An asymmetric fingerprint matching algorithm for Java']Java Card™

被引:0
|
作者
Bistarelli, S [1 ]
Santini, F
Vaccarelli, A
机构
[1] Univ G DAnnunzio, Dipartimento Sci, Chieti, Italy
[2] CNR, Ist Informat & Telemat, I-56100 Pisa, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel fingerprint matching algorithm is proposed in this paper. The algorithm is based on the minutiae local structures, that are invariant with respect to global transformations like translation and rotation. The match algorithm has been implemented inside a smartcard over the Java Card (TM) platform, meeting the individual's need for information privacy and the overall authentication procedure security. The main characteristic of the algorithm is to have an asymmetric behaviour, in respect to the execution time, between correct positive and negative matches. The performances in terms of authentication reliability and speed have been tested on some databases from the Fingerprint Verification Competition 2002 (FVC2002). Moreover, our procedure has shown better reliability results when compared with related Java Card (TM) algorithms.
引用
收藏
页码:279 / 288
页数:10
相关论文
共 50 条
  • [1] An asymmetric fingerprint matching algorithm for Java']Java Card™
    Bistarelli, Stefano
    Santini, Francesco
    Vaccarelli, Anna
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2006, 9 (04) : 359 - 376
  • [2] An asymmetric fingerprint matching algorithm for Java Card TM
    Stefano Bistarelli
    Francesco Santini
    Anna Vaccarelli
    [J]. Pattern Analysis and Applications, 2006, 9 : 359 - 376
  • [3] The synthesis of a Java']Java Card tokenisation algorithm
    Denney, E
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 43 - 50
  • [4] Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card
    Nurwarsito, Heru
    Ayu, Sarah Kusuma
    [J]. 2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 429 - 434
  • [5] Reverse engineering a Java']Java Card memory management algorithm
    Mesbah, Abdelhak
    Lanet, Jean-Louis
    Mezghiche, Mohamed
    [J]. COMPUTERS & SECURITY, 2017, 66 : 97 - 114
  • [6] Improved Adaptive Generational Garbage Collection Algorithm for Java']Java Card
    Yang Fubiao
    Li Daiping
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 699 - 702
  • [7] Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java']Java Card
    Kuemmel, Karl
    Vielhauer, Claus
    [J]. BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 61 - 72
  • [8] Using contour marking bytecode verification algorithm on the java']java card
    Jiang, Longlong
    Li, Daiping
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 4120 - +
  • [9] 8-bit Java']Java: the Java']Java card
    Grehan, R
    [J]. COMPUTER DESIGN, 1997, 36 (05): : 80 - 80
  • [10] Formalizing the safety of Java']Java, the Java']Java virtual machine, and Java']Java card
    Hartel, PH
    Moreau, L
    [J]. ACM COMPUTING SURVEYS, 2001, 33 (04) : 517 - 558