663 research outputs found

    Design of an embedded iris recognition system for use with a multi-factor authentication system.

    Get PDF
    This paper describes in detail the design, manufacturing and testing of an embedded iris scanner for use with a multifactor authentication system. The design process for this project included hardware design from part selection to board design to populating. Additionally, this process included the entirety of the software development, though the iris recognition process was largely based on other works. The functional requirements for the overall multi-factor authentication system were to have three authentication methods with a thirty second window to complete all three. The system acceptance accuracy was required to be greater than 75%. Those requirements therefore dictate that the iris scanner module must also have an acceptance accuracy higher than 75% and perform iris recognition in a few seconds so that the user can gain admittance in the allotted window of time. While the hardware has been verified and tested, further development and testing is necessary on the software and image processing. This work is funded by the Department of Energy’s Kansas City National Security Campus, operated by Honeywell Federal Manufacturing & Technologies, LLC under contract number DE-NA0002839

    Privacy Leakages in Approximate Adders

    Full text link
    Approximate computing has recently emerged as a promising method to meet the low power requirements of digital designs. The erroneous outputs produced in approximate computing can be partially a function of each chip's process variation. We show that, in such schemes, the erroneous outputs produced on each chip instance can reveal the identity of the chip that performed the computation, possibly jeopardizing user privacy. In this work, we perform simulation experiments on 32-bit Ripple Carry Adders, Carry Lookahead Adders, and Han-Carlson Adders running at over-scaled operating points. Our results show that identification is possible, we contrast the identifiability of each type of adder, and we quantify how success of identification varies with the extent of over-scaling and noise. Our results are the first to show that approximate digital computations may compromise privacy. Designers of future approximate computing systems should be aware of the possible privacy leakages and decide whether mitigation is warranted in their application.Comment: 2017 IEEE International Symposium on Circuits and Systems (ISCAS

    Implementation of the Enhanced Fingerprint Authentication in the ATM System Using ATmega128 with GSM Feedback Mechanism

    Get PDF
    ATM was introduced to boost the cashless policy in Nigeria. Current trend of Cybercrime facilitate the need for an enhanced fingerprint application on ATM machine with GSM Feedback mechanism. The mechanism enable unassigned fingerprint authentication of customers with quick code and secret code. The project enhances the security authentication of customers using ATM. A core controller using fingerprint recognition system of ATmega128 in-system programmable flash is explored. An SM630 fingerprint module is used to capture fingerprints with DSP processor and optical sensor for verification, using AT command of GSM module for feedback text messaging (i.e. sending of Quick and Secret-Codes respectively). Upon system testing of capable reduction of ATM fraud using C program, the new method of authentication is presented

    Mobile personal authentication using fingerprint.

    Get PDF
    Cheng Po Sum.Thesis submitted in: July 2003.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 64-67).Abstracts in English and Chinese.List of Figures --- p.iList of Tables --- p.iiiAcknowledgments --- p.iv摘要 --- p.vThesis Abstract --- p.viChapter 1. --- Mobile Commerce --- p.1Chapter 1.1 --- Introduction to Mobile Commerce --- p.1Chapter 1.2 --- Mobile commence payment systems --- p.2Chapter 1.3 --- Security in mobile commerce --- p.5Chapter 2. --- Mobile authentication using Fingerprint --- p.10Chapter 2.1 --- Authentication basics --- p.10Chapter 2.2 --- Fingerprint basics --- p.12Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19Chapter 3.1 --- Objectives --- p.19Chapter 3.2 --- Hardware and software design --- p.21Chapter 3.2.1 --- Choice of hardware platform --- p.21Chapter 3.3 --- Experiments --- p.25Chapter 3.3.1 --- Design methodology I - DSP --- p.25Chapter 3.3.1.1 --- Hardware platform --- p.25Chapter 3.3.1.2 --- Software platform --- p.26Chapter 3.3.1.3 --- Implementation --- p.26Chapter 3.3.1.4 --- Experiment and result --- p.27Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28Chapter 3.3.2.1 --- Hardware components --- p.28Chapter 3.3.2.2 --- Software components --- p.29Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29Chapter 3.3.2.4 --- Experiment and result --- p.30Chapter 3.4 --- Observation --- p.30Chapter 4. --- Implementation of the Device --- p.31Chapter 4.1 --- Choice of platforms --- p.31Chapter 4.2 --- Implementation Details --- p.31Chapter 4.2.1 --- Hardware implementation --- p.31Chapter 4.2.1.1 --- Atmel FingerChip --- p.32Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33Chapter 4.2.2 --- Software implementation --- p.33Chapter 4.2.2.1 --- Operating System --- p.33Chapter 4.2.2.2 --- File System --- p.33Chapter 4.2.2.3 --- Device Driver --- p.35Chapter 4.2.2.4 --- Smart card --- p.38Chapter 4.2.2.5 --- Fingerprint software --- p.41Chapter 4.2.2.6 --- Graphical user interface --- p.41Chapter 4.3 --- Results and observations --- p.44Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47Chapter 5.1 --- Requirement --- p.47Chapter 5.2 --- Design Principles --- p.48Chapter 5.3 --- Implementation --- p.52Chapter 5.4 --- Results and Observation --- p.57Chapter 6. --- Conclusions and future work --- p.62Chapter 7. --- References --- p.6

    Biometrics

    Get PDF
    Biometrics-Unique and Diverse Applications in Nature, Science, and Technology provides a unique sampling of the diverse ways in which biometrics is integrated into our lives and our technology. From time immemorial, we as humans have been intrigued by, perplexed by, and entertained by observing and analyzing ourselves and the natural world around us. Science and technology have evolved to a point where we can empirically record a measure of a biological or behavioral feature and use it for recognizing patterns, trends, and or discrete phenomena, such as individuals' and this is what biometrics is all about. Understanding some of the ways in which we use biometrics and for what specific purposes is what this book is all about
    corecore