Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Optimisation of biometric ID tokens by using hardware/software co-design

Optimisation of biometric ID tokens by using hardware/software co-design

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In current society, the necessity of recognising people is increasing every day. Logical or physical access is restricted to authorised users, which in many cases have to provide tokens where their personal information is stored. At the same time, biometrics proposes a feasible solution for the recognition problem. The combination of both solutions is coming up front. However, up till now, owing to processing restrictions, these tokens are just able to store data and perform the last steps of the biometric recognition process. In this study, the authors propose a new system where tokens are based on hardware/software (HW/SW) co-design, which allows computing most of the biometric process in them. This proposal covers several aspects which these systems are subject to, taking advantages of the two platforms they use for reducing computational time or HW area, and also to increase security or minimise misidentification errors. For testing this proposal, an Iris ID token has been implemented, showing different design alternatives adapted to different work scenarios.

References

    1. 1)
    2. 2)
      • Grabowski, K., Sankowski, W., Napieralska, M., Zubert, M., Napieralski, A.: `Iris recognition algorithm optimized for hardware implementation', 2006 IEEE Symp. on Computational Intelligence and Bioinformatics and Computational Biology, 2006 (CIBCB’06), 2006, p. 1–5.
    3. 3)
      • Khalil-Hani, M., Eng, P.C.: `FPGA-based embedded system implementation of finger vein biometrics', 2010 IEEE Symp. on Industrial Electronics & Applications (ISIEA), October 2010, p. 700–705.
    4. 4)
      • F. Glover , B. Melian . Tabu search. Revista iberoamericana de inteligencia artificial , 19 , 29 - 45
    5. 5)
      • Pan, S.B., Moon, D., Kim, K., Chung, Y.: `A VLSI implementation of minutiae extraction for secure fingerprint authentication', 2006 Int. Conf. on Computational Intelligence and Security, November 2006, p. 605–615.
    6. 6)
      • Eles, P., Peng, Z., Kuchcinski, K., Doboli, A.: `Hardware/software partitioning with iterative improvements heuristics', Ninth Int. Symp. on System Synthesis, November 1996, p. 71–76.
    7. 7)
    8. 8)
      • ISO/IEC 19792: ‘Information technology – security techniques – security evaluation of biometrics’, 2009.
    9. 9)
    10. 10)
    11. 11)
      • Jigang, W., Srikanthan, T., Jiao, T.: `Efficient algorithm for functional scheduling in hardware/software codesign', Proc IEEE Int. Conf. on Field Programmable Technology, December 2006, p. 65–72.
    12. 12)
      • Sanchez-Reillo, R., Liu-Jimenez, J., Entrena, L.: `Architectures for biometric match-on-token solutions', ECCV Workshop BioAW, 2004, p. 195–204.
    13. 13)
    14. 14)
    15. 15)
    16. 16)
    17. 17)
      • Mobio project (Mobile Biometry), 2010, http://www.mobioproject.org/.
    18. 18)
      • Alander, J.T.: `On optimal population size of genetic algorithms', Proc. CompEuro’92: Computer Systems and Software Engineering, May 1992, p. 65–70.
    19. 19)
      • National institute of standards and technology ice database: http://iris.nist.gov/ice/, 2005.
    20. 20)
      • Luo, R.C., Liu, H.-H.: `Design and implementation of efficient hardware solution based sub-window architecture of Haar classifiers for real-time detection of face biometrics', 2010 Int. Conf. on Mechatronics and Automation (ICMA), August 2010, p. 1563–1568.
    21. 21)
      • www.xilinx.com.
    22. 22)
    23. 23)
    24. 24)
      • J. Rabaey , A. Chandrakasan , B. Nikolic . (2003) Digital integrated circuits.
    25. 25)
      • Grabowski, K., Napieralski, A.: `Hardware architecture for advanced image processing', 2010 IEEE Nuclear Science Symp. Conf. Record (NSS/MIC), 2010, p. 3626–3633.
    26. 26)
      • P. Reid . (2003) Biometrics for network security.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2012.0004
Loading

Related content

content/journals/10.1049/iet-bmt.2012.0004
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address