Security and Accuracy of Fingerprint-Based Biometrics: a Review

Security and Accuracy of Fingerprint-Based Biometrics: a Review

S S symmetry Review Security and Accuracy of Fingerprint-Based Biometrics: A Review Wencheng Yang 1,* , Song Wang 2 , Jiankun Hu 3, Guanglou Zheng 1 and Craig Valli 1 1 Security Research Institute, Edith Cowan University, Joondalup, WA 6207, Australia; [email protected] (G.Z.); [email protected] (C.V.) 2 Department of Engineering, La Trobe University, Victoria 3083, Australia; [email protected] 3 School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia; [email protected] * Correspondence: [email protected]; Tel.: +61-8-6304-5210 Received: 2 December 2018; Accepted: 23 January 2019; Published: 28 January 2019 Abstract: Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper. Keywords: biometrics; security; template protection; recognition accuracy; latent fingerprint 1. Introduction Biometrics is a technology that uses the unique patterns of physical or behavioral traits of users for authentication or identification. With biometric scanners on smartphones and other devices becoming more prevalent, as well as a growing number of services calling for high security and good customer experience, traditional methods of authentication (e.g., passwords and PINs) are increasingly being replaced by biometric technology [1]. Passwords have some obvious drawbacks—they could be stolen, lost, or forgotten. In contrast, biometrics offer an alternative solution to the task of personal authentication or identification based on biometric traits. To be forgotten or lost is impossible, and unlike passwords, they are hard to forge. There are some biometric traits that can be defined for an individual; for example, fingerprint, finger-vein, iris, voice, face, and so on [2]. Generally, a typical biometric system comprises four modules, namely, sensor module, feature extraction module, template database, and matching module. Specifically, the sensor module acquires the biometric image. A set of global or local features are extracted from the acquired biometric image by the feature extraction module. Structured feature representations are stored in the template database as template data. The matching module is responsible for comparing the query and template data to reach a match or non-match verdict. A typical biometric system carries out authentication in two stages [3,4]—the enrollment stage and verification stage—as shown in Figure1. Take fingerprint Symmetry 2019, 11, 141; doi:10.3390/sym11020141 www.mdpi.com/journal/symmetry Symmetry 2019, 11, 141 2 of 19 Symmetry 2018, 10, x FOR PEER REVIEW 2 of 20 recognition as an example. In the stage of enrollment, a user presents their finger to the fingerprint sensorof the acquired and a fingerprint fingerprint image image is acquiredare extracted, by the and sensor further module. adapted Certain or transformed features of the to acquiredgenerate fingerprinttemplate data image for arethe extracted,purpose of and comparison further adapted in the orverification transformed stage. to generate In the verification template data stage, for the purposefingerprint of comparisonimage of a query in the is verification collected by stage. the Insensor the verificationmodule. The stage, feature the fingerprintrepresentations image of ofthe a query isfingerprint collected byimage the sensorgo through module. the same The feature process representations as in the enrollment of the stage, query so fingerprint as to obtain image query go throughdata. The the query same data process are asthen in thecompared enrollment with stage, the template so as to obtain data so query that data.a matching The query outcome data are is thenattained. compared with the template data so that a matching outcome is attained. Figure 1. An example of two stages—enrollment and verification—in a biometric authentication system. Figure 1. An example of two stages—enrollment and verification—in a biometric authentication Duesystem. to some specific properties possessed by biometrics, biometric systems have been adopted in many civilian and military applications [5–8] in the areas of law enforcement, border control, consumer Due to some specific properties possessed by biometrics, biometric systems have been adopted or residential biometrics, and financial services. in many civilian and military applications [5–8] in the areas of law enforcement, border control, (1)consumerLaw enforcement:or residential Biometricbiometrics, technology and financial has beenservices. embraced with open arms by law enforcement (1) Lawagencies enforcement: across theBiometric world fortechnology its efficiency has been in security-oriented embraced with open scenarios. arms Inby fact, law biometricsenforcement is agenciesnot aacross new toolthe world in law for enforcement. its efficiency Fingerprint in security-oriented biometrics scenarios. have been In adopted fact, biometrics by Argentinian is not a new criminologiststool in law forenforcement. more than Fingerprint a century. Nowadays,biometrics withhave rapidbeen technologicaladopted by development,Argentinian criminologistsbiometrics for have more launched than a century. a worldwide Nowadays, revolution with rapid in law technological enforcement. development, Biometric recognition biometrics have systemslaunched have a worldwide now been revolution utilized by in law law enforcement enforcement. agencies Biometric of recognition many countries, systems including have now the been Unitedutilized States, by law United enforcement Kingdom, agencies Australia, of ma andny countries, China. For including example, the in 2011,United the States, Department United Kingdom,of Defense Australia, and theand FBI China. started For workingexample, on in the2011, United the Department States’ next of generation Defense and biometric the FBI system,started workingnamed on Nextthe GenerationUnited States’ Identification next generati (NGI),on which biometric is designed system, to include named fingerprint, Next Generation face, iris, Identificationand palm (NGI), data, andwhich their is facialdesigned recognition to includ programe fingerprint, became face, fully iris, operational and palm in data, late 2014 and [9their]. (2)facialBorder recognition control: program In order became to prevent fully operational identity fraud in late and 2014 strengthen [9]. border and national security, (2) Bordermany control: countries In employorder to biometric prevent identity systems fraud to track and and strengthen manage theborder flow and of passengersnational security, across manyborders. countries For employ instance, biometric since 2008, systems all non-Americans to track and manage who travel the flow to the of Unitedpassengers States across are requested borders. For instance,to scan theirsince fingerprint2008, all non-Americans by US border who security travel officials to the United [10]. In States order are to requested eliminate theto scan need their for fingerprintpaper passports,by US border Australia security is planningofficials [10]. to boost In order its “Seamless to eliminate Traveler” the need program. for paper The passports, proposal Australia is planning to boost its “Seamless Traveler” program. The proposal of this program is to have 90 percent of the 35 million annual travelers to enter Australia via a paperless biometric recognition system by 2020 [11]. Symmetry 2019, 11, 141 3 of 19 of this program is to have 90 percent of the 35 million annual travelers to enter Australia via a paperless biometric recognition system by 2020 [11]. (3) Consumer biometrics: Consumer devices equipped with biometric systems are standalone products for the consumer market, such as door locks, surveillance systems, automotive, and especially mobile devices (smartphones, tablets, etc.). In the past, passwords were the only secure way of authentication, and fingerprint scanners were most likely used by law enforcement agencies and the military. However, times have changed. In the last decade, biometric technology has developed in leaps and bounds and spread to every corner of our lives as a more secure method of authentication. With the popularity of smart phones, mobile phones utilizing biometrics is a winning combination in the consumer market, allowing biometric technology to become much more widely accepted [12]. (4) Financial services: Finance is the most mature biometrics market outside the domain

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    19 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us