Fingerprint Acquisition Methodologies and Its Upgradation with IoT

  • Rohit Samkaria
  • Rajesh Singh
  • Anita Gehlot
  • Rohit Sanket
  • Ateev Aggarwal
  • M. S. Yadav
  • Ashok Kumar
  • Rupendra Pachauri
  • Sushabhan Choudhury
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)

Abstract

Fingerprint reader is an emerging technology, increasing at a tremendous rate due to its function that allows the fast identification and secure verification capabilities. This technology enables to recognize individual users without need of any password and the card swipes and works in a different ways rather than the swipe cards and other identification technologies. By using this technology, we can recognize and authenticate individuals based on the who they are, instead of the what they know, like their password and pins and what they possess, like keys and swipe cards. Fingerprint technology having important role with security application and e-commerce due to their ability of identifying and providing access to user through finger. This technology can be implemented in the various areas like Voters Identification, Passport verification, Population Census, Driver’s license, and Professional ID and there data can be placed on cloud by using Internet of Things (IoT). If cloud-based technology incorporated with fingerprint identification and is properly used, then it has potential to create a highly secured verification environment. In this research, we have done extensive literature survey for future research areas in this field.

Keywords

Fingerprint recognition IoT Quick response 

References

  1. 1.
    Jain, Anil K, Arun Ross, and Salil Prabhakar. “An introduction to biometric recognition.” IEEE Transactions on circuits and systems for video technology14.1 (2004): 4–20.Google Scholar
  2. 2.
    Poon, Carmen CY, Yuan-Ting Zhang, and Shu-Di Bao. “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health.” IEEE Communications Magazine 44.4 (2006): 73–81.Google Scholar
  3. 3.
    A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006.Google Scholar
  4. 4.
    C. Roberts, “Biometric attack vectors and defences,” Computers and Security, vol. 26, no. 1, pp. 14–25, 2007.Google Scholar
  5. 5.
    M1.4 Ad Hoc Group on Biometric in E-Authentication, “Study report on biometrics in E-authentication,” Tech. Rep. INCITS M1/07-0185rev, International Committee for Information Technology Standards (INCITS), Washington, DC, USA, August 2007.Google Scholar
  6. 6.
    Tao, Fei, et al. “IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing.” IEEE Transactions on Industrial Informatics 10.2 (2014): 1547–1557.Google Scholar
  7. 7.
    I. Buhan and P. Hartel, “The state of the art in abuse of biometrics,” Tech. Rep. TR-CTIT-05-41, Centre for Telematics and Information Technology, University of Twente, Twente, The Netherlands, December 2005.Google Scholar
  8. 8.
    Tao, Fei, et al. “IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing.” IEEE Transactions on Industrial Informatics 10.2 (2014): 1547–1557.Google Scholar
  9. 9.
    K. Ishikawa, Guide to Quality Control, Nordica International, Tokyo, Japan.Google Scholar
  10. 10.
    A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics, Springer, Berlin, Germany, 2006.Google Scholar
  11. 11.
    Francioso, L., et al. “Flexible thermoelectric generator for ambient assisted living wearable biometric sensors.” Journal of Power Sources 196.6 (2011): 3239–3243.Google Scholar
  12. 12.
    Jain, Anil K., Karthik, Nandakumar., and Abhishek, Nagar. “Biometric template security.” EURASIP Journal on Advances in Signal Processing 2008 (2008): 113.Google Scholar
  13. 13.
    Chen, Shih-Lun, et al. “Wireless body sensor network with adaptive low-power design for biometrics and healthcare applications.” IEEE Systems Journal 3.4 (2009): 398–409.Google Scholar
  14. 14.
    Roberts, Chris. “Biometric attack vectors and defences.” Computers & Security 26.1 (2007): 14–25.Google Scholar
  15. 15.
    Alonso-Fernandez, Fernando, et al. “Quality-based conditional processing in multi-biometrics: application to sensor interoperability.” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 40.6 (2010): 1168–1179.Google Scholar
  16. 16.
    Silva, Hugo, et al. “Study and evaluation of a single differential sensor design based on electro-textile electrodes for ECG biometrics applications. “Sensors, 2011 IEEE. IEEE, 2011.Google Scholar
  17. 17.
    Christin, Delphine, et al. “A survey on privacy in mobile participatory sensing applications.” Journal of Systems and Software 84.11 (2011): 1928–1946.Google Scholar
  18. 18.
    Piuri, Vincenzo, and Fabio Scotti. “Fingerprint biometrics via low-cost sensors and webcams.” Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on. IEEE, 2008.Google Scholar
  19. 19.
    Text of Final Committee Draft 19795-1, Biometric Performance Testing and Reporting—Part 1: Principles and Framework, ISO/IEC JTC1/SC37 N908, 2005.Google Scholar
  20. 20.
    K. Asai, Y. Hoshino and K. Kiji, “Automatic fingerprint identification by minutia-network feature – Matching process,” Transactions of IEICE D-II, J72-D-II, 5, pp. 733–740, May 1989 (in Japanese).Google Scholar
  21. 21.
    K. Uchida, et al, “Fingerprint card classification with statistical feature integration,” Proceedings of the 14th International Conference on Pattern Recognition, Brisbane, Australia, pp. 1833–1839, Aug. 1998.Google Scholar
  22. 22.
    Text of Final Committee Draft 19795-1, Biometric Performance Testing and Reporting—Part 1: Principles and Framework, ISO/IEC JTC1/SC37 N908, 2005.Google Scholar
  23. 23.
    A. Monden, L. Huang and S. Yoshimoto, “A Performance Evaluation Assuring the Security Strength of Individual Fingerprints,” Proc. of the 2005 Symposium on Cryptography and Information Security, pp. 541–546, 2005 (in Japanese).Google Scholar
  24. 24.
    A. Monden and S. Yoshimoto, “Fingerprint Identification for Security Applications,” NEC Res. & Develop., 44, 4, pp. 328–332, Oct. 2003.Google Scholar
  25. 25.
    L. Huang, A. Monden and S. Yoshimoto, “Fingerprint Identification Based on False Acceptance Probability,” Proc. of the 2004 Symposium on Cryptography and Information Security, pp. 579–584, 2004 (in Japanese).Google Scholar
  26. 26.
    Amendola, Sara, et al. “RFID technology for IoT-based personal healthcare in smart spaces.” IEEE Internet of Things Journal 1.2 (2014): 144–152.Google Scholar
  27. 27.
    S. Hiratsuka and Y. Hoshino, “The Intelligent Fingerprint Authentication System ‘Secure Finger’,” NEC Res. & Develop., 43, 1, pp. 11–14, Jan. 2002.Google Scholar
  28. 28.
    Biometric System Laboratory - University of Bologna, “FVC 2006: the 4th international fingerprint verification competition,” 2006, http://bias.csr.unibo.it/fvc2006/default.asp.
  29. 29.
    C. Wilson, A. R. Hicklin, M. Bone, et al., “Fingerprint vendor technology evaluation 2003: summary of results and analysis report,” Tech. Rep. NISTIR 7123, National Institute of Standards and Technology, Gaithersburg, Md, USA, June 2004.Google Scholar
  30. 30.
    P. J. Phillips, W. T. Scruggs, A. J. O Toole, et al., “FRVT 2006 ´ and ICE 2006 large-scale results,” Tech. Rep. NISTIR 7408, National Institute of Standards and Technology, 2007.Google Scholar
  31. 31.
    M. Przybocki and A. Martin, “NIST speaker recognition evaluation chronicles,” in Proceedings of Odyssey: The Speaker and Language Recognition Workshop, pp. 12–22, Toledo, Spain, May 2004.Google Scholar
  32. 32.
    T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial “gummy” fingers on fingerprint systems,” in Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 of Proceedings of SPIE, pp. 275–289, San Jose, Calif, USA, January 2002.Google Scholar
  33. 33.
    T. Matsumoto, M. Hirabayashi, and K. Sato, “A vulnerability evaluation of iris matching (part 3),” in Proceedings of the Symposium on Cryptography and Information Security (SCIS’04), pp. 701–706, Iwate, Japan, January 2004.Google Scholar
  34. 34.
    Kelly, Sean Dieter Tebje, Nagender Kumar Suryadevara, and Subhas Chandra Mukhopadhyay. “Towards the implementation of IoT for environmental condition monitoring in homes.” IEEE Sensors Journal 13.10 (2013): 3846–3853.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Rohit Samkaria
    • 1
  • Rajesh Singh
    • 1
  • Anita Gehlot
    • 1
  • Rohit Sanket
    • 1
  • Ateev Aggarwal
    • 1
  • M. S. Yadav
    • 1
  • Ashok Kumar
    • 1
  • Rupendra Pachauri
    • 1
  • Sushabhan Choudhury
    • 1
  1. 1.Electronics Instrumentation and Control Engineering Department, College of Engineering StudiesUniversity of Petroleum and Energy StudiesDehradunIndia

Personalised recommendations