Biometric access control systems: A review on technologies to improve their efficiency

One of the hot topics of today's world is security. Not only companies spend more and more money in order to protect their valuable assets (physical and digital), regular people also need enhanced forms of security regarding personal sensitive information. Traditional password methods for protection of information are prone to brute force attacks, as computational power increases. The focus has then been shifting towards more advanced forms of authentication that do not rely exclusively on a sequence of symbols. The use of biometric authentication has been added as a security feature to numerous systems. Its use has increased in popularity during the last few years, benefiting from a mass implementation of biometric authentication methods in mobile devices (namely laptops and smartphones), such as fingerprint readers and/or built-in cameras. There are already a few available systems which can offer these advantages, but they are typically closed systems that do not integrate well with existing infrastructures. Therefore, this paper intends to review the use of biometric sensors on a fully open and compatible Access Control System.

[1]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[2]  Akansha Bhargava,et al.  Biometric Access Control Implementation Using 32 bit Arm Cortex Processor , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[3]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[4]  Mauro Onori,et al.  Self-organization in automation - the IDEAS pre-demonstrator , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[5]  Larry Hamid Biometric technology: not a password replacement, but a complement , 2015 .

[6]  F. Roli,et al.  Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..

[7]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[8]  Venu Govindaraju,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..

[9]  Julian Fiérrez,et al.  Author's Personal Copy Future Generation Computer Systems a High Performance Fingerprint Liveness Detection Method Based on Quality Related Features , 2022 .

[10]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[11]  Guillermo Sapiro,et al.  Intel realsense = Real low cost gaze , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[12]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[13]  Harbi AlMahafzah,et al.  A Survey of Multibiometric Systems , 2012, ArXiv.

[14]  László Monostori,et al.  Agent-based systems for manufacturing , 2006 .

[15]  Marie-Pierre Gleizes,et al.  Self-Organisation and Emergence in MAS: An Overview , 2006, Informatica.

[16]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .

[17]  Gerard Briscoe,et al.  Community Cloud Computing , 2009, CloudCom.

[18]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[19]  Luis Ribeiro,et al.  An agent based framework to support plug and produce , 2014, 2014 12th IEEE International Conference on Industrial Informatics (INDIN).

[20]  Stephanie Schuckers,et al.  Integrating a wavelet based perspiration liveness check with fingerprint recognition , 2009, Pattern Recognit..

[21]  Steven Furnell,et al.  Biometrics – The promise versus the practice , 2005 .

[22]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Teodor-Florin Fortis,et al.  Towards a Scalable Multi-agent Architecture for Managing IoT Data , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[24]  Suneeta Agarwal,et al.  Ridgelet-based fake fingerprint detection , 2009, Neurocomputing.