Graph-based Hamming Embedding (GHE) and Minutia Vicinity Decomposition (MVD) | FVC 2002 (DB1, DB2) | GAR, FRR, FAR | GAR: 89%- 97%, FRR: 3%-11%, FAR: 0.061%-0.16% | Vulnerable to privacy attacks like ARM and SKI, limited to matching fingerprint images of the same finger |
4 | [62] | 2018 | Biometric template security mechanism based on two- dimensional logistic sine map (2DLSM) | CASIA iris database, FVC 2002 (DB3) | Global shannon entropy | 7.90 | noise sensitivity, inability to generate biometric templates in real- time |
5 | [63] | 2018 | Secure cryptographic authentication scheme based on discrete logarithm problem | CASIA iris database | Inner and outer Hamming distance distributions, FA, FR, BER | 1.16%, 28.3% | need for enhancing iris codes for better performance |
6 | [64] | 2019 | Biometric-based cryptographic key generation mechanism using convolution coding principles (BioKEY) | MIAS, FVC2002, FVC2004 | True positive rate | 95.12% | struggle with noisy or blurred fingerprints, significant computational time |
7 | [65] | 2019 | ECC-based mutual authentication scheme for Smart Grid communications using biometric approach | Inhouse Dataset | Computation cost | 8.92 ms | vulnerability to certain attacks |
8 | [66] | 2020 | Fuzzy vault method for template security of multimodal biometric systems with face and fingerprint images | Virtual face and fingerprint database | GAR | 99% | balancing security and accuracy |
9 | [67] | 2020 | Enhanced iris recognition approach using hyperelliptic curve cryptography (HECC) | CASIA Iris V-4, IITD iris datasets | Accuracy | 99.74% | limitations with fuzzy extractor’s parameters and potential attacks |
10 | [68] | 2020 | Multibiometric cryptosystem for user authentication | 100 subjects with iris and fingerprint modalities | FRR, EER | 0.01, 0.005 | Limitations in accuracy and precision due to variability of bio- metric data |
11 | [69] | 2020 | Multi-biometric template security method based on unique graph generation | CIE Fingerprints of IITD Database | ERR | Low ERR of 0.66% | Dependency on input sample quality |
12 | [71] | 2020 | Multimodal biometric cryptosystem using fingerprint and ear | Fingerprint and ear image datasets | accuracy | 98.76% | Reliance on systems for high accuracy |
13 | [72] | 2021 | Biometric cryptosystem based on random projection and back propagation neural network | NIST SD4, Faces94 | FNMR | 2.90% | Time-consuming training process for off-line enhancement, need for further research on multiple-biometric template protection |
14 | [73] | 2021 | Fingerprint biometric cryptosystem based on fuzzy commitment scheme and CNN | FVC2000 DB2-A finger- print database | FAR, FRR, EER | FAR: 1.25%, FRR: 1.15%, EER: 2.83% | Challenge of determining reference point precisely, need for larger training set |
15 | [74] | 2021 | Cancellable biometric authentication framework leveraging GA | ORL, FERET, LFW | AROC | 09998 | Need for further validation on larger and more diverse datasets |
16 | [75] | 2021 | Cancellable biometric security system based on advanced chaotic maps | In House | EER | 0.593 | Non-invertibility of biometric transformations, minor changes in biometrics affect hash functions |
17 | [76] | 2021 | Cancellable Biometrics Vault (CBV) using chaffing and winnowing | CASIA-V3-Interval | FRR, FAR | 6.92%, 0.001% | unsuitable for real-time applications due to computational complexity |
18 | [77] | 2021 | Multi-biometric cryptosystem based on Modulus Fuzzy Vault algorithm | IIT Delhi Iris Database, IIT Delhi Palmprint Database, IIT Delhi Ear Database, NIST Special | ROC curve, FAR, FRR, GAR | 0.96 | Limited focus on specific algorithms, need for experiments with natural image databases |
19 | [78] | 2022 | Machine vision gait-based biometric cryptosystem using fuzzy commitment scheme | CMU MoBo, CASIA A | FAR, FRR | 0% | Recognition limitations due to variations like complex back- ground and occlusions |
20 | [79] | 2022 | Asymmetric cryptosystem based on elliptic curve algorithm and optical scanning cryptography (OSC) | Inhouse | Information entropy | 7.95 | Speed limitations in encryption and decryption, vulnerability to cipher-text-only attacks |
21 | [80] | 2022 | Fuzzy extractor for generating cryptographically strong keys from biometric images using deep learning and code-based cryptosystems | LFW, CelebA | Accuracy | 93% | Requirement for large storage capacities with deep learning, susceptibility to attacks based on ma- chine learning model inversion |
22 | [81] | 2022 | Block chain-based user re-enrolment scheme for biometric-based authentication systems | Artificial dataset | Time complexity | 0.1515 | Computational complexity dependent on number of users, assumption of non-adversarial participants |
23 | [82] | 2022 | Secured multi-biometric template protection using Lagrange’s interpolation | The Hong Kong Poly- technic University dataset | Accuracy | 99.9816% | Increase in database size, may not meet all ISO/IEC 24745 requirements |
24 | [83] | 2023 | Hardware design of secure cancellable biometric cryptosystem based on 3D chaotic map | ORL, FVC, LFW | EER, AROC | EER of 6.2460 × 1013, AROC=0.9998 | Needs further study on differ- ent types of attacks and larger datasets |
25 | [84] | 2023 | Cancelable biometric authentication mechanism using 3D chaotic maps, PWLCM, logistic map, and DNA sequencing theory | Various face and palm print datasets | AROC, FAR, DH, SSIM, PSNR | AROC = 1, AFAR of 6.2 × 103, ADH=0.8755, PSNR=8.2061 | Increase in computational resources required |
26 | [85] | 2023 | Enhanced Biometric Cryptosystem (BCS) using ear and iris modalities based on BRIEF | AMI, UBIPr | NRMSE | 1.7486 | Susceptibility to database-level attacks, need for more sophisticated security techniques |
27 | [86] | 2023 | Multi-biometric secure-storage scheme based on deep learning and crypto mapping techniques | CASIA V4, MICHE, ICUB, MobiFace | AUCROC, EER | 0.054 | Need for hardware implementation, possibility of over fitting, trade-off between security and recognition performance |
28 | [87] | 2023 | Biometric key generation and multi-round AES cryptosystem for improved security | Inhouse | Energy efficiency | 24.67 ms | Lack of dataset details, limited encryption techniques tested, limited performance metrics reported |
The Table 4 presents a comparative analysis of cancellable biometric methods, offering insights into various techniques, datasets, metrics, accuracies, and limitations associated with these approaches. These methods encompass a wide range of strategies such as protection methods for fingerprint templates, generating masterprints for impersonation, one- factor cancellable biometric authentication schemes, secure triplet loss for training deep learning models, and multi- server authentication using cancellable biometrics and PUF, among others. Each method exhibits specific strengths, including high recognition accuracy, robustness against at- tacks, and effectiveness in protecting biometric templates. However, they also face challenges such as computational complexity, vulnerability to specific attacks, dependence on dataset characteristics, and limitations in adaptability to diverse biometric modalities. Several future research directions emerge from this analysis. Firstly, there is a need for the development of more efficient and scalable cancellable bio- metric techniques, particularly in addressing computational complexity issues and improving performance across di- verse biometric datasets. Secondly, research efforts should focus on enhancing the security and robustness of cancellable biometric methods against evolving threats and sophisticated attacks, including template inversion attacks, brute-force attacks, and adversarial manipulations. Thirdly, the exploration of novel approaches such as deep learning- based fusion techniques, chaotic-based cancellable systems, and image style transfer for biometric authentication could lead to innovative solutions with improved performance and reliability. Moreover, there is a need for standardized evaluation protocols and benchmarks to facilitate fair comparisons and reproducibility across different cancellable biometric methods. Additionally, future research should prioritize the development of cancellable biometric techniques that are user-friendly, privacy-preserving, and compliant with regulatory requirements such as GDPR and HIPAA. Further- more, efforts should be directed towards investigating the usability and acceptability of cancellable biometric systems in real-world applications such as access control, identity verification, and secure authentication. By addressing these future research directives, the field of cancellable biometric methods can advance towards more secure, efficient, and user-centric solutions, thereby meeting the evolving needs of various domains including cyber security, healthcare, finance, and law enforcement.
Table 4: Comparative Analysis of Cancellable Biometric Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [88] | 2017 | Protection method for finger- print templates using fused structures at feature level | FVC 2002 and 2004 databases | EER, separability, KS test | DB1: 2.19%, DB2: 1.6%, DB3: 6.14%; DB1: 11.89%, DB2: 12.71%, DB3: 17.6% | Computational cost for large-scale databases, non-invertibility |
2 | [89] | 2017 | Generating “MasterPrints” for impersonation in partial fingerprint-based authentication systems | FingerPass DB7 dataset, FVC2002 DB1-A dataset | Imposter Match Rate (IMR) | 6.77%, 1.31%,0.36%, 3.51% | Dataset imbalance, applicability limited to minutiae- based systems |
3 | [90] | 2018 | One-factor cancellable biometric authentication scheme using Indexing First Order hashing | FVC 2002 and FVC 2004 | EER, genuine- imposter distribution | 4.26%, 2.67% | Vulnerable to COA, KPA, CCA; identifier unlinkability |
4 | [91] | 2019 | One-factor cancellable palm- print biometric recognition scheme based on OIOM hash and MSH | PolyU and TJU palmprint databases | Recognition accuracy | 98.07% | No explicit mention of limitations |
5 | [92] | 2020 | Universal solution for multi- biometric systems using deep neural networks | IITD Iris and MMU2 | DI, EER | DI: 10.35, EER: 0.12 | Limited adaptiveness, need for sensitive environment |
6 | [93] | 2020 | Secure Triplet Loss for train- ing end-to-end deep learning models for cancellable biometric templates | Off-the-person ECG and un- constrained face images | EER | 12.56%, 13.99% | Vulnerability under specific attack scenarios, impact of variability factors |
7 | [94] | 2020 | Constrained Optimized Similarity-based Attack (CSA) on cancellable bio- metrics using IoM hashing | LFW dataset | Success rate, FAI rate, TAI rate | 99.19%, 98.58%, 0.2866% | Dependency on protected template information |
8 | [95] | 2020 | Non-invertible cancellable fingerprint template based on Delaunay triangulation | FVC2002 database | EER | 1.6%, 2.5%, 2.8%, 3.3%, 2.4% | Concerns about compromised acquisition device, need for larger dataset |
9 | [96] | 2021 | Highly optimized user template construction for fingerprint-based authenti- cation | Nine different fin- gerprint databases | EER | 0% | Performance limited by image quality, suggestion for multi-modal system |
10 | [97] | 2021 | Constrained-optimized similarity-based attack on cancellable biometrics using IoM hashing and BioHashing | LFW dataset | SAR, FAI | 72.74%, 72.11% | Fixed model complexity, over fitting reliance on IoM hash code size |
11 | [98] | 2021 | Cancellable template using GCD | Facial, fingerprint, iris, palm print | EER, AROC | High AROC up to 99.59%, low EER down to 0.04% | High-quality initial biometric images needed |
12 | [99] | 2021 | Feature-adaptive random projection | FVC2002 DB1- DB3, FVC2004 DB2 | EER, GAR, FAR | 1.0%, 2.0%, 4.0%, 11.0% | Need for more discrimina- tory feature descriptor |
13 | [100] | 2021 | Multi-server authentication using cancellable biometrics and PUF | LFW dataset | CMC curve, ROC curve, DIR curve, DET curve | 18th | Lack of evaluation against sophisticated attacks |
14 | [101] | 2021 | BioCanCrypto: biocrypto system on fingerprint cancellable templates | FVC2002 (DB1, DB2, DB3) | EER, FRR | 0.12%, 0.59%, 2.71% | Limited exploration in different feature spaces |
15 | [102] | 2021 | Watermarking reinforce- ment scheme | BioSecure, FVC2002 DB1 | FMR, GMR, EER | 1.98% | Limited to single biometric trait |
16 | [103] | 2022 | Absolute Value Equations Transform (AVET) | Eight datasets for various biometrics | GAR | 93.22%, 91.91%, 96.2% | Fixed sample size, vulnera- bility to brute-force attacks |
17 | [104] | 2022 | Multi-biometric cancellable scheme using deep fusion and deep dream | Nine images from each biometric modality | NPCR, PSNR, SSIM, UIQ, SD, UACI | 99.158%, 24.523, 0.079, 0.909, 59.582, 23.627 | Computationally intensive, requires enrollment of all seven images |
18 | [105] | 2022 | Cancellable multi-biometric identification scheme using ACM | FVC2002, ICE 2005 | EER, ROC curve | 0.0005, 0.0019 | Lack of large-scale database, need for reliable parameter estimation |
19 | [106] | 2022 | Cancellable SoftmaxOut Fusion Network (CSMoFN) | AR, Ethnic, Face- scrub, IMDB, Wiki, YTF | EER | 6.67%, 6.71% | Risk of CB template inversion |
20 | [107] | 2022 | Selective encryption and deep learning-based fusion technology | “Lena” image, face images | Correlation, entropy, ROC curve, AROC | 0.0008, 0.0019 | Limited size of the dataset |
21 | [108] | 2023 | Deep learning and style transfer for cancellable bio- metric system | 1800 images dataset segmented into face and fingerprint biomet- rics | NCC, MSE, PSNR, SSIM, UIQ, SD, UBER | Average NPCR: 99.26, PSNR: 23.28, SSIM: 0.0405, UIQ: 0.7492, SD: 60.442, UACI: 24.268 | Need for consistent physical condition, reduced reliability in certain environmental conditions |
22 | [109] | 2023 | Multi-Biometric Feature Hashing (MBFH) | Retina, finger veins, palm, dorsal vein images | Hamming, Spear-man, Jaccard pairwise distances | Average values over 0.9 in Spearman, Jaccard, and hamming distances | Applicability to adaptable and featherless biometric features, need for adaptability for adding white Gaussian noise |
23 | [110] | 2023 | Biometric template protec- tion scheme for Euclidean and Cosine metrics | AR Face, CASIA FaceV5, ORL, LFW | EER | 8.559, 0.154 | Not optimal for other types of biometric authentication systems, slightly higher computational costs due to pre-processing |
24 | [111] | 2023 | Chaotic-based cancelable face recognition system using convolution kernels | AT&T, YALE, UFI, LFW, FERET | Accuracy | 98.43% | Trade-off between system performance and user privacy, need for adaptation to environmental circum- stances |
25 | [112] | 2023 | Biometric authentication system using image style transfer | Face image database with key images | Correlation coefficients, ROC curves | AUC values > 0.9 in most cases | Problem of key image similarity, need for restrictions in setting key images in future studies |
The presented Table 5 offers a comprehensive analysis of various general-purpose user authentication methods, covering a wide range of techniques, datasets, metrics, accuracies, and limitations. These methods encompass diverse approaches such as orientation extraction, fingerprint reconstruction, fake biometric trait detection, local model-based classification, partial fingerprint matching, minutiae extraction evaluation, and multi-modal biometric authentication, among others. Each method demonstrates specific strengths, including high accuracy rates, robustness against attacks, and efficiency in authentication processes. However, they also encounter challenges such as dataset limitations, computational resource requirements, dependence on specific features, and vulnerabilities to spoofing attacks. Several future research directions can be identified from this analysis. Firstly, there is a need for the development of more robust and secure authentication methods, particularly in addressing vulnerabilities to spoofing attacks and enhancing resistance against adversarial manipulations. Secondly, research efforts should focus on improving the scalability and efficiency of authentication systems, especially in handling large-scale datasets and reducing computational resource requirements. Thirdly, the exploration of novel biometric features, fusion techniques, and machine learning algorithms could further enhance the accuracy and reliability of authentication methods across diverse modalities. Moreover, the development of privacy-preserving authentication techniques and the investigation of human-centric design principles could ensure the usability and acceptability of authentication systems in real-world scenarios. Lastly, efforts should be directed towards standardizing evaluation protocols and benchmarks to facilitate fair comparisons and reproducibility across different authentication methods. By addressing these future research directives, the field of general-purpose user authentication can advance towards more secure, efficient, and user-friendly authentication systems, thereby meeting the evolving needs of various applications such as cybersecurity, access control, and identity verification.
Table 5: Comparative Analysis of General Purpose User Authentication Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [113] | 2011 | Orientation Extraction | FVC2006 DB2 | Average Error | 0.206% | Limited benchmark dataset |
2 | [114] | 2012 | Fingerprint Reconstruction | FVC2002 DB1A, DB2A | Successful Match Rate | 86.48%, 86.96% | Performance limitations for certain scenarios |
3 | [115] | 2013 | Fake Biometric Trait Detection | Fingerprint, Iris, 2-D Face | Classification Error Rate | <3% | Computational resources, full image access |
4 | [116] | 2015 | Local Model-based Classification | FVC 2000, 2002, 2004 | Accuracy | 96.7%, 96.5% | Allocation of low- quality fingerprints for testing |
5 | [117] | 2016 | Partial Fingerprint Matching | FVC2000, FVC2002 | EER | 1.17%, 1.4% | Dependence on enhancement algorithm |
6 | [118] | 2017 | Minutiae Extraction Evaluation | FVC 2002, FVC2004, Synthetic data | Average positional error, Average orientation error | 3.48%, 0.06% | Environmental variations |
7 | [119] | 2017 | GLDM for Bio- Cryptosystems | PUCPR, GPDS-300 | Classification Error Rate | 7%, 17% | Limited positive signature samples |
8 | [120] | 2018 | Pore Extraction using CNN | Touch-based, Touch- less, Latent | Detection Rate, False Alarm Rate | 84.69%, 15.31% | Need for high-resolution images |
9 | [2] | 2019 | Pore Comparison | FVC2002 DB I, II | EER, FMR1000s | 1.86%, 0.12% | Dependence on alignment accuracy |
10 | [121] | 2020 | Fingerprint Enhancement & Reconstruction | FVC2002, FVC2004 | TAR | 97.95%, 94.09% | Impact of dirt, age, medical factors |
11 | [122] | 2020 | DeepPoreID Matching | DBI, DBII | EER, FMR100 | 35% increase in EER | Dependence on large quantity of sweat pores |
12 | [123] | 2020 | Homomorphic Encryption | FVC2002 DB2 | EER | 9.23% EER | Time-consuming encryption |
13 | [124] | 2020 | SSO Feature Extraction | 150 images | FAR, FRR, CVR | FAR: 0.00, FRR: 0.00666, CVR: 99.334% | Small dataset size |
14 | [125] | 2020 | FHE-based Authentication | NIST SD9 | EER | 0.053% | Time-consuming encryption |
15 | [126] | 2020 | BioSec Framework | FVC-2004 DB3 | Accuracy | 70% | Vulnerability of symmetric encryption |
16 | [127] | 2020 | Reversible Watermarking | FVC2002 | PSNR, Matching Score | 99.61% | Sensitivity to noise and compression |
17 | [128] | 2021 | Ensemble Matching | NIST SD27, GCDB, MOLF DB1 | Rank-1 identification rate | 74.03% | Choice of supervised classifier |
18 | [129] | 2021 | DRUnet Segmentation | FVC Databases | Jaccard similarity, Dice score | 97.21%, 94.73% | Small training dataset |
19 | [130] | 2021 | MiDeCon Quality Assessment | FVC 2006 | FMR | 10−1 , | Complex procedure |
20 | [131] | 2021 | ASRA Image Alignment | FVC2002, FVC2004 | Authentication accuracy | 99% | Dependence on ROI extraction |
21 | [132] | 2021 | VSS & Super-resolution | FVC2002 DB1 | Genuine match rate | 94%, | Need for higher quality fingerprint images |
22 | [133] | 2021 | Dual-filter Framework | LivDet 2013, 2015 | Accuracy | 97.56% | Framework agnostic to filter type |
23 | [134] | 2021 | Multi-modal Biometric Authentication | 228 image | signal data & EER, ROC curves | Classification rate of 100% | Not tested on large scale dataset |
24 | [135] | 2022 | Secure Authentication | FVC2002 DB1-DB3, FVC2004 DB1-DB3 | EER | 0.99%, 3.28% | Balance between security and performance |
25 | [136] | 2022 | Embedded System Authentication | In-house | Accuracy | – | Robustness against attacks |
26 | [137] | 2022 | Gabor Filter & CNN | FVC2006 | Validation accuracy | 99.33% | Management of smaller training sets |
27 | [138] | 2022 | Deep CNN Matching | In-house | Training & validation accuracy | 100% | Lack of diversity in dataset |
28 | [139] | 2022 | Multi-factor Authentication | CASIA-FingerprintV5, FVC2002 DB1 | FAR | 0.81% | Limited size of dataset |
29 | [140] | 2023 | Brute-force Attack | In-house | FAR | 4.14106 | Need for smartphones to support sensor hot plugging |
30 | [141] | 2023 | Joint Authentication & Spoof Detection | FVC 2006 DB2A, LiveDet 2015 | TAR, FAR, ACE | TAR = 100%, ACE = 1.44% | Need for larger and more diverse datasets |
31 | [142] | 2023 | Homomorphic Encryption & ML | PolyU, SOKOTO | F1-score | PolyU: 93.6%, SOKOTO: 98.2% | HE-based computation challenges |
32 | [143] | 2023 | Multi-factor Authentication | In-house | System Usability Scale | 90% | Small sample size |
33 | [144] | 2023 | AVAO enabled DMN | CASIA Fingerprint Image Database | Accuracy, Sensitivity, Specificity | 0.927, 0.938, 0.930 | Need for robust preprocessing |
The Table 6 offers a comprehensive comparative analysis of various fingerprint indexing methods, encompassing different approaches, datasets, metrics, accuracies, and limitations. Notable methodologies include distributed frameworks, GPU-based systems, absolute registration approaches, minutiae-based algorithms, deep learning-based models, and privacy-preserving indexing techniques. These methods exhibit diverse strengths, such as high processing speeds, improved accuracies, and workload reduction, while also facing challenges like hardware/software dependencies, scalability issues, and computational costs. Several future research directions emerge from this analysis. Firstly, there’s a need for continued exploration of deep learning techniques in fingerprint indexing, especially in improving accuracy and reducing computational costs. Additionally, addressing scalability concerns and hardware dependencies would be crucial for real-world deployment. Secondly, the development of privacy-preserving indexing methods is vital to ensure the security and confidentiality of biometric data, especially in light of increasing concerns regarding data privacy. Thirdly, research efforts should focus on enhancing the robustness and generalization capabilities of indexing algorithms, particularly in handling diverse datasets with varying quality and characteristics. Moreover, investigating novel features and descriptors, as well as exploring multimodal approaches, could further improve indexing performance and reliability across different biometric modalities. Lastly, efforts should be directed towards standardizing evaluation protocols and benchmarks to facilitate fair comparisons and reproducibility across different indexing methods.
Table 6: Comparative Analysis of Fingerprint Indexing Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [145] | 2014 | Two-level distributed frame- work for fingerprint matching | Large synthetic database created with SFinGe, NIST databases | Spped up | 312.8684 sec | Distribution of synthetic fingerprint dataset, hardware resources, scalability of matching algorithms |
2 | [146] | 2015 | Fingerprint identification system using GPUs | FVC2002, DB14 | EER | 2% | Potential benefits of GPU- based algorithms, need for a two-stage system for practical applications |
3 | [147] | 2016 | Absolute registration ap- proach with pose constraint | Public domain finger- print databases, NIST Special Database 14, database of 1,000,000 rolled fingerprints | Error Rate | 2.33% | High dimensionality of the Minutia Cylinder-Code (MCC) descriptor, need for further re- search on noise and variability |
4 | [148] | 2017 | Fingerprint indexing algorithm based on minutiae pairs and convex core point | FVC2000DB2A+B, FVC2000DB3A+B, FVC2002DB1A+B, FVC2004DB1A+B, NIST’s DB4 and DB14 | TPR | 2.18 | Lack of detail regarding param- eters, hardware/software differences |
5 | [149] | 2019 | Minutiae-centred fingerprint indexing method with deep convolutional neural network (DCNN) | FVC2002 DB2a, FVC2002 DB2b, FVC2004 DB1a, NIST special database 4, NIST special database 14 | Error rate, penetra- tion rate | 0.25%, 10% | High computational cost for MCC-based method |
6 | [150] | 2019 | DeepPrint: Deep network for learning fixed-length fingerprint representations | NIST SD4, last 2,700 pairs of NIST SD14 | Rank-1 search ac- curacy | 98.80% | Fixed length representation, Saturation of existing bench- marks |
7 | [151] | 2020 | CNN-based Combination of Nearest Arrangement Indexing (CNNAI) | FVC2004, NIST SD27 latent fingerprint databases | Rank-1 identifica- tion rate | 80%, 85.4% | Dependence on the availability of minutiae points, failure of MINU-EXTRACTNET |
8 | [152] | 2020 | Pore-based indexing method for high-resolution fingerprints | Hong Kong PolyU high- resolution fingerprint databases (DBI and DBII), IITI-HRFP, IITI- HRF | Pre-selection error rate, penetration rate | 67%, 49%, 42%,28%, 10% | Effectiveness limited on databases of high-resolution full fingerprints |
9 | [153] | 2020 | Latent fingerprint indexing using minutiae based rotational and translational features | IIIT-D latent fingerprint dataset | Accuracy, indexing time | Accuracy up to 94.77%, average indexing time ranging from 5.29 to 25.92 seconds | Challenges with partial impression, background noise, poor ridge clarity, large non-linear distortions |
10 | [154] | 2021 | Indexing algorithm based on clustering of minutia cylinder codes (MCC) | Public data, proprietary data, synthetic data, NIST SD4, NIST SD14 | Error rate, Penetration Rate | 53.9%, 0.01% | Reduced search space, lower performance on databases with different characteristics or quality levels, time complexity |
11 | [155] | 2021 | Pore-based indexing and refinement | DBI, DBII | Accuracy | 95.16% | Computation increase with pores |
12 | [156] | 2021 | Inverted index for minutiae- based search | FVC2002 DB1a, Private dataset | Error rate | 0.42% | High search rates |
13 | [157] | 2021 | PalmHashNet for palm print indexing | CASIA, IIT Delhi, Tongji, PolyU II | Accuracy | Above 99% accuracy | Not tested on large datasets |
14 | [158] | 2021 | MDSH-based indexing for multi biometric retrieval | IIT Delhi (iris, face, palm print) | Hit rate, Penetration rate | 68%, 100% | Computational costs |
15 | [159] | 2022 | Quality score-based search for biometric identification | FERET, CASIA, FVC2002 | Workload | Up to 38% reduction | High intreclass variability |
16 | [160] | 2022 | FKPIndexNet for finger- knuckle-print identification | PolyU-FKP, IITD-FKP | Error rate, Penetra- tion rate | 0.32%, 100% | Limitations in index table generation |
17 | [161] | 2022 | Signal-based fusion for bio- metric database indexing | FERET, FRGCv2, IJB-A | Workload | Reduced workload by 30% | Requires high-quality images |
18 | [162] | 2023 | Privacy-preserving multi- biometric indexing | Composite dataset | Workload | Workload reduction by 57% | Use of composite dataset |
19 | [163] | 2023 | Attention-Driven Finger- print Recognition Network | NIST SD4, NIST SD14 | Accuracy | 99.93% | Not using domain knowledge |
20 | [164] | 2023 | Gravitational Search Decision Forest for fingerprint recognition | NIST SD27, FVC2004 | Precision, Recall, F- measure | 93.90%, 96.25%, 95.06%, 96.25% | Recognition rate optimization |
The Table 7 presents a comprehensive overview of various methodologies employed for infant and child biometric recognition, highlighting the diverse approaches, datasets, metrics, accuracies, and limitations associated with each method. Several studies focus on fingerprint recognition, utilizing techniques ranging from image enhancement and CNN-based ridge flow estimation to pre-trained CNN models. These approaches demonstrate promising accuracies, with [166] achieving up to 99.5% True Accept Rate (TAR) for infant fingerprints. However, challenges persist, such as the lack of automated alignment methods and issues with small fingerprint sizes and low image quality, as noted by multiple authors. Moreover, alternative biometric modalities like footprints, iris, and outer ear shape are explored, showing potential for high accuracy, as evidenced by [168] 99.30% accuracy in footprint identification and [170] low Equal Error Rate (EER) for outer ear shape recognition. Nonetheless, these methods encounter hurdles related to data collection challenges, limited dataset sizes, and transparency in processes and facilities. Future research in infant and child biometric recognition could address these limitations by focusing on several key areas. Firstly, efforts should be directed towards developing automated alignment techniques to enhance accuracy and efficiency, especially for infant fingerprints. Secondly, there is a need for larger and more diverse datasets to ensure robust model performance and generalization. Thirdly, exploration of multi-modal biometric systems, as suggested by [172], could provide enhanced accuracy and reliability by combining different biometric traits . Lastly, advancements in image acquisition technologies and computing resources could facilitate the collection of high-quality images and alleviate challenges associated with low image quality and computing resource requirements, as highlighted by [169]. By addressing these research directions, future studies can contribute towards the development of more robust, accurate, and reliable infant and child biometric recognition systems, thereby enhancing their applicability in various domains such as healthcare, security, and childcare.
Table 7: Comparative Analysis of Infant and Child Biometric Recognition Methods
Sl No | Paper | Year | Method | Dataset | Metric | Accuracy | Limitation |
1 | [165] | 2016 | Image enhancement, CNN- based ridge flow estimation | Infant fingerprint database | Rank-1 identification accuracy | 73.98% | Lack of automated fingerprint alignment for infants |
2 | [166] | 2016 | Evaluation of child fingerprint recognition using NFIQ 2.0 metric | Dataset of infants aged 0-5 years | True Accept Rate (TAR), False Accept Rate (FAR) | TAR: 99.5% (500 PPI), 98.9% (1270 PPI) | Piecewise linear model interpretation, dataset resolution variations |
3 | [167] | 2021 | InfantPrints system with custom-built fingerprint reader | Longitudinal infant fingerprint database | TAR, FAR | 95.2%, 1.0% | Lack of automated alignment method |
4 | [168] | 2021 | Footprint identification using wavelet feature extraction and K-NN | Dataset of 30 babies with footprint images | Accuracy, Precision, Recall | 99.30% accuracy, 90.17% precision, 89.44% recall | Small dataset size, single feature extraction method |
5 | [169] | 2022 | Neonate fingerprint classification using deep learning | Dataset with manual labelling of fingerprint images | Accuracy | 78.4% | Computing resource requirements, challenges in collecting high-quality images |
6 | [170] | 2023 | Biometric recognition systems for infants (fingerprint, iris, outer ear shape) | Dataset from volunteer infants and children | Equal Error Rate (EER), Failure to Acquire (FTA) | EER: 0.16% (outer ear shape) | Challenges in data collection, limitations in facility and process transparency |
7 | [171] | 2023 | Multi-instance contingent fusion technique for infant fingerprint verification | Dataset of infant fingerprints | Verification accuracy | 73.8% (1 month in- terval), 57.14% (6 months interval) | Absence of ancillary information, greater time interval necessitates fusion |
8 | [172] | 2023 | Multi-modal Biometric Recognition for Toddlers and Pre School Children (M²BRTPC) | Dataset of iris and fingerprint modalities from children aged 18 months to 4 years | Accuracy | 96.3% | Restricted age range, improvements over existing methods without claiming absolute accuracy |
9 | [173] | 2023 | Pre-trained CNN model for newborn and toddler finger print recognition | Dataset of fingerprint images from 154 subjects | Accuracy | 82.47% | Small size of fingerprints, low image quality |
10 | [174] | 2023 | CNN-based children recognition system using contact less fingerprints | CLCF dataset for experimentation | Accuracy, Equal Error Rate (EER) | Accuracy: 98.46%, EER: 1.99% | Need for larger datasets, exploration of different enhancement and extraction techniques |
prehensive analysis of the literature on latent fingerprint recognition and biometric identification systems. With a wide range of strategies being investigated, such as deep learning models, hybrid approaches, and sophisticated algo- rithmic techniques, these systems have undergone tremen- dous evolution. Due to this diversity, difficult fingerprint identification problems like partial prints, noise, and in- consistent quality have been significantly improved. The literature does, however, also highlight enduring difficul- ties. The comparison of various methods is made more difficult by the absence of standard evaluation methodolo- gies, and algorithmic bias and generalizability are raised by the small size and lack of diversity of the datasets that are currently accessible. Moreover, a lot of sophisticated techniques, especially those centred on deep learning, have a high computational complexity, which makes real-time implementation challenging. Future work in this area has to concentrate on creating uniform benchmarks, growing datasets, maximizing computational effectiveness, and re- solving moral issues with bias and privacy. Advantage, disadvantage, area of improvement and ethical implication of the fingerprint biometric studied in the manuscript are discussed below.
• Advantage:
- Diverse Methodologies: The literature study demonstrates the wide variety of approaches, such as hybrid approaches, descriptor-based tactics, deep learning models, and different algorithmic advancements, that are employed in fingerprint recognition and biometric systems. Due to the variety of methods available, researchers are able to tackle several facets of latent fingerprint recognition issues, including handling partial prints, noise, and quality For instance, descriptor-based methods may provide computational efficiency, while deep learning models might enhance accuracy by discovering complex patterns in fingerprint data. The use of hybrid techniques, which blend conventional and cutting-edge methodologies, shows an effort to capitalize on each approach’s advantages and advance latent fingerprint recognition technology.
- Quantifiable Performance Metrics: Numerous studies provide comprehensive performance indicators, like F1 scores, recall, precision, and rank-1 accuracy, which are essential for evaluating the efficacy of various techniques. Benchmarking these measures against popular datasets such as FVC2004 and NIST SD27 is common practice. Researchers and practitioners find it easier to compare the effectiveness of different techniques, evaluate advances, and pinpoint areas that require ad- ditional development when such measurements are transparently reported. Because of its transparency, the community is able to monitor advancements and set performance standards for systems to come.
- Cutting-edge Techniques: Numerous novel methods have been presented, such as deep learning-based minutiae extraction, deformable minutiae clustering, and data augmentation using Generative Adversarial Networks (GAN). Especially for under-represented in- stances, GAN-based augmentation might artificially generate extra training data, hence improving the system’s resilience. Latent fingerprint identification systems are becoming more accurate and scalable thanks to deformable minutiae clustering and deep learning techniques. This makes them more suitable for use in forensic applications, particularly in challenging situa- tions where the prints are imperfect or deteriorated.
- Real-world Testing: The fact that numerous suggested techniques are evaluated on a range of databases and datasets, including NIST SD27 and FVC2004, is a note- worthy strength of the examined This makes it possible to test the algorithms in a variety of scenar- ios, simulating the unpredictability of the actual world. By doing this, scientists may evaluate how reliable and broadly applicable their methods are, making sure they work effectively outside of carefully regulated lab environments. For technology meant to be used in actual applications, including forensic investigations and security systems, this real-world applicability is essential.
• Disadvantages:
- Lack of Uniformity in Evaluation Standards: Al- though a large number of research offer performance indicators, there is a notable deficiency in uniform assessment procedures between various Direct comparisons between approaches are challenging because to variations in benchmarking procedures, quality criteria, and dataset sizes. Because of this, some accuracy statistics might be inflated, which makes it more difficult to determine whether strategy is better in an unbiased manner. A technique that works well on a small, clean dataset, for instance, might not translate as well to larger, messier real-world data. Additionally, because there isn’t a single benchmark, reported accuracy gains may vary depending on the context and may not apply to different circumstances.
- Dataset Limitations: The small size and lack of diversity of datasets used for testing and training is a problem that keeps coming up in the literature. A lot of research papers admit that their datasets are too tiny or homogeneous to adequately capture the heterogeneity present in real-world circumstances, especially when it comes to latent print datasets. This suggests that the models may be over fitting to the unique features of these small datasets, which raises questions about their A system that works well on the dataset it was trained on but has trouble with under-represented populations or situations, including various skin kinds, lighting settings, or sensor types, may also be introduced by a lack of diversity.
- Computational Complexity: There is a drawback to several of the sophisticated methods, especially those that depend on deep learning: higher computational demands. These techniques frequently call for additional processing power, memory, and time, but they may provide considerable accuracy It is difficult to apply these techniques in real-time scenarios, such as live fingerprint recognition at security checkpoints or mobile devices with constrained computing power, due to the rise in computational complexity. For example, deep learning models can yield higher recognition rates, but their resource needs make them impractical for use in real-time, low-power devices.
• Areas for Improvement:
- Standardized Benchmarks and Evaluation Protocols: The creation of uniform protocols for comparing finger- print recognition algorithms across various datasets is among the most urgent This would entail defining testing settings, dataset properties, and consistent evaluation criteria. Researchers may more precisely compare the performance of various approaches when a consistent framework is in place, which helps them determine which techniques are actually improving the state of the art. Exaggerated performance claims might be lessened by using a consistent evaluation process, which would guarantee that all approaches are examined under comparable circumstances [118].
- Larger and More Diverse Datasets: Future study should concentrate on increasing the amount and diversity of latent fingerprint databases in order to solve the limitations of the present investigations. This would include gathering information from a larger variety of sources and in a greater variety of settings, including various skin tones, ambient variables, and sensor kinds. By using larger, more representative datasets for algorithm training, researchers can improve system robustness and minimize bias. It would be easier to make sure that the algorithms can handle the whole range of real-world issues if more diverse latent prints were included, such as those with different levels of noise, distortion, and completeness [145].
- Improving Computational Efficiency: Because many of the methods are computationally demanding, optimization is required to shorten processing times without compromising For real-time applications, where speed is a crucial component, this is especially crucial. To lessen their processing footprint, researchers can concentrate on creating lightweight algorithms or improving already-existing deep learning systems. For example, the models could be deployed in resource- constrained contexts like mobile devices or edge computing platforms if they are optimized to perform well on GPUs or embedded systems [25].
- Integration with Other Biometric Modalities: Integrating fingerprint identification systems with other biometric modalities, such facial recognition or iris scanning, is another possible avenue for When one modality is impaired (a partial fingerprint, for example), this multi-modal method may enhance overall accuracy and resilience. Combining information from several biometric sources may also improve security by making it more difficult for hackers to impersonate the system. Future developments may proceed in the direction of sensor fusion technique research and the creation of reliable multi-modal biometric authentication algorithms [42].
- Ethical Considerations and Privacy: Future research must also address ethical issues including privacy concerns, data protection, and algorithmic bias given the growing usage of biometric technologies in sensitive applications like security and forensics. Strong legal frameworks are especially necessary for forensic applications in order to guarantee the validity and acceptability of the data gathered using these systems. Researchers should investigate the moral ramifications of gathering and using biometric data, making sure privacy laws like GDPR are followed, and creating clear procedures for handling user consent and data [180].
• Ethical Implications:
- Privacy Concerns: Fingerprint biometric systems create serious privacy concerns since they rely on the gathering, storing, and processing of private information. Biometric information, like fingerprints, is unchangeable after it is compromised, unlike passwords or other identity-related Biometric data is particularly susceptible to exploitation because of this. Identity theft, unapproved tracking, or monitoring might result from unauthorized access to fingerprint databases or data breaches. These worries are heightened by the collecting of biometric data, frequently without users’ express or informed agreement. The collection, storage, and sharing of this data must adhere to strict processes in order to comply with data protection legislation, such as the General Data Protection Regulation (GDPR) in Europe. Crucial to ethical compliance are letting users know how their biometric data is being used and providing them with the choice to opt out. To reduce these concerns, biometric systems should place a high priority on openness, safe encryption, and privacy- preserving methods like homomorphic encryption or cancelable biometrics.
- Algorithmic Biases: The possibility of algorithmic bias in fingerprint biometric technologies presents another ethical dilemma. Research has indicated that the accuracy of biometric systems can vary based on the demographic attributes of the people being scanned, including age, gender, and skin tone. For instance, under representation of particular populations in training datasets may result in reduced accuracy for those groups. Particularly in forensic or security scenarios, where a false match or inability to identify a legitimate individual can have dire effects, this bias can have catastrophic Misidentification in forensic investigations may result in false allegations, and in security applications, specific populations may be unjustly singled out or denied access. In order to solve this problem, more diverse datasets must be used, and algorithms must be developed with fairness standards in place. These problems can be lessened by routinely reviewing biometric systems for bias and including a variety of demographic groups in the testing process.
- Legal Considerations: Particularly in forensic and government use cases, fingerprint biometric technologies have a wide range of legal The reliability and admissibility of biometric evidence in court is one of the main issues. Strict legal requirements must be met by forensic fingerprint identification systems in order for the evidence they produce to be trustworthy and supported by science. But many contemporary biometric algorithms are “black-box,” especially those that rely on deep learning, which makes it challenging to under- stand how they arrive at a given judgement. This raises concerns about the accountability and transparency of these systems. Furthermore, there are jurisdictional differences in the legality of biometric data collecting, thus it is crucial to make sure local regulations are followed. While some nations have more permissive rules, others have tight legislation requiring express authorization for the use of biometric data. The ethical application of biometric technology must be covered by legal frameworks, with an emphasis on data protection, user permission, and making sure that systems are operated in a way that respects people’s rights.
This review study on fingerprint biometrics has some major limitations, one of them being its scant discussion of recent developments in fingerprint sensing technology and their potential applications. Although the study thoroughly discusses the current state of the art in fingerprint recognition, it does not go into great detail into cutting edge advances like new capture methods, sophisticated sensing materials, or the effects of recent advancements in fingerprint sensor downsizing. The absence of these developments implies that the evaluation may not accurately reflect the state of the field today and in the future, given the potential impact they could have on the precision, usability, and integration of fingerprint biometrics in a variety of scenarios. This gap may allow significant technical trends to go unnoticed, along with the implications they have for research and real-world applications.
8. Conclusion
The adoption of creative solutions to current problems is essential to the future viability of biometric authentication. This entails creating reliable, scalable algorithms that can efficiently handle a variety of biometric data. It is imperative to establish uniform standards and evaluation procedures to guarantee impartial assessments of diverse authentication techniques. Strict ethical guidelines and openness campaigns are necessary to solve issues with algorithmic bias and data privacy in order to win over the public’s trust. Multimodal fusion techniques that integrate various biometric features can greatly improve dependability. Furthermore, maximizing hardware technological developments is critical to increasing accuracy and productivity. The goal of research should be to develop biometric systems that are easy to use and prioritize both regulatory compliance and privacy protection. Collaboration between academic re- searchers, business personnel, and regulatory organizations is essential to spur innovation and guarantee the responsible application of biometric technologies across various sectors. By implementing these tactics, biometric authentication will be able to advance, satisfy the increasing need for reliable and secure authentication methods, and improve security and user experience across a range of applications.
Conflict of Interest The authors declare no conflict of interest.
- R. Ramotowski, Lee and Gaensslen’s advances in fingerprint technology, CRC press, 2012.
- Y. Xu, G. Lu, Y. Lu, D. Zhang, “High resolution fingerprint recog- nition using pore and edge descriptors”, Pattern Recognition Letters, vol. 125, pp. 773–779, 2019, doi:10.1016/j.patrec.2019.08.006.
- P. Tertychnyi, C. Ozcinar, G. Anbarjafari, “Low-quality fingerprint classification using deep neural network”, IET Biometrics, vol. 7, no. 6, pp. 550–556, 2018, doi:10.1049/iet-bmt.2018.5074.
- A. A. Paulino, J. Feng, A. K. Jain, “Latent fingerprint matching using descriptor-based hough transform”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 31–45, 2012, doi:10.1109/ijcb.2011.6117483.
- S. S. Arora, E. Liu, K. Cao, A. K. Jain, “Latent fingerprint matching: performance gain via feedback from exemplar prints”, IEEE Transac- tions on Pattern Analysis and Machine Intelligence, vol. 36, no. 12, pp. 2452–2465, 2014, doi:10.1109/tpami.2014.2330609.
- M. A. Medina-Pérez, A. M. Moreno, M. Á. F. Ballester, M. García- Borroto, O. Loyola-González, L. Altamirano-Robles, “Latent finger- print identification using deformable minutiae clustering”, Neurocom- puting, vol. 175, pp. 851–865, 2016, doi:10.1016/j.neucom.2015.05.130.
- A. Sankaran, A. Jain, T. Vashisth, M. Vatsa, R. Singh, “Adaptive latent fingerprint segmentation using feature selection and random decision forest classification”, Information Fusion, vol. 34, pp. 1–15, 2017, doi:10.1016/j.inffus.2016.05.002.
- W. Bian, S. Ding, W. Jia, “Collaborative filtering model for enhancing fingerprint image”, IET Image Processing, vol. 12, no. 1, pp. 149–157, 2018, doi:10.1049/iet-ipr.2017.0059.
- J. Li, J. Feng, C.-C. J. Kuo, “Deep convolutional neural network for latent fingerprint enhancement”, Signal Processing: Image Communi- cation, vol. 60, pp. 52–63, 2018, doi:10.1016/j.image.2017.08.010.
- K. Cao, A. K. Jain, “Automated latent fingerprint recognition”, IEEE transactions on pattern analysis and machine intelligence, vol. 41, no. 4, pp. 788–800, 2018, doi:10.1109/tpami.2018.2818162.
- R. P. Krish, J. Fierrez, D. Ramos, F. Alonso-Fernandez, J. Bigun, “Improving automated latent fingerprint identification using ex- tended minutia types”, Information Fusion, vol. 50, pp. 9–19, 2019, doi:10.1016/j.inffus.2018.10.001.
- K. Cao, D.-L. Nguyen, C. Tymoszek, A. K. Jain, “End-to-end latent fingerprint search”, IEEE Transactions on Information Forensics and Security, vol. 15, pp. 880–894, 2019, doi:10.1109/tifs.2019.2930487.
- A. J. Sanchez-Fernandez, L. F. Romero, D. Peralta, M. A. Medina- Pérez, Y. Saeys, F. Herrera, S. Tabik, “Asynchronous process- ing for latent fingerprint identification on heterogeneous cpu- gpu systems”, IEEE Access, vol. 8, pp. 124236–124253, 2020, doi:10.1109/access.2020.3005476.
- N. D. Kalka, M. Beachler, R. A. Hicklin, “Lqmetric: a latent finger- print quality metric for predicting afis performance and assessing the value of latent fingerprints”, Journal of Forensic Identification, vol. 70, no. 4, pp. 443–463, 2020.
- X. Huang, P. Qian, M. Liu, “Latent fingerprint image enhance- ment based on progressive generative adversarial network”, “Proceedings of the IEEE/CVF Conference on Computer Vi- sion and Pattern Recognition Workshops”, pp. 800–801, 2020, doi:10.1109/cvprw50498.2020.00408.
- U. U. Deshpande, V. Malemath, S. M. Patil, S. V. Chaugule, “End- to-end automated latent fingerprint identification with improved dcnn-fft enhancement”, Frontiers in Robotics and AI, vol. 7, p. 594412, 2020, doi:10.3389/frobt.2020.594412.
- M. Liu, P. Qian, “Automatic segmentation and enhancement of latent fingerprints using deep nested unets”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1709–1719, 2020, doi:10.1109/tifs.2020.3039058.
- S. Gu, J. Feng, J. Lu, J. Zhou, “Latent fingerprint registration via matching densely sampled points”, IEEE Transactions on In- formation Forensics and Security, vol. 16, pp. 1231–1244, 2020, doi:10.1109/tifs.2020.3032041.
- D. Agarwal, A. Bansal, “A utility of pores as level 3 features in latent fingerprint identification”, Multimedia Tools and Applications, vol. 80, no. 15, pp. 23605–23624, 2021, doi:10.1007/s11042-020-10207-x.
- U. U. Deshpande, V. Malemath, S. M. Patil, S. V. Chaugule, “Latent fingerprint identification system based on a local combination of minutiae feature points”, SN Computer Science, vol. 2, no. 3, p. 206, 2021, doi:10.1007/s42979-021-00615-7.
- S. M. Hilles, A. Liban, O. A. Miaikil, A. M. Altrad, Y. A. B. El- Ebiary, M. M. Hilles, J. Contreras, “Latent fingerprint enhancement and segmentation technique based on hybrid edge adaptive dtv model”, “2021 2nd International Conference on Smart Comput- ing and Electronic Enterprise (ICSCEE)”, pp. 8–13, IEEE, 2021, doi:10.1109/icscee50312.2021.9498025.
- S. M. Hilles, A. Liban, A. M. Altrad, O. A. Miaikil, Y. A. B. El- Ebiary, J. Contreras, M. M. Hilles, “Adaptive latent fingerprint image segmentation and matching using chan-vese technique based on edtv model”, “2021 2nd International Conference on Smart Com- puting and Electronic Enterprise (ICSCEE)”, pp. 2–7, IEEE, 2021, doi:10.1109/icscee50312.2021.9497996.
- U. U. Deshpande, V. Malemath, S. M. Patil, S. V. Chaugule, “Auto- matic latent fingerprint identification system using scale and rota- tion invariant minutiae features”, International Journal of Information Technology, vol. 14, no. 2, pp. 1025–1039, 2022, doi:10.1007/s41870- 020-00508-7.
- H. İ. Öztürk, B. Selbes, Y. Artan, “Minnet: Minutia patch embedding network for automated latent fingerprint recognition”, “Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recog- nition”, pp. 1627–1635, 2022, doi:10.1109/cvprw56347.2022.00169.
- S. Gu, J. Feng, J. Lu, J. Zhou, “Latent fingerprint indexing: Ro- bust representation and adaptive candidate list”, IEEE Transactions on Information Forensics and Security, vol. 17, pp. 908–923, 2022, doi:10.1109/tifs.2022.3154296.
- N. D. S. Cunha, H. M. Gomes, L. V. Batista, “Residual m-net with frequency-domain loss function for latent fingerprint en- hancement”, “2022 35th SIBGRAPI Conference on Graphics, Pat- terns and Images (SIBGRAPI)”, vol. 1, pp. 198–203, IEEE, 2022, doi:10.1109/sibgrapi55357.2022.9991793.
- E. Marasco, M. He, L. Tang, Y. Tao, “Demographic effects in latent fingerprint matching and their relation to image quality”, “Proceed- ings of the 2022 7th International Conference on Machine Learning Technologies”, pp. 170–179, 2022, doi:10.1145/3529399.3529427.
- A. B. V. Wyzykowski, A. K. Jain, “Synthetic latent finger- print generator”, “Proceedings of the IEEE/CVF Winter Confer- ence on Applications of Computer Vision”, pp. 971–980, 2023, doi:10.1109/wacv56688.2023.00103.
- Y. Zhu, X. Yin, J. Hu, “Fingergan: a constrained fingerprint generation scheme for latent fingerprint enhancement”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, doi:10.1109/tpami.2023.3236876.
- S. A. Grosz, A. K. Jain, “Latent fingerprint recognition: Fusion of local and global embeddings”, IEEE Transactions on Information Forensics and Security, 2023, doi:10.1109/tifs.2023.3314207.
- R. Jindal, S. Singla, “Latent fingerprint recognition using hybrid ant colony optimization and cuckoo search.”, Int. Arab J. Inf. Technol., vol. 20, no. 1, pp. 19–28, 2023, doi:10.34028/iajit/20/1/3.
- A. B. V. Wyzykowski, A. K. Jain, “A universal latent fingerprint enhancer using transformers”, arXiv preprint arXiv:2306.00231, 2023, doi:10.48550/arXiv.2306.00231.
- R. K. Dubey, J. Goh, V. L. Thing, “Fingerprint liveness detection from single image using low-level features and shape analysis”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, pp. 1461–1475, 2016, doi:10.1109/tifs.2016.2535899.
- Z. Xia, R. Lv, Y. Zhu, P. Ji, H. Sun, Y.-Q. Shi, “Fingerprint liveness de- tection using gradient-based texture features”, Signal, Image and Video Processing, vol. 11, pp. 381–388, 2017, doi:10.1007/s11760-016-0936-z.
- T. Chugh, K. Cao, A. K. Jain, “Fingerprint spoof buster: Use of minutiae-centered patches”, IEEE Transactions on Informa- tion Forensics and Security, vol. 13, no. 9, pp. 2190–2202, 2018, doi:10.1109/tifs.2018.2812193.
- C. Yuan, X. Sun, Q. J. Wu, “Difference co-occurrence matrix using bp neural network for fingerprint liveness detection”, Soft Computing, vol. 23, no. 13, pp. 5157–5169, 2019, doi:10.1007/s00500-018-3182-1.
- C. Yuan, X. Chen, P. Yu, R. Meng, W. Cheng, Q. J. Wu, X. Sun, “Semi- supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection”, Journal of Real- Time Image Processing, vol. 17, pp. 55–71, 2020, doi:10.1007/s11554- 019-00928-0.
- J. Fei, Z. Xia, P. Yu, F. Xiao, “Adversarial attacks on fingerprint liveness detection”, EURASIP Journal on Image and Video Processing, vol. 2020, pp. 1–11, 2020, doi:10.1186/s13640-020-0490-z.
- Y. Zhang, C. Gao, S. Pan, Z. Li, Y. Xu, H. Qiu, “A score- level fusion of fingerprint matching with fingerprint live- ness detection”, IEEE Access, vol. 8, pp. 183391–183400, 2020, doi:10.1109/access.2020.3027846.
- W. Jian, Y. Zhou, H. Liu, “Densely connected convolutional network optimized by genetic algorithm for fingerprint live- ness detection”, IEEE Access, vol. 9, pp. 2229–2243, 2020, doi:10.1109/access.2020.3047723.
- O. F. Onifade, P. Akinde, F. O. Isinkaye, “Circular gabor wavelet algorithm for fingerprint liveness detection”, Journal of Advanced Computer Science & Technology, vol. 9, no. 1, pp. 1–5, 2020, doi:10.14419/jacst.v9i1.29908.
- R. Agarwal, A. S. Jalal, K. Arya, “A multimodal liveness detection using statistical texture features and spatial analysis”, Multime- dia Tools and Applications, vol. 79, no. 19, pp. 13621–13645, 2020, doi:10.1007/s11042-019-08313-6.
- Y. Zhang, S. Pan, X. Zhan, Z. Li, M. Gao, C. Gao, “Fldnet: Light dense cnn for fingerprint liveness detection”, IEEE Access, vol. 8, pp. 84141–84152, 2020, doi:10.1109/access.2020.2990909.
- J. Kolberg, M. Grimmer, M. Gomez-Barrero, C. Busch, “Anomaly detection with convolutional autoencoders for fingerprint pre- sentation attack detection”, IEEE Transactions on Biometrics, Be- havior, and Identity Science, vol. 3, no. 2, pp. 190–202, 2021, doi:10.1109/tbiom.2021.3050036.
- C. Yuan, S. Jiao, X. Sun, Q. J. Wu, “Mfffld: A multimodal-feature- fusion-based fingerprint liveness detection”, IEEE Transactions on Cognitive and Developmental Systems, vol. 14, no. 2, pp. 648–661, 2021, doi:10.1109/tcds.2021.3062624.
- S. Agarwal, C. R. Chowdary, V. Sourabh, “Eazy learning: An adap- tive variant of ensemble learning for fingerprint liveness detection”, arXiv preprint arXiv:2103.02207, 2021, doi:10.48550/arXiv.2103.02207.
- S. B. Sandouka, Y. Bazi, N. Alajlan, “Transformers and generative adversarial networks for liveness detection in multitarget fingerprint sensors”, Sensors, vol. 21, no. 3, p. 699, 2021, doi:10.3390/s21030699.
- A. Verma, V. K. Gupta, S. Goel, A. K. Yadav, D. Yadav, et al., “Mod- eling fingerprint presentation attack detection through transient liveness factor-a person specific approach.”, Traitement du Signal, vol. 38, no. 2, 2021, doi:10.18280/ts.380206.
- C. Yuan, Q. Cui, X. Sun, Q. J. Wu, S. Wu, “Fingerprint liveness detection using an improved cnn with the spatial pyramid pooling structure”, “Advances in Computers”, vol. 120, pp. 157–193, Elsevier, 2021, doi:10.1016/bs.adcom.2020.10.002.
- Z. İ. Özkiper, Z. Turgut, T. Atmaca, M. A. Aydın, “Fingerprint liveness detection using deep learning”, “2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)”, pp. 129–135, IEEE, 2022, doi:10.1109/ficloud57274.2022.00025.
- R. C. Contreras, L. G. Nonato, M. Boaventura, I. A. G. Boaventura, F. L. Dos Santos, R. B. Zanin, M. S. Viana, “A new multi-filter framework for texture image representation improvement using set of pattern descriptors to fingerprint liveness detection”, IEEE Access, vol. 10, pp. 117681–117706, 2022, doi:10.1109/access.2022.3218335.
- A. Almehmadi, “A behavioral-based fingerprint liveness and will- ingness detection system”, Applied Sciences, vol. 12, no. 22, p. 11460, 2022, doi:10.3390/app122211460.
- S. Agarwal, A. Rattani, C. R. Chowdary, “A-ilearn: An adap- tive incremental learning model for spoof fingerprint detec- tion”, Machine Learning with Applications, vol. 7, p. 100210, 2022, doi:10.1016/j.mlwa.2021.100210.
- D. Agarwal, A. Bansal, “Fingerprint liveness detection through fusion of pores perspiration and texture features”, Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 7, pp. 4089–4098, 2022, doi:10.1016/j.jksuci.2020.10.003.
- K. Zhang, S. Huang, E. Liu, H. Zhao, “Lfldnet: Lightweight finger- print liveness detection based on resnet and transformer”, Sensors, vol. 23, no. 15, p. 6854, 2023, doi:10.3390/s23156854.
- A. Galli, M. Gravina, S. Marrone, D. Mattiello, C. Sansone, “Ad- versarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection”, IET Biometrics, vol. 12, no. 2, pp. 102–111, 2023, doi:10.1049/bme2.12106.
- M. Nishanth, H. K. MR, K. N. MG, S. Kamal, T. Rao, K. Ashwini, “Fingerprint liveness detection using deep learning”, “2023 Interna- tional Conference on Computational Intelligence for Information, Security and Communication Applications (CIISCA)”, pp. 383–388, IEEE, 2023, doi:10.1109/ciisca59740.2023.00079.
- Y. Myshkovskyi, M. Nazarkevych, “Robustness of fingerprint live- ness detection based on convolutional neural networks”, https://ceur- ws.org/Vol-3550/short13.pdf, 2023.
- C. Li, J. Hu, “A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 543–555, 2015, doi:10.1109/tifs.2015.2505630.
- T. Murakami, T. Ohki, K. Takahashi, “Optimal sequential fusion for multibiometric cryptosystems”, Information fusion, vol. 32, pp. 93–108, 2016, doi:10.1016/j.inffus.2016.02.002.
- Z. Jin, A. B. J. Teoh, B.-M. Goi, Y.-H. Tay, “Biometric cryptosystems: a new biometric key binding and its implementation for finger- print minutiae-based representation”, Pattern Recognition, vol. 56, pp. 50–62, 2016, doi:10.1016/j.patcog.2016.02.024.
- S. Rajendran, M. Doraipandian, “Biometric template security trig- gered by two dimensional logistic sine map”, Procedia computer science, vol. 143, pp. 794–803, 2018, doi:10.1016/j.procs.2018.10.387.
- A. A. Al-Saggaf, “Secure method for combining cryptography with iris biometrics.”, J. Univers. Comput. Sci., vol. 24, no. 4, pp. 341–356, 2018.
- G. Panchal, D. Samanta, S. Barman, “Biometric-based cryptog- raphy for digital content protection without any key storage”, Multimedia Tools and Applications, vol. 78, pp. 26979–27000, 2019, doi:10.1007/s11042-017-4528-x.
- A. A. Khan, V. Kumar, M. Ahmad, “An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach”, Journal of King Saud University-Computer and Information Sciences, 2019, doi:10.1016/j.jksuci.2019.04.013.
- S. Sapkal, S. Kakarwal, R. Deshmukh, “Template security of mul- timodal biometric system with face and fingerprint images using fuzzy vault method”, CSI Journal of Computing, vol. 3, no. 3, pp. 36–40, 2020, doi:10.21275/v5i3.nov162389.
- V. Rajasekar, J. Premalatha, K. Sathya, “Enhanced biometric recog- nition for secure authentication using iris preprocessing and hy- perelliptic curve cryptography”, Wireless communications and mobile computing, vol. 2020, pp. 1–15, 2020, doi:10.21203/rs.2.23196/v1.
- F. S. Babamir, M. Kırcı, “A multibiometric cryptosystem for user authentication in client-server networks”, Computer Networks, vol. 181, p. 107427, 2020, doi:10.1016/j.comnet.2020.107427.
- R. A. Rajan, P. Kumaran, “Multi-biometric cryptosystem using graph for secure cloud authentication”, Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6437–6444, 2020, doi:10.3233/jifs-179724.
- R. Dwivedi, S. Dey, M. A. Sharma, A. Goel, “A fingerprint based crypto-biometric system for secure communication”, Journal of Am- bient Intelligence and Humanized Computing, vol. 11, pp. 1495–1509, 2020, doi:10.1007/s12652-019-01437-5.
- P. S. Chanukya, T. Thivakaran, “Multimodal biometric cryptosystem for human authentication using fingerprint and ear”, Multimedia Tools and Applications, vol. 79, no. 1, pp. 659–673, 2020, doi:10.1007/s11042- 019-08123-w.
- J. Peng, B. Yang, B. B. Gupta, A. A. Abd El-Latif, “A biometric cryp- tosystem scheme based on random projection and neural network”, Soft Computing, vol. 25, pp. 7657–7670, 2021, doi:10.1007/s00500-021- 05732-2.
- S. Barzut, M. Milosavljević, S. Adamović, M. Saračević, N. Maček,
M. Gnjatović, “A novel fingerprint biometric cryptosystem based on convolutional neural networks”, Mathematics, vol. 9, no. 7, p. 730, 2021, doi:10.3390/math9070730. - W. El-Shafai, F. A. H. E. Mohamed, H. M. Elkamchouchi,
M. Abd-Elnaby, A. Elshafee, “Efficient and secure cancelable biometric authentication framework based on genetic encryp- tion algorithm”, IEEE Access, vol. 9, pp. 77675–77692, 2021, doi:10.1109/access.2021.3082940. - H. A. A. El-Hameed, N. Ramadan, W. El-Shafai, A. A. Khalaf, H. E. H. Ahmed, S. E. Elkhamy, F. E. A. El-Samie, “Cancelable biometric secu- rity system based on advanced chaotic maps”, The Visual Computer, pp. 1–17, 2021, doi:10.1007/s00371-021-02276-2.
- O. Ouda, K. Nandakumar, A. Ross, “Cancelable biometrics vault: A secure key-binding biometric cryptosystem based on chaffing and winnowing”, “2020 25th International Conference on Pattern Recognition (ICPR)”, pp. 8735–8742, IEEE, 2021, doi:10.1109/icpr48806.2021.9412957.
- R. Sreemol, M. S. Kumar, A. Sreekumar, “Improvement of security in multi-biometric cryptosystem by modulus fuzzy vault algorithm”, “2021 International conference on advances in computing and com- munications (ICACC)”, pp. 1–7, IEEE, 2021, doi:10.1109/icacc- 202152719.2021.9708136.
- L. A. Elrefaei, A. M. Al-Mohammadi, “Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme”, Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 2, pp. 204–217, 2022, doi:10.1016/j.jksuci.2019.10.011.
- X. Chang, W. Li, A. Yan, P. W. M. Tsang, T.-C. Poon, “Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm”, Scientific Reports, vol. 12, no. 1, p. 7722, 2022, doi:10.21203/rs.3.rs-1148931/v1.
- A. Kuznetsov, D. Zakharov, E. Frontoni, L. Romeo, R. Rosati, “Deep learning based fuzzy extractor for generating strong keys from biometric face images”, “2022 IEEE 9th Interna- tional Conference on Problems of Infocommunications, Sci- ence and Technology (PIC S&T)”, pp. 421–426, IEEE, 2022, doi:10.1109/picst57299.2022.10238643.
- N. Hamian, M. Bayat, M. R. Alaghband, Z. Hatefi, S. M. Pournaghi, “Blockchain-based user re-enrollment for biometric authentication systems”, International Journal of Electronics and Information Engineer- ing, vol. 14, no. 1, pp. 18–38, 2022, doi:10.6636/IJEIE.202206.
- S. D. Patil, R. Raut, R. H. Jhaveri, T. A. Ahanger, P. V. Dhade, A. B. Kathole, K. N. Vhatkar, et al., “Robust authentication system with privacy preservation of biometrics”, Security and Communication Networks, vol. 2022, 2022, doi:10.1155/2022/7857975.
- L. A. Abou Elazm, W. El-Shafai, S. Ibrahim, M. G. Egila, H. Shawkey, M. K. Elsaid, N. F. Soliman, H. N. AlEisa, F. E. Abd El-Samie, “Efficient hardware design of a secure cancellable biometric cryp- tosystem”, Intell. Autom. Soft Comput., vol. 36, no. 1, pp. 929–955, 2023, doi:10.32604/iasc.2023.031386.
- H. A. A. Eldawy, W. El-Shafai, E. E.-D. Hemdan, G. M. El-Banby, F. E. A. El-Samie, “A robust cancellable face and palmprint recogni- tion system based on 3d optical chaos-dna cryptosystem”, Optical and Quantum Electronics, vol. 55, no. 11, p. 970, 2023, doi:10.1007/s11082- 023-04840-7.
- P. Kaur, N. Kumar, “Enhanced biometric cryptosystem using ear & iris modality based on binary robust independent elementary feature”, “2023 6th International Conference on Information Sys- tems and Computer Networks (ISCON)”, pp. 1–6, IEEE, 2023, doi:10.1109/iscon57294.2023.10112197.
- A. Sedik, A. A. A. El-Latif, M. A. Wani, F. E. A. El-Samie, N. A.-S. Bauomy, F. G. Hashad, “Efficient multi-biometric secure-storage scheme based on deep learning and crypto-mapping techniques”, Mathematics, vol. 11, no. 3, p. 703, 2023, doi:10.3390/math11030703.
- S. Nagaraju, R. Nagendra, S. Balasundaram, R. K. Kumar, “Bio- metric key generation and multi round aes crypto system for im- proved security”, Measurement: Sensors, vol. 30, p. 100931, 2023, doi:10.1016/j.measen.2023.100931.
- M. Sandhya, M. V. Prasad, “Securing fingerprint templates using fused structures”, IET Biometrics, vol. 6, no. 3, pp. 173–182, 2017, doi:10.1049/iet-bmt.2016.0008.
- A. Roy, N. Memon, A. Ross, “Masterprint: Exploring the vulner- ability of partial fingerprint-based authentication systems”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2013–2025, 2017, doi:10.1109/tifs.2017.2691658.
- J. Kim, A. B. J. Teoh, “One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication”, “2018 24th International Conference on Pattern Recognition (ICPR)”, pp. 3108–3113, IEEE, 2018, doi:10.1109/icpr.2018.8545565.
- X. Wang, H. Li, “One-factor cancellable palmprint recognition scheme based on oiom and minimum signature hash”, IEEE Access, vol. 7, pp. 131338–131354, 2019, doi:10.1109/access.2019.2938019.
- G. S. Walia, K. Aggarwal, K. Singh, K. Singh, “Design and analysis of adaptive graph-based cancelable multi-biometrics approach”, IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 54–66, 2020, doi:10.1109/tdsc.2020.2997558.
- J. R. Pinto, M. V. Correia, J. S. Cardoso, “Secure triplet loss: Achieving cancelability and non-linkability in end-to-end deep biometrics”, IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 2, pp. 180–189, 2020, doi:10.1109/tbiom.2020.3046620.
- H. Wang, X. Dong, Z. Jin, A. B. J. Teoh, M. Tistarelli, “Security analysis of cancellable biometrics using constrained-optimized similarity-based attack”, arXiv preprint arXiv:2006.13051, 2020, doi:10.1109/wacvw52041.2021.00012.
- A. K. Trivedi, D. M. Thounaojam, S. Pal, “Non-invertible cancellable fingerprint template for fingerprint biometric”, Computers & Security, vol. 90, p. 101690, 2020, doi:10.1016/j.cose.2019.101690.
- U. Sharma, P. Tomar, S. S. Ali, N. Saxena, R. S. Bhadoria, “Optimized authentication system with high security and privacy”, Electronics, vol. 10, no. 4, p. 458, 2021, doi:10.3390/electronics10040458.
- H. Wang, X. Dong, Z. Jin, A. B. J. Teoh, M. Tistarelli, “Interpretable se- curity analysis of cancellable biometrics using constrained-optimized similarity-based attack”, “Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision”, pp. 70–77, 2021, doi:10.1109/wacvw52041.2021.00012.
- N. F. Soliman, A. D. Algarni, W. El-Shafai, F. E. A. El-Samie, G. Banby, et al., “An efficient gcd-based cancelable biometric algorithm for single and multiple biometrics.”, Computers, Materials & Continua, vol. 69, no. 2, 2021, doi:10.32604/cmc.2021.016980.
- W. Yang, S. Wang, M. Shahzad, W. Zhou, “A cancelable biometric au- thentication system based on feature-adaptive random projection”, Journal of Information Security and Applications, vol. 58, p. 102704, 2021, doi:10.1016/j.jisa.2020.102704.
- H. Zhang, W. Bian, B. Jie, D. Xu, J. Zhao, “A complete user au- thentication and key agreement scheme using cancelable biomet- rics and puf in multi-server environment”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5413–5428, 2021, doi:10.1109/tifs.2021.3128826.
- X. Dong, Z. Jin, L. Zhao, Z. Guo, “Biocancrypto: An ldpc coded bio-cryptosystem on fingerprint cancellable template”, “2021 IEEE international joint conference on biometrics (IJCB)”, pp. 1–8, IEEE, 2021, doi:10.1109/ijcb52358.2021.9484391.
- B. Samira, R. H. Lamia, E. B. A. Najoua, “Biometric template security using watermarking reinforcement based cancellable transforma- tion”, “2021 International Conference on Cyberworlds (CW)”, pp. 270–277, IEEE, 2021, doi:10.1109/cw52790.2021.00052.
- T. M. Dang, T. D. Nguyen, T. Hoang, H. Kim, A. B. J. Teoh, D. Choi, “Avet: a novel transform function to improve cancellable biometrics security”, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 758–772, 2022, doi:10.1109/tifs.2022.3230212.
- B. A. El-Rahiem, M. Amin, A. Sedik, F. E. A. E. Samie, A. M. Iliyasu, “An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream”, Journal of Ambient Intelligence and Hu- manized Computing, pp. 1–13, 2022, doi:10.1007/s12652-021-03513-1.
- A. M. Ayoup, A. A. Khalaf, W. El-Shafai, F. E. A. El-Samie, F. Alrad- dady, S. M. S. Eldin, “Cancellable multi-biometric template genera- tion based on arnold cat map and aliasing.”, Computers, Materials & Continua, vol. 72, no. 2, 2022, doi:10.32604/cmc.2022.025902.
- J. Kim, Y. G. Jung, A. B. J. Teoh, “Multimodal biometric template pro- tection based on a cancelable softmaxout fusion network”, Applied Sciences, vol. 12, no. 4, p. 2023, 2022, doi:10.3390/app12042023.
- A. M. Ayoup, A. Khalaf, F. Alraddady, F. Abd El-Samie, W. El- Safai, S. Eldin, “Selective cancellable multi-biometric template generation scheme based on multi-exposure feature fusion”, In- tell. Autom. Soft Comput., vol. 33, no. 1, pp. 549–565, 2022, doi:10.32604/iasc.2022.024379.
- A. Sedik, A. A. A. El-Latif, M. El-Affendi, H. Mostafa, “A cancelable biometric system based on deep style transfer and symmetry check for double-phase user authentication”, Symmetry, vol. 15, no. 7, p. 1426, 2023, doi:10.3390/sym15071426.
- S. M. S. Eldin, A. Sedik, S. S. Alshamrani, A. M. Ayoup, “Cancellable multi-biometric feature veins template generation based on sha- 3 hashing.”, Computers, Materials & Continua, vol. 75, no. 1, 2023, doi:10.32604/cmc.2023.030789.
- Y. Jiang, P. Shen, L. Zeng, X. Zhu, D. Jiang, C. Chen, “Cancelable biometric schemes for euclidean metric and cosine metric”, Cyberse- curity, vol. 6, no. 1, p. 4, 2023, doi:10.1186/s42400-023-00137-0.
- O. S. Faragallah, E. A. Naeem, W. El-Shafai, N. Ramadan, H. E.-d. H. Ahmed, M. M. A. Elnaby, I. Elashry, S. E. El-Khamy, F. E. A. El-Samie, “Efficient chaotic-baker-map-based cancelable face recognition”, Jour- nal of Ambient Intelligence and Humanized Computing, pp. 1–39, 2023, doi:10.1007/s12652-021-03398-0.
- S. Yamamoto, H. Inaba, “Cancellable biometric authentication system by image style transfer”, “2023 IEEE 12th Global Confer- ence on Consumer Electronics (GCCE)”, pp. 794–797, IEEE, 2023, doi:10.1109/gcce59613.2023.10315291.
- F. Turroni, D. Maltoni, R. Cappelli, D. Maio, “Improving fin- gerprint orientation extraction”, IEEE Transactions on Informa- tion Forensics and Security, vol. 6, no. 3, pp. 1002–1013, 2011, doi:10.1109/tifs.2011.2150216.
- S. Li, A. C. Kot, “An improved scheme for full fingerprint reconstruc- tion”, IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1906–1912, 2012, doi:10.1109/tifs.2012.2212012.
- J. Galbally, S. Marcel, J. Fierrez, “Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recogni- tion”, IEEE transactions on image processing, vol. 23, no. 2, pp. 710–724, 2013, doi:10.1109/tip.2013.2292332.
- H.-W. Jung, J.-H. Lee, “Noisy and incomplete fingerprint classifi- cation using local ridge distribution models”, Pattern recognition, vol. 48, no. 2, pp. 473–484, 2015, doi:10.1016/j.patcog.2014.07.030.
- S. Mathur, A. Vjay, J. Shah, S. Das, A. Malla, “Methodology for partial fingerprint enrollment and authentication on mobile devices”, “2016 International Conference on Biometrics (ICB)”, pp. 1–8, IEEE, 2016, doi:10.1109/icb.2016.7550093.
- T. Chugh, S. S. Arora, A. K. Jain, N. G. Paulter, “Benchmarking fingerprint minutiae extractors”, “2017 International conference of the biometrics special interest group (BIOSIG)”, pp. 1–8, IEEE, 2017, doi:10.23919/biosig.2017.8053498.
- G. S. E. Ekladious, R. Sabourin, E. Granger, “Learning global-local distance metrics for signature-based biometric cryptosystems”, Cryp- tography, vol. 1, no. 3, p. 22, 2017, doi:10.3390/cryptography1030022.
- R. D. Labati, A. Genovese, E. Munoz, V. Piuri, F. Scotti, “A novel pore extraction method for heterogeneous fingerprint images using convolutional neural networks”, Pattern Recognition Letters, vol. 113, pp. 58–66, 2018, doi:10.1016/j.patrec.2017.04.001.
- R. Gupta, M. Khari, D. Gupta, R. G. Crespo, “Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction”, Information Sciences, vol. 530, pp. 201–218, 2020, doi:10.1016/j.ins.2020.01.031.
- F. Liu, Y. Zhao, G. Liu, L. Shen, “Fingerprint pore matching us- ing deep features”, Pattern Recognition, vol. 102, p. 107208, 2020, doi:10.1016/j.patcog.2020.107208.
- W. Yang, S. Wang, K. Yu, J. J. Kang, M. N. Johnstone, “Secure finger- print authentication with homomorphic encryption”, “2020 Digital Image Computing: Techniques and Applications (DICTA)”, pp. 1–6, IEEE, 2020, doi:10.1109/dicta51227.2020.9363426.
- B. T. Ahmed, O. Y. Abdulhameed, “Fingerprint authentica- tion using shark smell optimization algorithm”, UHD Jour- nal of Science and Technology, vol. 4, no. 2, pp. 28–39, 2020, doi:10.21928/uhdjst.v4n2y2020.pp28-39.
- T. Kim, Y. Oh, H. Kim, “Efficient privacy-preserving fingerprint- based authentication system using fully homomorphic encryption”, Security and Communication Networks, vol. 2020, pp. 1–11, 2020, doi:10.1155/2020/4195852.
- M. Golec, S. S. Gill, R. Bahsoon, O. Rana, “Biosec: A biometric authen- tication framework for secure and private communication among edge devices in iot and industry 4.0”, IEEE Consumer Electronics Mag- azine, vol. 11, no. 2, pp. 51–56, 2020, doi:10.1109/mce.2020.3038040.
- M. Lebcir, S. Awang, A. Benziane, “Reversible watermarking tech- nique for fingerprint authentication based on dct”, IOP Conference Series: Materials Science and Engineering, vol. 769, no. 1, p. 012070, 2020, doi:10.1088/1757-899x/769/1/012070.
- D. Valdes-Ramirez, M. A. Medina-Pérez, R. Monroy, “An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification”, Pattern Analysis and Ap- plications, vol. 24, pp. 433–444, 2021, doi:10.1007/s10044-020-00911-7.
- I. Joshi, R. Kothari, A. Utkarsh, V. K. Kurmi, A. Dantcheva, S. D. Roy, P. K. Kalra, “Explainable fingerprint roi segmentation using monte carlo dropout”, “Proceedings of the IEEE/CVF Winter Con- ference on Applications of Computer Vision”, pp. 60–69, 2021, doi:10.1109/wacvw52041.2021.00011.
- P. Terhörst, A. Boller, N. Damer, F. Kirchbuchner, A. Kuijper, “Mide- con: Unsupervised and accurate fingerprint and minutia quality assessment based on minutia detection confidence”, “2021 IEEE International Joint Conference on Biometrics (IJCB)”, pp. 1–8, IEEE, 2021, doi:10.1109/ijcb52358.2021.9484404.
- F. Pandey, P. Dash, D. Samanta, M. Sarma, “Asra: Automatic singular value decomposition-based robust fingerprint image alignment”, Multimedia Tools and Applications, vol. 80, pp. 15647–15675, 2021, doi:10.1007/s11042-021-10560-5.
- A. Muhammed, N. C. Mhala, A. R. Pais, “A novel fingerprint template protection and fingerprint authentication scheme using visual se- cret sharing and super-resolution”, Multimedia Tools and Applications, vol. 80, no. 7, pp. 10255–10284, 2021, doi:10.1007/s11042-020-10095-1.
- R. C. Contreras, L. G. Nonato, M. Boaventura, I. A. G. Boaventura, B. G. Coelho, M. S. Viana, “A new multi-filter framework with sta- tistical dense sift descriptor for spoofing detection in fingerprint authentication systems”, “International Conference on Artificial Intelligence and Soft Computing”, pp. 442–455, Springer, 2021, doi:10.1007/978-3-030-87897-9_39.
- M. S. El_Tokhy, “Robust multimodal biometric authentication al- gorithms using fingerprint, iris and voice features fusion”, Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 647–672, 2021, doi:10.3233/jifs-200425.
- A. Bedari, S. Wang, W. Yang, “A secure online fingerprint authenti- cation system for industrial iot devices over 5g networks”, Sensors, vol. 22, no. 19, p. 7609, 2022, doi:10.3390/s22197609.
- A. Siswanto, A. Efendi, E. A. Kadir, “Fingerprint authentication in smart home environment based on embedded system”, “2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)”, pp. 1–6, IEEE, 2022, doi:10.1109/iceccme55909.2022.9988711.
- N. Pradeep, J. Ravi, “An revolutionary fingerprint authentication approach using gabor filters for feature extraction and deep learning classification using convolutional neural networks”, “Innovations in Electronics and Communication Engineering: Proceedings of the 9th ICIECE 2021”, pp. 349–360, Springer, 2022, doi:10.1007/978-981- 16-8512-5_38.
- A. F. Y. Althabhawee, B. K. O. C. Alwawi, “Fingerprint recognition based on collected images using deep learning technology”, IAES International Journal of Artificial Intelligence, vol. 11, no. 1, p. 81, 2022, doi:10.11591/ijai.v11.i1.pp81-88.
- P. Singh, H. Samuel, F. Jaafar, D. Ameyed, “Enhancing biometric security with combinatorial and permutational multi-fingerprint authentication strategies”, “2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intel- ligence and Computing, Intl Conf on Cloud and Big Data Com- puting, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)”, pp. 1–7, IEEE, 2022, doi:10.1109/picom/cbdcom/cy55231.2022.9927942.
- Y. Chen, Y. Yu, L. Zhai, “ InfinityGauntlet : Expose smartphone fingerprint authentication to brute-force attack”, “32nd USENIX Security Symposium (USENIX Security 23)”, pp. 2027–2041, 2023.
- A. Popli, S. Tandon, J. J. Engelsma, A. Namboodiri, “A unified model for fingerprint authentication and presentation attack detection”, “Handbook of Biometric Anti-Spoofing: Presentation Attack De- tection and Vulnerability Assessment”, pp. 77–99, Springer, 2023, doi:10.1109/ijcb52358.2021.9484382.
- H. Choi, S. Woo, H. Kim, “Blind-touch: Homomorphic encryption- based distributed neural network inference for privacy-preserving fingerprint authentication”, arXiv preprint arXiv:2312.11575, 2023, doi:10.1609/aaai.v38i20.30200.
- E. Marasco, M. Albanese, V. V. R. Patibandla, A. Vurity, S. S. Sri- ram, “Biometric multi-factor authentication: On the usability of the fingerpin scheme”, Security and Privacy, vol. 6, no. 1, p. e261, 2023, doi:10.1002/spy2.261.
- R. Deshmukh, P. Yannawar, “Avao enabled deep learning based person authentication using fingerprint”, “First International Con- ference on Advances in Computer Vision and Artificial Intelligence Technologies (ACVAIT 2022)”, pp. 327–346, Atlantis Press, 2023, doi:10.2991/978-94-6463-196-8_26.
- D. Peralta, I. Triguero, R. Sanchez-Reillo, F. Herrera, J. Benitez, “Fast fingerprint identification for large databases”, Pattern Recognition, vol. 47, no. 2, p. 588–602, 2014, doi:10.1016/j.patcog.2013.08.002.
- M. Lastra, J. Carabaño, P. D. Gutiérrez, J. M. Benítez, F. Herrera, “Fast fingerprint identification using gpus”, Information Sciences, vol. 301, pp. 195–214, 2015, doi:10.1016/j.ins.2014.12.052.
- Y. Su, J. Feng, J. Zhou, “Fingerprint indexing with pose constraint”, Pattern Recognition, vol. 54, pp. 1–13, 2016, doi:10.1016/j.patcog.2016.01.006.
- J. Khodadoust, A. M. Khodadoust, “Fingerprint indexing based on minutiae pairs and convex core point”, Pattern Recognition, vol. 67, pp. 110–126, 2017, doi:10.1016/j.patcog.2017.01.022.
- D. Song, Y. Tang, J. Feng, “Aggregating minutia-centred deep con- volutional features for fingerprint indexing”, Pattern Recognition, vol. 88, pp. 397–408, 2019, doi:10.1016/j.patcog.2018.11.018.
- J. J. Engelsma, K. Cao, A. K. Jain, “Learning a fixed-length fingerprint representation”, IEEE transactions on pattern analy- sis and machine intelligence, vol. 43, no. 6, pp. 1981–1997, 2019, doi:10.1109/tpami.2019.2961349.
- U. U. Deshpande, V. Malemath, S. M. Patil, S. V. Chaugule, “Cnnai: a convolution neural network-based latent fingerprint matching using the combination of nearest neighbor arrange- ment indexing”, Frontiers in Robotics and AI, vol. 7, p. 113, 2020, doi:10.3389/frobt.2020.00113.
- V. Anand, V. Kanhangad, “Pore-based indexing for fingerprints acquired using high-resolution sensors”, Pattern Analysis and Appli- cations, vol. 23, pp. 429–441, 2020, doi:10.1007/s10044-019-00805-3.
- H. P. Singh, P. Dimri, S. Tiwari, M. Saraswat, “Segmentation tech- niques through machine based learning for latent fingerprint index- ing and identification”, 2020, doi:10.56042/jsir.v79i3.68640.
- I. Pérez-Sánchez, B. Cervantes, M. A. Medina-Pérez, R. Monroy, O. Loyola-González, S. García, F. Herrera, “An indexing algorithm based on clustering of minutia cylinder codes for fast latent fin- gerprint identification”, IEEE Access, vol. 9, pp. 85488–85499, 2021, doi:10.1109/access.2021.3088314.
- Y. Xu, Y. Lu, F. Chen, G. Lu, D. Zhang, “High resolution fingerprint retrieval based on pore indexing and graph comparison”, IEEE Transactions on Information Forensics and Security, vol. 17, pp. 226–236, 2021, doi:10.1109/tifs.2021.3139219.
- J. M. S. Soares, L. Barbosa, P. A. L. Rego, R. P. Magalhães,
J. A. F. de Macêdo, “Using inverted index for fingerprint search”, Journal of Information and Data Management, vol. 12, no. 5, 2021, doi:10.5753/jidm.2021.1918. - G. Arora, S. Kalra, A. Bhatia, K. Tiwari, “Palmhashnet: Palm- print hashing network for indexing large databases to boost identification”, IEEE Access, vol. 9, pp. 145912–145928, 2021, doi:10.1109/access.2021.3123291.
- R. Balasundaram, G. F. Sudha, “Retrieval performance analysis of multibiometric database using optimized multidimensional spectral hashing based indexing”, Journal of King Saud University- Computer and Information Sciences, vol. 33, no. 1, pp. 110–117, 2021, doi:10.1016/j.jksuci.2018.02.003.
- D. Osorio-Roig, T. Schlett, C. Rathgeb, J. Tapia, C. Busch, “Exploring quality scores for workload reduction in biometric identification”, “2022 International Workshop on Biometrics and Forensics (IWBF)”, pp. 1–6, IEEE, 2022, doi:10.1109/iwbf55382.2022.9794533.
- G. Arora, A. Singh, A. Nigam, H. M. Pandey, K. Tiwari, “Fkpindexnet: An efficient learning framework for finger-knuckle-print database indexing to boost identification”, Knowledge-Based Systems, vol. 239, p. 108028, 2022, doi:10.1016/j.knosys.2021.108028.
- P. Drozdowski, F. Stockhardt, C. Rathgeb, C. Busch, “Signal-level fusion for indexing and retrieval of facial biometric data”, IET Biometrics, vol. 11, no. 2, pp. 141–156, 2022, doi:10.1049/bme2.12063.
- D. Osorio-Roig, L. J. Gonzalez-Soler, C. Rathgeb, C. Busch, “Privacy-preserving multi-biometric indexing based on fre- quent binary patterns”, arXiv preprint arXiv:2310.03091, 2023, doi:10.1109/tifs.2024.3386310/mm1.
- S. A. Grosz, A. K. Jain, “Afr-net: Attention-driven fingerprint recog- nition network”, IEEE Transactions on Biometrics, Behavior, and Identity Science, 2023, doi:10.1109/tbiom.2023.3317303.
- M. Kumar, D. Kumar, “An efficient gravitational search decision forest approach for fingerprint recognition”, Kuwait Journal of Science, vol. 50, no. 2A, 2023, doi:10.48129/kjs.20635.
- A. K. Jain, S. S. Arora, L. Best-Rowden, K. Cao, P. S. Sudhish, A. Bhat- nagar, Y. Koda, “Giving infants an identity: Fingerprint sensing and recognition”, “Proceedings of the Eighth International Conference on Information and Communication Technologies and Development”, pp. 1–4, 2016, doi:10.1145/2909609.2909612.
- A. K. Jain, S. S. Arora, K. Cao, L. Best-Rowden, A. Bhatnagar, “Fingerprint recognition of young children”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1501–1514, 2016, doi:10.1109/tifs.2016.2639346.
- J. J. Engelsma, D. Deb, K. Cao, A. Bhatnagar, P. S. Sudhish, A. K. Jain, “Infant-id: Fingerprints for global good”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 7, pp. 3543–3559, 2021, doi:10.1109/tpami.2021.3057634.
- I. Widiatmika, I. N. Piarsa, A. Syafiandini, “Recognition of the baby footprint characteristics using wavelet method and k-nearest neigh- bor (k-nn)”, Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 12, no. 1, pp. 41–52, 2021, doi:10.24843/lkjiti.2021.v12.i01.p05.
- H. I. Yoshinori Koda, “Fundamental study of neonate fin- gerprint recognition using fingerprint classification”, 2022, doi:10.1109/biosig55365.2022.9897017.
- N. Nelufule, Y. Moolla, S. Ntshangase, A. de Kock, “Biometric recog- nition of infants using fingerprints”, Tech. rep., EasyChair, 2023, doi:10.1109/ictas56421.2023.10082749.
- T. O. Odu, T. Ogunfunmi, M. O. Olaniyan, I. A. Samuel, “Multi- instance contingent fusion for the verification of infant fingerprints”, “World Conference on Information Systems for Business Manage- ment”, pp. 197–207, Springer, 2023, doi:10.1155/2024/7728707.
- M. Bahzad, L. M. Labib, M. Elhosseini, M. Badawy, “M2brtpc: A novel modified multimodal biometric recognition for toddlers and pre-school children approach”, Mansoura Engineering Journal, vol. 48, no. 5, p. 5, 2023, doi:10.58491/2735-4202.3069.
- M. Shabil, H. Fadewar, “Fingerprint recognition of newborns and toddlers using pre-trained model under convolution neural net- works”, Journal of Data Acquisition and Processing, vol. 38, no. 2, p. 234, 2023, doi:10.5281/zenodo.7766329.
- K. Rajaram, N. B. Amma, S. Selvakumar, “Convolutional neural network based children recognition system using contactless finger- prints”, International Journal of Information Technology, vol. 15, no. 5, pp. 2695–2705, 2023, doi:10.1007/s41870-023-01306-7.
- M. Kazi, K. Kale, R. S. Mehsen, A. Mane, V. Humbe, Y. Rode, S. Dab- hade, N. Bansod, A. Razvi, P. Deshmukh, “Face, fingerprint, and signature based multimodal biometric system using score level and decision level fusion approaches”, IETE Journal of Research, pp. 1–20, 2023, doi:10.1080/03772063.2023.2217784.
- S. A. El_Rahman, A. S. Alluhaidan, “Enhanced multimodal biometric recognition systems based on deep learning and traditional methods in smart environments”, Plos one, vol. 19, no. 2, p. e0291084, 2024, doi:10.1371/journal.pone.0291084.
- H. Byeon, V. Raina, M. Sandhu, M. Shabaz, I. Keshta, M. Soni, K. Ma- trouk, P. P. Singh, T. Lakshmi, “Artificial intelligence-enabled deep learning model for multimodal biometric fusion”, Multimedia Tools and Applications, pp. 1–24, 2024, doi:10.1007/s11042-024-18509-0.
- J. Priyani, P. Nanglia, P. Singh, V. Shokeen, A. Sharma, “Hgssa-bi lstm: A secure multimodal biometric sensing using optimized bi- directional long short-term memory with self-attention”, ECS Sensors Plus, vol. 3, no. 1, p. 011401, 2024, doi:10.1149/2754-2726/ad1b3a.
- J. Samatha, G. Madhavi, “Securesense: Enhancing person verification through multimodal biometrics for robust authentication”, Scalable Computing: Practice and Experience, vol. 25, no. 2, pp. 1040–1054, 2024, doi:10.12694/scpe.v25i2.2524.
- D. A. Reid, M. S. Nixon, S. V. Stevenage, “Soft biometrics: Human identification using comparative descriptions”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 6, pp. 1216–1228, 2014, doi:10.1109/tpami.2013.219.
No. of Downloads per Month
No. of Downloads per Country
Tab Content