{"title":"Fingerprint Verification through Cloud Computing","authors":"F. Noor, M. Alhaisoni","doi":"10.1145/2536853.2536902","DOIUrl":null,"url":null,"abstract":"In this paper, we implement a Parallel Distributed Phase Correlation algorithm for fingerprint verification through Cloud computing services. The algorithm is proposed to be hosted by Cloud Computing Services with Quality of Service (QoS) and Quality of Protection (QoP). We also propose 128-bit encryption for security and privacy of individuals' fingerprints and the Wavelet Scalar Quantization (WSQ) compression method. Fingerprint scanners from various manufactures have different specifications in image capture size, etc. Standards need to be set on the specifications, for image size, for storage, for transmission, for interoperability of various verification algorithms, and protection.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"37 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Mobile Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2536853.2536902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we implement a Parallel Distributed Phase Correlation algorithm for fingerprint verification through Cloud computing services. The algorithm is proposed to be hosted by Cloud Computing Services with Quality of Service (QoS) and Quality of Protection (QoP). We also propose 128-bit encryption for security and privacy of individuals' fingerprints and the Wavelet Scalar Quantization (WSQ) compression method. Fingerprint scanners from various manufactures have different specifications in image capture size, etc. Standards need to be set on the specifications, for image size, for storage, for transmission, for interoperability of various verification algorithms, and protection.