z-logo
open-access-imgOpen Access
Review of key‐binding‐based biometric data protection schemes
Author(s) -
Sadhya Debanjan,
Singh Sanjay Kumar,
Chakraborty Bodhi
Publication year - 2016
Publication title -
iet biometrics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.434
H-Index - 28
eISSN - 2047-4946
pISSN - 2047-4938
DOI - 10.1049/iet-bmt.2015.0035
Subject(s) - biometrics , computer science , key (lock) , computer security , encryption , intuition , fuzzy logic , biometric data , data science , artificial intelligence , philosophy , epistemology
With the advent of modern technology, the use of biometric authentication systems has been on the rise. The core of any biometric system consists of a database which contains the biometric traits of the successfully enrolled users. As such, maintenance of the security of the database is paramount, i.e. it must be made sure that the contents of the database should not be compromised to foreign threats or adversaries. Biometric encryption (BE) is by far the most successfully studied and analysed technique used for providing this required level of security in biometric systems. In this survey, we discuss the intuition behind this idea and study in deep the key‐binding‐based mechanisms of BE which will provide a basic foundation for future novel researches in this area. In addition to the latest available survey, our paper investigates in details the core ideas behind the development of the fuzzy frameworks and includes the most recent works in the available literature. This study is concluded by inspecting the merging of multimodal biometrics with the fuzzy systems and discussing some open challenges in this domain.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here