System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

Optimisation of biometric ID tokens by using hardware/software co-design

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Liu-Jimenez, J. ; Univ. Group for Identification Technol., Carlos III Univ. of Madrid, Leganes, Spain ; Sanchez-Reillo, R. ; Mengibar-Pozo, L. ; Miguel-Hurtado, O.

In current society, the necessity of recognising people is increasing every day. Logical or physical access is restricted to authorised users, which in many cases have to provide tokens where their personal information is stored. At the same time, biometrics proposes a feasible solution for the recognition problem. The combination of both solutions is coming up front. However, up till now, owing to processing restrictions, these tokens are just able to store data and perform the last steps of the biometric recognition process. In this study, the authors propose a new system where tokens are based on hardware/software (HW/SW) co-design, which allows computing most of the biometric process in them. This proposal covers several aspects which these systems are subject to, taking advantages of the two platforms they use for reducing computational time or HW area, and also to increase security or minimise misidentification errors. For testing this proposal, an Iris ID token has been implemented, showing different design alternatives adapted to different work scenarios.

Published in:

Biometrics, IET  (Volume:1 ,  Issue: 3 )