skip to main content
10.1145/967900.968070acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic

Authors Info & Claims
Published:14 March 2004Publication History

ABSTRACT

Fingerprint sensors are getting small enough to be included in mobile devices to enable fingerprint verification be employed as an authentication tool when using the mobile devices for secure transactions. Fingerprint verification, however, is a computing intensive technology that requires a lot of floating-point computation. Unfortunately, the embedded processors in most mobile devices do not support floating-point hardware. In this paper, we present the implementation of a fingerprint verification process in an embedded system environment based the StrongArm processor and the embedded Linux operating system. The success of the implementation relies on the use of a fixed-point arithmetic only. The fingerprint verification component, the fixed-point component as well as the technique employed to pair up the two components are described in details. In particular, we estimated the required precisions in the fixed-point representations before conducting experiments. Through our results, we further show that not only the fixed-point implementation achieves the goal of significant speed improvement but is almost as reliable as the floating-point counterparts.

References

  1. A. Jain, H. Lin, R. Bolle, "On-line fingerprint verification," in Pattern Analysis and Machine Intelligence, IEEE Transaction on, Volume: 19 Issue: 4, April 1997 Page(s): 302--314 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Wahab, S. H. Chin, E. C. Tan, "Novel approach to automated fingerprint recognition," in Vision, Image and Signal Processing, IEE Proceedings.-Visual Image Signal Process, Volume: 145 Issue: 3, June 1998Google ScholarGoogle Scholar
  3. D. Maio, D. Maltoni, "Direct gray-scale minutiae detection in fingerprints," in Pattern Analysis and machine Intelligence, IEEE Transactions on, Volume: 19 Issue: 1, Jan. 1997 Page(s): 27--40W.-K. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Lin, Yifei Wan, A. Jain, "Fingerprint image enhancement: algorithm and performance evaluation" in Pattern Analysis and Machine Intelligence, IEEE Transactions, Volume: 20 Issue: 8, Aug. 1998 Page(s): 777 - 789.com/pub/journals/21ps03-vidmar Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. K. Jain, S. Prabhakar, H. Lin, S. Pankanti, "Filterbank-based fingerprint matching", Image Processing, IEEE Transactions on, Volume: 9 Issue: 5, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, A. K. Jain, "FVC2000:fingerprint verification competition" Pattern Analysis and Machine Intelligence,' in IEEE Transactions on, Volume: 24 Issue: 3, March 2002 Page(s): 402--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Willems, V. Buersgens, H, Keding, and H. Meyr, "FRIDGE: An Interactive Fixed-Point Code Generation Environment for HW/SW CoDesign," in Proceeding of the International Conference on Acoustics, Speech, and Signal Processing '97, Apr. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ki-Il Kum, Jiyang Kang "AUTOSCALER For C: An Optimizing Floating-Point to Integer C Program Converter For Fixed-Point Digital Signal Processors,", in IEEE Transcations on Circuits and System-II: Analog and Digital Signal Processing, Vol. 47. No. 9, Sept 2000.Google ScholarGoogle Scholar
  9. K. C. Chan, Y. S. Moon and P. S. Cheng, "Fast Fingerprint Verification using Sub-regions of Fingerprint Images" to appear in the IEEE Transactions on Circuits and Systems for Video Technology, Nov. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
    March 2004
    1733 pages
    ISBN:1581138121
    DOI:10.1145/967900

    Copyright © 2004 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 March 2004

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader