Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Digital Image Processing
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Security analysis of smartcard to card reader communications for biometric cardholder authentication
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Implementation of the USB token system for fingerprint verification
SCIA'03 Proceedings of the 13th Scandinavian conference on Image analysis
Hi-index | 0.01 |
In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. To guarantee the integrity/confidentiality of the fingerprint images transmitted, a standard encryption algorithm is employed. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity/confidentiality of the fingerprint images can be guaranteed without any leakage of the ridge information. Also, the image-based selective bitplane encryption can be completed in real-time on embedded processors.