Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4813
Title: | Contact-less palmprint biometric for securing DSP coprocessors used in CE systems |
Authors: | Sengupta, Anirban Chaurasia, Rahul Reddy, Tarun |
Keywords: | Anthropometry;Biometrics;Coprocessor;Digital signal processing;Embedded systems;Contact less;Feature order;Feature sets;Palmprint biometric;Related works;Security constraint;Security features;Template-based;Hardware security |
Issue Date: | 2021 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Citation: | Sengupta, A., Chaurasia, R., & Reddy, T. (2021). Contact-less palmprint biometric for securing DSP coprocessors used in CE systems. IEEE Transactions on Consumer Electronics, 67(3), 202-213. doi:10.1109/TCE.2021.3105113 |
Abstract: | This paper presents a novel contact-less palmprint biometric hardware security approach for securing DSP based coprocessors. The proposed approach is capable of generating secret biometric palmprint constraints that are embedded in DSP designs used in consumer electronics systems to detect counterfeited versions. Any DSP based intellectual property (IP) core can be embedded with proposed palmprint signature to distinguish between authentic and its fake versions. In the proposed approach, the authentic biometric palmprint is first converted into its equivalent palmprint signature representing digital template based on palmprint feature set, followed by embedding palmprint signature's digital template into the design in the form of secret biometric constraints. The biometric palmprint constraints generated through the proposed approach is non-replicable and non-vulnerable compared to other signature based scheme such as hardware steganography and hardware watermarking. The proposed approach exploits several security features such as: palmprint nodal points, palmprint features, palmprint feature ordering, concatenation mechanism of features etc to generate a robust palmprint hardware security constraint. The results of the proposed approach indicated stronger probability of co-incidence and stronger tamper tolerance ability than recent related works. © 1975-2011 IEEE. |
URI: | https://doi.org/10.1109/TCE.2021.3105113 https://dspace.iiti.ac.in/handle/123456789/4813 |
ISSN: | 0098-3063 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: