Introduction
Biometric authentication is used more than ever for authentication of individuals in a wide range of security applications. The reliance of systems on physiological attributes of the users has lately offered more simplicity and reliability at the same time. This has helped in avoiding many problems associated with the systems where passwords/credentials are being used, which can potentially incur some problems such as forgotten passwords, transferred or stolen credentials. The use of biometrics has led to mitigate these problems significantly given that the individual with specific biometric traits is required to validate access to the systems to avoid the above mentioned problems. Moreover, most of the existing systems are typically connected to networks, at the very least, a local area network connecting a local network with a couple of systems and more often, a wide area network eventually connecting to the World Wide Web. Given this, a protection mechanism is required to be in place to ensure that an unauthorized access to the system is prevented and the templates are properly protected.
There is a wide use of authentication systems in Internet services and mobile devices for the protection of the user content. Various tools and techniques for the management of information security have been developed. However, systems based on biometrics have made significant progress to support some aspects of information security over the period of time. An in-depth and comprehensive study on biometric authentication has been conducted in recent years by various researchers (Jain, Ross & Prabhakar, 2004; Jain, Nandakumar & Ross, 2016). With the passage of time, biometric authentication of the users is gaining more and more popularity since the systems based on biometrics are not easily compromised. This is because, the systems can be breached only if the individuals who are trying to access the systems are in possession of those physiological parameters, which are possessed by the actual users. This has led to the addition of security for the protection of the systems, and reduced their vulnerability.
It goes without saying that the field of biometrics is very rich and up to the minute. There are a number of surveys that exist on biometric systems. However, some surveys focus mainly on a particular modality or environment; some of the recent contributions include Connor & Ross (2018), in which the authors focused on a biometric recognition system based on gait. They have reviewed several gait recognition modalities and their features. Kumari & Seeja (2019) provides an in depth survey about periocular biometrics, using various existing feature extraction methods and matching schemes. The paper also emphasizes the importance of periocular biometrics in a wide range of applications. Dargan & Kumar (2020) have done a very comprehensive and in depth survey on various unimodal and multimodal biometric recognition systems discussing feature extraction methods, various classifiers and datasets. Their main aim is to make the researcher aware of multiple dimensions to look for in a biometric system in order to enhance its security. Sundararajan & Woodard (2018) have performed a survey on the use of deep learning in the domain of biometric authentication using various modalities. However, their conclusion is that most of the deep learning approaches have been explored mainly on face biometrics and speaker recognition. Dinca & Hancke (2017) emphasized the importance of multibiometric systems in their work for meeting the emerging security demand in the field of authentication. Their work is mainly focused on covering two important aspects in biometric systems: fusion methods and security. A thorough review of secure and privacy preserving authentication is presented in Rui & Yan (2018). The authors have mainly tackled the problem of liveness detection and privacy protection in biometric systems. Given an ever increasing work done in the area of wearable technology and IoTs, the wearable biometrics is another upcoming area that requires a significant attention of the researchers. In this context, Sundararajan, Sarwat & Pons (2019) have performed an interesting review in which the authors compare the key characteristics of different modalities, and highlight critical attacks being carried out in traditional and wearable biometric systems. However, the scope of the manuscript is quite broad with a review covering most of the biometric modalities including behavioral and physiological traits. Moreover, there is a lack of presentation of the quantitative analysis in several manuscripts creating a gap for a more focused and thorough review on hand based multibiometric systems.
Rationale for the survey
There is a wide range of biometric traits that can be used for authentication purposes including face, hands, iris, retina, etc. All these traits offer their own advantages and drawbacks and most of them are thoroughly covered in the literature. In this paper, we aim to focus on the existing hand based multibiometric systems explored over the past five years. The use of hand modalities offers several advantages over others: they are highly accurate for recognition, generally make use of inexpensive technology, are fast for matching and require templates of very small sizes, resulting in a small memory footprint and are less sensitive to imaging conditions. Moreover, the hand-based modalities are more robust since they are not affected by emotions and other behavioral characteristics of the individuals such as tiredness, stress, etc. Given this, it is clear that with respect to some specific aspects, the use of hand based modalities is superior as compared to others for biometric authentication.
There is a large volume of literature discussing about the use of hand based modalities for authentication but the work becomes limited as it is directed towards multimodal systems. This domain was constrained until recently due to the issues related to the power consumption, size, and cost, etc., of the hardware required for executing the biometric systems. However, over the recent years, the revolution in the hardware design industry has led to miniaturized devices having tremendous capabilities, enabling the developers to execute multiple systems on very light, low-powered, and small devices with significantly lesser cost. Consequently, it has been possible to implement multibiometric systems very efficiently, triggering a lot of research in this direction. Moreover, to the best of our knowledge, a thorough survey of hand based multibiometric systems, their effective usage in biometric authentication and the main challenges faced, is currently not available in the literature.
With regard to the security of the biometric system, being multibiometric in nature adds itself another layer of security even though there are multiple points of attack on an authentication system. We aim to tackle the literature available regarding security of multibiometric templates. The rationale for focusing on security of multibiometric template is that they lead to a 3-dimensional vulnerability to a biometric system in contrast to their counterparts (Jain, Nandakumar & Nagar, 2008): 1. Template can be replaced by an imposter to gain unauthorized access, 2. A spoof can be created from the template to aide in unauthorized access, and 3. The stolen template can be replayed to the matcher to gain access. Therefore, it is vital to protect the templates from an adversary; unlike PINs and passwords, a biometric template if compromised cannot be revoked and reissued, so considering the criticality in this context, we aim to deal with the research contributions that are devised to protect the integrity of the saved templates.
This paper presents a systematic review on the use of hand based multibiometric systems and an analysis of their efficacy in performing authentication. In this context, the main contributions are as follows:
In summary, this paper covers two major directions of work on hand based multibiometric systems: 1. The work on various schemes to perform feature extraction and authentication of individuals using multibiometric systems based on hand modalities. The main objective of such studies is to ensure that the performance metrics of the systems are very good and they can be effectively used, and 2. Once the templates have been acquired from the users (the users are enrolled), how these templates can be effectively archived such that they are not susceptible to attacks.
Paper organization
The rest of the paper is organized as follows: In “Survey Methodology”, we present the methodology followed in this survey. We discuss an overview of a biometric system, multibiometric system and its types in “Overview of a Biometric System”, followed by the discussion on fusion methods used in a multibiometric system in “Fusion Methods”. Later, we talk about different hand-based modalities that are used for biometric authentication in “Hand Based Modalities”. Then, we discuss the feature extraction methods in existing hand multibiometric systems in “Feature Extraction Techniques for Hand Multibiometric Systems” and methods used to perform multibiometric template security in “Multibiometric Template Security”. Finally, we discuss about various open issues and challenges in the topics covered in “Open Challenges and Future Directions” and conclude the paper in “Conclusions”.
Survey methodology
With an ever growing demand of designing authentication systems and the linkages of such systems with critical databases owned by the governments, corporates and various entities, there is an increasing demand on making these systems scalable, user interactive, safe, and secure. In this context, the biometric technology has significantly grown over the last decade. Subsequently, several works have been conducted listing the major contributions and breakthroughs in the area. However, to the best of our knowledge, there is a shortage of detailed surveys on the use of hand-based modalities for multibiometric systems and an analysis of security aspects with respect to template protection. The recent contribution on this topic was done by Bahmed & Mammar (2019). However, the survey is limited and lacks a thorough analysis and discussion on future directions and does not cover the security aspect of the biometric systems. Moreover, there is a need to define a clear taxonomy that helps in defining the future research directions in the subject area.
In this survey, the approach followed to collect the manuscripts is shown in Fig. 1. The scholarly databases used for searching articles were IEEE explore, ACM Digital Library, Springer, Science Direct and Google Scholar. Most of the identified research papers are published in reputed forums. We have mainly focused on papers published from 2010 till date (May 2021). The search terms used for collecting the manuscripts were: “Multibiometric systems” with permutations of different hand modalities. According to the search terms, more than 600 papers were initially identified which were screened to fit the scope of the topic based on their title, abstracts, body, and conclusions. For our work on authentication using hand based multibiometric systems, we have identified 35 manuscripts, whereas for multibiometric template protection, we have picked out 22 manuscripts. We have followed a semi-systematic methodology for this survey (Snyder, 2019), narrowing down the literature in multiple phases. Breadth search is first adopted in which the literature on all hand multibiometric systems is analyzed. It was concluded that the optimization parameters on multibiometric systems revolved around two important performance primitives: authentication and security. These are complementary parameters as optimizing security may compromise on the authentication results obtained for the systems, although, a vice versa may not be necessarily true. Therefore, this led us to the Phase II of our research in which we conduct a depth search to shortlist the literature based on the design of authentication of multibiometric systems and template security. Phase II is formalized as a taxonomy in Phase III, which structures the literature for a better understanding and comprehension of the underlying problem. The inference drawn from an evaluation of the literature has led to a discussion about some challenges leading to subsequent future directions of work in this domain (Phase IV).
Overview of a biometric system
In a biometric system, an identifier is linked to its intrinsic human characteristics. These characteristics are physiological and behavioral in nature, which can be used to identify a person digitally (Meng et al., 2014; Rui & Yan, 2018). Biometric security helps in authentication, which takes place by identifying human characteristics. The specific human characteristics mentioned above are defined as follows:
There are four important modules in a traditional biometric system (Fig. 2). The sensor module is responsible to acquire data from the users, whereas the feature extraction module processes the sensor data to find a description that is feasible for matching of templates that are residing in the database. The feature extraction module is followed by the matching module that generates the matching scores, which are finally used to perform the decision making regarding the grant of permissions to a specific user in the decision module.
Figure 2: Logical blocks of a generic biometric authentication system. DOI: 10.7717/peerj-cs.707/fig-2
The several factors that are considered significant while performing the selection of a specific biometric identifier include permanence, universality, measurability, circumvention, performance, etc (Bhattacharyya et al., 2009). Another important factor is the suitability of the application. Nevertheless, the choice of a single biometric identifier which meets all the requirements of every possible application is not possible since there are tradeoffs between different performance metrics. Keeping this in view, there is a possibility to optimize a number of measures by using a combination of various biometric identifiers. Therefore, we can logically characterise a biometric system into two distinct categories: (1) Unibiometric systems, and (2) Multibiometric systems.
Unibiometric systems
Traditionally, biometric recognition systems are unibiometric, which employ a single biometric trait for authentication purposes. It may use one of the physical or behavioral biometric traits, such as fingerprint recognition (Maltoni et al., 2009; Hong, Wan & Jain, 1998; Yuan, Sun & Lv, 2016), face recognition (Zhao et al., 2003; Masi et al., 2018; Wang et al., 2018), iris recognition (Nguyen et al., 2017), signature, etc. In the literature, the use of unibiometric systems is widely employed with very good recognition results. However, such systems are typically constrained due to several factors including lack of accuracy due to noisy data, non-universality of biometric traits for registration, physiological limitations of biometrics, and vulnerabilities in biometric systems (Table 1) (Dinca & Hancke, 2017; Oloyede & Hancke, 2016).
Name | Description |
---|---|
Noise in data | The acquisition environment corrupts the data due to which the features are altered. This can result in a false registration of the user. |
Lack of universality | A certain biometric trait cannot be used due to some clinical condition such as a cut in the finger, long eyelashes resulting in an iris failure, etc. |
Identification accuracy | For large databases, a certain biometric trait will be able to handle a maximum number of distinguishable patterns after which it will not be able to discriminate between the users. |
Spoofing | Some behavioral and physical biometric traits are vulnerable to attacks, e.g., signatures and even fingerprints. Successful presentation of a spoofed biometric will result in an authentication compromise. |
DOI: 10.7717/peerj-cs.707/table-1
Some biometric modalities are more vulnerable to some specific problems, e.g., spoofing a fingerprint is relatively easier as compared to a vein/palm pattern. However, the recognition accuracy of fingerprints is far more superior. These are complementary properties of two different biometric modalities, which can be exploited together in a multimodal biometric system, hence making the system more tolerant to spoofing while maintaining a higher accuracy.
Multibiometric systems
When using the unibiometric systems, we may encounter problems due to several issues including, but not limited to, missing data (Nandakumar, Jain & Ross, 2009) (e.g., occlusion in face image), poor sampling (Grother & Tabassi, 2007), biometric duplication (Sudhish, Jain & Cao, 2016), low discrimination among samples (e.g., hand shape/geometry) between distinct users, vulnerability to attacks, and spoofing, etc (Jain & Kant, 2015). In situations like these, it may be necessary to make use of multiple biometric cues to boost the accuracy of a recognition system. The multibiometric systems offer so many features, making them more convenient and feasible as compared to the unimodal systems. There can be different sources of biometric information in a multibiometric system due to which such systems can be classified into the following five major categories (Fig. 3):
Multi-sensor systems
The multi-sensor systems use multiple sensors in order to capture the same biometric trait of an individual (Elhoseny et al., 2017; Kaur & Sohal, 2017). Such systems are desirable due to the fact that they can enhance the recognition capabilities of the systems (Blum & Liu, 2005). This happens because the data acquired from various sensors may be of different quality and the multi-sensor system can partially solve the problems related to poor data quality (Singh, Singh & Ross, 2019). The different biometric traits, when used for recognition, have the ability to complement one another, creating the possibility for a better recognition of the individuals.
Multi-algorithm systems
In multi-algorithm systems, more than one algorithm are utilized to improve the recognition rates of biometric systems (Sotonwa & Oyeniran, 2019; Gad et al., 2018). It is cost effective to work on such systems as they do not make use of multiple biometric traits, and thus do not require multiple sensors (Mishra, 2010). However, such systems require a lot of computational resources as multiple algorithms have to be run in order to calculate the relevant features for a single instance (Fan et al., 2019; Scherhag, Rathgeb & Busch, 2018). Keeping this in view, special consideration should be given to the fact that real-time performance is a requirement of biometric systems, and thus the feasibility of such systems might be compromised even when they have the ability to achieve very high recognition rates.
Multi-sample systems
In multi-sample systems, multiple samples from the same sensor are acquired from the biometric devices (Dinca & Hancke, 2017; Elhoseny et al., 2018). The fundamental issue with a single sample system is the fact that the samples can suffer from missing data problems due to which effective recognition cannot be performed (Goswami et al., 2017). The problem is mitigated in multi-sample systems by acquiring multiple samples from the devices and using multiple or the most relevant samples for recognition. The same algorithm is used to process all samples and recognition results from each sample are calculated and eventually fused to yield a final result of recognition (Modak & Jha, 2019). This recognition may be based on some technical considerations, e.g., a confidence score with which a specific recognition result is obtained.
Multi-instance systems
In multi-instance systems, the biometric data is typically extracted from multiple instance of the same body traits (Faltemier, Bowyer & Flynn, 2008). For example, finger biometric properties can be extracted from two fingers (Lamia & Najoua, 2019), the palm prints can be acquired from two palms (Leng et al., 2017), and the iris of the individuals (Kumar, Prasad & Raju, 2020) can be used for measuring different biometric traits of the systems. The addition of multiple instances for performing recognition in a biometric system increases the discrimination capability of the system because the distinctive capability for a single individual is extended by adding more features to the pool, potentially leading to an improvement in the recognition rates for a system (Leng et al., 2017).
Multi-modal systems
In the multi-modal systems, the biometric traits from different modalities can be combined together for the purpose of identification of an individual (Modak & Jha, 2019). Such systems are used to complement the weaknesses of a single biometric and they usually try to make the best of different biometric traits in order to perform recognition of an individual (Yang et al., 2018b). An additional advantage of using multi-modal biometric systems is that they are more secure as compared to the uni-biometric systems as more than one trait is used at the time of registration of a user in a system (Yang et al., 2018b; Barni et al., 2019; Gomez-Barrero et al., 2017). Appropriately, stealing or forging one biometric trait does not guarantee an access to the system, thus leading to an improved security feature for authentication in biometric systems.
Designing a multibiometric system has a very high significance. A valid design will be able to ensure that the pieces of evidence collected from various sources, when fused together using different fusion strategies, can improve the recognition rates while ensuring some value added services provided to the users. However, when different modalities have to be combined to implement multibiometric systems, special consideration has to be given to several dimensions, e.g., what kind of additional sensors will be required, what are the costs, is there a possibility to embed different sensors in the device and, what is the overhead of such a system in terms of computational complexity.
Performance metrics for evaluation
Multiple metrics can be employed to assess the performance of a biometric authentication system. Choosing a particular metric(s) depends upon the nature of evaluation. Following are the basic raw metrics and their descriptions:
The standard metrics that have been used to evaluate the performance of the authentication system in the literature are as follows:
Fusion methods
Fusion plays a very considerable role in the implementation of multibiometric systems. There is an inherent requirement to fuse the information collected from different modalities before using it for the purpose of recognition. Fusion can be applied in multibiometric systems in two major settings: before matching and after matching. Consequently, there are five distinct levels at which fusion can be applied, i.e., sensor level, score level, feature level, and decision level (Fig. 4). The fusion applied at the first two levels is referred to as pre-matching fusion, whereas the rest are categorised as post-matching fusion.
Figure 4: Fusion levels in a multibiometric system. DOI: 10.7717/peerj-cs.707/fig-4
Sensor level fusion
In sensor level fusion, the raw information is gathered from various sensors and is fused at the initial level prior to feature extraction to produce a raw fused information. Fusion of two images can take place at pixel, feature or at signal level. Fusion at sensor level can be between multiple samples of the same biometric gathered from multiple sensors (Yang et al., 2005) or multiple instances of the same biometric taken from a single sensor (Othman & Ross, 2012). Relatively less research has been done on this type of fusion in biometrics.
Feature level fusion
In feature level fusion, the features extracted from multiple biometric sources are combined together in the form of a single feature vector. In this fusion technique, features from different sensors, samples, and traits can be combined together. At this level of fusion, signals from various biometric channels are firstly pre-processed and their feature vectors are calculated independently; by using fusion algorithms, the feature vectors are fused to form a combined feature vector, which is used for recognition (Xin et al., 2018). The incorporation of multimodal biometric traits in this type of fusion can be employed to exploit specific strengths of different biometric modalities (Nagar, Nandakumar & Jain, 2011; Jagadiswary & Saraswady, 2016; Prasanalakshmi, Kannammal & Sridevi, 2011). Although better recognition results can be expected using this type of fusion technique, it has certain limitations including the lack of compatibility of different biometric features, curse of dimensionality, etc.
Matching score level fusion
This type of fusion is done by joining the scores yielded by the matching module of each feature vector with the template. The features are processed independently along with the calculation of scores, followed by the calculation of composite matching scores (He et al., 2010; Yilmaz & Yankoglu, 2016; Kabir, Ahmad & Swamy, 2018). This is done by the checking the confidence scores, which are obtained using each feature vector. This type of fusion technique is typically easy and thus is being used by different multibiometric systems for effective execution.
Rank level fusion
In this type of fusion, sensor data is acquired followed by the feature extraction. The matching of this feature vector is performed against all the available templates in the database and similarity scores are obtained (Kumar & Shekhar, 2010; Monwar & Gavrilova, 2009). The scores are arranged in the descending order and the entry corresponding to the lowest rank (indicating similarity of feature vector with the respective template) is taken as the most relevant to the data that is acquired from the sensor. The rank level fusion can also be employed for multibiometric traits and thus can yield a recognition score with a higher confidence. However, it should be noted that in addition to the pre-processing of sensor data, additional computational load is transfered on the matching module. Therefore, the rank level fusion can be computationally very complex especially when more than one biometric trait is employed.
Decision level fusion
In this type of fusion, the information obtained from different decision modules is combined together to decide about the identity of a user (Jiang et al., 2014; Niu et al., 2008). The recognition results of each biometric trait are individually obtained followed by a fusion of these decisions to obtain a final decision regarding recognition (Li et al., 2018; Ghosh, Sharma & Joshi, 2014). Various methods to perform this type of fusion can be used, e.g., majority voting can be employed (Jimenez, Morales-Morell & Creus, 1999). In systems which require enhanced security and fail safe functioning, rule based decision can also be made such as the use of a logical ‘AND’ operation, indicating that it is necessary for all biometric traits to be yielding the same output.
Hand based modalities
As discussed previously, there are many modalities that can be used to obtain biometric information from the users. Making the right choice for designing biometric systems is a question that requires consideration in multiple dimensions. The ease of use, budget, overall performance in terms of recognition ability and modalities that promote anti-spoofing are important influential factors that determine the best biometric trait for biometric security research. A brief overview of most of the physiological biometric modalities is summarized in Table 2. The choice of the modality presents a trade-off between different factors, which require a careful review based on the nature of intended applications. As can be seen in Table 2, retina and iris present the technologies which show very good recognition results. Physiologically, these modalities are highly distinctive for different individuals with almost no chance of repetition of the patterns. However, they are not user friendly, are expensive with respect to technology and highly sensitive to the protocols used for acquisition of the data. These specific limitations have resulted in a highly restrictive use of these two modalities, specially from the perspective of the convenience of the end user. Ear is one of the most stable biometric; however, it is not distinctive and is also sensitive to some external factors such as wearing of cap, jewelry, etc. Face is a physiologically motivated biometric and is very useful; however, the most fundamental flaw with the face biometric is that it is a source of infringement of the user’s privacy. Therefore, the users are typically not comfortable with hosting of their facial data specially by the third parties.
Modality | Advantages | Disadvantages |
---|---|---|
Retina | • Retinal pattern cannot be forged | • Not user friendly |
• Highly distinctive | • Sensitive to medical conditions | |
• Provides a high security in authentication | • Expensive technology | |
• Requires controlled environment | ||
Iris | • Highly accurate | • Not user friendly |
• Highly scalable | • Expensive technology | |
• Iris pattern remains stable over a long time | • Requires controlled environment | |
• Small template size, fast matching | • Occlusion due to eyelashes, lenses | |
• Illumination should be controlled | ||
• Sensitive to medical conditions | ||
Ear | • Fixed shape and appearance | • Sensitive to earrings, hats etc. |
• Most stable | • Comparatively less distinctive | |
Face | • Physiologically motivated: humans identify each other based on faces | • Facial traits change over time |
• Requires a standard camera | • Dependent on lightning conditions | |
• Fast matching based on facial features | • Causes infringement of privacy | |
Fingerprint | • Inexpensive technology | • Cuts, scars etc can alter fingerprints |
• Secure and highly reliable | • Easily deceived through wax finger | |
• Fast matching as template size is small | • Some people have damaged fingerprints | |
• Unhygienic: physical contact with the sensor | ||
Palm print | • Highly distinctive | • Sensitive to illumination variations |
• More reliable, permanent | • Large recognition area | |
• Good results with low resolution cameras | • Scanners are bulkier and expensive | |
Hand vein | • Contactless and hygienic | • Age related deformations |
• Very accurate | • Relatively expensive technology | |
• Difficult to forge | • Sensitive to environment | |
Hand geometry | • User friendly, contactless and hygienic | • Not very distinctive |
• Results not effected by external factors | • Large recognition area | |
• Large storage requirement | ||
• Can be used only for adults | ||
Finger knuckle | • Contactless and user friendly | • Non-uniform reflections |
• Works with low resolution | • Sensitive to environment conditions | |
• Low cost | • Shortage of public databases |
DOI: 10.7717/peerj-cs.707/table-2
In contrast to the above-mentioned modalities, the remaining four, i.e., fingerprint, palm print, hand vein, and hand geometry are the modalities which are based on hands. It should be noted that all these modalities (except hand geometry) are highly accurate for recognition, make use of inexpensive technology in general, are fast for matching as they require templates of very small size, and are less sensitive to acquisition conditions as compared to the other modalities that are used for biometrics. Therefore, in this paper, we have focused on a thorough review of the available literature on the use of biometrics based on hands (Fig. 5).
Figure 5: Front and back view of hands along with various biometric traits. DOI: 10.7717/peerj-cs.707/fig-5
Fingerprint
Fingerprint is one of the most established biometric modalities due to its high recognition rates and consistency, and has been in existence for over a century. The ease to acquire fingerprints and their wide usage has led to many commercial applications relying on them as far as biometrics are concerned. A fingerprint is formed by the coexistence of a collection of ridges and valleys, thus yielding a pattern, which is distinct for different human beings. These patterns are also referred to as “minutiae” and are mainly composed of bifurcations, enclosures, ridge endings and ridge dots. Further, the minutiae are subdivided into sub minutiae such as pores, crossovers, and deltas (Fig. 6). A fingerprint biometric system has four main stages: acquisition of data, feature extraction, template creation, and matching. The ease of use and a small space required for the storage of template has made it one of the best biometric technologies to employ commercially.
On fingerprint biometric, both quantitative and qualitative works exist. A survey of around 160 users was done in Arteaga-Falconi, Al Osman & El Saddik (2015) and Cappelli et al. (2007) in which the users gave a positive response towards using this technology for smartphones. Furthermore, various technological contributions presenting quantitative results show that a fingerprint take less than one second for matching, achieve 0.07% EER on a database of 100 subjects, false rejection rates of upto 0.04% and false acceptance rates of upto 0%, 4.18% and 8.91% using three confidence coefficients, i.e., 99.0%, 99.5% and 99.9% respectively. These results indicate a very high recognition performance in a very small amount of time, promoting the use of fingerprint technology for real time implementation of systems requiring biometric validation.
Palm print
Palm print is a popular biometric modality, which has attracted the attention of many researchers. However, it is a relatively new biometric modality as compared to its counterparts, such as face, fingerprints, etc. A palm print image consists of some rich intrinsic features such as ridges and palm lines, delta lines, principle lines, minutiae features, wrinkles, etc. (Chen, Huang & Zhou, 2013; Huang, Jia & Zhang, 2008) that are deemed to be permanent and unique for every individual (Fig. 7). Owing to these inherent features, palm prints generate unique biometric characteristics for every individual that are reliable for identification purposes (Zhang, Zuo & Yue, 2012; Zhong, Du & Zhong, 2019). The main issue that is responsible for reducing the performance of palm print systems is the deformation of images during the image acquisition process. Attempts are being made to solve this issue by using contact devices, but researchers have faced several challenges in the design of such devices including its size and limited usability, along with several challenges including position, stretch and rotation of the palm print. Lately, researchers are resorting to contactless devices again with low resolution imagery used for commercial application and high resolution imagery for applications such as criminal investigation.
Some of the most recent contributions on palm print biometric (Zhang et al., 2017; Tabejamaat & Mousavi, 2017) show that the recognition rates of upto 98.78% and 97.2% respectively have been achieved within processing times in the order of milliseconds on databases of fairly large size (about 12,000 instances). The most relevant contribution in this regard with the best accuracies are presented by Luo et al. (2016) in which the authors have reported an accuracy of 100% on a dataset having 4,600 instances of palm prints. This is in contrast to a general perception that palm prints are not as accurate as fingerprints. However, it should be noted that the possibility to obtain a relatively large dataset to validate the findings on fingerprints having a statistically higher significance is much more likely in contrast to palm prints for which the availability of dataset is relatively limited.
Veins
Vein biometrics, also known as vascular biometrics, refer to a biometric system that measures parts of an individual’s circulatory system for identification. Vein pattern recognition technology has gained a significant attention due its unique attributes along with liveness property yielding very high recognition rates. Vein patterns are segmented into different sub-modalities amongst them most commonly used come from the palm (Zhou & Kumar, 2011), palm dorsal (Joardar, Chatterjee & Rakshit, 2014), wrist (Pascual et al., 2010), or finger (Lee et al., 2010). The sub-dermal nature of veins makes these types of biometrics a highly secure modality (Crisan, 2017). In a vein biometric system, image acquisition is carried out by using near-infrared (NIR) imaging device. The NIR light maps the vein locations, because the hemoglobin in veins absorbs the NIR light. A high contrast image is created by visualization of the vein pattern as shadows appearing over a white background. These high contrast images with vein patterns are used for recognition using various texture feature extraction techniques.
A quick review of the literature elucidates the facts that very high recognition rates are obtained on this biometric trait. Researchers have reported an accuracy of upto 99.4% reinforcing the theoretical claims of high uniqueness of vein patterns (Das et al., 2018). However, the requirement of using sophisticated acquisition devices for obtaining the biometric data makes this modality relatively less popular (Kilian et al., 2020). Moreover, using vein patterns can be a challenge in some cases because of the physiological changes taking place due to ageing and various medical conditions (Oloyede & Hancke, 2016).
Hand geometry
Hand geometry/shape is a very simple biometric technology that uses the measurements of human hand to verify the identity of the individuals. The measurements include the length, shape and width of fingers and size of palm (Fig. 8). The biometric systems employing hand geometry are widely used as they have a high public acceptance (Babich, 2012; Jain, Dass & Nandakumar, 2004, Sharma et al., 2015). However, it should be noted that the systems based on this technology are not scalable as the hand geometry is not highly unique (Oloyede & Hancke, 2016). Nevertheless, it is widely used at places providing access control, where the main objective is to find out if someone is illegally trying to gain access to someone’s personal identification. A hand reader guarantees that a worker is actually available at a place where he is meant to be. It is also used for implementing time attendance of the employees and helps in stopping the employees from buddy punching (which takes place commonly with fingerprint technology). Hence, the payroll accuracy of a company is guaranteed with a higher probability when hand geometry is used (Babich, 2012).
Figure 8: A human hand used for the extraction of hand geometry features. DOI: 10.7717/peerj-cs.707/fig-8
Due to the lack of ability to differentiate between the people effectively, the usage of hand geometry is somewhat limited and typically used in conjunction with other biometric modalities for improved recognition rates. Some recent contributions on hand geometry show that an EER of upto 0.31% has been achieved by Sharma et al. (2015) with upto 50 distinct users. A novel contactless sensing system (Kanhangad, Kumar & Zhang, 2011) based on multi sampling has been proposed, which has been used to authenticate a database of 100 people representing upto 200 hands with about 50% improvement in the recognition rates (Oloyede & Hancke, 2016). Nevertheless, the technology is not as accurate as its counterparts and thus is not very useful in a standalone setting for large scale deployment for commercial purposes.
Finger knuckle print/inner knuckle print (FKP)
Finger knuckle print is one of the emerging hand based modalities used for biometric verification of the individuals (Kumar & Ravikanth, 2009). The finger knuckle patterns can be easily acquired using contactless devices. In contrast to the more established modalities such as fingerprints requiring high resolution imagery, the knuckle patterns can be easily captured using low-resolution samples (Zhang, Lu & Zhang, 2018). Additionally, the patterns on the outer surface of the knuckle appear at an early stage and survive for a longer periods of time and are specifically useful for the workers, labourers, cultivators, etc., whose fingerprints are more susceptible to damage due to the nature of work (Yang, Yu & Liao, 2009). In a biometric system based on finger knuckle, the physiology which differentiates two different people is due to the lines, creases and texture of the knuckle print that lie at the three knuckle joints of the fingers (Jaswal, Kaul & Nath, 2016) (Fig. 9). These lines appear before birth and rarely change over an individual’s lifetime.
Figure 9: Finger dorsal knuckle print around the joints. DOI: 10.7717/peerj-cs.707/fig-9
The knuckle print is a biometric that can be acquired without any physical contact with any sensor. Therefore, the chances of spoofing are significantly reduced. These are highly stable for individuals from various age groups; however, their widespread usage is still not reported. A quick survey of the literature shows that researchers have obtained a high accuracy on the identification of persons using knuckle prints with an overall accuracy of upto 98% in real time on a dataset of size 7,900; FAR of 0.062% and FRR of 0%. Given the ability to obtain data for finger knuckles contactlessly, the ease in acquisition process, invariance of patterns to emotions and behavioral aspects, and a wide acceptability socially, there is potential in using this technology on a large scale undoubtedly. However, research is needed on improving the identification results for a widespread deployment.
Feature extraction techniques for hand multibiometric systems
A significant volume of literature exists with regards to the design of hand multibiometric systems. It is well known that for any system, the feature extraction methodology is the most fundamental aspect that governs the recognition performance achieved by the systems. In this context, a survey of the literature reveals that all the methods can be mainly divided into the following main categories: 1. Statistical features, 2. Filter based features, 3. Deep features and 4. Hand crafted features, leading to a taxonomy, which is shown in Fig. 10.
Figure 10: Taxonomy adopted for feature extraction techniques. DOI: 10.7717/peerj-cs.707/fig-10
Statistical features
Texture is a spatial property that is generally valid over a larger spatial neighborhood. In order to capture the spatial characteristics and dependence of the images, some statistical measures can be used in order to summarize the patterns indicated in the images. Using statistical methods typically yield good quality image descriptors with the requirement of a smaller memory footprint for maintaining the templates of the registered users. Various authors have worked on proposing statistical methods for feature extraction (Summary presented in Table 3).
Publication | Modalities | Feature extraction | Database | Fusion level | Recognition rates |
---|---|---|---|---|---|
Aoyama, Ito & Aoki (2014) | Multi-instance FKP | 2D DFT | 7920 images (PolyU FKP database) | Score level | EER-0.321% |
Perumal & Ramachandran (2015) | Palm print, FKP | SIFT, SURF, EMD | PolyU dataset (7920 images) | Score level | Acc-99.54%, FAR-0.761%, FRR-0.83% |
Veluchamy & Karlmarx (2016) | Finger vein, Finger Knuckle | Grid based location | SDUMLA-HMT (Finger vein), IIT Delhi FKP images | Feature level | Acc-96% |
Yang & Sun (2016) | Palm print, Palm vein | Local binary patterns | CASIA dataset (100 persons) | Feature level | EER-0.077% |
Srivastava et al. (2016) | Palm veins, Dorsal vein | Palm phalenges, Mean, Absolute deviation | NSIT Palm print Database 1.0 | Score level | Acc-98.2% |
Chaudhary, Srivastava & Bhardwaj (2016) | Palm print, Dorsal vein | Gaussian function | IIT Delhi Palm print, Bosphorus Hand Vein Database | Feature level | FAR-99.83% |
Bhilare et al. (2018) | Palm vein, Finger vein | Local binary patterns | PolyU dataset, VERA Palm print dataset, CASIA dataset | Score level | Acc-100%, EER-0.13% |
Vishi & Mavroeidis (2018) | Fingerprint, Finger vein | – | SDUMLA-HMT dataset | Score level | EER-0.0001% |
Yang et al. (2018b) | Fingerprint, Finger vein | Cancelable template generation, DFT | FVC2002 (800 images), FVC2004 (800 images) | Feature level | EER-0.12% |
Korichi et al. (2018) | Palm print, Palm vein, FKP, Finger vein | Principle component analysis | PolyU dataset (7920), SDUMLA-HMT finger vein dataset (100 persons) | Score level, Feature level | EER-0.007% |
Yang et al. (2018a) | Finger vein, Finger dorsal texture | Weber representation,Cross section asymmetrical coding | CASIA (6000 images), PolyU (2515 finger dorsal images), USM(492 fingers) | Feature level | CASIA (EER-3.24%), PolyU (EER-2.72%), USM (EER-3.83%) |
Zhang et al. (2019) | Fingerprint, finger vein, finger knuckle | Graph feature extraction | 17550 images | Feature level | Acc-99.8% |
Veluchamy & Karlmarx (2020) | FKP, Palm print | Entropy weighted gradient decomposition | IIT Delhi FKP and Palm print | Feature level | Acc-95%, FAR-0.1%, FRR-0.1% |
Lv et al. (2020) | Fingerprint, Finger vein | Local binary patterns | 1500 images | Feature level | EER-0.95% |
You & Wang (2019) | Fingerprint, Finger vein | Template fusion and coding | 100 images | Feature level | GAR-95%, FAR-0.4% |
DOI: 10.7717/peerj-cs.707/table-3
Aoyama, Ito & Aoki (2014) proposed a FKP recognition algorithm based on block matching using phase correlation where the phase information was extracted from the 2D DFT (Discrete Fourier Transform) of the images. Good recognition results were obtained with a high main-to-side lobe ratio of correlation and an EER of 0.321%. Perumal & Ramachandran (2015) proposed a method to fuse the palm print and FKP of individuals using interest point based techniques including SIFT (Scale Invariant Feature Transform), SURF (Speeded-up Robust Features) and EMD (Emiprical Mode Decomposition) with even better results but it should be noted that EMD is an iterative algorithm and is not very suitable for real-time implementations. Veluchamy & Karlmarx (2016) made use of FKP and finger veins to design a biometric system in which repeated line tracking is performed followed by grid operation, yielding a set of features, which are used for classification using support vector machines (SVM). Although the overall results are good, there is a margin for improvement before the method can be deployed for commercial usage. Yang & Sun (2016) proposed a biometric system making use of palm print and palm veins, in which local binary patterns were used for feature extraction. The method achieves good results; however, a wider validation on a larger dataset is required for a thorough evaluation of the proposed method. Srivastava et al. (2016) performed the fusion of palm-phalages, palm print and dorsal hand vein using some statistical features (average absolute deviation, mean features and Gaussian membership) followed by classification using SVM, KNN (k-nearest neighbors) and random forest. However, the main aim of the authors was to introduce a new dataset for carrying out biometric research.
Chaudhary, Srivastava & Bhardwaj (2016) used palm print and dorsal hand vein for recognition, performing feature extraction using Gaussian membership function. Bhilare et al. (2018) made use of the images from hand vein based modalities by performing an ROI extraction, followed by the use of CS-LBP (Center Symmetric Local Binary Patterns) as texture features. They obtained very good results, concluding in their research that the palm vein and finger vein images yield better results rather than using the vein structure of the entire hand for recognition. Vishi & Mavroeidis (2018) made use of fingerprint and finger vein for performing recognition. The paper was aimed at a combination of score normalization and fusion techniques on the two aforementioned modalities, concluding that the hyperbolic tangent score normalization technique achieves the highest recognition rates. Yang et al. (2018b) aimed at improving the template protection in a multibiometric system in which fingerprint and finger veins were used. They made use of DFT based features, achieving very good recognition rates while ensuring the security of the templates. Korichi et al. (2018) proposed a multibiometric identification system with modalities composed of images obtained from both visible and near-infrared light. Feature extraction is performed using PCA (principal component analysis), with results obtained on various datasets, showing a high precision.
Yang et al. (2018a) proposed a Weber representation based feature extraction method for feature extraction from finger veins and dorsal veins. They performed feature level fusion and validated their results on several datasets, achieving very good results. Zhang et al. (2019) made use of multiple finger based modalities, followed by feature extraction using graph based methods. They achieved very good results, showing a high potential of employing graph theory for designing biometric recognition systems. Also, the results are validated on a large dataset, elucidating on the statistical significance of the achieved performance. Veluchamy & Karlmarx (2020) proposed a multibiometric system based on FKP and palm print in which they used HoG (histogram of oriented gradients) features. These are also part of the MPEG-7 standard and thus are used widely for multimedia application. Good recognition rates have been achieved; however, there is a margin of improvement in the overall recognition rates that could possibly be achieved using more specialized descriptors. Lv et al. (2020) made use of LBP based image descriptor for feature extraction from the fingerprint and finger vein images. Feature level fusion was employed to combine the fingerprint and finger vein patterns into a single image, followed by the use of contrast enhancement techniques, and later performing LBP giving good results. You & Wang (2019) discussed about the classical disadvantage of the fuzzy vault scheme in terms of potential attacks carried out by the attackers. They mitigated this problem by performing the fusion of fingerprint and finger vein templates, followed by the projection of feature points on a rectangular grid. The fuzzy vault scheme is later used for encoding and decoding purposes. Good results are obtained along with experimental evidence of the security of the proposed scheme.
Filter based features
Several feature extraction methods exist in the literature that are based on first filtering the images with a specific mask (filter) or a set of filters and then estimating the texture of the images based on models or statistics of the filter outputs. Typically, these methods result in a decomposition of the images giving a large amount of data based on the number of filters and their parameters (more descriptive with respect to some texture related characteristics such as edges, scales, angles, etc). Later, the decomposed information is summarized using some statistics, which enhance the description of the images with respect to the filter parameters. The literature is rich in terms of the use of filter based methods for texture feature extraction (Summary in Table 4).
Publication | Modalities | Feature extraction | Database | Fusion level | Recognition Rates |
---|---|---|---|---|---|
Chin et al. (2014) | Fingerprint, Palm print | Gabor filters | FVC2004 DB1 (800 images), PolyU databse (7750 images) | Feature level | EER-0.001% |
Khellat-Kihel et al. (2016) | Finger vein, Fingerprint, FKP | Gabor filters | PolyU database (7920 images) | Feature level, Decision level | EER-0.04%, FAR-99.53% |
Gupta, Srivastava & Gupta (2016) | Hand geometry, Vein patterns | Multi-scale matched filter, Variational calculus (vein), Hand crafted features (hand geometry) | IITK-Pdv dataset (538200 images) | Score level | CRR-99.34%, EER-1.87% |
Verma & Dubey (2017) | Hand vein, Finger vein, Palm vein | Filtering, holoentropy thresholding | SDUMLA-HMT (finger vein), Bosphorus (hand vein), CASIA (palm print) | Score level | Acc-89.9% |
Bharathi & Sudhakar (2019) | Finger vein, palm vein | Gabor filters, gradient based methods | SDUMLA-HMT (Finger vein, palm vein) | Score level | FRR = 0%, Accuracy = 99.5% |
Kauba, Prommegger & Uhl (2019) | Finger vein, Hand vein | Gabor filters, Principal curvature, Maximum curvature, SIFT | PLUSVein (Finger vein, hand vein) | Score level | EER-0.03% |
Jaswal & Poonia (2020) | Palm print, FKP | Wavelet transform | PolyU FKP (7920 images), CASIA palm print (5502 images) | Score level, Rank level | EER-0.26%, Acc-100% |
Li et al. (2021) | Finger vein, FKP | Gabor filters | Data-multi (Finger vein, FKP) | Feature level | EER = 0.63, Acc = 99.6% |
DOI: 10.7717/peerj-cs.707/table-4
Chin et al. (2014) predominantly focus on multibiometirc template protection. They have proposed a three-stage hybrid method. In order to obtain a fused template, fusion of fingerprint and palm print images is done at feature level, followed by applying random tile technique to obtain random features. These random fused features undergo discretisation, hence generating a secure template bit string. Khellat-Kihel et al. (2016) pointed out that the multimodal biometric system improves the accuracy significantly but on the other hand, they tend to have a larger memory footprint and result in longer execution times. Therefore, they proposed the extraction of features using Gabor filters, followed by feature selection using linear discriminant analysis (LDA) giving good recognition results. Gupta, Srivastava & Gupta (2016) proposed a hand geometry and vein pattern based method in which gradient based variational approach is used for the extraction of veins. Matching is performed using global approach in which Fourier Mellin transform is used, thus avoiding the issues such as non-uniform illumination, noise, etc. Hand geometry features are obtained using hand crafted features. The authors have carried out validation of methods on a large dataset with statistically significant results.
Verma & Dubey (2017) proposed a multimodal vein based recognition system in which an ROI (region of interest) is identified followed by vein enhancement using circular averaging filter and holoentropy thresholding. The results reported by Verma & Dubey (2017) are not very good; however, the feature extraction procedure is not precisely mentioned, and thus the quality of features employed cannot be fairly assessed. Bharathi & Sudhakar (2019) made use of hand vein based biometric modalities for performing recognition. Feature extraction was performed using Gabor filter and gradient based methods with matching performed using the Euclidean distance metric. Although good results are obtained, the authors have mentioned that using some other fusion techniques can improve the results. Furthermore, researching on a more relevant distance metric could potentially be useful for matching purposes. Kauba, Prommegger & Uhl (2019) proposed a contactless device to acquire images corresponding to hand-based biometric modalities, which make use of vein patterns for recognition. The authors collected a dataset for evaluation and also used various methods including Gabor filter, high frequency filtering, and interest point based methods for feature extraction. The proposed device achieves good results and exhibits potential for usage for recognition tasks. Jaswal & Poonia (2020) made use of palm print and finger knuckles to design an authentication system. They performed an ROI extraction from the respective images followed by line ordinal pattern based encoding of the images. Later, feature extraction is performed using criterion wavelet transform and feature selection is performed using linear discriminant analysis and search based methods yielding very good recognition rates. Li et al. (2021) proposed a joint discriminative feature learning framework in which the directional features are estimated using Gabor filters, which are later fed into an optimization framework for feature learning that maximizes the inter-class variation and minimizes the intra-class variation among samples. Finally, block-wise histograms of learned feature maps are used for recognition purposes, giving very good overall recognition accuracy of about 99.65%.
Deep features
Over the last couple of years, the Deep Convolutional Neural Networks have dominated significantly in terms of the extraction of features and for performing the classification tasks or solving recognition problems. This is because of their robust framework, having an incredible ability to learn from the training data and adapt the designed networks to solve complex problems. Even in biometric systems, the employment of deep learning has seen a significant surge and is producing very good results in comparison to the other methods that have been used previously (Summary in Table 5).
Publication | Modalities | Feature extraction | Database | Fusion level | Recognition rates |
---|---|---|---|---|---|
Zhong et al. (2018) | Palm print, Dorsal hand vein | Deep hashing network (Palm print), Hand crafted features (Vein) | PolyU dataset, GPDS vein dataset | Feature level | FAR-0.0495% |
Zhong, Shao & Du (2019) | Palm print, dorsal hand vein | Deep Hashing Network | NCUT database, GPDS database | Sensor level, Feature level, Matching score, Decision level | FAR ≈ 0%, FRR ≈ 0% |
Toygar, Babalola & Bitrim, 2020 | Palm, dorsal and wrist vein | Hand crafted, CNN based | FYO Vein database | Feature level | Acc-100% |
Chen & Wang (2018) | Hand shape, Palm print | Block statistics | VIP-CC database (hand and palm images) | Decision level | FAR-0.0095%, FRR-5.7692%, EER-7% |
Mehdi Cherrat, Alaoui & Bouzahir, 2020 | Fingerprint, Finger vein | CNN | SDUMLA-HMT (41,340 images) | Feature level | Acc-99.59% |
Chen et al. (2019) | Palm vein, Palm print | CNN | 540 images | Feature level | Acc-99.97% |
Choudhury, Kumar & Laskar, 2021 | Dorsal hand | Alexnet, Resnet | 890 images | Rank level | Av Error-0.0097 |
DOI: 10.7717/peerj-cs.707/table-5
Zhong et al. (2018) proposed the use of DHN (deep hashing network) for palm print encoding into 128-bit codes, and BGM (biometric graph matching) to encode dorsal hand vein images into three discriminant features. Later, feature level fusion was used with very good recognition rates, with EER of upto 0%. Toygar, Babalola & Bitrim (2020) proposed a deep architecture with five hidden layers, each comprising convolutional, batch normalization and pooling layers to design a multibiometric system based on palm, dorsal, and wrist veins. The results when compared with several other methods including hand crafted features and Gabor filters, show very good results, elucidating on the potential of using deep learning methods for multimodal biometrics. Zhong, Shao & Du (2019) proposed a deep end-to-end trainable hashing network that takes an image at the input and outputs a binary code corresponding to the respective image. Matching can be performed by comparing the binary codes corresponding to the training images with the image given as input to the network. The method achieves very good results, showing promise in employing the neural networks based techniques for encoding the images. Chen et al. (2019) introduced a low cost personal identification system consisting of near infrared and visible LED (light emitting diodes). An adaptive feedback control was used to control the brightness of the diodes. The images acquired were preprocessed, with feature extraction performed using a deep scattering CNN, giving good recognition rates. Mehdi Cherrat, Alaoui & Bouzahir (2020) proposed a system for recognition using the CNN models in a multibiometric setting with a fusion of finger vein and fingerprint. Good recognition rates were obtained using the proposed strategy, with a conclusion that the use of preprocessing improves the recognition rates. Choudhury, Kumar & Laskar (2021) made use of index, middle, and ring fingernail plates for extracting biometric features from the images using three customized pretrained models: Alexnet, Resnet and Densenet. An adaptive fusion technique based on score and decision level is used for the purpose of fusion of features from dorsal hand followed by exhaustive experiments to assess the efficacy of the proposed technique, giving very good recognition results with a minimum average rate of 0.0097%.
Hand crafted features
Handcrafted features are typically those which are used with more traditional machine learning algorithms for performing classification tasks. More commonly, these features can be easily correlated to statistical features. In this specific article, we define the handcrafted features as those features that are obtained as a combination of statistical and physical properties of the images such as hand size, finger size, etc. Such combinations are typically obtained when at least one of the biometric traits used for recognition is hand geometry. Although the literature on such techniques is limited, a summary of relevant contributions made using such methods is presented in Table 6.
Publication | Modalities | Feature extraction | Database | Fusion level | Recognition Rates |
---|---|---|---|---|---|
Sharma et al. (2015) | Hand shape, Hand geometry | Hand crafted features | JUET contact database (50 subjects), IITD contact less dataset (240 subjects) | Score level | EER-0.31% |
Anitha & Rao (2016) | FIKP, Hand geometry | Hand crafted features | PolyU dataset (7920 images) | Feature level | ERR-0.8% |
Jaswal et al. (2019) | FKP, Palm print, Hand print | Hand crafted feature, shape features | CASIA, IIT Delhi, PolyU | Feature level | EER-0.01%, CRR-100% |
Gupta & Gupta (2018) | Fingerprint, Dorsal vein, Hand geometry | Hand crafted | 2000 hand slap images, 2000 IR hand images | Matching score | EER-0.72%, CRR-100% |
Khodadoust et al. (2021) | Fingerprint, Finger vein and FKP | Maximum Curvature | 924 Finger prints, 924 Finger veins and 924 FKP | Matching level, Score level | – |
DOI: 10.7717/peerj-cs.707/table-6
Sharma et al. (2015) performed identity verification using the shape and geometry of hands using the contour of the hands. The hand contour is initially aligned followed by the calculation of peaks and valleys, and the extraction of the finger feature points by calculating the Euclidean distance between the reference point and all the feature points. The proposed method shows promise with good recognition rates achieved over two datasets. However, their sizes are small and the methodology requires extensive validation over larger datasets for a statistically significant conclusion. Anitha & Rao (2016) made use of FKP and hand geometry to propose a multibiometric system. They performed ROI extraction from the pictures followed by the use of LBP as texture features for the finger knuckles and hand geometry features using hand crafted features. The process for the extraction of these features includes the identification of six points on the hand to extract the angle features and the aspect ratio of the palm, followed by the calculation of Euclidean distance between the template and the acquired image for matching. Experiments show that the best performance is achieved using a feature level fusion of the FKP and hand geometry features. Jaswal et al. (2019) laid down the idea of using multiple biometric traits for recognition using a single sensor. A device having the ability to capture the FKP and palm print was used for acquiring the image. Processing of the images was done by the extraction of an ROI followed by a transformation using texture code matrix. Hand registration was done by detecting the feature points (peaks and valleys) and also the detection of knuckle point followed by deep multiscale matching giving very good recognition rates. Gupta & Gupta (2018) proposed a system that captures slap fingerprints and hand dorsal image at the same time. Slap segmentation is performed by making use of the finger location and hand type. Matching of scores are generated by matching the slap fingerprints, palm dorsal vein and hand geometry that are fused for the purpose of authentication yielding good recognition results. Khodadoust et al. (2021) worked on the fusion of fingerprint, finger veins, and FKP using an experimental setup, which obtained the 3D reconstruction of the above-mentioned traits followed by maximum curvature based feature extraction. They obtained good overall identification results, with validation carried out on 66 users showing promise for the use of their method for authentication purposes. The most significant claimed advantage of the proposed method relates to the experimental protocol as the method relies on a contactless and hygienic way of acquiring multibiometric traits.
Now that we have analyzed the feature extraction techniques, which have been presented in the literature, it is important to note that there are a several points to compromise a biometric system. It is very important for a biometric system to be unsusceptible to attacks and loss of template by adversaries. To deal with the issues related to the security of a multibiometric template, we now analyze the existing work on multibiometric template protection.
Multibiometric template security
A multibiometric system uses multiple biometric traits (e.g., fingerprint, face, and finger vein) to recognize a person (Ross, Nandakumar & Jain, 2008), hence improving the reliability and accuracy of biometric systems. However, adequate attention has not been paid towards making the multibiometric templates secure. There are several ways to compromise a biometric system (Ratha, Connell & Bolle, 2001) and loss of a biometric template information to unauthorized individuals possesses security and privacy threats (Nagar, Nandakumar & Jain, 2011; Mirza et al., 2014) due to following reasons:
Keeping this in view, the security of a multibiometric system is very critical as it contains information regarding multiple biometric traits of the same user and it should be shielded from an unauthorized access (Chin et al., 2014; Rathgeb & Busch, 2012). Therefore, there is a need for a secure template that must be irreversible and unlinkable (Davida, Frankel & Matt, 1998; Ratha et al., 2007; Bolle, Connell & Ratha, 2002; Juels & Sudan, 2006; Sutcu, Li & Memon, 2007a, Sarkar & Singh, 2020; Bharathi & Mohana, 2019) (Fig. 11). Biometric template protection schemes can be categorized into two main classes (Fig. 12) (Rathgeb & Uhl, 2011; Sandhya & Prasad, 2017): 1. Cancelable Biometrics (CB), 2. Biometric Cryptosystems (BCs). These schemes offer various advantages over a generic biometric systems. A few most important advantages are summarized in Table 7.
Figure 11: Biometric authentication system incorporating template security. DOI: 10.7717/peerj-cs.707/fig-11
Figure 12: General categorization of template protections schemes. DOI: 10.7717/peerj-cs.707/fig-12
Advantage | Description |
---|---|
Secure template/Privacy protection | Reconstruction is hardly feasible in biometric cryptosystems and cancelable biometrics as the original biometric template is obscured. |
Secure key release | Key release mechanisms provided in cryptosystems are based on biometrics. |
Pseudonymous authentication | The encrypted identifier that is used for authentication is also a pseudonymous identifier. |
Revocability of templates | Multiple instances of templates can be generated from the same biometric data. |
Enhanced security | Traditional attacks are mitigated with the usage of cancelable biometrics and biometric cryptosystems. |
Social acceptance | The social acceptance of biometric applications is expected to increase with the use of cancelable biometrics and biometric cryptosystems. |
DOI: 10.7717/peerj-cs.707/table-7
Cancelable biometrics
Cancelable biometrics (CB) refer to distortion of biometric features that are intentional and systematically repeatable in nature to protect sensitive user-specific data (Ratha, Connell & Bolle, 2001). Cancelable biometric transforms are those that are used to transform the original biometric samples such that the resulting data is computationally hard to recover. When the user registers in the system, his biometric sample is transformed using a one-way transformation and saved in the database. This transformation is chosen from an identification word that is specific to the user. In the verification step, the query template is used to generate a transformed template that is compared with the saved template in the database followed by the verification process. The literature on unimodal cancelable biometric systems is very rich but there are inherent problems with such systems including intraclass variability, variation in data quality and a significant similarity in interclass samples. In contrast to such systems, the multimodal biometric systems combine the features of various biometric traits to generate the templates, which are more secure and thus, resistant to various threats and attacks. The main advantages offered by the multibiometric systems are greater security, accuracy, noise sensitivity, and resistance to spoof attacks. Table 8 presents a brief summary of the work done in the domain of cancelable multibiometircs.
Year | Authors | Description |
---|---|---|
2012 | Paul & Gavrilova (2012) | Multibiometric template protection using PCA as a transform based tool |
2013 | Paul & Gavrilova (2013) | Multibiometric template protection using Gram-Schmidt transformation |
2014 | Chin et al. (2014) | Hybrid template protection using feature fusion and random tiling transformation |
2014 | Paul & Gavrilova (2014) | Multibiometric template protection using Gram-Schmidt transform, PCA and rank level fusion |
2017 | Gomez-Barrero et al. (2017) | Homomorphic probabilistic encryption for cancelable biometric template generation |
2018 | Yang et al. (2018b) | Fusion based cancelable multibiometric system |
2018 | Kaur & Khanna (2018) | Random distance method for obtaining secure biometric templates |
2018 | Gomez-Barrero et al. (2018) | Bloom filter based cancelable biometric features |
2019 | Dwivedi & Dey (2019) | Cancelable features followed by score level fusion |
2020 | Walia et al. (2020) | Cancelable deep feature, followed by adaptive graph fusion |
2020 | Chang et al. (2020) | Novel bitwise encryption scheme to generate biometric template |
DOI: 10.7717/peerj-cs.707/table-8
Researchers have made several contributions on multibiometric template protection employing cancelable biometrics. Paul & Gavrilova (2012) proposed a method in which two-fold random selections are made from each biometric trait, followed by a feature level fusion. Random projection of each fold is obtained followed by PCA (principal component analysis) and later K-means clustering to generate the single template for individual biometrics. Later, LDA (linear discriminant analysis) is applied to further improve discriminability of the features. Final authentication is carried out using a classifier. Another variant of the technique proposed in Paul & Gavrilova (2013) makes use of Gram–Schmidt transformation instead of PCA, along with some other minor modifications in the pipeline. The authors have validated the cancelable property of the proposed method, while giving good authentication results in a multibiometric setting. Furthermore, the authors improved the results by proposing a methodology in which both Gram–Schmidt transformation and PCA were used followed by a rank level fusion for performing final authentication of the users (Paul & Gavrilova, 2014). Chin et al. (2014) proposed a three-stage hybird template protection scheme. They have performed the fusion of palm print and fingerprint on the feature level, followed by the use of random tiling technique to extract unique features. Finally, the fused random features undergo 2N discretisation to produce the template bit string. The approach addresses the criterion for template protection with an improved EER as compared to unimodal biometric sytems, though it is slightly higher with reference to multimodal systems. Gomez-Barrero et al. (2017) made use of homomorphic probabilistic encryption to generate the biometric templates along with fusion at three different levels. A complexity analysis was also carried out to assess the feasibility of the proposed method for real-time implementation. Moreover, feature level fusion is also employed yielding more secure and better cancelable biometric features. Kaur & Khanna (2018) proposed a template transformation method named random distance method that yields privacy preserving, revocable and discriminative pseudo biometric identities, with about 50% reduced memory footprints. Yang et al. (2018b) proposed a multibiometric system in which the fingerprint based minutae features and finger vein features are extracted followed by their respective binary features, and then performing feature level fusion in three different ways. The method obtained secure biometric templates with good recognition results. Gomez-Barrero et al. (2018) showed the use of Bloom filter based protection schemes while elucidating that it is not a straightforward task. A statistical analysis of unprotected templates is carried out to estimate the main parameters of such schemes. Dwivedi & Dey (2019) proposed a method to obtain cancelable templates by using log-Gabor filters with phase quantization, followed by the generation of biometric codes. Score level fusion from multiple biometric templates are used for authentication yielding better results in comparison to unibiometric systems with better accuracy. Walia et al. (2020) proposed a method to obtain cancelable features using deep neural networks that are fused using adaptive graph based fusion method. The proposed method is used to obtain multimodal unified templates, which are empirically demonstrated to be robust to adversary attacks. Chang et al. (2020) proposed an authentication approach in which bit-wise encryption scheme is used to transform a biometric template into a secure template using a secret key, which is generated from another template. The scheme fully preserves the number of bit errors in the protected and original template, ensuring that the recognition performance is the same as that in the case of unprotected templates.
Biometric cryptosystems
Biometric cryptosystems (BCs) refer to designs that securely generate digital key from a biometric or bind a digital key to a biometric (Cavoukian & Stoianov, 2009). To overcome the shortcomings of traditional verification methods, which were based on password-based key-release, BCs bring about a considerable security benefit by offering biometric-dependant key-release since the biometrics have a strong link with the user’s identity (Uludag et al., 2004; Jain, Ross & Uludag, 2005; Rathgeb & Uhl, 2011). At the same time, combining biometrics with cryptography and extracting the keys is not that straightforward due to variations present in a biometric data. Most of the BCs require helper data that contains additional information about the biometric and is used to generate or retrieve a key (Jain, Nandakumar & Nagar, 2008; Ali & Khan, 2014). A helper data must not reveal significant information about original biometric templates. Table 9 presents a brief summary of the biometric cryptosystems.
Year | Authors | Description |
---|---|---|
2007 | Sutcu, Li & Memom (2007b) | Protection of face and fingerprint templates |
2008 | Nandakumar & Jain (2008) | Multibiometric template security using fuzzy vault |
2008 | Camlikaya, Kholmatov & Yanikoglu, 2008 | Encoding of fingerprint with voice features |
2009 | Fu et al. (2009) | Multibiometric fusion at cryptographic level |
2011 | Nagar et al. (2011) | Feature level fusion for fuzzy vault and fuzzy commitments |
2015 | Li et al. (2015) | Biometric cryptosystem using computational security and information security, with decision level fusion |
2016 | Kumar & Kumar (2015) | Multibiometric system based on cell array for storing has code and keys separately |
2019 | You & Wang (2019) | Novel fuzzy vault scheme based on the feature level fusion of the fingerprint and finger vein. |
2020 | Chang et al. (2021) | Multibiometric cryptosystem based on Fuzzy vault and fuzzy commitment |
2021 | Evangelin & Fred (2021) | Cryptographic model based biometric template protection |
2021 | Asthana, Walia & Gupta, 2021 | Cryptographic key binding for template protection |
DOI: 10.7717/peerj-cs.707/table-9
Sutcu, Li & Memom (2007b) proposed the use of multibiometric features, followed by a secure sketch block, making it hard to extricate the original samples from the encrypted features. Nandakumar & Jain (2008) proposed a method to enable template protection using fuzzy vault framework. The authors claim to improve the recognition performance of the system along with enhanced security. Camlikaya, Kholmatov & Yanikoglu (2008) proposed a technique for the fusion of fingerprint template along with behavioral biometrics (voice samples). The algorithm enhanced the security of the biometric system by encoding the fingerprint features within the voice feature vector. The use of voice was motivated by using the property of spoken words used as a password to achieve the desirable cancelable property. Multiple biometric cryptosystems were proposed by Fu et al. (2009) out of which three were used for performing biometric fusion at the cryptographic level. The authors presented no experimental results; however, a detailed theoretical analysis of algorithms, comparison, and discussion were carried out. Nagar, Nandakumar & Jain (2011) provided a feature-level fusion method for both fuzzy vault and fuzzy commitment schemes that simultaneously secure the multiple templates of a user using a single secure sketch. Feature level fusion using multiple characteristics of a user proves to be significant in providing high privacy as compared to the single characteristic biometric systems, since only the fused feature vector is stored on the server database. Further, it requires less storage since only the combined feature vector is stored in the database server. However, it requires additional feature extraction and transformation tools for the heterogeneous features (variable formats based on distance, similarity, etc.). Another hybrid methodology to secure the biometric systems was proposed by Li et al. (2015) in which a combination of computational security and information security principles was implemented. Decision level fusion was done in the proposed cryptosystem for performing recognition. Kumar & Kumar (2015) proposed a multibiometric system based on cell array. Encoding and hash code computation was done using Bose Chaudhuri Hocquenghem (BCH) on the biometric modalities. The data is scattered across the two cells such that the first cell stores the hash code and the second cell stores the key. Moreover, fusion was performed at both decision and feature levels out of which the former shows better results in a multibiometric cryptosystem setting. You & Wang (2019) proposed a novel fuzzy vault scheme, which effectively protects the multibiometric template against location attack, brute force attack, and correlation attack. They performed fusion of fingerprint and finger vein templates. Feature point fusion encoding is done through grid projection, and fusion encodings are applied to construct the fuzzy vault. Chang et al. (2021) proposed BIOFUSE in which fuzzy commitment and fuzzy vault are combined using an encryption scheme. The system makes it difficult for an attacker to gain unauthorized access to the system without doing an impersonation of all the biometric traits at the same instant. The experiments have shown very good recognition rates with a high security. Evangelin & Fred (2021) used a visual shadow creation process to create multiple shadows of one image followed by encoding and decoding using elliptic curve cryptography. Although a very secure model is obtained, the implementation time of the model was significantly expanded. Asthana, Walia & Gupta (2021) made use of a key binding mechanism to generate a secret key using the biometric data of the user, leading to the proposition of a biocrypto system. Novel objective functions are proposed to create the helper data. The local minima of the objective function are taken as anchor points to retrieve the secret key and perform recognition leading to about 98% success rate in recognition even in the presence of limited noise in biometric data.
Open challenges and future directions Challenges
The limitations faced by various researchers in the implementation of biometric systems are listed as under:
Future Directions for Improving Biometric Systems
The main future directions of work for the implementation of biometric systems are summarized as follows:
Conclusions
In this article, we have performed a detailed survey of hand-based multibiometric systems. In this context, various hand-based biometric modalities are discussed, along with a through discussion about various fusion techniques employed and a brief survey of recent work that is being done on template protection schemes in biometric systems. A summary of the main conclusions is as follows:
Additional Information and Declarations
Competing Interests
Farrukh Aslam Khan and Haider Abbas are Academic Editors for PeerJ.
Author Contributions
Anum Aftab conceived and designed the experiments, analyzed the data, prepared figures and/or tables, and approved the final draft.
Farrukh Aslam Khan conceived and designed the experiments, analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, mentoring student, and approved the final draft.
Muhammad Khurram Khan conceived and designed the experiments, analyzed the data, prepared figures and/or tables, mentoring student, and approved the final draft.
Haider Abbas conceived and designed the experiments, analyzed the data, prepared figures and/or tables, mentoring student, and approved the final draft.
Waseem Iqbal conceived and designed the experiments, analyzed the data, prepared figures and/or tables, and approved the final draft.
Farhan Riaz conceived and designed the experiments, analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
Data Availability
The following information was supplied regarding data availability:
There is no raw data/code in this paper as it is a survey paper.
Funding
This project was funded by the National Plan for Science, Technology and Innovation (MAARIFAH), King Abdulaziz City for Science and Technology, Kingdom of Saudi Arabia, Award Number (3-17-09-001-0008). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Ali A, Khan FA. 2014. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. Journal of Medical Systems 38(5):1-12
Anitha M, Rao KR. 2016. Fusion of finger inner knuckle print and hand geometry features to enhance the performance of biometric verification system. International Journal of Electrical and Computer Engineering 10(10):1351-1356
Aoyama S, Ito K, Aoki T. 2014. A finger-knuckle-print recognition algorithm using phase-based local block matching. Information Sciences 268(7):53-64
Arteaga-Falconi JS, Al Osman H, El Saddik A. 2015. ECG authentication for mobile devices. IEEE Transactions on Instrumentation and Measurement 65(3):591-600
Assaad FS, Serpen G. 2015. Transformation based score fusion algorithm for multi-modal biometric user authentication through ensemble classification. Procedia Computer Science 61(1):410-415
Asthana R, Walia GS, Gupta A. 2021. A novel biometric crypto system based on cryptographic key binding with user biometrics. Multimedia Systems 27:877-891
Auksorius E, Boccara AC. 2017. Fast subsurface fingerprint imaging with full-field optical coherence tomography system equipped with a silicon camera. Journal of Biomedical Optics 22(9):96002
Babich A. 2012. Biometric authentication. Types of biometric identifiers. Bachelor’s Thesis, HAAGA-HELIA University of Applied Sciences. Finland.
Bahmed F, Mammar MO. 2019. A survey on hand modalities and hand multibiometric systems.
Barni M, Droandi G, Lazzeretti R, Pignata T. 2019. Semba: secure multi-biometric authentication. IET Biometrics 8(6):411-421
Bharathi R, Mohana S. 2019. A review on biometric template security. In: Emerging Research in Electronics, Computer Science and Technology. Berlin: Springer. 589-596
Bharathi S, Sudhakar R. 2019. Biometric recognition using finger and palm vein images. Soft Computing 23(6):1843-1855
Bhattacharyya D, Ranjan R, Alisherov F, Choi M. 2009. Biometric authentication: a review. International Journal of u-and e-Service, Science and Technology 2(3):13-28
Bhilare S, Jaswal G, Kanhangad V, Nigam A. 2018. Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach. Machine Vision and Applications 29(8):1269-1286
Blum RS, Liu Z. 2005. Multi-sensor image fusion and its applications. Boca Raton: CRC press.
Bolle RM, Connell JH, Ratha NK. 2002. Biometric perils and patches. Pattern Recognition 35(12):2727-2738
Camlikaya E, Kholmatov A, Yanikoglu B. 2008. Multi-biometric templates using fingerprint and voice. Biometric technology for human identification V, International Society for Optics and Photonics 6944:69440I
Cappelli R, Ferrara M, Franco A, Maltoni D. 2007. Fingerprint verification competition 2006. Biometric Technology Today 15(7–8):7-9
Cavoukian A, Stoianov A. 2009. Biometric encryption. Boston: Springer.
Chang D, Garg S, Ghosh M, Hasan M. 2021. Biofuse: a framework for multi-biometric fusion on biocryptosystem level. Information Sciences 546:481-511
Chang D, Garg S, Hasan M, Mishra S. 2020. Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption. IEEE Transactions on Information Forensics and Security 15:3152-3167
Chaudhary G, Srivastava S, Bhardwaj S. 2016. Multi-level fusion of palmprint and dorsal hand vein. In: Information Systems Design and Intelligent Applications. Berlin: Springer. 321-330
Chen F, Huang X, Zhou J. 2013. Hierarchical minutiae matching for fingerprint and palmprint identification. IEEE Transactions on Image Processing 22(12):4964-4971
Chen P, Ding B, Wang H, Liang R, Zhang Y, Zhu W, Liu Y. 2019. Design of low-cost personal identification system that uses combined palm vein and palmprint biometric features. IEEE Access 7:15922-15931
Chen W-S, Wang W-C. 2018. Fusion of hand-shape and palm-print traits using morphology for bi-modal biometric authentication. International Journal of Biometrics 10(4):368-390
Chin YJ, Ong TS, Teoh ABJ, Goh K. 2014. Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Information Fusion 18:161-174
Choudhury SH, Kumar A, Laskar SH. 2021. Adaptive management of multimodal biometrics-a deep learning and metaheuristic approach. Applied Soft Computing 106:107344
Connor P, Ross A. 2018. Biometric recognition by gait: a survey of modalities and features. Computer Vision and Image Understanding 167(4):1-27
Crisan S. 2017. A novel perspective on hand vein patterns for biometric recognition: problems, challenges, and implementations. In: Biometric Security and Privacy. Berlin: Springer. 21-49
Dargan S, Kumar M. 2020. A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Systems with Applications 143(c):113114
Das R, Piciucco E, Maiorana E, Campisi P. 2018. Convolutional neural network for finger-vein-based biometric identification. IEEE Transactions on Information Forensics and Security 14(2):360-373
Davida GI, Frankel Y, Matt BJ. 1998. On enabling secure applications through off-line biometric identification.
Dinca LM, Hancke GP. 2017. The fall of one, the rise of many: a survey on multi-biometric fusion methods. IEEE Access 5:6247-6289
Dong L, Yang G, Yin Y, Liu F, Xi X. 2014. Finger vein verification based on a personalized best patches map.
Dwivedi R, Dey S. 2019. Score-level fusion for cancelable multi-biometric verification. Pattern Recognition Letters 126(3):58-67
Elhoseny M, Elkhateb A, Sahlol A, Hassanien AE. 2018. Multimodal biometric personal identification and verification. In: Advances in Soft Computing and Machine Learning in Image Processing. Berlin: Springer. 249-276
Elhoseny M, Essa E, Elkhateb A, Hassanien AE, Hamad A. 2017. Cascade multimodal biometric system using fingerprint and iris patterns. In: Hassanien A, Shaalan K, Gaber T, Tolba M, eds. Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017. AISI 2017. Advances in Intelligent Systems and Computing. Cham: Springer. 639
Evangelin LN, Fred AL. 2021. Securing recognized multimodal biometric images using cryptographic model. Multimedia Tools and Applications 80:1-18
Faltemier TC, Bowyer KW, Flynn PJ. 2008. Using multi-instance enrollment to improve performance of 3d face recognition. Computer Vision and Image Understanding 112(2):114-125
Fan Q, Jin Y, Wang W, Yan X. 2019. A performance-driven multi-algorithm selection strategy for energy consumption optimization of sea-rail intermodal transportation. Swarm and Evolutionary Computation 44(9):1-17
Fu B, Yang SX, Li J, Hu D. 2009. Multibiometric cryptosystem: model structure and performance analysis. IEEE Transactions on Information Forensics and Security 4(4):867-882
Gad R, Talha M, Abd El-Latif AA, Zorkany M, Ayman E-S, Nawal E-F, Muhammad G. 2018. Iris recognition using multi-algorithmic approaches for Cognitive Internet of Things (CIoT) framework. Future Generation Computer Systems 89(7):178-191
Ghosh A, Sharma R, Joshi P. 2014. Random forest classification of urban landscape using landsat archive and ancillary data: combining seasonal maps with decision level fusion. Applied Geography 48(2):31-41
Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J. 2017. Multi-biometric template protection based on homomorphic encryption. Pattern Recognition 67(10):149-163
Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C. 2018. Multi-biometric template protection based on bloom filters. Information Fusion 42(3):37-50
Goswami G, Singh R, Vatsa M, Majumdar A. 2017. Kernel group sparse representation based classifier for multimodal biometrics.
Grother P, Tabassi E. 2007. Performance of biometric quality measures. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):531-543
Gupta P, Gupta P. 2015. An accurate finger vein based verification system. Digital Signal Processing 38(4):43-52
Gupta P, Gupta P. 2018. Multibiometric authentication system using slap fingerprints, palm dorsal vein, and hand geometry. IEEE Transactions on Industrial Electronics 65(12):9777-9784
Gupta P, Srivastava S, Gupta P. 2016. An accurate infrared hand geometry and vein pattern based authentication system. Knowledge-Based Systems 103(11):143-155
He M, Horng S-J, Fan P, Run R-S, Chen R-J, Lai J-L, Khan MK, Sentosa KO. 2010. Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognition 43(5):1789-1800
Hong L, Wan Y, Jain A. 1998. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(8):777-789
Huang D-S, Jia W, Zhang D. 2008. Palmprint verification based on principal lines. Pattern Recognition 41(4):1316-1328
Huang Z, Liu Y, Li X, Li J. 2015. An adaptive bimodal recognition framework using sparse coding for face and ear. Pattern Recognition Letters 53(1):69-76
Jagadiswary D, Saraswady D. 2016. Biometric authentication using fused multimodal biometric. Procedia Computer Science 85(1):109-116
Jain AK, Dass SC, Nandakumar K. 2004. Soft biometric traits for personal recognition systems. In: Zhang D, Jain AK, eds. Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. 3072
Jain AK, Nandakumar K, Nagar A. 2008. Biometric template security. EURASIP Journal on Advances in Signal Processing 2008(1):1-17
Jain AK, Nandakumar K, Ross A. 2016. 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognition Letters 79(2):80-105
Jain AK, Ross A, Prabhakar S. 2004. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14(1):4-20
Jain AK, Ross A, Uludag U. 2005. Biometric template security: challenges and solutions.
Jain R, Kant C. 2015. Attacks on biometric systems: an overview. International Journal of Advances in Scientific Research 1(7):283-288
Jaswal G, Kaul A, Nath R. 2016. Knuckle print biometrics and fusion schemes-overview, challenges, and solutions. ACM Computing Surveys (CSUR) 49(2):1-46
Jaswal G, Nigam A, Kaul A, Nath R, Singh AK. 2019. Bring your own hand: how a single sensor is bringing multiple biometrics together. Soft Computing 23(19):9121-9139
Jaswal G, Poonia RC. 2020. Selection of optimized features for fusion of palm print and finger knuckle-based person authentication. Expert Systems 38(1):page-e12523
Jiang B, Martinez B, Valstar MF, Pantic M. 2014. Decision level fusion of domain specific regions for facial action recognition.
Jimenez LO, Morales-Morell A, Creus A. 1999. Classification of hyperdimensional data based on feature and decision fusion approaches using projection pursuit, majority voting, and neural networks. IEEE Transactions on Geoscience and Remote Sensing 37(3):1360-1366
Joardar S, Chatterjee A, Rakshit A. 2014. A real-time palm dorsa subcutaneous vein pattern recognition system using collaborative representation-based classification. IEEE Transactions on Instrumentation and Measurement 64(4):959-966
Juels A, Sudan M. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38(2):237-257
Kabir W, Ahmad MO, Swamy M. 2018. Normalization and weighting techniques based on genuine-impostor score fusion in multi-biometric systems. IEEE Transactions on Information Forensics and Security 13(8):1989-2000
Kanhangad V, Kumar A, Zhang D. 2011. A unified framework for contactless hand verification. IEEE Transactions on Information Forensics and Security 6(3):1014-1027
Kauba C, Prommegger B, Uhl A. 2019. Combined fully contactless finger and hand vein capturing device with a corresponding dataset. Sensors 19(22):5014
Kaur H, Khanna P. 2018. Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Transactions on Information Forensics and Security 14(3):709-719
Kaur J, Sohal RS. 2017. Multi sensor based biometric system using image processing. Research Journal of Engineering and Technology 8(1):53-62
Khalifa AB, Gazzah S, BenAmara NE. 2013. Adaptive score normalization: a novel approach for multimodal biometric systems. World Academy of Science, Engineering and Technology, International Journal of Computer Science Engineering 7(3):882-890
Khan FA, Gumaei A, Derhab A, Hussain A. 2019. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373-30385
Khellat-Kihel S, Abrishambaf R, Monteiro JL, Benyettou M. 2016. Multimodal fusion of the finger vein, fingerprint and the finger-knuckle-print using kernel fisher analysis. Applied Soft Computing 42(July):439-447
Khodadoust J, Medina-Pérez MA, Monroy R, Khodadoust AM, Mirkamali SS. 2021. A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print. Expert Systems with Applications 176(8):114687
Kilian V, Ally N, Nombo J, Abdalla AT, Maiseli B. 2020. Cost-effective and accurate palm vein recognition system based on multiframe super-resolution algorithms. IET Biometrics 9(3):118-125
Korichi M, Meraoumia A, Saigaa M, Bendjenna H. 2018. Securing person identification by combining hand biometric modalities.
Kumar A, Kumar A. 2015. A cell-array-based multibiometric cryptosystem. IEEE Access 4:15-25
Kumar A, Ravikanth C. 2009. Personal authentication using finger knuckle surface. IEEE Transactions on Information Forensics and Security 4(1):98-110
Kumar A, Shekhar S. 2010. Personal identification using multibiometrics rank-level fusion. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 41(5):743-752
Kumar MM, Prasad MV, Raju U. 2020. Bmiae: blockchain-based multi-instance iris authentication using additive elgamal homomorphic encryption. IET Biometrics 9(4):165-177
Kumari P, Seeja K. 2019. Periocular biometrics: a survey. Journal of King Saud University-Computer and Information Sciences Epub ahead of print 6 June 2019.
Lamia RH, Najoua EBA. 2019. Biometric authentication based on multi-instance fingerprint fusion in degraded context.
Lanitis A. 2010. A survey of the effects of aging on biometric identity verification. International Journal of Biometrics 2(1):34-52
Lee HC, Kang BJ, Lee EC, Park KR. 2010. Finger vein recognition using weighted local binary pattern code based on a support vector machine. Journal of Zhejiang University SCIENCE C 11(7):514-524
Leng L, Li M, Kim C, Bi X. 2017. Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimedia Tools and Applications 76(1):333-354
Li C, Hu J, Pieprzyk J, Susilo W. 2015. A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Transactions on Information Forensics and Security 10(6):1193-1206
Li J, Qiu T, Wen C, Xie K, Wen F-Q. 2018. Robust face recognition using the deep C2D-CNN model based on decision-level fusion. Sensors 18(7):2080
Li S, Zhang B, Fei L, Zhao S. 2021. Joint discriminative feature learning for multimodal finger recognition. Pattern Recognition 111(2):107704
Liu F, Yang G, Yin Y, Wang S. 2014. Singular value decomposition based minutiae matching method for finger vein recognition. Neurocomputing 145(1):75-89
Luo Y-T, Zhao L-Y, Zhang B, Jia W, Xue F, Lu J-T, Zhu Y-H, Xu B-Q. 2016. Local line directional pattern for palmprint recognition. Pattern Recognition 50(7):26-44
Lv G-L, Shen L, Yao Y-D, Wang H-X, Zhao G-D. 2020. Feature-level fusion of finger vein and fingerprint based on a single finger image: the use of an incompletely closed near-infrared equipment. Symmetry 12(5):709
Maltoni D, Maio D, Jain AK, Prabhakar S. 2009. Handbook of fingerprint recognition. Berlin: Springer Science & Business Media.
Manisha, Kumar N. 2020. Cancelable biometrics: a comprehensive survey. Artificial Intelligence Review 53(5):3403-3446
Masi I, Wu Y, Hassner T, Natarajan P. 2018. Deep face recognition: a survey.
Mehdi Cherrat E, Alaoui R, Bouzahir H. 2020. Convolutional neural networks approach for multimodal biometric identification system using the fusion of fingerprint, finger-vein and face images. PeerJ Computer Science 6(2):e248
Mehrotra H, Singh R, Vatsa M, Majhi B. 2016. Incremental granular relevance vector machine: a case study in multimodal biometrics. Pattern Recognition 56(4):63-76
Meng W, Wong DS, Furnell S, Zhou J. 2014. Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials 17(3):1268-1293
Mirza NAS, Abbas H, Khan FA, Al Muhtadi J. 2014. Anticipating advanced persistent threat (apt) countermeasures using collaborative security mechanisms.
Mishra A. 2010. Multimodal biometrics it is: need for future systems. International Journal of Computer Applications 3(4):28-33
Modak SKS, Jha VK. 2019. Multibiometric fusion strategy and its applications: a review. Information Fusion 49(1):174-204
Monwar MM, Gavrilova ML. 2009. Multimodal biometric system using rank-level fusion approach. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39(4):867-878
Nagar A, Nandakumar K, Jain AK. 2011. Multibiometric cryptosystems based on feature-level fusion. IEEE Transactions on Information Forensics and Security 7(1):255-268
Nandakumar K, Jain AK. 2008. Multibiometric template security using fuzzy vault.
Nandakumar K, Jain AK, Ross A. 2009. Fusion in multibiometric identification systems: what about the missing data?
Nguyen K, Fookes C, Jillela R, Sridharan S, Ross A. 2017. Long range iris recognition: a survey. Pattern Recognition 72(9):123-143
Niu G, Widodo A, Son J-D, Yang B-S, Hwang D-H, Kang D-S. 2008. Decision-level fusion based on wavelet decomposition for induction motor fault diagnosis using transient current signal. Expert Systems with Applications 35(3):918-928
Oloyede MO, Hancke GP. 2016. Unimodal and multimodal biometric sensing systems: a review. IEEE Access 4:7532-7555
Othman A, Ross A. 2012. On mixing fingerprints. IEEE Transactions on Information Forensics and security 8(1):260-267
Pascual JES, Uriarte-Antonio J, Sanchez-Reillo R, Lorenz MG. 2010. Capturing hand or wrist vein images for biometric authentication using low-cost devices.
Paul PP, Gavrilova M. 2012. Multimodal cancelable biometrics.
Paul PP, Gavrilova M. 2013. Novel multimodal template generation algorithm.
Paul PP, Gavrilova M. 2014. Rank level fusion of multimodal cancelable biometrics.
Peng J, Wang N, Abd El-Latif AA, Li Q, Niu X. 2012. Finger-vein verification using gabor filter and sift feature matching.
Perumal E, Ramachandran S. 2015. A multimodal biometric system based on palmprint and finger knuckle print recognition methods. International Arab Journal of Information Technology (IAJIT) 12(2):118-128
Prasanalakshmi B, Kannammal A, Sridevi R. 2011. Multimodal biometric cryptosystem involving face, fingerprint and palm vein. International Journal of Computer Science Issues (IJCSI) 8(4):604
Rastogi P, Murali R, Rastogi S. 2014. Hand biometrics-atool for gender & stature estimation. Journal of Forensic Medicine and Toxicology 31(1):87-90
Ratha NK, Chikkerur S, Connell JH, Bolle RM. 2007. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561-572
Ratha NK, Connell JH, Bolle RM. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614-634
Rathgeb C, Busch C. 2012. Multi-biometric template protection: issues and challenges. In: New Trends and Developments in Biometrics. 173-190
Rathgeb C, Uhl A. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011(1):3
Riaz F, Hassan A, Rehman S, Qamar U. 2013. Texture classification using rotation-and scale-invariant gabor texture features. IEEE Signal Processing Letters 20(6):607-610
Ross A, Nandakumar K, Jain AK. 2008. Introduction to multibiometrics. In: Handbook of Biometrics. Berlin: Springer. 271-292
Rui Z, Yan Z. 2018. A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994-6009
Ryu R, Yeom S, Kim S-H, Herbert D. 2021. Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9:34541-34557
Sandhya M, Prasad MV. 2017. Biometric template protection: a systematic literature review of approaches and modalities. In: Biometric Security and Privacy. Berlin: Springer. 323-370
Sarkar A, Singh BK. 2020. A review on performance, security and various biometric template protection schemes for biometric authentication systems. Multimedia Tools and Applications 79(37):27721-27776
Scherhag U, Rathgeb C, Busch C. 2018. Morph deterction from single face image: A multi-algorithm fusion approach.
Sharma S, Dubey SR, Singh SK, Saxena R, Singh RK. 2015. Identity verification using shape and geometry of human hands. Expert Systems with Applications 42(2):821-832
Sim HM, Asmuni H, Hassan R, Othman RM. 2014. Multimodal biometrics: weighted score level fusion based on non-ideal iris and face images. Expert Systems with Applications 41(11):5390-5404
Singh M, Singh R, Ross A. 2019. A comprehensive overview of biometric fusion. Information Fusion 52(1):187-205
Snyder H. 2019. Literature review as a research methodology: an overview and guidelines. Journal of Business Research 104(5):333-339
Song W, Kim T, Kim HC, Choi JH, Kong H-J, Lee S-R. 2011. A finger-vein verification system using mean curvature. Pattern Recognition Letters 32(11):1541-1547
Sotonwa KA, Oyeniran OA. 2019. Feature extraction and classification technique for multi-algorithm facial recognition system. International Journal of Latest Technology in Engineering, Management and Applied Science-IJLTEMAS 8(2):06-10
Srivastava S, Bhardwaj S, Bhargava S. 2016. Fusion of palm-phalanges print with palmprint and dorsal hand vein. Applied Soft Computing 47(43):12-20
Sudhish PS, Jain AK, Cao K. 2016. Adaptive fusion of biometric and biographic information for identity de-duplication. Pattern Recognition Letters 84(6):199-207
Sundararajan A, Sarwat AI, Pons A. 2019. A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems. ACM Computing Surveys (CSUR) 52(2):1-36
Sundararajan K, Woodard DL. 2018. Deep learning for biometrics: a survey. ACM Computing Surveys (CSUR) 51(3):1-34
Sutcu Y, Li Q, Memon N. 2007a. Protecting biometric templates with sketch: theory and practice. IEEE Transactions on Information Forensics and Security 2(3):503-512
Sutcu Y, Li Q, Memon N. 2007b. Secure biometric templates from fingerprint-face features.
Tabejamaat M, Mousavi A. 2017. A coding-guided holistic-based palmprint recognition approach. Multimedia Tools and Applications 76(6):7731-7747
Toygar O, Babalola FO, Bitrim Y. 2020. Fyo: a novel multimodal vein database with palmar, dorsal and wrist biometrics. IEEE Access 8:82461-82470
Trokielewicz M, Czajka A, Maciejewicz P. 2018. Iris recognition under biologically troublesome conditions-effects of aging, diseases and post-mortem changes.
Uludag U, Pankanti S, Prabhakar S, Jain AK. 2004. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6):948-960
Veluchamy S, Karlmarx L. 2016. System for multimodal biometric recognition based on finger knuckle and finger vein using feature-level fusion and k-support vector machine classifier. IET Biometrics 6(3):232-242
Veluchamy S, Karlmarx L. 2020. He-co-hog and k-svm classifier for finger knuckle and palm print-based multimodal biometric recognition. Sensor Review 40(2):203-216
Verma D, Dubey S. 2017. Fuzzy least brain storm optimization and entropy-based euclidean distance for multimodal vein-based recognition system. Journal of Central South University 24(10):2360-2371
Vishi K, Mavroeidis V. 2018. An evaluation of score level fusion approaches for fingerprint and finger-vein biometrics.
Walia GS, Aggarwal K, Singh K, Singh K. 2020. Design and analysis of adaptive graph based cancelable multi-biometrics approach. IEEE Transactions on Dependable and Secure Computing 1
Wang H, Wang Y, Zhou Z, Ji X, Gong D, Zhou J, Li Z, Liu W. 2018. Cosface: large margin cosine loss for deep face recognition.
Xie S, Fang L, Wang Z, Ma Z, Li J. 2017. Review of personal identification based on near infrared vein imaging of finger.
Xin Y, Kong L, Liu Z, Wang C, Zhu H, Gao M, Zhao C, Xu X. 2018. Multimodal feature-level fusion for biometrics identification system on IoMT platform. IEEE Access 6:21418-21426
Xu Y, Lu Y. 2015. Adaptive weighted fusion: a novel fusion approach for image classification. Neurocomputing 168(1):566-574
Yang F, Paindavoine M, Abdi H, Monopoli A. 2005. Development of a fast panoramic face mosaicking and recognition system. Optical Engineering 44(8):087005
Yang W, Chen Z, Qin C, Liao Q. 2018a. α-Trimmed Weber representation and cross section asymmetrical coding for human identification using finger images. IEEE Transactions on Information Forensics and Security 14(1):90-101
Yang W, Wang S, Hu J, Zheng G, Valli C. 2018b. A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognition 78:242-251
Yang W, Yu X, Liao Q. 2009. Personal authentication using finger vein pattern and finger-dorsa texture fusion.
Yang X, Sun D. 2016. Feature-level fusion of palmprint and palm vein base on canonical correlation analysis.
Yilmaz MB, Yanikoglu B. 2016. Score level fusion of classifiers in off-line signature verification. Information Fusion 32:109-119
You L, Wang T. 2019. A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Computing 23(11):3843-3851
Yuan C, Sun X, Lv R. 2016. Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications 13(7):60-65
Zhang D, Lu G, Zhang L. 2018. Global information for finger-knuckle-print recognition. In: Advanced Biometrics. Berlin: Springer. 131-149
Zhang D, Zuo W, Yue F. 2012. A comparative study of palmprint recognition algorithms. ACM Computing Surveys (CSUR) 44(1):1-37
Zhang H, Li S, Shi Y, Yang J. 2019. Graph fusion for finger multimodal biometrics. IEEE Access 7:28607-28615
Zhang L, Li L, Yang A, Shen Y, Yang M. 2017. Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recognition 69(2):199-212
Zhao W, Chellappa R, Phillips PJ, Rosenfeld A. 2003. Face recognition: a literature survey. ACM Computing Surveys (CSUR) 35(4):399-458
Zhong D, Du X, Zhong K. 2019. Decade progress of palmprint recognition: a brief survey. Neurocomputing 328(6368):16-28
Zhong D, Li M, Shao H, Liu S. 2018. Palmprint and dorsal hand vein dualmodal biometrics.
Zhong D, Shao H, Du X. 2019. A hand-based multi-biometrics via deep hashing network and biometric graph matching. IEEE Transactions on Information Forensics and Security 14(12):3140-3150
Zhou Y, Kumar A. 2011. Human identification using palm-vein images. IEEE Transactions on Information Forensics and Security 6(4):1259-1274
Anum Aftab1, Farrukh Aslam Khan2, Muhammad Khurram Khan2, Haider Abbas1, Waseem Iqbal1, Farhan Riaz1
1 National University of Sciences and Technology, Islamabad, Pakistan
2 Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021 Aftab et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The traditional methods used for the identification of individuals such as personal identification numbers (PINs), identification tags, etc., are vulnerable as they are easily compromised by the hackers. In this paper, we aim to focus on the existing multibiometric systems that use hand based modalities for the identification of individuals. We cover the existing multibiometric systems in the context of various feature extraction schemes, along with an analysis of their performance using one of the performance measures used for biometric systems. Later, we cover the literature on template protection including various cancelable biometrics and biometric cryptosystems and provide a brief comment about the methods used for multibiometric template protection. Finally, we discuss various open issues and challenges faced by researchers and propose some future directions that can enhance the security of multibiometric templates.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer