Since singular point extraction plays an important role in many fingerprint recognition systems, a digital circuit to implement such processing is presented herein. A novel algorithm that combines hardware efficiency with precision in the extraction of the points has been developed. The circuit architecture contains three main building blocks...
-
March 28, 2017 (v1)PublicationUploaded on: March 25, 2023
-
November 4, 2022 (v1)Publication
Método de identificación de huellas dactilares y dispositivo que hace uso del mismo.Se describen en este documento un método y un dispositivo que permiten generar un vector de características de una huella dactilar humana mediante una serie de procesos re
Uploaded on: December 4, 2022 -
April 24, 2017 (v1)Publication
This paper presents the implementation of a complete fingerprint biometric cryptosystem in a Field Programmable Gate Array (FPGA). This is possible thanks to the use of a novel fingerprint feature, named QFingerMap, which is binary, length-fixed, and ordered. Security of Authentication on FPGA is further improved because information stored is...
Uploaded on: March 27, 2023 -
March 24, 2017 (v1)Publication
Most of contributions for biometric recognition solutions (and specifically for fingerprint recognition) are implemented in software on PC or similar platforms. However, the wide spread of embedded systems means that fingerprint embedded systems will be progressively demanded and, hence, hardware dedicated solutions are needed to satisfy their...
Uploaded on: December 4, 2022 -
April 11, 2017 (v1)Publication
The first step in any fingerprint recognition system is the fingerprint acquisition. A well-acquired fingerprint image results in high-resolution accuracy and low computational effort of processing. Hence, it is very useful for the recognition system to evaluate recognition confidence level to request new fingerprint samples if the confidence...
Uploaded on: March 27, 2023 -
September 21, 2022 (v1)Publication
Biometric recognition has the potential to authenticate individuals by an intrinsic link between the individual and their physical, physiological and/or behavioral characteristics. This leads a higher security level than the authentication solely based on knowledge or possession. One of the reasons why biometrics is not completely accepted is...
Uploaded on: March 24, 2023 -
January 8, 2024 (v1)Publication
This paper proposes a global fingerprint feature named QFingerMap that provides fuzzy information about a fingerprint image. A fuzzy rule that combines information from several QFingerMaps is employed to register an individual in a database. Error and penetration rates of a fuzzy retrieval system based on those rules are similar to other...
Uploaded on: January 10, 2024 -
January 9, 2024 (v1)Publication
This paper proposes an access control system based on the simultaneous authentication of what the user has and who the user is. At enrollment phase, the wearable access device (a smart card, key fob, etc.) stores a template that results from the fusion of the intrinsic device identifier and the user biometric identifier. At verification phase,...
Uploaded on: January 12, 2024 -
March 24, 2017 (v1)Publication
Fuzzy models, traditionally used in the control field to model controllers or plants behavior, are used in this work to describe fingerprint images. The textures, in this case the directions of the fingerprint ridges, are described for the whole image by fuzzy if-then rules whose antecedents consider a part of the image and the consequent is...
Uploaded on: December 4, 2022 -
March 23, 2017 (v1)Publication
Fingerprint orientation image, also called directional image, is a widely used method in fingerprint recognition. It helps in classification (accelerating fingerprint identification process) as well as in preprocessing or processing steps (such as fingerprint enhancement or minutiae extraction). Hence, efficient storage of directional...
Uploaded on: December 4, 2022 -
September 14, 2023 (v1)Publication
Ethereum is a dynamic blockchain that grows every day thanks to a community that creates and decides on various of its issues. The community participates through Ethereum Improvement Proposals (EIPs) at many levels, from proposals that describe new standards for the creation of new tokens to proposals that define new ways for the Ethereum...
Uploaded on: October 18, 2023 -
September 13, 2023 (v1)Publication
The rental of houses is a common economic activity. However, there are many inconveniences that arise when renting a property. The lack of trust between the landlord and the tenant due to fraud or squatters makes it necessary to involve third parties to minimize risk. A blockchain (such as Ethereum) provides an ideal solution to act as a...
Uploaded on: October 11, 2023 -
March 29, 2017 (v1)Publication
La presente comunicación describe la utilización de un software de libre distribución, Xfuzzy 3, para ilustrar la aplicación de sistemas difusos al procesamiento de imágenes, en concreto, al problema del aumento de resolución. El proceso de diseño de sistemas difusos quedará cubierto por el uso de las herramientas CAD de descripción,...
Uploaded on: March 27, 2023 -
March 28, 2017 (v1)Publication
Los entornos de desarrollo de sistemas fuzzy se han empleado normalmente para diseñar sistemas de control y de toma de decisiones pero apenas para diseñar sistemas de procesado de imágenes, a pesar de que este campo cuenta ya con numerosas soluciones basadas en Lógica Fuzzy. En este artículo se muestra cómo el entorno Xfuzzy 3 desarrollado en...
Uploaded on: December 5, 2022 -
February 16, 2024 (v1)Publication
Remote attestation is a powerful mechanism that allows a verifier to know if the hardware of an IoT (Internet-of-Thing) device (acting as a prover) has been counterfeited or tampered with and if its firmware has been altered. Remote attestation is based on collecting and reporting measurements in a trusted way, and should be lightweight for...
Uploaded on: February 18, 2024 -
January 8, 2024 (v1)Publication
This paper presents the design of a prototype for a wearable device that implements a recognition system based on in-air signature into a FPGA that receives data from a 3-axis accelerometer. The Dynamic Time Warping (DTW) algorithm has been analyzed and simplified to reduce the complexity of the hardware architecture that implements the...
Uploaded on: January 10, 2024 -
January 9, 2024 (v1)Publication
A demonstrator has been developed to illustrate the performance of a lightweight fingerprint recognition algorithm based on the feature QFingerMap16, which is extracted from a window of the directional image centered at the convex core of the fingerprint. The algorithm has been implemented into a lowpower ARM Cortex-M3 microcontroller included...
Uploaded on: January 12, 2024 -
September 1, 2022 (v1)Publication
Nowadays, biometrics based on vein patterns as a trait is a promising technique. Vein patterns satisfy universality, distinctiveness, permanence, performance, and protection against circumvention. However, collectability and acceptability are not completely satisfied. These two properties are directly related to acquisition methods. The...
Uploaded on: March 24, 2023 -
August 4, 2023 (v1)Publication
Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric data, to be compared in a protected way, revealing only the comparison result when the private key is known. This is very useful for non-device-centric authentication architectures with clients that provide protected data and external servers that...
Uploaded on: October 11, 2023 -
January 11, 2023 (v1)Publication
This paper describes a demonstrator of a post-quantum-secure facial authentication system distributed between a mobile device acting as a client and a remote computer acting as an authentication server. Homomorphic encryption based on Classic McEliece, one of the fourth-round candidates of the NIST post-quantum standardization process, is...
Uploaded on: March 24, 2023 -
November 13, 2018 (v1)Publication
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to avoid cyberattacks. However, cameras on mobile devices have constraints in size, computation and...
Uploaded on: December 4, 2022 -
January 11, 2023 (v1)Publication
Considered sensitive information by the ISO/IEC 24745, biometric data should be stored and used in a protected way. If not, privacy and security of end-users can be compromised. Also, the advent of quantum computers demands quantum-resistant solutions. This work proposes the use of Kyber and Saber public key encryption (PKE) algorithms together...
Uploaded on: March 24, 2023 -
June 3, 2019 (v1)Publication
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost...
Uploaded on: December 4, 2022 -
May 20, 2021 (v1)Publication
Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets. Current NFTs allow representing assets by a unique identifier, as a possession of an owner. The novelty introduced in this paper is the proposal of smart NFTs to represent IoT devices, which are physical smart assets. Hence, they are...
Uploaded on: March 25, 2023 -
January 9, 2024 (v1)Publication
A number of personal devices, such as smartphones, have incorporated fingerprint recognition solutions for user authentication purposes. This work proposes a dual-factor fingerprint matching scheme based on P-MCCs (Protected Minutia Cylinder-Codes) generated from fingerprint images and PUFs (Physically Unclonable Functions) generated...
Uploaded on: January 12, 2024