2003
DOI: 10.1007/3-540-45103-x_131
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of the USB Token System for Fingerprint Verification

Abstract: In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers (PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to take place in the security token(e.g., smart card, USB token). However, there is an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Only C(36,13) ≈ 2.3×10 9 of these combinations will reveal the secret(i.e., unlock the vault). Thus, it will need an average of 3.4×10 11 (=C(230,9)/C(30,9)) evaluations for an attacker to crack the vault.…”
Section: Implementation Details and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Only C(36,13) ≈ 2.3×10 9 of these combinations will reveal the secret(i.e., unlock the vault). Thus, it will need an average of 3.4×10 11 (=C(230,9)/C(30,9)) evaluations for an attacker to crack the vault.…”
Section: Implementation Details and Experimental Resultsmentioning
confidence: 99%
“…A fingerprint authentication system has two phases: enrollment and verification [11]. In the off-line enrollment phase, an enrolled fingerprint image is preprocessed, and features, called as minutiae, are extracted and stored.…”
Section: Fingerprint Verificationmentioning
confidence: 99%