DOI QR코드

DOI QR Code

User Authentication System using OCR

광학문자인식을 이용한 사용자 인증 시스템

  • Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College) ;
  • Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
  • 정필성 (명지전문대학 정보통신공학과) ;
  • 조양현 (삼육대학교 컴퓨터.메카트로닉스공학부)
  • Received : 2018.06.22
  • Accepted : 2018.09.20
  • Published : 2018.09.28

Abstract

As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

스마트 기기가 보급화 됨에 따라서 사용자는 다양한 방법을 이용하여 인증 서비스를 이용할 수 있게 되었다. 인증 서비스로는 아이디와 비밀번호를 이용한 인증, 문자 메시지를 이용한 인증, OTP(One Time Password)와 같은 일회용 비밀번호를 이용한 인증 등이 있다. 본 논문은 광학문자인식 기술을 이용하여 지식기반 인증의 보안성 문제를 해결하고 쉽고 빠르게 사용자를 인증할 수 있는 인증 시스템을 제안한다. 제안하는 인증 시스템은 사용자가 업로드한 이미지에서 문자를 추출하고 추출된 문자 정보를 이용하여 사용자를 인증한다. 제안하는 인증 시스템은 외부로 쉽게 노출되거나 분실 위험이있는 비밀번호나 OTP를 사용하지 않으며 정확한 사진을 사용하지 않으면 인증이 불가능하다는 장점을 가진다. 제안한 인증 시스템은 플랫폼에 구애받지 않으며 사용자 인증 및 파일 암호화, 복호화에도 활용이 가능하다.

Keywords

References

  1. Y. Ko, J. Choi & B. Kim. (2012). Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center, Journal of the Korea Institute of Information Security & Cryptology, 22(2), 391-400.
  2. T. Y. Kim, H. J. Jun & T. S. Kim. (2018). An Analysis on Intention to Use Information Service for Personal Information Breach, Journal of the Korea Institute of Information Security & Cryptology, 28(1), 199-213. https://doi.org/10.13089/JKIISC.2018.28.1.199
  3. T. H. Park, G. R. Lee & H. W. Kim. (2017). Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment, Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1149-1155. DOI : 10.13089/JKIISC.2017.27.5.1149
  4. H. J. Mum, (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain, Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
  5. S. H. Lee, (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 27-31.
  6. S. S. Ji, (2012). The Improved-Scheme of Two Factor Authentication using SMS, Journal of the Korea Industrial Information Systems Research, 17(6), 25-30. DOI : 10.9723/jksiis.2012.17.6.025
  7. S. J. Kim & S. S. Yeo, (2013). A Study on Secure Data Access Control in Mobile Cloud Environment, Journal of Digital Convergence, 11(2), 317-322. https://doi.org/10.14400/JDPM.2013.11.2.317
  8. H. T. Chae & S. J. Lee, (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI : 10.13089/JKIISC.2014.24.5.961
  9. S. Khandelwal. (2016). QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System. The Hacker New(Online). https://thehackernews.com/2016/07/qrljacking-hackingqr-code.html
  10. Google. (2018). Google Cloud Vision API. Google Cloud Vision(Online). https://cloud.google.com/vision
  11. Y. J. Shin, S. H. Shin, J. S. Lee & W. G. Han, (2015). A Study on Improvement of Identification Means in R.O.K, Journal of Korean Associastion for Regional Information Society, 18(4), 59-88.
  12. D. J. Kim & H. S. Choi, (2009). Design on Protection and Authentication System of IPTV Contents using OTP, Journal of The Korea Ccontens Association, 9(8), 129-137. DOI : 10.5392/JKCA.2009.9.8.129
  13. C. J. Chae, H. J. Cho & H. M. Jung, (2018). Authentication Method using Multiple Biometric Information in FIDO Environment, Journal of Digital Convergence, 16(1), 159-164. https://doi.org/10.14400/JDC.2018.16.1.159
  14. J. S. Seo & J. S. Moon, (2015). A Study on User Authentication with Smartphone Accelerometer Sensor, Journal of The Korea Institute of Information Security and Cryptology, 25(6), 1477-1484. DOI : 10.13089/JKIISC.2015.25.6.1477
  15. H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel & D. Skirop, (2010). MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures, Proc. Of UBICOMM'10, 31-34.