Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
A Survey Paper on Securing Fingerprint-based Authentication Systems
Author Name : Prof. Dr. Kamini Nalawade, Janhavi Sanap, Manishkumar Singh, Om Kayastha, Pranav Patil
ABSTRACT
Fingerprints are crucial to forensic analysis, law enforcement, customs access, and other aspects of public security and criminal investigation. Additionally, it can contribute to people having a more fulfilling and secure life. Many machine learning and neural network methods have been put forth for the collection, identification, categorization, and analysis of fingerprints. In this paper, we present the deep literature survey on widely used techniques in fingerprint recognition system. Some of the popular techniques of Fingerprint Authentication System.
In recent years, fingerprints have been widely and successfully used as identity proof. primarily because they have the lowest chance of invasion, are stable in life, stand out among the population, and are original. A bio-metric system called fingerprint technology is used to categorized people according to their physical characteristics. The most popular biometric method used to give authentication is fingerprint matching. The fingerprint identification system searches for unprocessed images first, does pre-processing, and then defines the features of those images as vectors and stores them as image records in fingerprint databases. In this paper we present a deep literature survey on Fingerprint based authentication system.
Keywords: The terms Antispoofing, biometrics, liveness detection, and fingerprints are all examples of biometrics. ,"authentication," "biometrics," "computer security," "dictionary attack," "fingerprint recognition," "climbing a mountain," and "mobile applications" are all used.