TITLE

DSP for smart biometric solutions

AUTHOR(S)
Sathappan, Ram
PUB. DATE
September 2004
SOURCE
Portable Design;Sep2004, Vol. 10 Issue 9, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article highlights that digital signal processor (DSP) will bring revolution to the core of the biometric authentication process comprising of image processing and pattern matching. DSP have a distinct advantage in the biometrics market and play a pivotal role in the development and adoption of biometric systems. DSP-based systems provide inherent precision and enable image enhancement that lead to greater accuracy in terms of error rates. A DSP programmability provides the flexibility of reusing the design in multiple applications and adjusts error thresholds depending on the application's security needs. With the high-performance capabilities of DSP, the system's total recognition time can be reduced without an increase in power consumption generally associated with faster processors. This low power consumption is achieved with hardware enhancements and leading-edge process technology, providing customers with a powerful yet low overhead processor for multiple biometric applications, both battery and ac-powered.
ACCESSION #
14441318

 

Related Articles

  • Biometrics Doesn't Quicken Corporate Pulses. Crowley, Aileen // PC Week;01/04/99, Vol. 16 Issue 1, p61 

    Discusses the slow corporate acceptance of biometric equipment for computer security. Cost and quality issues which have kept biometry out of the mainstream; Biometry's success in controlling physical access; Issues to consider when looking at biometry; The challenge of integrating biometry...

  • Continuous Authentication using Biometric Keystroke Dynamics. Bours, Patrick; Barghouthi, Hafez // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2009, p1 

    When talking about authentication in general and biometrics in particular, we envisage a situation where a user provides an identity and gives proof of this identity, in order to get access to certain services. This kind of authentication (called static authentication) is done when first...

  • Biometrics: All the Way or Not at All. Surkan, Michael // PC Week;12/07/98, Vol. 15 Issue 49, p144 

    Focuses on the use of biometric security for authentication in computer networks. The importance of price and practicality when looking at biometry products; The hardware required to implement biometric authentication; Flaws in biometric security which make it impractical in network situations;...

  • Privacy Concerns and Offshore Outsourcing Security. Changchit, Chuleeporn // Journal of Information Privacy & Security;2011, Vol. 7 Issue 2, p1 

    The article discusses various papers published within the issue including one on a countermeasure for keylogging attacks, another on usable authentication, and another one on the effect of information politics on the effectiveness of Health Information Exchange Networks.

  • A Hybrid System for Fingerprint Identification. Tadvi, Shabana; Kolte, Mahesh // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 3, p767 

    Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint identification; the minutiae based, show poor performance for real time...

  • Simulation Model of Biometric Authentication Using Multiagent Approach. KapczyƄski, Adrian; Owczarek, Tomasz // Journal of Telecommunications & Information Technology;2010, Vol. 2010 Issue 4, p68 

    No abstract available.

  • Identifying Legal Concerns in the Biometric Context. Yue Liu // Journal of International Commercial Law & Technology;Jan2008, Vol. 3 Issue 1, p45 

    This paper aims to contribute to the debate of biometrics and privacy concerns by examining the existing legal and academic debates. Several controversial legal problems in the biometric context will be discussed such as the following: the legal status of biometric data, the storage of biometric...

  • A Fuzzy Vault Scheme for Ordered Biometrics. Lifang Wu; Peng Xiao; Songlong Yuan; Siyuan Jiang; Chang Wen Chen // Journal of Communications;Dec2011, Vol. 6 Issue 9, p682 

    The fuzzy vault scheme has recently become popular approaches to biometric template protection. Since the original scheme has been designed to work with unordered biometric features, such a scheme cannot effectively utilize order information. We present in this paper a new fuzzy vault scheme...

  • A Framework for Token and Biometrics Based Authentication in Computer Systems. Jian De Zheng // Journal of Computers;Jun2011, Vol. 6 Issue 6, p1206 

    User authentication is of vital importance to the security of computer systems. This paper proposes a new framework for multifactor authentication using token and various biometrics, such as fingerprint, retina scan, hand geometry and face pattern, which allows the authenticator, usually runs as...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics