Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
Department of Labor HSPD-12
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
CS 345 Computer System Overview
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Fingerprint Biometrics By Tamar Bar.
Define Embedded Systems Small (?) Application Specific Computer Systems.
Biometrics and Authentication Shivani Kirubanandan.
Mahesh Sukumar Subramanian Srinivasan. Introduction Face detection - determines the locations of human faces in digital images. Binary pattern-classification.
Dynamic Hardware Software Partitioning A First Approach Komal Kasat Nalini Kumar Gaurav Chitroda.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
HW/SW PARTITIONING OF FLOATING POINT SOFTWARE APPLICATIONS TO FIXED - POINTED COPROCESSOR CIRCUITS - Nalini Kumar Gaurav Chitroda Komal Kasat.
“Fingerprint Recognition based on Silicon Chips”.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Human-computer interfaces. Operating systems are software (i.e. programs) used to control the hardware directly used to run the applications software.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
BIOMETRICS.
Hardware/Software Co-Design of Complex Embedded System NIKOLAOS S. VOROS, LUIS SANCHES, ALEJANDRO ALONSO, ALEXIOS N. BIRBAS, MICHAEL BIRBAS, AHMED JERRAYA.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Multimodal Biometric Security 1.
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics , Computer & Network Security 1
Presentation transcript:

Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda

Outline Motivation Introduction Finger-print Based Sensors System-On-Chip Architectures Hardware-Software System Co-Design Results and Conclusions Future Work

Motivation Differences in Biological characteristics Using them to improve security Using them in place of Pins and Passwords Fingerprint Recognition systems

Introduction Stages of Biometric Recognition Process - Enrolment: Measurement of particular Biometric characteristic of user - Authentication: Comparison of stored template and current input. - Processing and Action Phase Fingerprint Recognition Systems: - Ridges and Valleys Identification - Fingerprint Pores

Finger-print based sensors Optical sensors Ultrasound sensors RF sensors Silicon based Sensors Pressure based sensors Capacitance based sensors Thermal sensors

System-On-Chip Architecture

Hardware-Software Co-Design Overview : The paper focuses on the first stage of the System Acquisition and Reconstruction

HW-SW partitioning Compute-intensive tasks are selected to be implemented by Hardware - Image Acquisition and Reconstruction Less intensive tasks are implemented by Software running on Microprocessor - Sequence of steps or scheduling - Detection of finger on sensor

SOFTWARE TASKSHARDWARE TASKS T IMESEQUENCET IMESEQUENCE No Finger On Sensor Finger On Sensor Task 1: Finger Detection Task 3: Image Reconstruction Task 2: Slice Acquisition Task 4: Image Storage Task 5: END Fingerprint Acquisition No Finger On Sensor

Image Acquisition Stage A) Handling of the sensor to get the fingerprint slices B) Storage of the captured slices in a correct way

Reconstruction On-the-Fly Stage Tasks in Reconstruction Stage: a) Management of the concurrent acquisition stage, b) Reconstruction of the fingerprint image from the acquired slices c) Handshaking with the microcontroller in order to allow the image storage process.

Overlap is found between the first and second slices by line comparison. After detection of overlap an interrupt is generated to the microcontroller to transfer the overlapped lines to memory. Repeated till done or finger taken off

Acquisition time is obviously dependent on finger sliding speed. But good quality fingerprint images can be obtained at freq of 200 slices/sec.

Results and Conclusions The platform permits the Hw-Sw co- design of medium-low complex systems. The described architecture has provided the authors with a low-cost solution. The first stage of the Automated Fingerprint identification system is detailed.

Future Work To develop further stages: - image enhancement phase - Signature Extraction - Signature Storage - Biometric matching - Encryption of the verification result

Questions ???