Skip to main content

Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

  • Conference paper
Information Security Applications (WISA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Included in the following conference series:

Abstract

Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, the smart card employing 32-bit RISC processors has been released recently. It is possible to consider three strategies to implement the fingerprint system on the smart card environment as how to distribute the modules of the fingerprint verification system between the smart card and the card reader; Store-on-Card, Match-on-Card and System-on-Card.Depending on the scenarios, the security level and the required system resources, such as the processing power and the memory size, are different. However, there is an open issue of integrating fingerprint verification into the smart card because of its limited resources. In this paper, we first evaluate the number of instructions of each step of a typical fingerprint verification algorithm. Then, we estimate the execution times of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted between the smart card and the card reader. Based on these evaluated results, we propose the most proper scenario to implement the fingerprint verification system on the smart card environment in terms of the security level and the real-time execution requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Bole, R., Panakanti, S.: Fingerprint: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  2. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  3. Moon, D., et al.: An Efficient Selective Encryption of Fingerprint Images for Embedded Processors. ETRI Journal 28(4), 444–452 (2006)

    Google Scholar 

  4. Chung, Y., et al.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Dreifus, H., Monk, T.: Smart Cards. John Wiley & Sons, Chichester (1997)

    Google Scholar 

  6. Hachez, G., Koeune, F., Quisquater, J.: Biometrics, Access Control, Smart Cards: A Not So Simple Combination. In: Proc. of the 4th Working Conf. on Smart Card Research and Advanced Applications, pp. 273–288 (2000)

    Google Scholar 

  7. Sanchez-Reillo, R.: Smart Card Information and Operations using Biometrics. IEEE AEES Mag., 3-6 (2001)

    Google Scholar 

  8. Moon, Y., et al.: Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. Electrical and Computer Engineering 1, 108–112 (2000)

    MathSciNet  Google Scholar 

  9. Rila, L., Mitchell, C.: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. In: Proc. 5th Smart Card Research and Advanced Application Conference (CARDIS ’02), pp. 19–28 (2002)

    Google Scholar 

  10. Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Verification. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)

    Google Scholar 

  11. Samsung, http://www.samsungelectronics.com

  12. X.9.84, http://www.x9.org

  13. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  14. Hankerson, D., et al.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)

    Google Scholar 

  15. Ahn, D., Kim, H.: Fingerprint Recognition Algorithm using Clique(in Korean). Technical Report, Inha University (2000)

    Google Scholar 

  16. Burger, D., Austin, T.: The SimpleScalar Tool Set, Version 2.0. Technical Report, University of Wisconsin (1997)

    Google Scholar 

  17. ARM, http://www.arm.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Park, B., Moon, D., Chung, Y., Park, JW. (2007). Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics