Fingerprint Acquisition Methodologies and Its Upgradation with IoT

Fingerprint reader is an emerging technology, increasing at a tremendous rate due to its function that allows the fast identification and secure verification capabilities. This technology enables to recognize individual users without need of any password and the card swipes and works in a different ways rather than the swipe cards and other identification technologies. By using this technology, we can recognize and authenticate individuals based on the who they are, instead of the what they know, like their password and pins and what they possess, like keys and swipe cards. Fingerprint technology having important role with security application and e-commerce due to their ability of identifying and providing access to user through finger. This technology can be implemented in the various areas like Voters Identification, Passport verification, Population Census, Driver’s license, and Professional ID and there data can be placed on cloud by using Internet of Things (IoT). If cloud-based technology incorporated with fingerprint identification and is properly used, then it has potential to create a highly secured verification environment. In this research, we have done extensive literature survey for future research areas in this field.

[1]  Alvin F. Martin,et al.  NIST speaker recognition evaluation chronicles , 2004, Odyssey.

[2]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[3]  Luca Francioso,et al.  Flexible thermoelectric generator for ambient assisted living wearable biometric sensors , 2011 .

[4]  Hugo Silva,et al.  Study and evaluation of a single differential sensor design based on electro-textile electrodes for ECG biometrics applications , 2011, 2011 IEEE SENSORS Proceedings.

[5]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[6]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[7]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[8]  Shih-Lun Chen,et al.  Wireless Body Sensor Network With Adaptive Low-Power Design for Biometrics and Healthcare Applications , 2009, IEEE Systems Journal.

[9]  Salil S. Kanhere,et al.  A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..

[10]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  V. Piuri,et al.  Fingerprint Biometrics via Low-cost Sensors and Webcams , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[12]  Seiji Yoshimoto,et al.  Fingerprint identification for security applications , 2003 .

[13]  Masanori Mizoguchi,et al.  Fingerprint card classification with statistical feature integration , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[14]  Subhas Chandra Mukhopadhyay,et al.  Towards the Implementation of IoT for Environmental Condition Monitoring in Homes , 2013, IEEE Sensors Journal.

[15]  Gaetano Marrocco,et al.  RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.

[16]  Julian Fiérrez,et al.  Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[17]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[18]  Yukio Hoshino,et al.  The intelligent Fingerprint authentication system SecureFinger : Special issue on recent recognition technologies , 2002 .

[19]  Fei Tao,et al.  IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[20]  Pieter H. Hartel,et al.  The state of the art in abuse of biometrics , 2005 .

[21]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.