Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System
نویسندگان
چکیده
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder’s identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
منابع مشابه
Fingerprint Verification System Involving Smart Card
The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely identical and its permanence. Traditional computer-aided fingerprint identification or verification system has been involving the central database of fingerprints. However, retaining the centra...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملDevelopment of Personal Authentication System using Fingerprint with Digital Signature Technologies
1 Abstract Authentication based on biometrics is being applied to control physical access to high-security facilities. Recently, with the recent rapid growth of information system technologies, applications for accessing databases or business workflow systems have begun to use biometrics. These applications need to implement measures to counter threats to security. In the case of authentication...
متن کاملComparative study of minutiae selection algorithms for ISO fingerprint templates
We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EURASIP J. Adv. Sig. Proc.
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009