<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jaimit Patel</string-name>
          <email>jaimitpatel.1432@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anubhav</string-name>
          <email>anubhavojha06@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ayush Kumar Singh</string-name>
          <email>ayush9446286@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rachit Kumar Tiwari</string-name>
          <email>rachittiwari03@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abhi Singh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bhupinder Kaur</string-name>
          <email>bhupinder.23626@lpu.co.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Biometric Authentication</institution>
          ,
          <addr-line>Access Control, Data Security, Biometric Authentication, Fingerprint Recogni-</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Computer Science and Engineering, Lovely Professional University Phagwara</institution>
          ,
          <addr-line>Punjab</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>165</fpage>
      <lpage>176</lpage>
      <abstract>
        <p>Biometric Authentication System isacrucialneed in everyday security protocols, providing reliability through security and eficiency for identity verification. This paper introduces a comprehensive framework for fingerprint recognition within system addressing the critical challenges like rotation, scaling variations, noise, and distortions eficient in large datasets, accuracy, real-time performance, and reliability.Capitalizing on fingerprint scanner, captured templates are stored in database securely and matched with Python libraries. AES-256 encryption is applied to store templates and enhances protection against unauthorized access. Testing is conducted using various dataset sources like Kaggle, all-inclusive various ifngerprint variation and noise levels. The proposed system demonstrates robustness, achieving the accuracy of 58% to 98% across diferent conditions. The eficiency of the algorithm ensures scalability even when processing the large dataset with real-time performance.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Physical access security to restrict areas is one of the topmost priorities for an business,
organizations and personal space. Currently available methods like key cards, RFID cards and
simple pin passwords are vulnerable to loss, theft, cloning and unauthorized sharing. Biometric
authentication ofers a secure alternative which utilizes biometric signatures and components
like face recognition, fingerprint recognition, retinal scan etc. This research paper will talk
about how we created a fingerprint scanner and a matching algorithm for security access control.
The components which are used to create fingerprint scanner are, R307 Optical fingerprint
reader which is utilized to extract and verify human fingerprint data. This data, along with
other user information, was collected by the ESP8266 Wi-Fi Module and transmitted over the
internet to a designated destination which can be a cloud or a drive with connected network. A
0.96” I2C OLED Display is used to display the data. The system uses the Python environment
and libraries for real-time fingerprint matching to grant access. The images captured by scanner
CEUR
Workshop
Proceedings</p>
      <p>
        ceur-ws.org
ISSN1613-0073
is compared with templates stored in the database. Access is granted only if a successful match
is established with a good score and accuracy. Fingerprint templates stored within the database
are encrypted using the latest and secured AES-256 bit encryption, safeguarding sensitive
information against unauthorized access or potential breaches. It added an extra layer of security in
database of fingerprint and protect the integrity of biometric data and the security of access
control system. An open source algorithm is implement for the fingerprint matching algorithm
on this biometric authentication for access control work which delivers quick and accurate
results. This work utilizes SIFT (Scale Invariant Feature Transform) which is used to detect key
points in images that are resistant to changes in size/scale, rotation, and brightness. Key points
are just distinctive, or we can say unique location which are diferent from other points available
in the image. It also utilizes Fast Library for Approximate Nearest Neighbours (FLANN) which
is used to eficiently find the nearest neighbours between key points between images and for
that it provides an accuracy rate about how much confident it is that images are the same or
have the same key points. Upcoming sections of this paper will delve deeper into the system
design, by outlining the fingerprint reader technology,fingerprint template creation process,
and the Python-based fingerprint matching algorithm. Additionally, the paper will discuss
the chosen encryption technique and its significance in securing the stored fingerprint data.
Finally, the paper will present the results obtained from the system implementation and address
potential limitations and future advancements. Several security and video based authentication
techniques were proposed by the researchers in the recent years [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Common Challenges and General Issues</title>
      <p>In this section, issues and challenges related to noisy fingerprints and its eficiency are
mentioned.</p>
      <p>• Rotation and Scaling Variations:Templates which are in database or capture can have
rotation of some degree or the scale may be diferent for each template.
• Noise and Distortions:Template may also contain noises like blurring, fuzziness due to
some problems which capturing templates.
• Large Dataset Matching Eficiency:When working with large dataset, if algorithm is not
eficient it can make matching process highly computational.
• Accuracy and Reliability: if algorithms are eficient in matching there can be an issue
with accuracy and reliability of matching.
• Real Time Performance: there is also an issue with how much time does the whole process
takes which is an issue.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Review of Literature</title>
      <p>In this section literature review is discussed authors have done the work by using diferent
approaches.</p>
      <p>
        Leyu, Z. et.al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] came with an idea to implement an RFID access control system, by utilizing
both hardware and software components in the work. Biometric recognition technologies like
ifngerprint scanners and face recognition is used and highlighted as main aspect. This work
integrates biometrics with IC cards while addressing pros and cons regarding data security
and privacy. The architecture of work is composed of diferent modules where each module
is designed to perform specific task like Card Issuing module, which is a software design,
broken into components such as Face Recognition, Fingerprint Identification, and Windows
client. The card reding and verifying uses modules like RFID Input-Output driver, and Voice
broadcasting module which complements face and fingerprint recognition. The system employs
AES-246 encryption and hardware based password authentication to strengthen data security
and mitigating the risks.
      </p>
      <p>
        Cheng, H. et.al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] talked about a plan for getting data in cloud computing. It focuses on
keeping things safe by using identity based encryption (IBE) and body measurement checks.
It talks about worries on safety of getting data in cloud places and ways to use IBE with ECC
and body checks for safety. IBE lets any set of letters be a public key, making it easy to pass
keys around and keep things safe. The end point they came to shows that because of growth in
wireless talks and body checks, the plan they came up with is doable. Plus, RBAC (Role Based
Access Control) is used to show how well it keeps data safe from many dangers.
      </p>
      <p>
        Anisha Poojary et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presented a biometric authentication system using the unique vein
patterns present in the dorsal hand. the paper shows the limitations of traditional authentication
methods by showing enhanced security using hand vein recognition method. For this system
authors have used cost efective scanning equipment such as No IR camera and NIR LEDs. These
components have ability to capture high quality vein images without direct contact of hand.
The paper shows the system’s capability to accurately identify individuals based on the unique
vein patterns. This feature makes it well suited for a wide range of uses which require strong
security measures. In the end authors have given a detailed discussion of the implementation
step of the system including camera initialization, image capture, pre-processing operations,
and template matching procedures.
      </p>
      <p>
        Natalya Kharina et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] presented an calculation for selecting palm vein pictures for
biometric confirmation frameworks, especially centring on utilizing multidimensional Markov chains.
The strategy includes approximating the biometric format picture through a discrete Markov
handle and leveraging conditional Markov handle hypothesis. The algorithm follows a number
of specified steps. Initially it will be based on the calculation of transition matrices, which
analyses local configurations. As a result, for the purpose of determining transition matrix indices,
state vectors are established in the neighbourhood. In addition to palm vein authentication, it
suggests applications such as riverbed detection or ultrasound image processing. In addition,
it points to the algorithms low computational resource requirements and its potential use of
precalculated transition matrices in order to further reduce complexity.
      </p>
      <p>
        Tanya Ignatenko et. al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] presents the biometric privacy-authentication system was
examined. The system utilized BHC code 13.5dB to introduce fuzzy commitment, but its limitations
were attaining optimal privacy leakage. The paper’s study recommends using turbo and
convoluted codes to improve privacy control. The main emphasis of the practical coding method
implementations is the use of vector quantization of the encoder for better trade-ofs. Advanced
coding techniques need to be implemented to increase privacy protection in biometric
authentication systems. Many important elements are needed for needed for footprint recognition,
including techniques for extraction, classification, matching, and data storing. It is emphasized
that matching and classifying footprints is highly essential in obtaining a precise biometric
identity. Nevertheless, face recognition also concentrates on issues related to face biometric
including illumination, body posture, expressions, image quality and more. The paper focuses
on the advancements, drawbacks, and applications of biometric recognition technology in
various domains like access control systems.
      </p>
      <p>
        Prashant Johri et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] described that in today’s time, strong security measures are essential
to tackle the emerging threats of cyber attackers. These attackers are looking for diferent ways
to get into the system and access the data for malicious purpose. The authors also talked about
various ideas such as using biometric authentication as a robust security mechanism. The tools
such as ID cards, username credentials like password, pin numbers have been in use for a pretty
long time now and have been proved to not enough as they can be easily stolen or abused hence
we need better alternatives and that’s where biometric authentication come into play. Biometric
technology is generally based on the psychological or behavioural traits. They are generally
used in the form of fingerprints, facial, and eye contour identification. It covers the evolution of
biometric technology across time, from earliest used techniques for collecting fingerprints to the
most recent deep learning based strategies as well as the integration of ai in this. It also further
explores about the new developments happening in this field such as multimodal biometric,
global cooperation, and passive biometric data collection. The paper highlights the potential
and ongoing progress of biometric authentication system across sectors.
      </p>
      <p>
        Diptadeep Addy et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] proposed a system of several layers of security to integrate
biometrics and GSM communication in vaults. The proposal provides for a system whereby each
layer of security is progressively transferred to access the vault, addressing growing concerns
about security breaches. The four layers include account username/password matching, facial
recognition, fingerprint matching, and One Time Password (OTP) verification through GSM
communication. the system uses biometric data, a unique finger impression filter and remote
communications. The paper examines the architecture of the framework, its equipment plan and
usage, and analyses each organization of confirmation. Furthermore,to improve the accuracy
and strength of the system, it recommends possible improvements and adjustments.
      </p>
      <p>
        R. T. Hans et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] explained about how biometric authentication system can be implemented
from vehicle being theft. Due to this aid employment will also be created. This model diagram
is important This diagram shows the benefit of implementing this model which Contributing to
green computing, Cost efective, Better eficient and efective authentication of vehicle owner
After implementing this model Shopping mall owners don’t have to worry about vehicle theft,
business opportunities will also be created which would develop and buy of-shelf systems.
there is only one limitation to this model that is the approval of using such systems at the
shopping mall because it deals with the usage of individual private sensitive information which
should always be protected. So the usage of this approach should negotiate the perceived
privacy.
      </p>
      <p>
        Spanakis, E.G. et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] described that most of the user authentication in ICT service/systems
in application identity tools are passkey/personal identification number(PINs).This idea focuses
to overcome weakness and flaws under improved under authentication with high level security
and privacy. Speech-Xray’s implementation regarding e-Health provided and analyzed report
which explores security and privacy issues which ofers a comprehensive summary of
biometrics technology applications pointing towards the e-Health security challenges. Biometrics
authenticates or verifies a person’s identity and sorts it in two categories, physiological namely
ifngerprints, palm print, face and iris recognition, and DNA behavioral namely typing rhythm or
voice.These things are also used as supplementary ID cards and passkeys, like communicating an
extra level of security like multi factor authentication.Data like these will be stored in template
database, placed inside the hospital which will achieve all the required characteristics regarding
security, privacy, usability &amp; cost-eficiency.
      </p>
      <p>
        Z. Ishak et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] experimented about fingerprint biometric systems. These were categorized
by small size, ease of use and less power consumption like Apple touch id. If this system is
implemented, we can work upon multi-factor authentication plan and improve encryption
algorithm. Other biometric system like retina and face recognition not enough researched in
depths so there is less trust in uniqueness.This system implements position-based accesses
control, develop stronger authentication mechanism. Long-term use will increase security of
database and eliminate backdoor entry.There are 3 main problems with this system: first is
identification of unauthorized user for access in the absence of any limitation in the security
company, next is confidential data might slip out by any intruder since of weak security part,
last up is security software to protect internal data which are not carefully unforced. The system
reach is divided in two parts: user scope and system scope. In user scopes,users can optimize
the data in Secure Biometric Lock System for Files and Applications. Simultaneously, the system
scope consists of features in the Biometric Lock System namely login settings and enter control
panel. Approaches are modern fingerprint readers, facial recognition, eigen face (black and
white) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and hand geometry [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
      <p>This Work is divided into six parts which explain about the hardware components which gives
insight about the circuit connection, and algorithms which are used for encryption, decryption,
and fingerprint matching. COmplete flow diagram of proposed work is shown in fig. 1.</p>
      <sec id="sec-4-1">
        <title>4.1. First: Integration of Fingerprint Sensor Module:</title>
        <p>The integration of a fingerprint sensor module is done with Transistor-Transistor Logic (TTL)
Universal Asynchronous Receiver-Transmitter(UART) interface for direct connections to
microcontroller UART or to a PC through MAX232 / USB-Serial adapter. Module diagram is shown
in figure 2. This module allows users to store fingerprint data and configure it in 1:1 or 1:N
mode for identifying individuals. The fingerprint sensor is flexible and suitable for applications
like marking attendance, safety boxes and securing devices like car doors and monitoring
applications. It can interface directly with any microcontroller or Arduino board.The complete
setup and module structure are shown in Fig. 2 and Fig. 3. The fingerprint sensors used in the
IoT setup have the following functions:</p>
        <p>A thin, multilayered organic film is positioned between an anode and a cathode to create
the self-emitting OLED (Organic Light-Emitting Diode) technology. OLED is thought to be the
next-generation technology for flat-panel displays since it doesn’t require a backlight like LCD
technology does. It also ofers great application potential for a variety of display kinds.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Second: Data Encryption:</title>
        <p>This step involves encryption of the images which are being taken for the censors. The algorithm
used for this is AES-256. By creating a key with random generation, we generate a secure key,
and when the incoming data is received it gets encrypted by the program and then stored in
the database.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Third : Database Access and Decryption</title>
        <p>By using AES-256decryption we can access data from the database. It requires a stored and
protected key which is used for both encryption and decryption.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Fourth: Fingerprint Processing:</title>
        <p>This step involves improving the quality of images, as in size formatting or removing some
blurriness, and lastly applying grayscale conversion as shown in Fig. 4.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Fifth: Fingerprint Loading and Extracting Features:</title>
        <p>By using Pythons OS module we will move to the directory where all the fingerprints are stored,
and we will store location in a variable which will hold the paths. After this we will extract all
the features using SIFT (Scale Invariant Feature Transformation) by using SIFT create() function,
It will detect all the features like, Scale invariance: SIFT detects features at multiple scales
within an image. Rotation invariance: SIFT descriptors are invariant to image rotation.</p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Sixth: Matching Features:</title>
        <p>By initializing a FLANN (Fast Library for Approximate Nearest Neighbours) matcher with
proper parameters, the Matched fingerprint function will match by using Knn-Match method.
This method finds the two nearest neighbours (key points) for each descriptor in the query
image within the database descriptors, as shown in the Fig. 5.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Results</title>
      <p>The Sift descriptors are used to determine accuracy of the system. These photos depict various
ifngerprints with diferent types of variations and noises as shown in fig. 6, fig. 7 and fig. 8. The
purpose of this study, which deal with both security aspects of fingerprint and noise cancellation.
More than 17,000 photos are used in the testing process to ensure that it can withstand large
dataset and gives good accuracy. The resultant accuracy varied from 58% to 98% according to
level of noise present in the image. If the image is in perfect condition and without any noise
the resultant accuracy comes in the range of 89% to 99% depending upon the level of noise in
the fingerprint image.</p>
      <p>By using OpenCV’s Euclidean distance method we got diferent results when matching
ifngerprints. As shown in Fig. 9. The time taken by Euclidean distance is much shorter when
compared to SIFT+FLANN matching and as the number of templates increases this time of
matching also increases.</p>
      <p>SIFT+FLAAN based matching comes into highlight when we talk about accuracy as shown in
Fig. 10. Not only SIFT+FLAAN is good with accuracy as compared to others, but it also tackles
images with noises preset with it which makes this algorithm a little bit time consuming.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The Fingerprint Scanner and Matching is a technique which is used by multiple organizations
in their daily life for adding a layer of security. Increased number of crimes has made people
more aware about security and risks associated with it. In this work, with low computational
complexity, faster matching and with relatively good accuracy, this model can be helpful in
security.With the help of image processing techniques which are available in open source helped
this work to be more secure. The resultant product can detect images with rotation (Fig 6),
noises(Fig 7),blurriness(Fig 8) with good accuracy.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <article-title>Optimisation of image fusion using feature matching based on sift and ransac</article-title>
          ,
          <source>Indian Journal of Science and Technology</source>
          <volume>9</volume>
          (
          <year>2016</year>
          )
          <fpage>47</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sethi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <article-title>Public network security by blufing the intruders through encryption over encryption using public key cryptography method</article-title>
          , in: Advanced Informatics for Computing Research: First International Conference, ICAICR 2017, Jalandhar, India, March
          <volume>17</volume>
          -18,
          <year>2017</year>
          , Revised Selected Papers, Springer Singapore,
          <year>2017</year>
          , pp.
          <fpage>249</fpage>
          -
          <lpage>257</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chauhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          , E-gardener:
          <article-title>building a plant caretaker robot using computer vision</article-title>
          ,
          <source>in: 2018 4th International Conference on Computing Sciences (ICCS)</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Bhadwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Kakran.</surname>
          </string-name>
          ,
          <article-title>Smart border surveillance system using wireless sensor network and computer vision</article-title>
          , in: International Conference on Automation,
          <article-title>Computational and Technology Management (ICACTM -</article-title>
          <year>2019</year>
          ), https://ieeexplore.ieee.org/document/8776749,
          <year>2019</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>190</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Leyu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xinyou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Yunjia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Shuyao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Jun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xijia</surname>
          </string-name>
          ,
          <article-title>Design and implementation of rfid access control system based on multiple biometric features</article-title>
          ,
          <source>in: 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>570</fpage>
          -
          <lpage>575</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , C. Rong,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <article-title>Identity based encryption and biometric authentication scheme for secure data access in cloud computing</article-title>
          ,
          <source>Chinese Journal of Electronics</source>
          <volume>21</volume>
          (
          <year>2012</year>
          )
          <fpage>254</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Poojary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chourasiya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ranbhise</surname>
          </string-name>
          ,
          <article-title>Biometric authentication system using dorsal hand vein pattern</article-title>
          , in: 2020 International Conference on Convergence to Digital World-Quo
          <string-name>
            <surname>Vadis</surname>
          </string-name>
          (ICCDW), IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kharina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zemtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chernyadyev</surname>
          </string-name>
          ,
          <article-title>Algorithm of palm vein image selection for biometric authentication systems based on multidimensional markov chain</article-title>
          ,
          <source>in: 2023 25th International Conference on Digital Signal Processing and its Applications</source>
          (DSPA), IEEE,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ignatenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Willems</surname>
          </string-name>
          ,
          <article-title>Privacy-leakage codes for biometric authentication systems</article-title>
          , in: 2014 IEEE International Conference on Acoustics,
          <source>Speech and Signal Processing (ICASSP)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>1601</fpage>
          -
          <lpage>1605</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Johri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Arora</surname>
          </string-name>
          ,
          <article-title>Review of the issues and a thorough investigation of biometric authentication systems</article-title>
          , in: 2022
          <source>International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)</source>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>892</fpage>
          -
          <lpage>897</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Addy</surname>
          </string-name>
          , P. Bala,
          <article-title>Physical access control based on biometrics and gsm</article-title>
          , in: 2016
          <source>International Conference on Advances in Computing, Communications and Informatics (ICACCI)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1995</fpage>
          -
          <lpage>2001</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. T.</given-names>
            <surname>Hans</surname>
          </string-name>
          ,
          <article-title>Using a biometric system to control access and exit of vehicles at shopping malls in south africa</article-title>
          ,
          <source>in: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>148</fpage>
          -
          <lpage>151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Spanakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Spanakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karantanas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marias</surname>
          </string-name>
          ,
          <article-title>Secure access to patient's health records using speechxrays a mutli-channel biometrics platform for user authentication</article-title>
          ,
          <source>in: 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>2541</fpage>
          -
          <lpage>2544</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ishak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Rajendran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. I.</given-names>
            <surname>Al-Sanjary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A. M.</given-names>
            <surname>Razali</surname>
          </string-name>
          ,
          <article-title>Secure biometric lock system for ifles and applications: a review</article-title>
          ,
          <source>in: 2020 16th IEEE International Colloquium on Signal Processing &amp; Its Applications (CSPA)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Babu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sethi</surname>
          </string-name>
          ,
          <article-title>Moving object detection and recognition using optical flow and eigen face using low resolution video</article-title>
          ,
          <source>Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science</source>
          )
          <volume>13</volume>
          (
          <year>2020</year>
          )
          <fpage>1180</fpage>
          -
          <lpage>1187</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dhiman</surname>
          </string-name>
          ,
          <article-title>Expar: A fuzzy rule based expert system for palmistry 9 (</article-title>
          <year>2016</year>
          )
          <fpage>5207</fpage>
          -
          <lpage>5214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>J. I. Bhat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Yousuf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jeelani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bhat</surname>
          </string-name>
          ,
          <article-title>An insight into content-based image retrieval techniques, datasets, and evaluation metrics</article-title>
          ,
          <source>in: Intelligent Signal Processing and RF Energy Harvesting for State of art 5G and B5G Networks</source>
          , Springer,
          <year>2024</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R. T.</given-names>
            <surname>Hans</surname>
          </string-name>
          ,
          <article-title>Using a biometric system to control access and exit of vehicles at shopping malls in south africa</article-title>
          ,
          <source>in: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>148</fpage>
          -
          <lpage>151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Tazim</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. M. Miah</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          <string-name>
            <surname>Surma</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          <string-name>
            <surname>Islam</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Shahnaz</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          <string-name>
            <surname>Fattah</surname>
          </string-name>
          ,
          <article-title>Biometric authentication using cnn features of dorsal vein pattern extracted from nir image</article-title>
          ,
          <source>in: TENCON 2018-2018 IEEE Region 10 Conference</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1923</fpage>
          -
          <lpage>1927</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Estacio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Linsangan</surname>
          </string-name>
          ,
          <article-title>A rotation invariant algorithm for bimodal hand vein recognition system</article-title>
          ,
          <source>in: 2018 IEEE 10th International Conference on Humanoid, Nanotechnology</source>
          , Information Technology,
          <article-title>Communication and Control, Environment and Management (HNICEM)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Thakuria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dutta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sarkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghosal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Saha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pramanik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mitra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U. N.</given-names>
            <surname>Thakur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <article-title>A comparative study of vein pattern recognition for biometrie authentication</article-title>
          ,
          <source>in: 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>689</fpage>
          -
          <lpage>694</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , I. Oleshko,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chernov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bagmut</surname>
          </string-name>
          , T. Smirnova,
          <article-title>Biometric authentication using convolutional neural networks</article-title>
          ,
          <source>in: Conference on Mathematical Control Theory</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Xin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Xiaojun</surname>
          </string-name>
          ,
          <article-title>Palm vein recognition method based on fusion of local gabor histograms</article-title>
          ,
          <source>The Journal of China Universities of Posts and Telecommunications</source>
          <volume>24</volume>
          (
          <year>2017</year>
          )
          <fpage>55</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kalyani</surname>
          </string-name>
          ,
          <article-title>Various biometric authentication techniques: a review</article-title>
          ,
          <source>Journal of Biometrics &amp; Biostatistics</source>
          <volume>8</volume>
          (
          <year>2017</year>
          )
          <fpage>371</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , Z. Cheng,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Palmprint and palmvein recognition based on dcnn and a new large-scale contactless palmvein dataset</article-title>
          ,
          <source>Symmetry</source>
          <volume>10</volume>
          (
          <year>2018</year>
          )
          <fpage>78</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kurbatova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kharina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zemtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Plyaskin</surname>
          </string-name>
          ,
          <article-title>Investigating palm vein pattern recognition methods</article-title>
          ,
          <source>in: 2022 24th International Conference on Digital Signal Processing and its Applications</source>
          (DSPA), IEEE,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>