Skip to Main Content
The emerging need of the electronic cum computerized world is the security of the sensitive and personal data. The security of modern information systems is composed of three primary components - authentication, authorization, and accountability. The need for discriminating information security has expanded the research focus from securing the network to authenticating individual users. In real applications, privacy is a major concern in using biometric authentication systems. Biometrics is a stirring, rapidly developing and yet emerging field of technology, with immense potential, which helps to make our lives easier and safer. Biometrics is widely used in many areas such as security monitoring, database access, border control and immigration, and for verification, identification or recognition. The aim of this paper is to review attacks on biometric data, cancelable biometric generation and protection schemes. We made an attempt to survey the existing biometric template generation and protection schemes such as Bio-hashing (Salting), Non-invertible Transformations, Key-binding Biometric systems, Key-generating Biometric Systems and Hybrid approaches. In our review, we observed the suitable and robust scheme.
Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Volume:5 )
Date of Conference: 8-10 April 2011