2003
DOI: 10.1007/3-540-36552-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Verification System Involving Smart Card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…In order to speed up the fingerprint image processing, a set of software and hardware optimizations methods are applied, gaining a 65% execution time reduction with less than half the energy consumption. A memory analysis method is 1 In the simulation of our database, there is no false accept error. introduced to trace the program memory usage during run time.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to speed up the fingerprint image processing, a set of software and hardware optimizations methods are applied, gaining a 65% execution time reduction with less than half the energy consumption. A memory analysis method is 1 In the simulation of our database, there is no false accept error. introduced to trace the program memory usage during run time.…”
Section: Resultsmentioning
confidence: 99%
“…By selecting this local structure, we achieve an FRR of 1% and an FAR of less than 0.1%. 1 Also we compared the template size of our matching algorithm with others. For a typical case, 0 ≤ d i ≤ 256, 0 ≤ ϕ i , θ i , Ψ ≤ 32, the average template size for our algorithm is around 0.5 kbytes, which is comparable to the template size in the light category of FVC2004 [21].…”
Section: Definition Of Neighborhood Structurementioning
confidence: 99%
See 1 more Smart Citation
“…In this case the safety of the precious biometric information cannot be guaranteed because attacks might occur during the transmission or on the server. Some embedded systems implement the complex signal preprocessing step on a powerful card reader, and only the matching step is executed on the embedded device [1]. This design still cannot prevent the critical fingerprint leakage since it requires the transmission of raw fingerprint image as well as the template.…”
Section: Introductionmentioning
confidence: 99%