期刊文献+

Fingerprint matching,spoof and liveness detection:classification and literature review

原文传递
导出
摘要 Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several techniques are presented to address these challenges over well-known data-sets.This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades.It divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous tech-niques.Among these,deep learning approach has outperformed other approaches and gained significant attention for future research.By reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第1期179-196,共18页 中国计算机科学前沿(英文版)
基金 This work was supported by the National ICT R&D(NICTRDF/NGIRI/2012-13/Corsp/3) University of Management&Technology,Pakistan.
  • 相关文献

参考文献3

二级参考文献77

  • 1Lamport L. Password authentication with insecure communication. Communications of the ACM, 1981, 24(11): 770-772.
  • 2He D B, Chen J H, Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 2012, 13(3): 223-230.
  • 3Li L H, Lin L C, Hwang M S. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks, 200l, 12(6): 1498 1504.
  • 4He D B. An efficient remote user authentication and key exchange pro- tocol for mobile client-server environment from pairings. Ad Hoc Net- works, 2012, 10(6): 1009-1016.
  • 5Liao Y P, Wang S S. A secure dynamic 1D based remote user authen- tication scheme for multi-server environment. Computer Standards & Interfaces, 2009, 31(1): 24-29.
  • 6He D B, Chen J H, Chert Y T. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secu- rity and Communication Networks, 2012, 5(12): 1423-1429.
  • 7Li X, Niu J W, Khan M K, Wang Z B. Applying LU decomposi- tion of matrices to design anonymity bilateral remote user authenti- cation scheme. Mathematical Problems in Engineering. 2013, Article ID 910409, 10 pages, DOI:10.1155/2013/910409.
  • 8Chert T H, Chen Y C, Shih W K, Wei H W. An efficient anonymous au- thentication protocol for mobile pay-TV. Journal of Network and Corn-puter Applications, 2011, 34(4): 1131-1137.
  • 9He D B, Chen J H, Zhang R. A more secure authentication scheme for telecare medicine information systems. Joumal of Medical Systems, 2012, 36(3): 1989-1995.
  • 10Leung K C, Cheng L M, Fong A S, Chan C K. Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 2003, 49(4): 1243-1245.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部