Approximate Computing for Biometric Security Systems: A Case Study on Iris Scanning
نویسندگان
چکیده
Exploiting the error resilience of emerging data-rich applications, approximate computing promotes the introduction of small amount of inaccuracy into computing systems to achieve significant reduction in computing resources such as power, design area, runtime or energy. Successful applications for approximate computing have been demonstrated in the areas of machine learning, image processing and computer vision. In this paper we make the case for a new direction for approximate computing in the field of biometric security with a comprehensive case study of iris scanning. We devise an end-to-end flow from an input camera to the final iris encoding that produces sufficiently accurate final results despite relying on intermediate approximate computational steps. Unlike previous methods which evaluated approximate computing techniques on individual algorithms, our flow consists of a complex SW/HW pipeline of four major algorithms that eventually compute the iris encoding from input live camera feeds. In our flow, we identify overall eight approximation knobs at both the algorithmic and hardware levels to trade-off accuracy with runtime. To identify the optimal values for these knobs, we devise a novel design space exploration technique based on reinforcement learning with a recurrent neural network agent. Finally, we fully implement and test our proposed methodologies using both benchmark dataset images and live images from a camera using an FPGA-based SoC. We show that we are able to reduce the runtime of the system by 48× on top of an already HW accelerated design, while meeting industry-standard accuracy requirements for iris scanning systems.
منابع مشابه
Password Hardened Multimodal Biometric Fuzzy Vault with Feature Points Extracted from Retina and Iris
Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...
متن کاملE-Voting security system through Biometric Cloud Computing Integration with virtual server application
Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based computing through biometrics then it will create more authentication, transparency and security in voting system. To operate e-voting manag...
متن کاملSecuring Database of Biometric Systems
In cyberspace security of private data is a prominent issue. Beside the reliable algorithm for automatic authentication, providing the security of the server database is considerable. In this paper a technique to secure the database of an iris-based biometric system is proposed. We employed visual cryptography, permutation and a block-based saving procedure to protect the template from maliciou...
متن کاملMulti-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security
To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in...
متن کاملSurvey of Different Biometrics Techniques Biometrics Systems Personal Authenticati on Medical Diagnosis Future Expectation Ethnology Exploration
Biometrics is the study of automatically recognizing humans by means of inherently unique physical or behavioural characteristics. The human physical characteristics like fingerprints, face, hand geometry, voice, Signature, palm and iris are known as biometrics. These features are used to provide an authentication for computer based security systems. The existing computer security systems used ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017