Font Size: a A A

Fingerprint Verification Technology Using In Network Security

Posted on:2009-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:B TianFull Text:PDF
GTID:2178360245952096Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of our society, the recognition system of identification with high efficiency and reliability is becoming a great demand. Fingerprint verification is a new technology developed rapidly in recent years, which uses the fingerprint characteristics to verify the identification, and has a bright future AFIS (Automated Fingerprint Identification System) is an applied system followed by the development of the fingerprint verification technology, is of convenience and security. It has been applied in identification field such as financial security, electronically business and will play a more and more important role in our life.This paper takes the development project of an entry system for the comprehensive service platform of a certain company as background. First, the origins of the fingerprint verification technology, the development condition as well as the application field have been summarized, and the basic theories have been analyzed. Then, the preprocessing, the feature extraction and the matching method of the fingerprint images in AFIS have been deeply studied. Finally, this paper designs a user authentication system based on user's fingerprint using ARM-based embedded fingerprint processing core module. By integrating this system with the comprehensive service platform of a certain company, we can successfully identify the user who logs on the platform and make it more convenient and reliable to enter the system.There are two kinds of authentication technologies in network security application which have been introduced in detail in this paper, and an effective cryptography has been used in the system. All the data including fingerprint template, customer's visit request and the feedback information of server transmitted between client and server have been encrypted, which can better ensure the system security.
Keywords/Search Tags:Automatic Fingerprint Identification System, preprocessing, feature extraction, matching, authentication, ARM, embedded, network security
PDF Full Text Request
Related items