Skip to main content

PYroelectric Conformable SEnsor matrix for Large area applications in security and safety

Deliverables

Final demonstrators (curved 2D sensor & 4-slap print sensor)

Two demonstrators are planned aiming at reproducing governmental application and automotive application environments. These demonstrations will allow fingerprint image acquisition and biometric processing (identification).

Dissemination Plan

The dissemination activities will be compiled in this deliverable. An initial plan will be drafted, but updates are expected along the project, considering new publications, collaborations with other projects, etc.

Project flyer

This deliverable will provide documentation (i.e. press release, brochure, leaflets...) on the project in order to support promotion of both the consortium and the project results

Project website

This deliverable will provide a web site that will be used as a repository, a webinar media as well as a promotion tool. Leader:

Publications

Active-Matrix IGZO Array with Printed Thermistor for Large-Area Thermal Imaging

Author(s): Jan-Laurens P.J. van der Steen, Laurens C.J.M. Peters, Edsger C.P. Smits, Peter Zalar, Gerwin H. Gelinck
Published in: 2019 IEEE International Conference on Flexible and Printable Sensors and Systems (FLEPS), 2019, Page(s) 1-3
DOI: 10.1109/fleps.2019.8792229

A large-area curved pyroelectric fingerprint sensor

Author(s): JF. Mainguet, A. J. Kronemeijer, G. H. Gelinck, M. Pouet, J.-Y. Fourre, S. Sinopoli, U. Emanuele, L. Fritsch, J. Liu Jimenez, J. Karlsson, F. De Roose, D. Gallaire, S. Steudel, A. Martinent, A. Revaux, M. Benwadih, S. Charlot, A. J. J. M van Breemen, J.- L. van der Steen, H. B. Akkerman
Published in: 2019 IEEE International Electron Devices Meeting (IEDM), 2019, Page(s) 26.5.1-26.5.4
DOI: 10.1109/iedm19573.2019.8993475

Analysis of the attack potential in low cost spoofing of fingerprints

Author(s): Ines Goicoechea-Telleria, Judith Liu-Jimenez, Helga Quiros-Sandoval, Raul Sanchez-Reillo
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6
DOI: 10.1109/ccst.2017.8167798