FPGA implementation of fast & secure fingerprint authentication using trsg (true random and timestamp generator)

Microprocessors and Microsystems - Tập 82 - Trang 103858 - 2021
D. Harikrishnan1, N. Sunil Kumar1, R. Shelbi Joseph1, Kishor Nair2, R. Nishanth1, Abin John Joseph1
1Cochin University of Science and Technology, Cochin, India
2CSIR, Pretoria, South Africa

Tài liệu tham khảo

Sathiya, 2019, 1227 Maser, 2019, 1 Hajri, 2018, 1 Kamath, 2017, 1 Jaswal, 2018, 214 Sun, 2018, 226 Kang, 2016, Deception with Side Information in Biometric Authentication Systems, IEEE Trans. Inform. Theory, 61, 1344, 10.1109/TIT.2015.2389825 KaviPriya, 2018, 1 Huang, 2019, A PUF-based unified identity verification framework for secure IoT hardware via device authentication, World Wide Web, 1 Wagh, 2020, Biometric finger vein recognition methods for authentication, Comput. Eng. Technol., 1025, 45, 10.1007/978-981-32-9515-5_5 García Vargas, 2019, Portable and efficient fingerprint authentication system based on a microcontroller, Int.l J. Electr. Comput. Eng., 9, 2346 Shaik, S., ‘High secure buffer based physical unclonable functions (PUF's) for device authentication’, vol. 17, Iss. 1, pp. 377–383, 2019. Salah Azzaz, 2019, An efficient and lightweight multi-scroll chaos-based hardware solution for protecting fingerprint biometric templates, Int J Commun Syst, 33, 1 Huang, 2020, A PUF-based unified identity verification framework for secure IoT hardware via device authentication, World Wide Web Internet Web Inform Syst. (WWW), 23, 1057, 10.1007/s11280-019-00677-x Bhairannawar, 2018, Implementation of Fingerprint based biometric system using optimized 5/3 DWT architecture and modified CORDIC based FFT, Circuits Syst. Signal Process, 37, 342, 10.1007/s00034-017-0555-0 Gorantla, 2019, Design of approximate subtractors and dividers for error tolerant image processing applications, J.Electr.Testing Theory Appl. (JETTA) – Springer, 35, 901, 10.1007/s10836-019-05837-5 Appathurai, 2018, Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles, IET Networks, 8, 106