Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and Usability


  • Mohammad Η. Algarni Department of Computer Science, Al-Baha University, Saudi Arabia
Volume: 14 | Issue: 3 | Pages: 14233-14239 | June 2024 |


Biometric authentication stands at the forefront of modern security measures, offering a highly sophisticated and reliable method for identity verification. Biometrics aims to identify an individual’s identity by comparing specific characteristics against a stored template. Unlike traditional passwords or PINs, which can be forgotten, shared, or stolen, biometric authentication relies on unique biological or behavioral traits that are inherent to each individual. The current article introduces the innovative concept of multi-fingerprint sequence authentication process to verify users. In contrast to the traditional, single fingerprint methods, this multifactor technique combines the use of multiple fingerprints along with a sequence pattern for enhanced usability and security. Furthermore, this study presents a comprehensive evaluation of an innovative authentication system utilizing a multiple fingerprint sequence pattern as an alternative to biometric usernames and textual passwords, named BioPass. By leveraging an established framework, the research focuses on assessing the proposed system's usability and security aspects, as well as its potential benefits.


authentication, biometrics, security, usability, privacy, multi fingerprints, fingerprint sequencing


Download data is not yet available.


S. Muramoto, T. P. Forbes, A. C. van Asten, and G. Gillen, "Test Sample for the Spatially Resolved Quantification of Illicit Drugs on Fingerprints Using Imaging Mass Spectrometry," Analytical Chemistry, vol. 87, no. 10, pp. 5444–5450, May 2015.

S. Zaman et al., "Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey," IEEE Access, vol. 9, pp. 94668–94690, Jun. 2021.

L. O’Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2021–2040, Sep. 2003.

B. Ammour, T. Bouden, and L. Boubchir, "Face–iris multi-modal biometric system using multi-resolution Log-Gabor filter with spectral regression kernel discriminant analysis," IET Biometrics, vol. 7, no. 5, pp. 482–489, 2018.

A. K. Jain, P. Flynn, and A. A. Ross, Eds., Handbook of Biometrics. New York, NY, USA: Springer, 2007.

S. Liu and M. Silverman, "A practical guide to biometric security technology," IT Professional, vol. 3, no. 1, pp. 27–32, Jan. 2001.

P. V. L. Suvarchala and S. S. Kumar, "Feature Set Fusion for Spoof Iris Detection," Engineering, Technology & Applied Science Research, vol. 8, no. 2, pp. 2859–2863, Apr. 2018.

L. Lai, S.-W. Ho, and H. V. Poor, "Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 140–151, Dec. 2010.

A. K. Jain and A. Kumar, "Biometric Recognition: An Overview," in Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras, Eds. Dordrecht, The Netherlands: Springer Netherlands, 2012, pp. 49–79.

A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy, "Multi-Factor Authentication: A Survey," Cryptography, vol. 2, no. 1, Mar. 2018, Art. no. 1.

N. A. R. Negri, G. M. R. Borille, and V. A. Falcão, "Acceptance of biometric technology in airport check-in," Journal of Air Transport Management, vol. 81, Oct. 2019, Art. no. 101720.

C. Unal and V. Tecim, "The Use of Biometric Technology for Effective Personnel Management System in Organization," KnE Social Sciences, pp. 221–232, Nov. 2018.

H. Swofford, C. Champod, A. Koertner, H. Eldridge, and M. Salyards, "A method for measuring the quality of friction skin impression evidence: Method development and validation," Forensic Science International, vol. 320, Mar. 2021, Art. no. 110703.

V. M. Praseetha, S. Bayezeed, and S. Vadivel, "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification," Journal of Intelligent Systems, vol. 29, no. 1, pp. 1379–1387, Jan. 2020.

A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 43, no. 2, pp. 90–98, Oct. 2000.

J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," in 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 2012, pp. 553–567.

D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. London, UK: Springer, 2009.

E. Marasco and M. Albanese, "FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers," in Computer Vision and Image Processing, vol. 1376, S. K. Singh, P. Roy, B. Raman, and P. Nagabhushan, Eds. Singapore: Springer Singapore, 2021, pp. 500–511.

A. Q. M. S. U. Pathan, A. Chakraborty, M. Kabir, and K. Thakur, "Fingerprint Authentication Security: An Improved 2-Step Authentication Method with Flexibility," International Journal of Scientific and Engineering Research, vol. 10, no. 1, pp. 438–442, Jan. 2019.

B. E. Sabir, M. Youssfi, O. Bouattane, and H. Allali, "Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology," Engineering, Technology & Applied Science Research, vol. 10, no. 2, pp. 5441–5447, Apr. 2020.

M. Algarni, "An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology," Journal of Information Security and Cybercrimes Research, vol. 6, no. 2, pp. 139–149, Dec. 2023.

D. Virmani, P. Girdhar, P. Jain, and P. Bamdev, "FDREnet: Face Detection and Recognition Pipeline," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 3933–3938, Apr. 2019.


How to Cite

Algarni M. Η., “Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and Usability”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 3, pp. 14233–14239, Jun. 2024.


Abstract Views: 154
PDF Downloads: 96

Metrics Information