• Title/Summary/Keyword: 데이터 인증

Search Result 1,281, Processing Time 0.03 seconds

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

The Effect of Government R&D Supports on SME's Technological Innovation Performance in Korea (정부의 기술개발 지원이 중소기업의 기술혁신 성과에 미치는 영향)

  • Lee, Byung Heon;Lee, Soo Wook;Wi, Se Ahn
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.157-171
    • /
    • 2014
  • This study has empirically analyzed the effect of government technology development supports on the performance of SME's (Small-and-Medium-Sized Enterprises). To analyze the effects of government technology development supports on the performance of SME's, this paper collected data from 271 Korean SMEs and tested hypothesis on the key questions. The result shows that government technology development supports had a meaningful positive effect on the performance of SMEs in terms of innovation. It was also understood that the closer the ties were with large enterprises, the higher the R&D personnel ratio was. Furthermore, when the SME was a certified venture, the government technology development supports had less influence on the SME's technological innovation. On the other hand, SME's technological innovation performance in relation to the government supports showed an improvement when the business environment of SME's was hostile. This study offers theoretical and practical implications, as it more accurately analyses the effect of government technology development supports on the performance of SME's, for which data were collected and analyzed for the same companies two separate times. Last of all, the limitation of this study is discussed in terms of the sample selection, data collection method, variables measurement method, etc.

  • PDF

Development of the Common Model for Reuse of GIS Components in Local Governments (재사용을 위한 지자체 GIS 공통모델 연구)

  • Kim, Eun-Hyung
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.81-98
    • /
    • 1999
  • The purpose of this study is to provide a common model and implementation strategies for reusing GIS components in local governments. The common model includes several solutions to remove stumbling blocks step by step in reusing or exchanging GIS application systems between local governments. Elements of the model are component architecture, common business process model, common function model, and data model. The elements are the minimum standards for reusability. In order to realize the desirable common model at present, however, the following problems remain : usable components are insufficient in spatial domains and existing GIS application systems require reinvestment to accommodate the new component technology. Three questions are raised to maximize reusability from a monolithic structure toward layered and the componentized GIS application systems : (1) How can the application systems be reused within a local government?, (2) Can the systems be exchanged when they are in the same computing platform?, and (3) When the systems are componentized by standardized interfaces, are the components replaceable between the systems in local governments? Some strategies are presented to accomplish the objectives implicated in the questions. For the actual implementation, several issues such as evaluation procedures for component products, ownership and commercialization issues, will be brought up in the future. Central and local governments, and commercial party need to co-operate each other to maximize the reusability. Reducing overlapping investments in local governments and obtaining competitive component technology in the commercial party should be recognized as critical tasks for the more efficient and economical GIS implementation.

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Study on the Development of Airworthiness Standards for VTOL UAS (수직이착륙(VTOL) 무인항공기 감항기준 개발에 대한 연구)

  • Gil, Ginam;Yoo, Minyoung;Park, Jongsung
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.1
    • /
    • pp.44-53
    • /
    • 2020
  • In conjunction with the Fourth Industrial Revolution, the unmanned aerial vehicle industry is being developed to a new paradigm by combining advanced technologies such as AI, Big Data and the IoT. Aeronautical developed countries such as the U.S. are focusing their efforts on the development of the safer unmanned aerial vehicles. The Korea Aerospace Research Institute, as part of the national R&D project in 2011, had succeeded in developing the first vertical takeoff and landing (VTOL) UAS, called Smart-UAV. However, although the development technology of the VTOL UAS is possessed, developing and operating of the VTOL UAS for commercial or military use are limited. The type certification procedure of the VTOL UAS developed by domestic technology is stipulated in the Korean Aviation Safety Act, but the Korean VTOL UAS airworthiness standards (KAS) hsve not been established. Thus, this study investigated the development trends of the VTOL UAS in Korea and abroad and national certification systems and procedures, and benchmarked the special conditions for the VTOL aircraft, announced by the EASA on July 2, 2019, to establish standards for type certificate of the VTOL UAS in Korea.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

DSRC Strategy and Future ITS (DSRC 전략과 향후의 ITS)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.105-119
    • /
    • 2006
  • The car navigation system to be accompanied to the car on-board equipment system or the development of mobile communication technique, the demand in information communication which connects an interior and the car outside is coming to be high, As applications, ETC/VISC/AHS classes get deceived supply are advanced. The research of DSRC radio systems actively, with medium of communication between the automobile and road, is advanced. DSRC radio systems are appropriate in massive data transfer, in the case which the traffic accident evasion is urgent, the notarization of the preferential control function which is necessary to a medium of communication, guarantee and security are suitable in the high-speed network. Accompanied to the cellular phone which is to be supplied recently suddenly, By complementing and coexisting each other, and it will be developed simultaneously. However, in a connection of this kind of communication system and high-speed DSRC radio system, Hand-over technique (network, radio transmission hand-over), there is a technical subject of the high-speed transmission techniques against the mobile devices and the realization is expected to be difficult in near, until 2010 year is becoming the plan of putting to practical use. Also as the next generation DSRC with 5.8GHz built-on board equipment and the road-side equipment are expected in near. In this paper DSRC systems which will be developed are discussed.

Real-Time Face Recognition Based on Subspace and LVQ Classifier (부분공간과 LVQ 분류기에 기반한 실시간 얼굴 인식)

  • Kwon, Oh-Ryun;Min, Kyong-Pil;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.19-32
    • /
    • 2007
  • This paper present a new face recognition method based on LVQ neural net to construct a real time face recognition system. The previous researches which used PCA, LDA combined neural net usually need much time in training neural net. The supervised LVQ neural net needs much less time in training and can maximize the separability between the classes. In this paper, the proposed method transforms the input face image by PCA and LDA sequentially into low-dimension feature vectors and recognizes the face through LVQ neural net. In order to make the system robust to external light variation, light compensation is performed on the detected face by max-min normalization method as preprocessing. PCA and LDA transformations are applied to the normalized face image to produce low-level feature vectors of the image. In order to determine the initial centers of LVQ and speed up the convergency of the LVQ neural net, the K-Means clustering algorithm is adopted. Subsequently, the class representative vectors can be produced by LVQ2 training using initial center vectors. The face recognition is achieved by using the euclidean distance measure between the center vector of classes and the feature vector of input image. From the experiments, we can prove that the proposed method is more effective in the recognition ratio for the cases of still images from ORL database and sequential images rather than using conventional PCA of a hybrid method with PCA and LDA.

  • PDF

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

Implementation of an Effective Educational Community Service System by using Metadata and Category (MetaData와 Category를 이용한 효과적인 교육용 커뮤니티 서비스 시스템(ECSS) 구현)

  • Yoon, Sun-Jung;Kim, Mi-Jin;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1332-1343
    • /
    • 2006
  • This paper proposes an educational community service system that manages information of good quality intensively without overlapping, and that provides an effective searching function by using a personal community with many user layers. This system raises the efficiency of searching and management by using Metadata and Category. It is a self-leading educational community system that brings merits into relief and improves weak points. We constructed an autogenous Blog chain service as a tool which verifies this system, which is called 'EduLOG(Educational Blog) service' Especially we extracted Metadata suitable for this service, which is on the basis of worldfamous Dublin Core Metadata. And we made a new category on the basis of categories which were proposed by some educational community sites and public educational authorities, and we applied it to this system. To ascertain whether this service system provide adequate function or not, we made a questionnaire on the basis of the appraisal table in websites, and evaluated it at the request of experts. In view of the results so far achieved, it returned good scores (above 3.5/5.0) in accuracy of evaluation, low-end reappearance ratio, easiness of registering and approaching information, and intensive management of a categorical information, confirming the efficiency of the ECSS system. Therefore we believe firmly that the ECSS system will play a efficient information storing and searching roles in the near future.

  • PDF