Fig. 1. projection Moire
Fig. 2. Security Token System Actions
Fig. 3. Face recognition token system
References
- G. G. Kim & D. S. Kim, (2001). An Analysis of Anti-jamming Capability of Frequency Hopping Satellite Communication Systems, The Journal of Korean Institute of Communications and Information Sciences, 26(1), 34-41.
- K. S. Kang & C. S. Kim. (2017). Mutual Coupling Compensation and Direction Finding for Anti-Jamming 3D GPS Antenna Array, The Korean Institute of Communications and Information Sciences, 723-730. DOI : 10.7840/kics.2017.42.4.723
- D. W. Lim. (2013). Case Study of Incidents by GPS Interferences and Trend for Monitoring Techniques, Current Industrial and Technological Trends in Aerospace, 11(1), 169-176.
- E. J. Kang & B. J. Park. (2009). A Study on Enhancing the Performance of Detecting Lip Feature Points for Facial Expression Recognition Based on AAM, PKorea Information Processing Society), 299-308. DOI : 10.3745/KIPSTB.2009.16-B.4.299
- W. J. Ryu, Y. J. Kang, H. M. Rho & D, H. Lee. (2005). A Study on 3-D Shape Measurement and Application by using Digital Projection Moire (I), Journal of the Korean Society for Precision Engineering, 22(7), 88-93. DOI : 10.1016/j.ijleo.2006.12.016
- W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2007). A Study on 3-D Shape Measurement and Application by Using Digital Projection Moire (II), Journal of the Korean Society for Precision Engineering, 24(5), 62-67.
- W. J. Ryu & Y. J. Kang. (2005). Shape Measurement Method by using Moire Phenomenon, Journal of the Korean Society for Precision Engineering, 22(4), 7-12.
- C. R. Seo, J. P. Lee, K. H. Lee, Y. B. Jeon & J. S. Park, (2017), A Proposal for Improvement of Detection of User Based on Facial Authentication Using Digital Projection Moire, KIPS_C2017B0117, 366-367.
- P. S. Jeong & Y. H. Cho, (2018). User Authentication System based on Auto Identification and Data Collection, Journal of the Korea Institute of Information and Communication Engineering, 22(1), 75-82. DOI : 10.6109/jkiice.2018.22.1.75
- Y. W. Moon, D. S. Pan & S. B. Seo. (2011). A Practical Implementation of Fuzzy Fingerprint Vault, KSII Transactions on Internet and Information Systems, 5(10), 1783-1798 DOI : 10.3837/tiis.2011.10.006
- S. H. Han. (2008). A Study on certification plan on Radio Frequency Identification for Airplane Use, Aerospace Engineering and Technology, 7(1), 236-244.
- S. P. H & S. J. Han, (2012). Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism, The Korea Institute of Information and Commucation Engineering, 16(9), 1983-1989. DOI : 10.6109/jkiice.2012.16.9.1983
- Y. J. Kim, D. S. Moon, S. B. Pan, Y. W. Chung & K. I. Chung. (2003). Implementation of Embedded Biometrics Technologies: A Case of a Security Token for Fingerprints, The Institute of Electronics Engineers of Korea - Computer and Information, 40(6), 39-46.
- B. K. Lee, M. S. Kim & J. H. Seo. (2015). Design and Implementation of The Capability Token based Access Control System in the Internet of Things, Journal of the Korea Institute of Information Security & Cryptology, 25(2), 439-448. DOI : 10.13089/JKIISC.2015.25.2.439
- S. A. Park, C. J. Chae, H. J. Cho & J. K. Lee. (2012). Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information, Journal Of The Korea Contents Association, 12(2), 69-77. DOI : 10.5392/JKCA.2012.12.02.069