Since singular point extraction plays an important role in many fingerprint recognition systems, a digital circuit to implement such processing is presented herein. A novel algorithm that combines hardware efficiency with precision in the extraction of the points has been developed. The circuit architecture contains three main building blocks...
-
March 28, 2017 (v1)PublicationUploaded on: March 25, 2023
-
March 23, 2017 (v1)Publication
The use of Ring Oscillator PUFs to provide circuit authentication is analyzed in this paper. The limitations of the previously reported approach in terms of false rejection (due to high intra-die variations) and false acceptance (due to small inter-die variations) are discussed. These limitations ...
Uploaded on: March 27, 2023 -
November 4, 2022 (v1)Publication
Método de identificación de huellas dactilares y dispositivo que hace uso del mismo.Se describen en este documento un método y un dispositivo que permiten generar un vector de características de una huella dactilar humana mediante una serie de procesos re
Uploaded on: December 4, 2022 -
April 24, 2017 (v1)Publication
This paper presents the implementation of a complete fingerprint biometric cryptosystem in a Field Programmable Gate Array (FPGA). This is possible thanks to the use of a novel fingerprint feature, named QFingerMap, which is binary, length-fixed, and ordered. Security of Authentication on FPGA is further improved because information stored is...
Uploaded on: March 27, 2023 -
March 23, 2017 (v1)Publication
Lightweight security is currently a challenge in the field of cryptography. Most of applications designed for embedded scenarios often focus on authentication or on providing some form of anonymity and/or privacy. A well-known cryptographic element employed to provide such security is the HMAC construction. However, reported solutions are not...
Uploaded on: December 4, 2022 -
March 24, 2017 (v1)Publication
Most of contributions for biometric recognition solutions (and specifically for fingerprint recognition) are implemented in software on PC or similar platforms. However, the wide spread of embedded systems means that fingerprint embedded systems will be progressively demanded and, hence, hardware dedicated solutions are needed to satisfy their...
Uploaded on: December 4, 2022 -
April 11, 2017 (v1)Publication
The first step in any fingerprint recognition system is the fingerprint acquisition. A well-acquired fingerprint image results in high-resolution accuracy and low computational effort of processing. Hence, it is very useful for the recognition system to evaluate recognition confidence level to request new fingerprint samples if the confidence...
Uploaded on: March 27, 2023 -
March 16, 2017 (v1)Publication
This paper describes a methodology to extract fuzzy models that describe linguistically the low-level features of an image (such as color, texture, etc.). The methodology combines grid-based algorithms with clustering and tabular simplification methods to compress image information into a small number of fuzzy rules with high linguistic...
Uploaded on: December 5, 2022 -
September 21, 2022 (v1)Publication
Biometric recognition has the potential to authenticate individuals by an intrinsic link between the individual and their physical, physiological and/or behavioral characteristics. This leads a higher security level than the authentication solely based on knowledge or possession. One of the reasons why biometrics is not completely accepted is...
Uploaded on: March 24, 2023 -
January 8, 2024 (v1)Publication
This paper proposes a global fingerprint feature named QFingerMap that provides fuzzy information about a fingerprint image. A fuzzy rule that combines information from several QFingerMaps is employed to register an individual in a database. Error and penetration rates of a fuzzy retrieval system based on those rules are similar to other...
Uploaded on: January 10, 2024 -
January 9, 2024 (v1)Publication
This paper proposes an access control system based on the simultaneous authentication of what the user has and who the user is. At enrollment phase, the wearable access device (a smart card, key fob, etc.) stores a template that results from the fusion of the intrinsic device identifier and the user biometric identifier. At verification phase,...
Uploaded on: January 12, 2024 -
March 24, 2017 (v1)Publication
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated...
Uploaded on: March 25, 2023 -
May 30, 2016 (v1)Publication
Fuzzy controllers have been proven to be universal, that is, they can provide any control surface. Their microelectronic implementation is very suitable to achieve high-speed (real-time operation), and low area and power consumption. This paper focuses on discussing the two basic approaches that can be employed to design programmable universal...
Uploaded on: March 27, 2023 -
February 7, 2023 (v1)Publication
This paper presents a new form of piecewise-affine (PWA) solution, referred to as PWA hierarchical (PWAH), to approximate the explicit model predictive control (MPC) law, achieving a very rapid control response with the use of very few computational and memory resources. This is possible because PWAH controllers consist of single-input...
Uploaded on: February 28, 2023 -
April 7, 2022 (v1)Publication
Physical Unclonable Functions (PUFs) have gained a great interest for their capability to identify devices uniquely and to be a lightweight primitive in cryptographic protocols. However, several reported attacks have shown that virtual copies (mathematical clones) as well as physical clones of PUFs are possible, so that they cannot be...
Uploaded on: March 25, 2023 -
March 24, 2017 (v1)Publication
Fuzzy models, traditionally used in the control field to model controllers or plants behavior, are used in this work to describe fingerprint images. The textures, in this case the directions of the fingerprint ridges, are described for the whole image by fuzzy if-then rules whose antecedents consider a part of the image and the consequent is...
Uploaded on: December 4, 2022 -
March 29, 2017 (v1)Publication
No description
Uploaded on: March 27, 2023 -
March 23, 2017 (v1)Publication
Fingerprint orientation image, also called directional image, is a widely used method in fingerprint recognition. It helps in classification (accelerating fingerprint identification process) as well as in preprocessing or processing steps (such as fingerprint enhancement or minutiae extraction). Hence, efficient storage of directional...
Uploaded on: December 4, 2022 -
September 14, 2023 (v1)Publication
Ethereum is a dynamic blockchain that grows every day thanks to a community that creates and decides on various of its issues. The community participates through Ethereum Improvement Proposals (EIPs) at many levels, from proposals that describe new standards for the creation of new tokens to proposals that define new ways for the Ethereum...
Uploaded on: October 18, 2023 -
September 13, 2023 (v1)Publication
The rental of houses is a common economic activity. However, there are many inconveniences that arise when renting a property. The lack of trust between the landlord and the tenant due to fraud or squatters makes it necessary to involve third parties to minimize risk. A blockchain (such as Ethereum) provides an ideal solution to act as a...
Uploaded on: October 11, 2023 -
December 15, 2022 (v1)Publication
Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) are cryptographic primitives very well suited for secure IoT devices. This paper proposes a circuit, named multibit-RO-PUF-TRNG, which offers the advantages of unifying PUF and TRNG in the same design. It is based on counting the oscillations of pairs of ring...
Uploaded on: March 24, 2023 -
March 29, 2017 (v1)Publication
La presente comunicación describe la utilización de un software de libre distribución, Xfuzzy 3, para ilustrar la aplicación de sistemas difusos al procesamiento de imágenes, en concreto, al problema del aumento de resolución. El proceso de diseño de sistemas difusos quedará cubierto por el uso de las herramientas CAD de descripción,...
Uploaded on: March 27, 2023