Designing a System For Authenticating a Magnetic Fingerprint Signal Andrew Cowley and Jason Binder Abstract Methods Introduction Results Future Directions.

Slides:



Advertisements
Similar presentations
Signal Encoding Techniques
Advertisements

EET260 Introduction to digital communication
Chapter : Digital Modulation 4.2 : Digital Transmission
Chapter 2 Fundamentals of Data and Signals
Motivation Application driven -- VoD, Information on Demand (WWW), education, telemedicine, videoconference, videophone Storage capacity Large capacity.
Data Acquisition Risanuri Hidayat.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Sixth Edition.
Lagrangian measurements using Doppler techniques: Laser and Ultrasound Nicolas Mordant (Ecole Normale Supérieure de Paris) Romain Volk, Artyom Petrosyan,
1/42 Changkun Park Title Dual mode RF CMOS Power Amplifier with transformer for polar transmitters March. 26, 2007 Changkun Park Wave Embedded Integrated.
Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Lecture 101 Introduction to Energy Storage Elements: The Capacitor.
X-Ray Survey of The ATLAS SCT. The ATLAS Semi-Conductor Tracker.
Top Level System Block Diagram BSS Block Diagram Abstract In today's expanding business environment, conference call technology has become an integral.
Aki Hecht Seminar in Databases (236826) January 2009
Magnetometer calibration and detection Robert Szewczyk, Alec Woo Nest Retreat June 17, 2002.
1 HW/SW Partitioning Embedded Systems Design. 2 Hardware/Software Codesign “Exploration of the system design space formed by combinations of hardware.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Fifth Edition.
Chapter 2 Fundamentals of Data and Signals
Chapter 2: Fundamentals of Data and Signals. 2 Objectives After reading this chapter, you should be able to: Distinguish between data and signals, and.
Does this seem familiar… Are you ever out shopping… Or buying gas… Or out to dinner… …And think you are going to go crazy because your credit card wont.
Simulation of an Optical Fiber Point to Point Communication link using Simulink By Nihal Shastry Uday Madireddy Nitin Ravi.
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Microcomputer Systems 1 Introduction to DSP’s. 9 August 2015Veton Këpuska2 Introduction to DSP’s  Definition: DSP – Digital Signal Processing/Processor.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Principles of MRI Physics and Engineering
Inputs to Signal Generation.vi: -Initial Distance (m) -Velocity (m/s) -Chirp Duration (s) -Sampling Info (Sampling Frequency, Window Size) -Original Signal.
Digital Image Characteristic
Sound Source Localization based Robot Navigation Group 13 Supervised By: Dr. A. G. Buddhika P. Jayasekara Dr. A. M. Harsha S. Abeykoon 13-1 :R.U.G.Punchihewa.
Introduction to IT and Communications Technology Justin Champion Network Connections & Number Systems.
Data Communications & Computer Networks, Second Edition1 Chapter 2 Fundamentals of Data and Signals.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
A 30-GS/sec Track and Hold Amplifier in 0.13-µm CMOS Technology
MiniCheck OCR Enhancement CSCI 6838 Capstone Project Team # 3 Fall 2007
Anti-Fraud System Design: Authenticating Magnetic Fingerprint Signal Amanda Spencer AND Raja Timihiri Dr. Robert E. Morley, Jr., Edward J. Richter, Washington.
FE8113 ”High Speed Data Converters”. Part 2: Digital background calibration.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Information Theory The Work of Claude Shannon ( ) and others.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
©F.M. Rietti Electro Dynamics Fundamentals. ©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 2 Electro Dynamics (cont) Ohm Law (DC) –Ohm's law.
Lecture#10 Spectrum Estimation
Chapter 2 Fundamentals of Data and Signals
Chapter : Digital Modulation 4.2 : Digital Transmission
Motion Detection and Processing Performance Analysis Thomas Eggers, Mark Rosenberg Department of Electrical and Systems Engineering Abstract Histograms.
Analog/Digital Conversion
Credit Card Offerings. The Mobile Offering Basket allows your church to collect credit card offerings.
Figure Analog-to-digital conversion.. Figure The DAC output is a staircase approximation to the original signal. Filtering removes the sharp.
Digital Technology 14.1 Analogue and Digital Signals.
Magnetic Resonance Imaging Glenn Pierce, King’s College London, Department of Physics Introduction Edward Purcell and Felix Bloch were both awarded the.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Introduction to Data Conversion EE174 – SJSU Tan Nguyen.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
 Sensor (S)–converts arbitary physical quantity into electric signal  Adaptor (A)–provides signal amplification to a required level; expands a dynamic.
Midterm Review 28-29/05/2015 Progress on wire-based accelerating structure alignment Natalia Galindo Munoz RF-structure development meeting 13/04/2016.
1 Summary Lecture: Part 1 Sensor Readout Electronics and Data Conversion Discovering Sensor Networks: Applications in Structural Health Monitoring.
CHAPTER 4. OUTLINES 1. Digital Modulation Introduction Information capacity, Bits, Bit Rate, Baud, M- ary encoding ASK, FSK, PSK, QPSK, QAM 2. Digital.
1. Presentation Agenda  Identify Java Card Technology  Identify Elements of Java Card applications  Communicating with a Java Card Applet  Java Card.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
MECH 373 Instrumentation and Measurements
SE40 Meeting on Pseudolites JRC test results
Prototyping SoC-based Gate Drive Logic for Power Convertors by Generating code from Simulink models. Researchers Rounak Siddaiah, Graduate Student-University.
B.Sc. Thesis by Çağrı Gürleyük
Digital Control Systems
Sampling rate conversion by a rational factor
Signal conditioning.
pocketVNA What is a Vector Network Analyzer?
Basic Concepts of Audio Watermarking
Analog-to-digital converter
♪ Embedded System Design: Synthesizing Music Using Programmable Logic
Embedded Sound Processing : Implementing the Echo Effect
Presentation transcript:

Designing a System For Authenticating a Magnetic Fingerprint Signal Andrew Cowley and Jason Binder Abstract Methods Introduction Results Future Directions Literature Cited Acknowledgements The Software and Hardware Used The simulations and data collection were all coded using LabVIEW. The swipe signals were collected using a magnetic stripe card reader, and amplifier circuit, and the Elvis II Prototyping Board. Other modifications should be done to make the system commercially viable. To help test the system, we treated the forward and backward swipes of each card as two different cards. This was possible because the MagnePrint™ of a backward swipe is flipped, and therefore correlates with the corresponding forward swipe to zero, as would two different cards. In a real-world application, the MagnePrint™ for a backward swipe should be flipped in time so that the swipe direction has no effect on the authentication process. Another necessity to implement the system commercially is to create a server to store the MagnePrints™ associated with each card, as opposed to storing the data locally. Finally, the sampling speed of card reader ADC should be increased to allow for swipes with speeds greater than 40 IPS to be accurately recorded and processed. MagnePrint™ Simulations Track 1 Data MagnePrint™ Collection and Analysis Track 2 Data MagnePrint™ Collection and Analysis 1.Morley, Jr. et al. Method and Apparatus For Authentication a Magnetic Fingerprint Signal Using a Filter Capable of Isolating a Remnant Noise Related Signal Component. U.S. Patent 7,478,751 B2, filed December 17, 2004, and issued January 20, We would like to both acknowledge and thank Professor Morley for assisting us with this research project by providing both the necessary equipment, as well as guidance. A large amount of credit card fraud that occurs every year results from the copying of an authentic card’s data to a skim card. One method for preventing this fraud is to design a system with the ability to dynamically differentiate between two unique cards regardless of the binary information encoded on them. Due to the imperfect alignment of ferromagnetic particles in a magnetic stripe, each magnetic strip card contains a unique, data- independent fingerprint (MagnePrint™) that may be detected with a card reader and used for authentication. We successfully designed a system to store card swipes in a database, extract the MagnePrint™ from each swipe, and correlate these MagnePrints™ together in order to determine the authenticity of a given swipe. Magnetic Stripe Card Swipe Basics The stripes on cards are composed of ferromagnetic rods fixed in a resin. Data is encoded on the card by changing the polarity of the rods at specific points along the card. During a swipe, the time-varying magnetic field from the polarity shifting of the rods at an inductive read head yields an electric signal with an amplitude proportional to the density of the rods and to the swipe speed. Ideally, all of these rods are perfectly aligned with the length of the magnetic stripe, meaning a switch in polarity would yield an electrical data signal with maximum amplitude. However, the rods are not perfectly aligned with the length of the magnetic stripe, yielding a small signal embedded within the data signal. This small signal causes the amplitude of the data signal to vary from ideal at a greater frequency than the data signal. From the literature, we know that this small signal is at about -40dB relative to the data signal, and has an amplitude of about 20µV pk /IPS. This small signal is unique to each magnetic stripe and is independent of the encoded data, thus it may be used for card authentication. Any given card may be authenticated by correlating the small signal, extracted at the point of sale, with its MagnePrint™, extracted by the card manufacturer and stored in a secure database. Electric data signal with embedded MagnePrint™ ƒ Spatial sensitivity of read head yields band-limited, high-pass filter …M-3M-2M-1 Δ ΔΔ Number of Bits M Δ Mean Smoothing Filter used to extract MagnePrint from center of zero bits (N = 33) Parameter Track 1 (384 bits) Track 1 (No Constraints) Track 2 (384 bits) Track 2 (No Constraints) Δ M (# of Samples) numBits Separation (S) The Separation with a Δ of 20 and 384 total bits per MagnePrint™ Δ Number of Bits The Separation with 3 bits per sample and 128 total samples per MagnePrint™ Correlation distributions for M = 128, Delta = 20, and 3 bits per sample Accept correlation distributions based on the swipe speeds of the correlated MagnePrints™