Biometric Thesis
Biometric Thesis
INTRODUCTION
1.1 Overview
immigration and customs. Clearly, modern security systems requires the application of
cryptography and biometrics for strong authentication, data integrity and information
confidentiality to be realized in embedded digital systems.
1.1.1 Cryptography
According to Moore’s Law, the number of transistor can be put into single
die doubles every 18 months which implies that more complex design could be
implemented onto single chip. This is why there is an explosion development of putting
a system onto a chip in electronics design such as mobile phone and GPS devices. An
embedded system is defined as special-purpose computer system that performs certain
task repeatedly, often responding to real-time computing constraint [1]. In recent years,
there is huge improvement in speed, power consumption and complexity of integrated
circuits that employ FPGA technology. The advancement of the FPGA technology
has made possible the development of devices based on embedded digital system and
System-on-Chip(SoC) designs.
Telecommunications
Consumer Electronics
Memory
Figure 1.2: Architecture of Embedded Digital System and its Applications (adapted
from [1])
5
Lately, much research have been carried out on the study and integration of
biometric and cryptography, leading to combined system called biometric encryption.
Biometric authentication measures unique human’s traits such as finger print, voice,
iris and so on. Due to nature that biometric data are noisy and inconsistent, biometric
systems allow minor errors while maintaining high authentication accuracy. On
the contrary, cryptographic schemes encrypt and decrypt secret information using
cryptographic keys. Cryptography does not tolerate even a single bit of error.
Therefore, integrating these two different fields of technology is a challenging task.
Most of the biometric encryption systems proposed in the past are implemented
on PC, in other words, software. In such implementation, biometric templates are
either stored in PC or in a central server so that it can be accessed from remote
locations. However, there is a major drawback to software-based implementation;
biometric templates are easily accessed by attackers, and this causes biometric
information leakage issue [15]. Thus, software implementation of biometric
encryption is insufficient in terms of security. In addition, biometric encryption system
applies image processing and encryption algorithms, which means that the design
blocks are highly compute-intensive. Hence to be viable, software-based design need
to be implemented on powerful computers. This prevents biometric encryption to be
deployed in portable devices embedded systems. Implementing the design on low-cost,
6
Image Acquisition
AES HW Core
Nios2 CPU (Embedded Software)
HW Accelerator
Nios2-Linux
(Embedded OS)
Image Preprocessing
System Bus
Biometric Feature
Extraction
Memory
I/O Peripherals