Skip to main content

Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model

  • Conference paper
Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3320))

Abstract

In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on the sensor, the client, and the server, respectively. Then, based on these primitive performance results, the workload of each scenario of the task assignment was applied to the M/D/1 queueing model representing the sensor-client-server model, and the collective performance of each scenario was analyzed quantitatively. The modeling results showed that extracting features and matching on the server could provide both fast response time and secure authentication with small numbers of clients. As the number of clients was increased, however, a bottleneck was observed on the server. The bottleneck can be eliminated by either performing the feature extraction on the client or increasing the number of processors in the server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  2. Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  3. Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)

    Article  Google Scholar 

  4. Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33–42 (2003)

    Google Scholar 

  5. Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)

    Google Scholar 

  6. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  7. Bunday, B.: An Introduction to Queueing Theory. Halsted Press (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chung, Y., Moon, D., Kim, T., Park, JW. (2004). Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_163

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_163

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics