Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Fingerprint verification using smart cards for access control systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Sanchez-Reillo, R. ; Dpt. Ingenieria Electrica, Electronica y Autom, Univ. Carlos III, Leganes, Spain ; Sanchez-Avila, C.

During the last years, the authors have been trying to integrate biometrics inside a smart card. In order to improve the error rates obtained with hand geometry biometrics, and the cost involved with iris recognition systems, fingerprints will be used. This technique, quite well known in the industry and deeply studied in the last century, have improved its electronic sensors, pulling down the prices, and therefore enabling its use in many more applications. The first step is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables a feature extraction step, in order to obtain the location and type of all minutiae, i.e. the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied in order to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are described, showing the paths that should be followed in order to improve the security of access control and payment systems available today

Published in:

Security Technology, 2001 IEEE 35th International Carnahan Conference on

Date of Conference:

Oct 2001