Access Control Based on a Distributed Fingerprint Recognition System

Article Preview

Abstract:

This paper presents an implemented solution for controlling the access of the users to restricted areas and resources (including machines and robots), based on fingerprint recognition. The proposed distributed system is composed of a number of fingerprint scanning mobile terminals connected to a server net (one or more server instances used for identity confirmation). The proposed server architectures itself was designed to be loosely coupled in order to be able to achieve a highly scalable system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

759-764

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] International Biometrics Group: Biometrics Market Report 2009-2014, (2009).

Google Scholar

[2] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar in: Handbook of Fingerprint Recognition, Springer, New York, (2003) pp.8-12.

Google Scholar

[3] W.F. Leung, S.H. Leung, W.H. Lau and A. Luk in: Fingerprint Recognition Using Neural Network, Neural Networks for Signal Processing, Proceedings of The 1991 IEEE Workshop (1991).

DOI: 10.1109/nnsp.1991.239519

Google Scholar

[4] J.H. Wegstein in: An Automated Fingerprint Identification System, U.S. Government Publication, Washington, DC: U.S. Dept. of Commerce, National Bureau of Standards (1982).

Google Scholar

[5] D. Maltoni in: A Tutorial on Fingerprint Recognition, Biometric Systems Laboratory - DEIS - University of Bologna (2005).

Google Scholar

[6] K. Abbad, N. Assem, H. Tairi and A. Aarab in: Fingerprint Matching Relying on Minutiae Hough Clusters, ICGST - GVIP Journal, ISSN: 1687-398X, Volume 10, Issue 1, (2010) pp.39-44.

Google Scholar

[7] Y. Chen and A.K. Jain in: Dots and incipients: Extended features for partial fingerprint matching, Biometric Symposium, BCC, Baltimore (2007).

DOI: 10.1109/bcc.2007.4430538

Google Scholar

[8] R.S. Sandhu and P. Samarati in: Access Control: Principle and Practice, Communications Magazine, IEEE, Volume: 32, Issue: 9, (1994) pp.40-48.

DOI: 10.1109/35.312842

Google Scholar

[9] T. Ritter, R. Schreiner, and U. Lang in: Integrating Security Policies via Container Portable Interceptors, Distributed Systems Online, IEEE, Volume: 7, Issue: 7 (2006).

DOI: 10.1109/mdso.2006.44

Google Scholar

[10] V. Mureşan in: Mathematical Modelling and Numerical Simulation of the Temperature Control System in a Furnace with Rotary Hearth. IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics (ICCC-CONTI 2010), ISBN: 978-1-4244- -7431-8 (2010).

DOI: 10.1109/icccyb.2010.5491298

Google Scholar