Inside risks: the uses and abuses of biometrics
Communications of the ACM
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Integrating fingerprint verification into the smart card-based healthcare information system
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
A secure fingerprint authentication system on an untrusted computing environment
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on the sensor, the client, and the server, respectively. Then, based on these primitive performance results, the workload of each scenario of the task assignment was applied to the M/D/1 queueing model representing the sensor-client-server model, and the collective performance of each scenario was analyzed quantitatively. The modeling results showed that extracting features and matching on the server could provide both fast response time and secure authentication with small numbers of clients. As the number of clients was increased, however, a bottleneck was observed on the server. The bottleneck can be eliminated by either performing the feature extraction on the client or increasing the number of processors in the server.