A review on type of attacks on fingerprint image and watermarking techniques

Lebcir, Mohamed and Suryanti, Awang (2019) A review on type of attacks on fingerprint image and watermarking techniques. In: IOP Conference Series: Materials Science and Engineering, Joint Conference on Green Engineering Technology & Applied Computing 2019, 4-5 February 2019 , Bangkok, Thailand. pp. 1-6., 551 (012071). ISSN 1757-8981 (Print), 1757-899X (Online)

Pdf (Open access)
A review on type of attacks on fingerprint.pdf
Available under License Creative Commons Attribution.

Download (206kB) | Preview


Fingerprint image watermarking techniques have several advantages over traditional security systems that based on token or knowledge. However, they are also vulnerable to attacks that can decrease their security. In this regard, this paper presents a study of a number of research studies on the attacks of fingerprint images watermarking techniques. The attacks can be categorized into intentional and unintentional. We study several attacks based on that category and several fingerprint image watermarking methods. We produce a comprehensive comparison of those methods to show how the methods able to prevent the attacks. We also discuss the advantages and disadvantages of the methods. Therefore, based on that, we can see what are the common attacks on the fingerprint image and what are the methods that efficient in preventing the attacks.

Item Type: Conference or Workshop Item (Lecture)
Additional Information: Indexed by Scopus
Uncontrolled Keywords: Comprehensive comparisons; Fingerprint images; Research studies; Watermarking algorithms
Subjects: Q Science > QA Mathematics > QA76 Computer software
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Faculty/Division: Faculty of Computer System And Software Engineering
Institute of Postgraduate Studies
Depositing User: Mrs Norsaini Abdul Samat
Date Deposited: 03 Apr 2020 07:19
Last Modified: 03 Apr 2020 07:19
URI: http://umpir.ump.edu.my/id/eprint/27583
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item