Inside risks: the uses and abuses of biometrics
Communications of the ACM
Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Security analysis of smartcard to card reader communications for biometric cardholder authentication
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Design and implementation of a smart card based healthcare information system
Computer Methods and Programs in Biomedicine
Workload dispatch planning for real-time fingerprint authentication on a sensor-client-server model
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Hi-index | 0.00 |
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.