Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures

A review is conducted to deeply analyse and map the research landscape of current technologies in finger vein (FV) biometric authentication in medical systems into a coherent taxonomy. This research focuses on articles related to the keywords ‘biometrics’, ‘finger veins’ and ‘verification’ and their variations in three major databases, namely, Web of Science, ScienceDirect and IEEE Xplore. The final set of collected articles related to FV biometric authentication systems is divided into software- and hardware-based systems. In the first category, software development attempts are described. The experiment results, frameworks, algorithms and methods that perform satisfactorily are presented. Moreover, the experiences obtained from conducting these studies are discussed. In the second category, hardware development attempts are described. The final articles are discussed from three aspects, namely, (1) number of publications, (2) problem type, proposed solutions, best results and evaluation methods in the included studies and (3) available databases containing different scientific work collected from volunteers, such as staff and students. The basic characteristics of this emerging field are identified from the following aspects: motivations of using FV biometric technology in authentication systems, open challenges that impede the technology’s utility, authors’ recommendations and future research prospects. A new solution is proposed to address several issues, such as leakage of biometrics that leads to serious risks due to the use of stolen FV templates and various spoofing and brute-force attacks in decentralised network architectures in medical systems, including access points and various database nodes without a central point. This work contributes to literature by providing a detailed review of feasible alternatives and research gaps, thereby enabling researchers and developers to develop FV biometric authentication medical systems further. Insights into the importance of such a technology and its integration into different medical applications and fields are also provided.

[1]  B. B. Zaidan,et al.  Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.

[2]  A. A. Zaidan,et al.  New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .

[3]  Mounim A. El-Yacoubi,et al.  Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification , 2017, IEEE Transactions on Information Forensics and Security.

[4]  A. A. Zaidan,et al.  Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .

[5]  B. B. Zaidan,et al.  An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.

[6]  Gongping Yang,et al.  Finger Vein Verification with Vein Textons , 2015, Int. J. Pattern Recognit. Artif. Intell..

[7]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[8]  B. B. Zaidan,et al.  Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure , 2019, Journal of Medical Systems.

[9]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[10]  Marzuki Khalid,et al.  Multimodal face and finger veins biometric authentication , 2010 .

[11]  A. A. Zaidan,et al.  Comprehensive Insights Into the Criteria of Student Performance in Various Educational Domains , 2018, IEEE Access.

[12]  B. B. Zaidan,et al.  Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.

[13]  B. B. Zaidan,et al.  Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.

[14]  Zarinah Mohd Kasirun,et al.  Hiding Data in Video File: An Overview , 2010 .

[15]  B. Zaidan,et al.  New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .

[16]  Zhi Liu,et al.  Finger vein verification system based on sparse representation. , 2012, Applied optics.

[17]  Fazida Othman,et al.  An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.

[18]  A. A. Zaidan,et al.  Review of mobile short message service security issues and techniques towards the solution , 2011 .

[19]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[20]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .

[21]  Nor Badrul Anuar,et al.  The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..

[22]  B. B. Zaidan,et al.  Intrusion Detection System: Overview , 2010, ArXiv.

[23]  Dzati Athiar Ramli,et al.  Sharpness Enhancement of Finger-Vein Image Based on Modified Un-sharp Mask with Log-Gabor Filter , 2018, KES.

[24]  Mehdi Nasri,et al.  A multibiometric finger vein verification system based on score level fusion strategy , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).

[25]  A. A. Zaidan,et al.  High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .

[26]  A. A. Zaidan,et al.  A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..

[27]  Fathi E. Abd El-Samie,et al.  Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering , 2016, Wireless Personal Communications.

[28]  M. Khalil-Hani,et al.  FPGA embedded hardware system for finger vein biometric recognition , 2013, IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society.

[29]  Laiha Binti Mat Kiah,et al.  High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.

[30]  Miss Laiha Mat Kiah Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .

[31]  A. A. Zaidan,et al.  Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .

[32]  Jian-Da Wu,et al.  Driver identification using finger-vein patterns with Radon transform and neural network , 2009, Expert Syst. Appl..

[33]  A. A. Zaidan,et al.  Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .

[34]  Gongping Yang,et al.  A Systematic Review of Finger Vein Recognition Techniques , 2018, Inf..

[35]  M. Khalil-Hani,et al.  FPGA-based embedded system implementation of finger vein biometrics , 2010, 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA).

[36]  Ahmed A. Abd El-Latif,et al.  Multimodal biometric authentication based on score level fusion of finger biometrics , 2014 .

[37]  T. Madhloom,et al.  Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .

[38]  B. B. Zaidan,et al.  A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.

[39]  Othman Omran Khalifa,et al.  A review on multimedia communications cryptography , 2011 .

[40]  Naixue Xiong,et al.  Exploring finger vein based personal authentication for secure IoT , 2017, Future Gener. Comput. Syst..

[41]  Hongbing Li,et al.  Finger-vein verification based on the curvature in Radon space , 2017, Expert Syst. Appl..

[42]  Wira Hidayat Mohd Saad,et al.  A Review of Finger-Vein Biometrics Identification Approaches , 2016 .

[43]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[44]  Ahmed Wathik Naji,et al.  Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .

[45]  Jiankun Hu,et al.  A fingerprint and finger-vein based cancelable multi-biometric system , 2018, Pattern Recognit..

[46]  Shuxu Guo,et al.  Segmentation for finger vein image based on PDEs denoising , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.

[47]  N. Sugandhi,et al.  Real time authentication system using advanced finger vein recognition technique , 2014, 2014 International Conference on Communication and Signal Processing.

[48]  B. B. Zaidan,et al.  Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.

[49]  Yilong Yin,et al.  Finger vein recognition with manifold learning , 2010, J. Netw. Comput. Appl..

[50]  Wei Jia,et al.  Finger Vein Presentation Attack Detection Using Total Variation Decomposition , 2018, IEEE Transactions on Information Forensics and Security.

[51]  B. B. Zaidan,et al.  A security framework for mHealth apps on Android platform , 2018, Comput. Secur..

[52]  B. B. Zaidan,et al.  Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[53]  A. A. Zaidan,et al.  A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .

[54]  B. B. Zaidan,et al.  Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review , 2019, Journal of Medical Systems.

[55]  A. A. Zaidan,et al.  A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.

[56]  Miss Laiha Mat Kiah,et al.  Comprehensive review and analysis of anti-malware apps for smartphones , 2019, Telecommunication Systems.

[57]  B. B. Zaidan,et al.  Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.

[58]  D. Saraswady,et al.  Biometric Authentication Using Fused Multimodal Biometric , 2016 .

[59]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[60]  Hiroyuki Suzuki,et al.  Secure biometric image sensor and authentication scheme based on compressed sensing. , 2013, Applied optics.

[61]  Mrunali Jadhav,et al.  Implementation of an embedded hardware of FVRS on FPGA , 2015, 2015 International Conference on Information Processing (ICIP).

[62]  Ahmed Wathik Naji,et al.  Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .

[63]  Christoph Busch,et al.  Feature extraction from vein images using spatial information and chain codes , 2012, Inf. Secur. Tech. Rep..

[64]  Kenta Takahashi,et al.  Optimal sequential fusion for multibiometric cryptosystems , 2016, Inf. Fusion.

[65]  A. A. Zaidan,et al.  StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .

[66]  Devarasan Ezhilmaran,et al.  A smart computing algorithm for finger vein matching with affine invariant features using fuzzy image retrieval , 2018 .

[67]  刘通,et al.  Finger-vein Pattern Restoration with Direction-Variance-Boundary Constraint Search , 2015 .

[68]  B. B. Zaidan,et al.  Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.

[69]  A. A. Zaidan,et al.  A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .

[70]  B. B. Zaidan,et al.  Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review , 2019, Journal of Medical Systems.

[71]  Gongping Yang,et al.  Singular value decomposition based minutiae matching method for finger vein recognition , 2014, Neurocomputing.

[72]  Wenxin Li,et al.  Finger vein verification using Occurrence Probability Matrix (OPM) , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[73]  N. Radha,et al.  Multimodal biometric template authentication of finger vein and signature using visual cryptography , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[74]  Yihua Shi,et al.  Accurate ROI localization and hierarchical hyper-sphere model for finger-vein recognition , 2019, Neurocomputing.

[75]  Shahrel Azmin Suandi,et al.  Finger Vein Recognition Using Local Line Binary Pattern , 2011, Sensors.

[76]  Gongping Yang,et al.  Finger vein verification based on a personalized best patches map , 2014, IEEE International Joint Conference on Biometrics.

[77]  A. A. Zaidan,et al.  Mobile Patient Monitoring Systems from a Benchmarking Aspect: Challenges, Open Issues and Recommended Solutions , 2019, Journal of Medical Systems.

[78]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[79]  A. A. Zaidan,et al.  Security improvement of credit card online purchasing system , 2011 .

[80]  B. B. Zaidan,et al.  Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard , 2019, Journal of Medical Systems.

[81]  Bo-Chao Cheng,et al.  Special point representations for reducing data space requirements of finger-vein recognition applications , 2016, Multimedia Tools and Applications.

[82]  M. Z. Ibrahim,et al.  A Review of Finger Vein Recognition System , 2018 .

[83]  Kiran B. Raja,et al.  Novel finger vascular pattern imaging device for robust biometric verification , 2014, 2014 IEEE International Conference on Imaging Systems and Techniques (IST) Proceedings.

[84]  Jian Shen,et al.  Finger vein secure biometric template generation based on deep learning , 2018, Soft Comput..

[85]  B. B. Zaidan,et al.  Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[86]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[87]  A. A. Zaidan,et al.  New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .

[88]  Omar Zakaria,et al.  An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .

[89]  Riza Sulaiman,et al.  Vein matching using artificial neural network in vein authentication systems , 2011, International Conference on Graphic and Image Processing.

[90]  B. B. Zaidan,et al.  Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication , 2019, Comput. Stand. Interfaces.

[91]  B. B. Zaidan,et al.  Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.

[92]  Fei Zhou,et al.  Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion , 2014, Inf. Sci..

[93]  B. B. Zaidan,et al.  New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.

[94]  Bilal Bahaa Zaidan,et al.  Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .

[95]  B. B. Zaidan,et al.  Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[96]  Hamid A. Jalab,et al.  A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[97]  Hamid A. Jalab,et al.  Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .

[98]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[99]  A. A. Zaidan,et al.  Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .

[100]  Kiran B. Raja,et al.  A low-cost multimodal biometric sensor to capture finger vein and fingerprint , 2014, IEEE International Joint Conference on Biometrics.

[101]  Hee Chan Kim,et al.  A finger-vein verification system using mean curvature , 2011, Pattern Recognit. Lett..

[102]  A. A. Zaidan,et al.  Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .

[103]  Andrew Beng Jin Teoh,et al.  Multi-instance finger vein recognition using minutiae matching , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[104]  Yi Zhang,et al.  DeepVein: Novel finger vein verification methods based on Deep Convolutional Neural Networks , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[105]  Shahrel Azmin Suandi,et al.  Fusion of Band Limited Phase Only Correlation and Width Centroid Contour Distance for finger based biometrics , 2014, Expert Syst. Appl..

[106]  Gongping Yang,et al.  Finger Vein Recognition With Anatomy Structure Analysis , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[107]  Mounim A. El-Yacoubi,et al.  Finger-Vein Quality Assessment by Representation Learning from Binary Images , 2015, ICONIP.

[108]  B. B. Zaidan,et al.  Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis , 2018, Health and Technology.

[109]  B. B. Zaidan,et al.  Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.

[110]  B. B. Zaidan,et al.  A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.

[111]  Jian-Da Wu,et al.  Finger-vein pattern identification using SVM and neural network technique , 2011, Expert Syst. Appl..

[112]  Kang Ryoung Park,et al.  Multimodal Biometric Recognition Based on Convolutional Neural Network by the Fusion of Finger-Vein and Finger Shape Using Near-Infrared (NIR) Camera Sensor , 2018, Sensors.

[113]  Ahmed A. Abd El-Latif,et al.  Finger-vein Verification Using Gabor Filter and SIFT Feature Matching , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[114]  B. B. Zaidan,et al.  Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions , 2019, Comput. Stand. Interfaces.

[115]  Liu Di,et al.  Two modality-based bi-finger vein verification system , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.

[116]  Omar Zakaria,et al.  Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.

[117]  Puneet Gupta,et al.  An accurate finger vein based verification system , 2015, Digit. Signal Process..

[118]  Mohamed Khalil,et al.  Personal verification using finger vein biometrics in FPGA-based-system-on-chip , 2011 .

[119]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.

[120]  Jian-Da Wu,et al.  Finger-vein pattern identification using principal component analysis and the neural network technique , 2011, Expert Syst. Appl..

[121]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[122]  Amitabh Wahi,et al.  Finger vein extraction and authentication based on gradient feature selection algorithm , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[123]  A. A. Zaidan,et al.  Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .

[124]  Jinfeng Yang,et al.  Finger-vein image matching based on adaptive curve transformation , 2017, Pattern Recognit..

[125]  Wenxin Li,et al.  A Person Retrieval Solution Using Finger Vein Patterns , 2010, 2010 20th International Conference on Pattern Recognition.

[126]  B. B. Zaidan,et al.  New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files , 2010, ArXiv.

[127]  Md Rafiqul Islam,et al.  "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[128]  B. B. Zaidan,et al.  Secure Topology for Electronic Medical Record Transmissions , 2010 .

[129]  B. B. Zaidan,et al.  Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.

[130]  Yilong Yin,et al.  Learning discriminative binary codes for finger vein recognition , 2017, Pattern Recognit..

[131]  A. A. Zaidan,et al.  "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[132]  B. B. Zaidan,et al.  Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..

[133]  B. B. Zaidan,et al.  Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.

[134]  B. B. Zaidan,et al.  Multi-Criteria Evaluation and Benchmarking for Active Queue Management Methods: Open Issues, Challenges and Recommended Pathway Solutions , 2019, Int. J. Inf. Technol. Decis. Mak..

[135]  Thian Song Ong,et al.  Finger Vein verification using local histogram of hybrid texture descriptors , 2015, 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA).

[136]  Ting Wu,et al.  Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..

[137]  Othman Omran Khalifa,et al.  Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .

[138]  Ya-Wen Chang,et al.  Development of neural network techniques for finger-vein pattern classification , 2010, International Conference on Digital Image Processing.

[139]  A. A. Zaidan,et al.  New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .

[140]  Mahmood Fathy,et al.  A novel approach for Finger Vein verification based on self-taught learning , 2015, 2015 9th Iranian Conference on Machine Vision and Image Processing (MVIP).

[141]  Jing Xiao,et al.  Discriminative and generative vocabulary tree: With application to vein image authentication and recognition , 2015, Image Vis. Comput..

[142]  Bilal Zaidan,et al.  Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.

[143]  Miss Laiha Mat Kiah,et al.  Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .

[144]  Ahmed A. Abd El-Latif,et al.  Finger multibiometric cryptosystems: fusion strategy and template security , 2014, J. Electronic Imaging.

[145]  Zarinah Mohd Kasirun,et al.  On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .

[146]  A. A. Zaidan,et al.  High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.

[147]  Jinfeng Yang,et al.  Personal identification based on finger-vein features , 2011, Comput. Hum. Behav..

[148]  Alejandro García-González,et al.  Embedded biometric cryptosystem based on finger vein patterns , 2015, 2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[149]  A. A. Zaidan,et al.  Medical emergency triage and patient prioritisation in a telemedicine environment: a systematic review , 2019, Health and Technology.

[150]  Fazidah Othman,et al.  Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .