Abstract
Automatic Fingerprint Authentication Systems are rapidly being incorporated in a wide range of applications, satisfying the society demand of accurate identification frameworks in order to prevent unauthorised accesses or fraudulent uses. Most of biometrics based personal identification systems run on high-performance computer based platforms, which execute a set of complex algorithms implemented in software. Those solutions cannot be applied to small, low-cost and low-power embedded systems, based on microprocessors without floating-point arithmetic unit. In this article we present a hardware/software implementation of a fingerprint minutiae extraction algorithm. The proposed system consists of a microprocessor and a coprocessor implemented in an associated FPGA. In order to develop an efficient implementation, fixed-point computations have substituted the floating-point ones. Due to the low feature requirements the whole system is suitable for a SoC with embedded flexible hardware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AuthenTec FingerLoc TMS320C5509 DSP-based EDK, http://www.authentec.com
Biometric Information Autonomous Systems Research Group. Università di Bolognia, http://bias.csr.unibo.it/
Bioscrypt MV1200 OEM Module, http://www.bioscrypt.com
Canto, E., et al.: FPGA Implementation of the Ridge Line Following Fingerprint Algorithm. In: Proceedings of the XIX Conference on Design of Circuits and Integrated Systems, DCIS 2004 (2004)
Canto, E., et al.: Coprocessor of the Ridge Line Following Fingerprint Algorithm. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol. 3203, Springer, Heidelberg (2004) ISBN 3-540-22989-2
Chapel, C.E.: Fingerprinting. Coward McCann, New York (1971)
Cogent Systems SecurARM OEM Identification Module, http://www.cogentsystems.com
Donahue, M.J., Rokhlin, S.I.: On the use of Level Curves in Image Analysis. Image Undestanding 57(2) (1993)
Fingerprint Cards FPC2000 Fingerprint Processor, http://fingerprints.com
Galton, F.: Finger Prints. Macmillan, London (1892)
Halici, U., Ongun, G.: Fingerprint Classification Through Self-Organized Feature Maps Modified to Treat Uncertainities. Proceedings of the IEEE 84(10) (October 1996)
IKE-1 Multifunction Controller for Image Processing Applications, http://www.ikendi.com
Jain, L.C., et al.: Intelligent Biometric Techniques in Fingerprint and Face recognition. CRC Press, New York (2000) ISBN 0-8493-2055-0
Maio, D., Maltoni, D.: Direct Gray-Scale Minutiae Detection In Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(1) (January 1997)
Mehtre, B.M.: Fingerprint Image Analysis for Authomatic Identification. Machine Vision abd Applications 6, 124–139 (1993)
Microblaze Processor Reference Guide. Xilinx Inc., http://www.xilinx.com
PowerPC Processor Reference Guide. Xilinx Inc., http://www.xilinx.com
Ratha, N., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, New York (2004) ISBN: 0-387-95593-3
Suprema UniFinger Stand-alone Fingerprint OEM Module, http://www.suprema.co.kr
Watson, C.I., Wilson, G.L.: Fingerprint Database. National Institute of Standards and Technology. Special Database 4 (April 18, 1992)
Wilson, G.L., et al.: Massively parallel neural network fingerprint classification system. NIST Tech. Rep., Advanced Syst. Div., Image Recognition Group (1993)
Yang, S., et al.: A Compact and Efficient Fingerprint Verification System for Secure Embedded Devices. In: Proc. Of the 37th Asilomar Conference on Signals, Systems and Computers (November 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Canyellas, N., Cantó, E., Forte, G., López, M. (2005). Hardware-Software Codesign of a Fingerprint Identification Algorithm. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_71
Download citation
DOI: https://doi.org/10.1007/11527923_71
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27887-0
Online ISBN: 978-3-540-31638-1
eBook Packages: Computer ScienceComputer Science (R0)