E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fingerprint and iris based unimodal and multimodal authentication systems will be described, analyzed and compared. Finally, a prototyped embedded multimodal biometric sensor will be outlined. Software and hardware prototypes have been checked against common and widely used databases.

Fingerprint and Iris based Authentication in Inter-cooperative Emerging e-Infrastructures

CONTI, VINCENZO;
2013-01-01

Abstract

E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fingerprint and iris based unimodal and multimodal authentication systems will be described, analyzed and compared. Finally, a prototyped embedded multimodal biometric sensor will be outlined. Software and hardware prototypes have been checked against common and widely used databases.
2013
978-3-642-34951-5
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11387/10381
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact