Efficient and secure fingerprint verification for embedded devices

被引:11
|
作者
Yang, Shenglin [1 ]
Sakiyama, Kazuo
Verbauwhede, Ingrid
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
[2] Katholieke Univ Leuven, ESAT COSIC, B-3001 Louvain, Belgium
基金
美国国家科学基金会;
关键词
Acceleration Technique; Embed Processor; Minutia Extraction; Execution Cycle; Hardware Level;
D O I
10.1155/ASP/2006/58263
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] A Survey of Secure Boot Schemes for Embedded Devices
    Wang, Rui
    Yan, Yonghang
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 224 - +
  • [32] Efficient and secure cryptosystem for fingerprint images in wavelet domain
    Loukhaoukha, Khaled
    Refaey, Ahmed
    Zebbiche, Khalil
    Shami, Abdallah
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) : 9325 - 9339
  • [33] Efficient and secure cryptosystem for fingerprint images in wavelet domain
    Khaled Loukhaoukha
    Ahmed Refaey
    Khalil Zebbiche
    Abdallah Shami
    Multimedia Tools and Applications, 2018, 77 : 9325 - 9339
  • [34] Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint
    Quan Quach
    Ngu Nguyen
    Tien Dinh
    KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2013), VOL 1, 2014, 244 : 375 - 387
  • [35] Automatic secure fingerprint verification system based on fuzzy vault scheme
    Yang, SL
    Verbauwhede, I
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 609 - 612
  • [36] Secure Code Update for Embedded Devices via Proofs of Secure Erasure
    Perito, Daniele
    Tsudik, Gene
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 643 - 662
  • [37] Efficient construction and verification of embedded software
    Glesner, Sabine
    EMBEDDED SYSTEMS - MODELING, TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2006, : 21 - 32
  • [38] Firmware Verification of Embedded Devices Based on a Blockchain
    Lee, Boohyung
    Malik, Sehrish
    Wi, Sarang
    Lee, Jong-Hyouk
    QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS IN HETEROGENEOUS NETWORKS, 2017, 199 : 52 - 61
  • [39] An efficient selective encryption of fingerprint images for embedded processors
    Moon, Daesung
    Chung, Yongwha
    Pan, Sung Bum
    Moon, Kiyoung
    Chung, Kyo
    ETRI JOURNAL, 2006, 28 (04) : 444 - 452
  • [40] Efficient fingerprint image enhancement for mobile embedded systems
    Chen, JS
    Moon, YS
    Fong, KF
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3087 : 146 - 157