scispace - formally typeset
Search or ask a question
Author

Zhang Jinhai

Bio: Zhang Jinhai is an academic researcher. The author has contributed to research in topics: Smart card & Fingerprint Verification Competition. The author has an hindex of 2, co-authored 2 publications receiving 7 citations.

Papers
More filters
Proceedings ArticleDOI
01 Sep 2011
TL;DR: Recently, with the rapid development of embedded systems, embedded operating system has also been more widely used, and the demand of supporting file system in embedded product is also increased greatly.
Abstract: Recently, with the rapid development of embedded systems, embedded operating system has also been more widely used, The demand of supporting file system in embedded product is also increased greatly. Such as mobile music, image storage, etc., and now the hard disk can be recorded TV there, all of which need to have embedded file system support.

4 citations

Proceedings ArticleDOI
01 Sep 2011
TL;DR: Through the practical efficiency test analysis, the whole system is feasible, and the running effect is good by practical application, the improved fingerprint identification algorithm is improved, and combining with actual demand the improved algorithm is combined.
Abstract: Automatic identification technology becomes a urgent need of production and life, authentication technology gained worldwide attention because of its high reliability, fingerprint identification technology which applied to social security system can accurately determine protects a person's identity and prevent the phenomenon of the pension of falsely claim that solves this one long-term puzzling problem. Based on the preeminent fingerprint identification algorithm is improved, and combining with actual demand the improved algorithm, Using the fingerprint identification and IC card combination way realization of distributed fingerprint authentication system collection. Through the practical efficiency test analysis proves the whole system is feasible, and the running effect is good by practical application.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comparative analysis of four thresholding techniques, two thinning techniques and a feature extraction technique is presented to evaluate the best performance of the algorithms in fingerprint images to point out the positive and negative points of the different algorithms.
Abstract: A large volume of images of fingerprints are collected and stored to be used in various systems such as in access control and identification records (ID). Systems for automatic fingerprint recognition perform searches and comparisons with a database. Biometric recognition is based on two fundamental premises: the first is that digital printing must have permanent details, and the second is the information unit. From these premises, a system analyzes the fingerprint image to extract the information and then compares the data in the verification mode or identification mode. , Extraction techniques must be used to obtain the fingerprint data. These techniques use binarization, thinning and features extraction algorithms which are computational methods that can be applied to digital image processing used in scientific research and security issues. This paper presents a comparative analysis of four thresholding techniques (Niblack, Bernsen, Fisher, Fuzzy), two thinning techniques (Stentiford and Holt) and a feature extraction (Cross Number) technique to evaluate the best performance of the algorithms in fingerprint images. To develop this project a set of 160 fingerprint images was used in experiments and analysis. The results point out the positive and negative points of the different algorithms. The system was developed in the C/C++ language.

13 citations

Journal ArticleDOI
TL;DR: The next generation of fingerprint-based authentication systems, including Biometric crypto systems, Cancellable templates and Bio-hashing proscribed systems, are expected to be introduced in the coming months.
Abstract: Fingerprint-based authentication systems in general are prone to several security vulnerabilities. Authentication systems such as Biometric crypto systems, Cancellable templates and Bio-hashing pro...

7 citations

Book ChapterDOI
01 Jan 2013
TL;DR: This paper attempts to explore the cluster allocation strategies of ExFAT file system in comparison with conventional FAT32 file system.
Abstract: The Multimedia card (MMC) and Secure Digital (SD) card associations classify the Extend File Allocation Table (ExFAT) as the standard file system for storage flash cards of more than 32 giga bytes (GB) of size. This paper attempts to explore the cluster allocation strategies of ExFAT file system in comparison with conventional FAT32 file system. The performance improvements by cluster allocation strategies of ExFAT file system are discussed. The adaptation techniques of cluster allocation strategies of ExFAT file system to the FAT32 file system are also discussed.

4 citations

01 Jan 2014
TL;DR: This paper examines the available Solid State Drives in Windows and Linux kernel based operating system with respect to features such as crash resilience, Garbage Collection, Wear Levelling, Performance and ability to use the file system in multiple operating systems.
Abstract: . The Solid State Drives (SSD) of digital cameras, mobile phones, tablets, and Multimedia Card(MMC), Secure Digital (SD) cards, USB (Universal Serial Bus) flash drives are the personal storage devicesprevalent in today’s human life. The SSDs provides the high speed, high storage capacity with lower physicalspace and price. Hence SSDs are the replacement for traditional Hard Disk Drives (HDD). Today, SSDs areavailable with SATA (Serial Advance Attachment) interface and hence laptops and Personal computers useSSDs. This paper examines the available file systems in Windows and Linux kernel based operating systemswith respect to features such as crash resilience, Garbage Collection, Wear Levelling, Performance and abilityto use the file system in multiple operating systems. Keywords: Btrfs, ExFAT, ext4, F2FS, File system, FAT, Flash memory, FUSE, JFFS, LFS, Linux, MMC,NAND, NOR, MTD, SD, SSD, UBIFS, YAFFS. 1. Introduction The MMC [1]/SD [2] memory cards are made up of NOR or NAND flash memoires which can be electrically erasedand reprogrammed. The flash memories are called as “Solid State Drives (SSD)”. Data is written to the flash memoryin units called pages. Each page is made up of multiple memory cells. However, the memory can only be erased inlarger units called blocks. Each Block consists of multiple pages. In case of hard disks drives, data can be written interms of bytes and blocks, and overwrites are possible too. In case of flash memories writes are performed only interms of pagesand no byte writes are possible. In case of overwrites, even-thougha single page needsto be updatedtheblock, containing the page to be updated, need to be erased and written with updated data. The erase cycles determinesthe endurance of the flash memory. This means that after the maximum device specific erase cycles per block, the flashdevices becomes unreliable. To improve the life span of the flash device, A mechanism called “Wear levelling” [3] isrequired to arrange the data in the blocks such that erase cycles are equally distributed among all blocks of the flashstorage device. While erasing a block If the data in some of the pages of the block are no longer needed (also calledstale pages), only the pages with good data in that block are read and re-written into another previously erased emptyblock, then the free pages left by not moving the stale data are available for new data. This is a process called garbagecollection (GC) [3]. All SSDs include some level of garbage collection, but they may differ in when and how fast theyperform the process. The continuous usage (write operations) of NAND flash memoires cause the block of memorycan wear out and therefore such blocks should not be used and alternative block should be provided for logical tophysical mapping. The process of tracking the bad blocks and replacing with valid blocks are called “Bad BlockManagement” [3].A file systems in general defines the data structures and algorithms to store the user data such as documents,text files, executable, multimedia files, directories etc. The conventional file systems assumes that storage device isbyte accessible and overwrites are permitted and thus these file system requires a dedicated FTL (Flash TranslationLayer)s [4,5] software to handle the wear-levelling, logical to physical block mappings. The MMC/SD cards, USB [6]pen drives and SATA [7] SSD storage devices has in-built (firmware) wear-levellingand garbagecollectionalgorithms.Where as in case of NAND/NOR flash memories FTL is software module. Defining a file system pattern for flashmemories is challengingtask because flash memories requireswear-levellingand garbagecollectionof memoryblocks

4 citations

Book ChapterDOI
22 Sep 2017
TL;DR: An improved method of fingerprint registration based on image field and mean square error (MSE) is presented, which calculates the image field to obtain clear ridges and valleys of the image, and replaces the mutual information with MSE.
Abstract: Fingerprint registration is an important step in the technology of fingerprint identification. Image field is often used for feature extraction in fingerprint registration, however, the accuracy can not be guaranteed due to the selection of feature points. On the other hand, methods based on mutual information are widely used in the field of image registration because of the high precision, but the speed is slow owing to the complexity of calculating mutual information. By sharing the advantages and overcoming shortcomings of the image field and mutual information methods, this paper presents an improved method of fingerprint registration based on image field and mean square error (MSE). First, we calculate the image field to obtain clear ridges and valleys of the image, and then replace the mutual information with MSE, we globally search the spatial transformation parameters for image registration. The experimental results show effectiveness of the proposed algorithm.

2 citations