ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
Cited 4 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Byung Kwan Park, Dae Sung Moon, Yong Wha Chung, Jin-Won Park
Issue Date
2006-08
Citation
International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.110-120
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-71093-6_9
Abstract
Verification of a person's identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, the smart card employing 32-bit RISC processors has been released recently. It is possible to consider three strategies to implement the fingerprint system on the smart card environment as how to distribute the modules of the fingerprint verification system between the smart card and the card reader; Store-on-Card, Matchon-Card and System-on-Card. Depending on the scenarios, the security level and the required system resources, such as the processing power and the memory size, are different. However, there is an open issue of integrating fingerprint verification into the smart card because of its limited resources. In this paper, we first evaluate the number of instructions of each step of a typical fingerprint verification algorithm. Then, we estimate the execution times of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted between the smart card and the card reader. Based on these evaluated results, we propose the most proper scenario to implement the fingerprint verification system on the smart card environment in terms of the security level and the real-time execution requirements. © Springer-Verlag Berlin Heidelberg 2007.
KSP Keywords
Cryptographic Algorithms, Fingerprint system, Fingerprint verification system, Limited resources, Memory size, Personal identification number, Real-time execution, Security level, Smart Card, execution time, processing power