Skip to main content
SpringerOpen journals have moved to Springer Nature Link. Learn more about website changes.
Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. EURASIP Journal on Advances in Signal Processing
  3. Article

Efficient and Secure Fingerprint Verification for Embedded Devices

  • Research Article
  • Open access
  • Published: 01 December 2006
  • Volume 2006, article number 058263, (2006)
  • Cite this article

You have full access to this open access article

Download PDF
Save article
View saved research
EURASIP Journal on Advances in Signal Processing Aims and scope Submit manuscript
Efficient and Secure Fingerprint Verification for Embedded Devices
Download PDF
  • Shenglin Yang1,
  • Kazuo Sakiyama2 &
  • Ingrid Verbauwhede2 
  • 1437 Accesses

  • 10 Citations

  • 6 Altmetric

  • Explore all metrics

Abstract

This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

Article PDF

Download to read the full article text

Similar content being viewed by others

Analysis and Implementation of AFIS Based on ARM

Chapter © 2020

The effect of fingerprint expertise on visual short-term memory

Article Open access 19 March 2024

Enhanced fingerprint authentication: a deep learning and error correction-based biometric cryptosystem

Article 21 October 2025

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Biometrics
  • Embedded Systems
  • Lab-on-a-Chip
  • Personal Computing
  • Register-Transfer-Level Implementation
  • Electronics Design and Verification

References

  1. Gil Y, Moon D, Pan S, Chung Y: Fingerprint verification system involving smart card. Proceedings of the International Conference on Information Security and Cryptology, November 2003, Seoul, Korea, LNCS 2587: 510–524.

    MATH  Google Scholar 

  2. Prabhakar S, Pankanti S, Jain AK: Biometric recognition: security and privacy concerns. IEEE Security and Privacy Magazine 2003, 1(2):33–42. 10.1109/MSECP.2003.1193209

    Article  Google Scholar 

  3. Raghunathan V, Schurgers C, Park S, Srivastava MB: Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine 2002, 19(2):40–50. 10.1109/79.985679

    Article  Google Scholar 

  4. Hrechak AK, Mchugh JA: Automated fingerprint recognition using structural matching. Pattern Recognition 1990, 23(8):893–904. 10.1016/0031-3203(90)90134-7

    Article  Google Scholar 

  5. Jain A, Hong L, Bolle R: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 1997, 19(4):302–314. 10.1109/34.587996

    Article  Google Scholar 

  6. Jiang X, Yau W-Y: Fingerprint minutiae matching based on the local and global structures. Proceedings of the International Conference on Pattern Recognition, September 2000, Barcelona, Spain 6038–6041.

    Google Scholar 

  7. Yang S, Sakiyama K, Verbauwhede I: A compact and efficient fingerprint verification system for secure embedded devices. Proceedings of the 37th Asilomar Conference on Signal Systems, and Computers, November 2003, Pacific Grove, Calif, USA 2058–2062.

    Google Scholar 

  8. Wahab A, Chin SH, Tan EC: Novel approach to automated fingerprint recognition. IEE Proceedings - Vision, Image and Signal Processing 1998, 145(3):160–166. 10.1049/ip-vis:19981809

    Article  Google Scholar 

  9. Panda P, Catthoor F, Dutt N, et al.: Data and memory optimization techniques for embedded systems. ACM Transactions on Design Automation of Electronic Systems 2001, 6(2):149–206. 10.1145/375977.375978

    Article  Google Scholar 

  10. Verbauwhede I, Catthoor F, Vandewalle J, De Man H: Background memory management for the synthesis of algebraic algorithms on multi-processor DSP chips. Proceedings of the International Conference on VLSI (VLSI '89), August 1989, Munich, Germany 209–218.

    Google Scholar 

  11. Verbauwhede I, Scheers C, Rabaey J: Memory estimation for high level synthesis. Proceedings of the 31st ACM/IEEE Design Automation Conference, June 1994, San Diego, Calif, USA 143–148.

    Google Scholar 

  12. Grun P, Balasa F, Dutt N: Memory size estimation for multimedia applications. Proceedings of the 6th International Workshop on Hardware/Software Codesign, March 1998, Seattle, Wash, USA 145–149.

    Chapter  Google Scholar 

  13. Zhao Y, Malik S: Exact memory size estimation for array computations without loop unrolling. Proceedings of the 36th ACM/IEEE Design Automation Conference, June 1999, New Orleans, La, USA 811–816.

    Google Scholar 

  14. Gupta P, Ravi S, Raghunathan A, Jha NK: Efficient fingerprint-based user authentication for embedded systems. Proceedings of Design Automation Conference, June 2005, Anaheim, Calif, USA 228–233.

    Google Scholar 

  15. https://doi.org/www.gaisler.com

  16. FVC2000: The First International Fingerprint Verification Competition, https://doi.org/bias.csr.unibo.it/fvc2000/

  17. https://doi.org/www.authentec.com

  18. Garris MD, Watson CI, McCabe RM, Wilson CL: User's Guide to NIST Fingerprint Image Software (NFIS). NISTIR 6813, National Institute of Standards and Technology

  19. Schaumont P, Sakiyama K, Hodjat A, Verbauwhede I: Embedded software integration for coarse-grain reconfigurable architectures. IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS '04), April 2004, Santa Fe, NM, USA 137–142.

    Google Scholar 

  20. Schaumont P, Verbauwhede I: Interactive cosimulation with partial evaluation. Proceedings of Design Automation and Test in Europe (DATE '04), February 2004, Paris, France 642–647.

    Google Scholar 

  21. FVC2004: The Third International Fingerprint Verification Competition, https://doi.org/bias.csr.unibo.it/fvc2004/

  22. Danckaert K, Catthoor F, De Man H: A loop transformation approach for combined parallelization and data transfer and storage. Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '00), June 2000, Las Vegas, Nev, USA 5: 2591–2597.

    Google Scholar 

  23. Catthoor F, Danckaert K, Wuytack S, Dutt ND: Code transformations for data transfer and storage exploration preprocessing in multimedia processors. IEEE Design & Test of Computers 2001, 18(3):70–82. 10.1109/54.922804

    Article  Google Scholar 

  24. Anderson RJ: Security Engineering, A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York, NY, USA; 2001. chapter 13

    Google Scholar 

  25. https://doi.org/www.ThumbPod.com

  26. Hwang D, Schaumont P, Fan Y, et al.: Design flow for HW/SW acceleration transparency in the ThumbPod secure embedded system. Proceedings of the 40th ACM/IEEE Design Automation Conference, June 2003, Anaheim, Calif, USA 60–65.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Electrical Engineering, University of California, Los Angeles, CA, 90095, USA

    Shenglin Yang

  2. ESAT-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Leuven-Heverlee, 3001, Belgium

    Kazuo Sakiyama & Ingrid Verbauwhede

Authors
  1. Shenglin Yang
    View author publications

    Search author on:PubMed Google Scholar

  2. Kazuo Sakiyama
    View author publications

    Search author on:PubMed Google Scholar

  3. Ingrid Verbauwhede
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Shenglin Yang.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Yang, S., Sakiyama, K. & Verbauwhede, I. Efficient and Secure Fingerprint Verification for Embedded Devices. EURASIP J. Adv. Signal Process. 2006, 058263 (2006). https://doi.org/10.1155/ASP/2006/58263

Download citation

  • Received: 09 March 2005

  • Revised: 22 September 2005

  • Accepted: 21 January 2006

  • Published: 01 December 2006

  • DOI: https://doi.org/10.1155/ASP/2006/58263

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Acceleration Technique
  • Embed Processor
  • Minutia Extraction
  • Execution Cycle
  • Hardware Level

Profiles

  1. Ingrid Verbauwhede View author profile

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2026 Springer Nature