Efficient and secure fingerprint verification for embedded devices

被引:11
|
作者
Yang, Shenglin [1 ]
Sakiyama, Kazuo
Verbauwhede, Ingrid
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
[2] Katholieke Univ Leuven, ESAT COSIC, B-3001 Louvain, Belgium
基金
美国国家科学基金会;
关键词
Acceleration Technique; Embed Processor; Minutia Extraction; Execution Cycle; Hardware Level;
D O I
10.1155/ASP/2006/58263
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Secure and Efficient Protocols for Iris and Fingerprint Identification
    Blanton, Marina
    Gasti, Paolo
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 190 - +
  • [22] Smartcard-based Secret Distribution for Secure Fingerprint Verification
    Choi, Hanna
    Lee, Sungju
    Chung, Yongwha
    Cho, Hyeonjoong
    Choi, Wooyong
    Pan, Sungbum
    IETE JOURNAL OF RESEARCH, 2011, 57 (04) : 299 - 307
  • [23] Smartcard-based Secret Sharing for Secure Fingerprint Verification
    Choi, Hanna
    Choi, Woo-yong
    Moon, Daesung
    Lee, Sungju
    Chung, Yongwha
    Pan, Sungbum
    PROCEEDINGS OF THE 2009 FOURTH INTERNATIONAL CONFERENCE ON EMBEDDED AND MULTIMEDIA COMPUTING, 2009, : 73 - +
  • [24] Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification
    Praseetha, V. M.
    Bayezeed, Saad
    Vadivel, S.
    JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) : 1379 - 1387
  • [25] A hardware implementation of fingerprint verification for secure biometric authentication systems
    Chung, YW
    Moon, D
    Pan, SB
    Kim, M
    Kim, K
    IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 770 - 777
  • [26] A realtime, memory efficient fingerprint verification system
    Yang, SL
    Verbauwhede, I
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 189 - 192
  • [27] Fingerprint verification with scratch feature for personal portable devices
    Sin, SangWoo
    Li, Dongju
    Isshik, Tsuyoshii
    Kunieda, Hiroaki
    OPTICAL ENGINEERING, 2012, 51 (02)
  • [28] Automatic Fingerprint Verification Algorithm Optimized Implemented on Embedded System
    Wei, Xianmin
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5709 - 5713
  • [29] IRIS: An embedded secure boot for IoT devices
    Cano-Quiveu, G.
    Ruiz-de-Clavijo-Vazquez, P.
    Bellido, M. J.
    Juan-Chico, J.
    Viejo-Cortes, J.
    INTERNET OF THINGS, 2023, 23
  • [30] Secure and Trusted Application Execution on Embedded Devices
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    Msgna, Mehari G.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 3 - 24