Вы находитесь на странице: 1из 9

PRESENTED BY:

GANTA SANTHI SWARUP BANDLA GOPI


III/IV B.TECH ECE III/IV B.TECH ECE
PH NO: 9985882474 PH NO: 9885402037
swarup43g@yahoo.co.uk Bandlagopi177@yahoo.com

LOYOLA INSTITUTE OF TECHNOLOGY AND


MANAGEMENT,
DHULIPALLA,
SATTENAPALLI-522412,
GUNTUR DIST.
INDEX

1.Introduction

2.Biometrics System

3. Complete System Solution

4. DSP for Secure and Trusted Biometrics

5.DSP Applications:

6.Biometric System Examples

7.Conclusion

8.References
ABSTRACT architecture well-suited for

Biometrics is the implementing complex mathematical

science of measuring and statistically algorithms, can efficiently address all the

analyzing biological data. In information processing needs of such a system.

technology, biometrics refers to the use The following information


introduces the concept of a complete
of a person’s biological characteristics biometrics system solution based on
semiconductor components,
for personal identification and development tools, and software
solutions. Additionally, the various
authentication. Fingerprint, iris-scan, concepts that outline the inherent
advantages of a DSP in a biometric
retinal-scan, voiceprint, signature, system - better accuracy, faster
recognition an
handprint and facial features are some of d lower cost, all leading to smarter

the most common types of human biometrics - will also be covered.

biometrics. 1.Introduction
Digital signal processors Imagine how convenient it
would be to activate the security alarm at
(DSPs), which are specially designed
your home with the touch of a finger, or
single-chip digital microcomputers that
to enter your home by just placing your
process electrical signals generated by hand on the door handle. How would
you like to walk up to a nearby ATM
electronic sensors (e.g., cameras,
which will scan your iris so you can
fingerprint sensors, microphones, etc.),
withdraw money without ever inserting a
will help to revolutionize this world of card or entering a PIN. You will
basically be able to gain access to
biometrics. The core of the biometric
everything you are authorized to, by
authentication process is made up of
presenting yourself as your identity.
image processing and pattern matching This scenario might not
be as far off as we might expect. In the
or minutiae comparison algorithms. And
near future, we may no longer use
the programmable DSP, with an
passwords and PIN numbers to 2.Biometrics System
authenticate ourselves. These methods The four basic
have proven to be insecure and unsafe elements of a typical biometric system
time and time again. Technology has are: sensing, processing, storage and
introduced a much smarter solution to interface to an existing infrastructure.
us: Biometrics.
Biometrics, the use of a
person’sunique biological characteristics
(such as face, voice, or fingerprints) for
personal identification. The advantages
of biometrics are becoming more
apparent with the increasing use of
computers in our daily life. As cyber
crime increases, the need for security
against identity theft becomes more and
more apparent. Add to this the ever- 3. Complete System Solution
increasing threat to personal, corporate Add software solutions and
and government assets, the need for development tools to the broad spectrum
better forms of security is obvious. of DSP and analog components available
Biometric authentication will from TI and you have a supplier with the
help in enhancing the security most complete system solution offering
infrastructure against some of these (see Figure 3). A wide array of
threats. After all, physical characteristics expresses™-compliant software and
are not something that can be lost, hardware development tools are
forgotten or passed from one person to available for all DSP platform.
another. They are extremely hard to
forge and a would-be criminal would
think twice before committing a crime
involving biometrics.
Secure Standalone Device

A secure standalone device is


one where all the functions of
authentication are carried out within the
confines of the embedded processor and
the result is communicated or displayed
along with control signals to deny or
grant access to the secured asset. The
original enrolled template or pattern is
For biometrics, specific either stored in the memory within the
developments tools like fingerprint product or on a smart card which is
development kits, software drivers and carried on the user’s person. In a secure
multiple algorithms for fingerprint standalone device, the captured image is
verification, speaker verification and transferred to the embedded processor
signature verification are available today (DSP) which then converts/encodes the
from third parties. analog video stream into a digital image
4. DSP for Secure and Trusted for camera based biometrics like facial,
Biometrics and iris/retinal recognition. The

Today’s biometric systems are encoding can then be done on the DSP
based mainly on interfacing the sensing using off-the-shelf encoding software
element with a personal computer. The
sensors are generally networked to a available for the TI DSP (MPEG2,
computer server to service unlimited JPEG, etc).
users and multiple access points. The
cost of using PCs is prohibitive and the With fingerprint recognition, no
communication link between the sensor encoding is required as the output of the
and the PC/server could be a major
cause for concern with regards to sensor module is a grayscale bitmap
security and privacy. A biometrics image. In the case of optical sensors,
solution based on DSPs can function
both as a secure standalone device for analog front-end components like
recognition (1:1 or 1: few) and as a amplifiers and analog-to-digital
trusted network device for identification
converters may be needed to generate
the bitmap.
source of the live biometric data being
presented needs to be a trusted point of
access.
First, encrypting the extracted
template or the captured image and
transmitting this encrypted data to the
remote server using a public key
infrastructure can help establish this
After the capture (and encoding), the
trust. This can help ensure that the
image can then be enhanced with one or
biometric data presented for a match is
more functions like histogram
not a digital file of a bitmap image being
equalization, filtering
fed into the system by hacking or
Trusted Network Device
breaking into the communication link
A trusted network device is
between the access point and the
one in which the captured biometric can
database server.
be extracted into a template (in the case
of minutiae) or encoded and compressed
(in the case of image patterns) and then
encrypted before being transmitted to a
computing
server on which the matching against a
database of templates/patterns is carried
out as part of the identification process.
In the case of a networked
identification system (like access to PCs
in a LAN or WAN or POS terminals
connected to a credit processing
network), there are multiple access With the use of an embedded DSP in the
points and the user needs to be identified trusted network device, all the functions
amongst a database of users as an of a secure standalone device mentioned
authorized user. To secure such a above can be implemented excluding the
network, the access point that is the
matching step and still have performance TMS320VC55 DSP-Based
headroom to execute software Biometric Fingerprint
Solution:
encryption (e.g., 3DES, RSA1024, etc.)
An example fingerprint
algorithm
biometric system based on
5.DSP Applications: TMS320C5509 DSP is shown in Figure
DSP processors are used in diverse field 6
of applications, from radar to consumer

electronics. Naturally any one processor


cannot support such diverse application
span.

Different categories are: -

Low Cost Embedded System:


Modems, Radar Detectors, Pagers,
Cellular

Phones, Cordless phones, Disk drivers,


automatic real time control.

High Performance Applications :


Radar, Sonar, Seismic imaging, Speaker

identification etc. In addition to the DSP, the


TPSXXX power management,
Personal Computer Based Multimedia
: Modems, Voice mail, Music synthesis, TL16C550C UART, MAX232 serial
driver (RS232), standard linear and logic
Speech synthesis, Audio compression
and decompression. components like universal bus
transceivers and NAND gates are the
6.Biometric System Examples other hardware components from TI
The following sections used to build a standalone fingerprint
provide examples of the TMS320C5509 system with serial interface.
DSP-based biometric fingerprint Additionally, third party software
solution and the TMS320DM642™ solutions for image enhancement and
DMP-based biometric smart camera. matching are available to complete the
system solution.
If this design is used in a
computer mouse or keyboard, the Figure 7 illustrates a Biometric
internal USB slave port can be used as Smart Camera module that can be used
the interface to the PC. If it is networked as a digital surveillance camera or as
to a server managing multiple fingerprint part of a facial recognition system based
access modules, the designer can make on the TMS320DM642 digital media
use of the RS485 component processor. The DM642 processor is
(SN65XXX and SN75XXX) or use a made up of the C64x DSP core coupled
10/100 Ethernet interface connected to with video ports, 10/100 EMAC
the external memory bus on the DSP. If controller and a 66 MHz PCI bus in
the application requires wireless addition to standard peripherals.
connectivity then the system developer The facial image capture can be
can opt to use an RFID component (low carried out either from a snapshot (CCD
frequency, Tag-It™ high frequency and combined with data converter) or
encrypted transponders and readers) for streaming video image (external camera
contact less smart card solutions. source via TVPXXXX video decoders)
as the video ports on the DM642 are
configurable. One of the three video
ports on the DM642 can be configured
TMS320DM642,,,DMP-Based to output the image to a display/monitor.
Biometric Smart Camera In addition to the on-chip
10/100 Ethernet MAC controller and the
66 MHz PCI bus that provide flexibility
in terms of interface options, TI supports
independent or integrated FireWire™
IEEE1394 ICs (TSB43XXXX -
integrated, TSB12XXXX - link layer
and TSB14XXXX – physical layer)
7.Conclusion
Using DSP as the embedded
processor of choice for enabling smart
biometric systems can provide the
following advantages:
• Fast, accurate, secure and trusted
authentication
• Enable new applications with one
scalable design
• Reduce overall cost of development

References
1.www.encyclopedia.thefreediction.com
2. www.howstuffworks.com
3. www.google.com
4. www.instrumentationews.com

Вам также может понравиться