Lebcir, Mohamed and Suryanti, Awang (2019) A review on type of attacks on fingerprint image and watermarking techniques. In: IOP Conference Series: Materials Science and Engineering, Joint Conference on Green Engineering Technology & Applied Computing 2019 , 4-5 February 2019 , Bangkok, Thailand. pp. 1-6., 551 (012071). ISSN 1757-8981 (Print), 1757-899X (Online)
|
Pdf (Open access)
A review on type of attacks on fingerprint.pdf Available under License Creative Commons Attribution. Download (206kB) | Preview |
Abstract
Fingerprint image watermarking techniques have several advantages over traditional security systems that based on token or knowledge. However, they are also vulnerable to attacks that can decrease their security. In this regard, this paper presents a study of a number of research studies on the attacks of fingerprint images watermarking techniques. The attacks can be categorized into intentional and unintentional. We study several attacks based on that category and several fingerprint image watermarking methods. We produce a comprehensive comparison of those methods to show how the methods able to prevent the attacks. We also discuss the advantages and disadvantages of the methods. Therefore, based on that, we can see what are the common attacks on the fingerprint image and what are the methods that efficient in preventing the attacks.
Item Type: | Conference or Workshop Item (Lecture) |
---|---|
Additional Information: | Indexed by Scopus |
Uncontrolled Keywords: | Comprehensive comparisons; Fingerprint images; Research studies; Watermarking algorithms |
Subjects: | Q Science > QA Mathematics > QA76 Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Faculty/Division: | Faculty of Computer System And Software Engineering Institute of Postgraduate Studies |
Depositing User: | Mrs Norsaini Abdul Samat |
Date Deposited: | 03 Apr 2020 07:19 |
Last Modified: | 05 Jan 2024 01:47 |
URI: | http://umpir.ump.edu.my/id/eprint/27583 |
Download Statistic: | View Download Statistics |
Actions (login required)
View Item |