Open Access
| Issue |
E3S Web Conf.
Volume 680, 2025
The 4th International Conference on Energy and Green Computing (ICEGC’2025)
|
|
|---|---|---|
| Article Number | 00011 | |
| Number of page(s) | 12 | |
| DOI | https://doi.org/10.1051/e3sconf/202568000011 | |
| Published online | 19 December 2025 | |
- BAAQEEL, Hind et OLUSANYA OLATUNJI, Sunday. Spoofing detection on adaptive authentication System‐A survey. IET Biometrics, 2022, vol. 11, no 2, p. 87-96. https://doi.org/10.1049/bme2.12060 [Google Scholar]
- Ali, S.F., Khan, M.A. & Aslam, A.S. Fingerprint matching, spoof and liveness detection: classification and literature review. Front. Comput. Sci. 15, 151310 (2021). https://doi.org/10.1007/s11704-020-9236-4 [Google Scholar]
- Z. Jia, C. Huang, Z. Wang, H. Fei, S. Wu and J. Feng, “Finger Recovery Transformer: Toward Better Incomplete Fingerprint Identification,” in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8860-8874, 2024. https://doi.org/10.1109/TIFS.2024.3419690 [Google Scholar]
- CHOCHOWSKI, Marcin. The template selection in biometric systems based on binary iris codes. Journal of Telecommunications and Information Technology, 2010, no 4, p. 86-92. https://doi.org/10.26636/jtit.2010.4.1100 [Google Scholar]
- S. Sharma and V. Balasubramanian, “A biometric based authentication and encryption Framework for Sensor Health Data in Cloud,” Proceedings of the 6th International Conference on Information Technology and Multimedia, Putrajaya, Malaysia, 2014, pp. 49-54, https://doi.org/10.1109/ICIMU.2014.7066602 [Google Scholar]
- TOOSI, Amirhosein. Feature Fusion for Fingerprint Liveness Detection. 2018. [Google Scholar]
- Baghel, V.S., Prakash, S. & Agrawal, I. An enhanced fuzzy vault to secure the fingerprint templates. Multimed Tools Appl 80, 33055–33073 (2021). https://doi.org/10.1007/s11042-021-11325-w [Google Scholar]
- Ametefe, D.S., Sarnin, S.S., Ali, D.M. et al. Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks. J. Inst. Eng. India Ser. B 105, 1451–1467 (2024). https://doi.org/10.1007/s40031-024-01066-3 [Google Scholar]
- Tarif, E.B., Wibowo, S., Wasimi, S. et al. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimed Tools Appl 77, 2485–2503 (2018). https://doi.org/10.1007/s11042-016-4280-7 [Google Scholar]
- Maltoni, D., Maio, D., Jain, A.K., Feng, J. (2022). Securing Fingerprint Systems. In: Handbook of Fingerprint Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-83624-5_9 [Google Scholar]
- Marasco, E., Albanese, M. (2021). FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers. In: Singh, S.K., Roy, P., Raman, B., Nagabhushan, P. (eds) Computer Vision and Image Processing. CVIP 2020. Communications in Computer and Information Science, vol 1376. Springer, Singapore. https://doi.org/10.1007/978-981-16-1086-8_44 [Google Scholar]
- Galbally, R. Haraksim and L. Beslay, “A Study of Age and Ageing in Fingerprint Biometrics,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1351-1365, May 2019. https://doi.org/10.1109/TIFS.2018.2878160 [Google Scholar]
- YANG, Wencheng, WANG Song, HU Jiankun, et al. Security and accuracy of fingerprint-based biometrics: A review. Symmetry, 2019, vol. 11, no 2, p. 141. https://doi.org/10.3390/sym11020141 [Google Scholar]
- K. Simoens, J. Bringer, H. Chabanne and S. Seys, “A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems,” in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 833-841, April 2012, https://doi.org/10.1109/TIFS.2012.2184092 [Google Scholar]
- N. K. Ratha, S. Chikkerur, J. H. Connell and R. M. Bolle, “Generating Cancelable Fingerprint Templates,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007, https://doi.org/10.1109/TPAMI.2007.1004 [Google Scholar]
- K. Nandakumar and A. K. Jain, “Biometric Template Protection: Bridging the performance gap between theory and practice,” in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 88-100, Sept. 2015. https://doi.org/10.1109/MSP.2015.2427849 [Google Scholar]
- Marta Gomez-Barrero, Javier Galbally, Reversing the irreversible: A survey on inverse biometrics, Computers & Security, Volume 90, 2020, 101700, ISSN 0167-4048. https://doi.org/10.1016/j.cose.2019.101700 [Google Scholar]
- DONG, Xingbo, PARK Jaewoo, JIN Zhe, et al. On the risk of cancelable biometrics. arXiv preprint arXiv:1910.07770, 2019. https://doi.org/10.48550/arXiv.1910.07770 [Google Scholar]
- Manisha, Kumar, N. Cancelable Biometrics: a comprehensive survey. Artif Intell Rev 53, 3403–3446 (2020). https://doi.org/10.1007/s10462-019-09767-8 [Google Scholar]
- V. M. Patel, N. K. Ratha and R. Chellappa, “Cancelable Biometrics: A review,” in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54-65, Sept. 2015. https://doi.org/10.1109/MSP.2015.2434151 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

