Skip to main content

A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

This paper presents a prototype design and implementation of secured mobile phones based on embedded fingerprint recognition systems. One is a front-end fingerprint capture sub-system and the other is a back-end fingerprint recognition system based on smart phones. The fingerprint capture sub-system is an external module which contains two parts: an ARM-Core processor LPC2106 and an Atmel Finger Sensor AT77C101B. The LPC2106 processor controls the AT77C101B sensor to capture the fingerprint image. In the fingerprint recognition system, a new fingerprint verification algorithm was implemented on internal hardwares. The performance of the proposed system, with 4.16% equal error rate (EER) was examined on Atmel fingerprints database. The average computation time on a 13 MHz CPU S1C33 (by Epson) is about 5.0 sec.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Uchida, K.: Fingerprint-Based User-Friendly Interface and Pocket-PID for Mobile Authentication. In: ICPR 2000, Barcelona, vol. 4, pp. 205–209 (2000)

    Google Scholar 

  2. Sung, A., Choi, B.: An Interaction Testing Technique between Hardware and Software in Embedded Systems. In: Ninth Asia-Pacific Software Engineering Conference, December 2002, pp. 457–464 (2002)

    Google Scholar 

  3. El-Kharashi, M.W., El-Malaki, M.H., Hammad, S., et al.: Towards Automating Hardware/Software Co-Design. In: 4th IEEE International Workshop on System-on-Chip for Real-Time Applications, July 19-21, pp. 189–192 (2004)

    Google Scholar 

  4. Chen, X.J., Tian, J., He, Y.L.: Low Quality Fingerprint Enhancement Algorithm Based on Filtering in Frequency Domain. In: The 4th Chinese Conference on Biometric Recognition, pp. 145–150 (2003)

    Google Scholar 

  5. Hong, L., Wan, Y.f., Jain, A.: Fingerprint image Enhancement: Algorithm and Performance Evaluation. IEEE Trans. on Pattern Analysis and Machine Intelligence 20(8), 777–789 (1998)

    Article  Google Scholar 

  6. Luo, X.P., Tian, J., Wu, Y.: A Minutia Matching algorithm in Fingerprint Verification. In: 15th ICPR, Barcelona, vol. 4, pp. 833–836 (2000)

    Google Scholar 

  7. Chen, X.J., Tian, J., Yang, X.: A Matching Algorithm Based on Local Topologic Structure. In: Campilho, A.C., Kamel, M.S. (eds.) ICIAR 2004. LNCS, vol. 3211, pp. 360–367. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. BIRD DOEASY E868 Mobile Business Elite Introduce, http://doeasy.net.cn/index_2.htm

  9. LPC2106/2105/2104 User Manual, Philips Semiconductors

    Google Scholar 

  10. FCD4B14 FingerChip Datasheet, Atmel Corporation

    Google Scholar 

  11. Biometric Systems Lab, Pattern Recognition and Image Processing Laboratory, Biometric Test Center, http://bias.csr.unibo.it/fvc2000/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, X., Tian, J., Su, Q., Yang, X., Wang, F.Y. (2005). A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_57

Download citation

  • DOI: https://doi.org/10.1007/11427995_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics