Thawre, A.Hariyale, A.Chandavarkar, B.R.2026-02-062021ICSCCC 2021 - International Conference on Secure Cyber Computing and Communications, 2021, Vol., , p. 90-95https://doi.org/10.1109/ICSCCC51823.2021.9478120https://idr.nitk.ac.in/handle/123456789/30131Biometric Cryptography is the biometric tokenization used for authentication with public-key infrastructure (PKI). In particular, biometric cryptography provides the convenience of authentication via fingerprint, face, eye, voice, palm, etc.-with none of the risks posed by having the biometrics take the form of a shared secret. With comfort, biometric verification gives more security than as it were conventional cryptography-based confirmation. Since biometric highlights of each human being are distinctive from each other, that makes it difficult to get to in an unauthorized way and it jams the privacy at the time of verification since there's no plausibility of snooping. In this manner, these days the utilization of biometric-based confirmation has expanded and utilized in versatile, portable workstation, and numerous other gadgets are utilizing biometric-based verification and biometric information stored in biometric gadgets and programmers are exceptionally shrewd they can render biometric information, can take it, and not at all like username or password biometric information can not alter, due to unique feature of biometrics. It implies, compromising biometric information will be until the end of life, and programmers can take advantage of it, so the security of biometric information is a vital issue. This paper gives some idea about cryptography methods that are capable to secure biometric data and we have presented four cryptography methods which are Biometric Encryption, Blockchain, Cancelable biometrics, and Visual cryptography. This paper also provides some challenges, issues in biometric, and future direction. © 2021 IEEE.Biometric CryptographyBiometric EncryptionBlockchainCancelable biometricsVisual cryptographySurvey on security of biometric data using cryptography