• Title/Summary/Keyword: 위조 판별

Search Result 39, Processing Time 0.023 seconds

Feature selection and similarity comparison system for identification of unknown paintings (미확인 작품 식별을 위한 Feature 선정 및 유사도 비교 시스템 구축)

  • Park, Kyung-Yeob;Kim, Joo-Sung;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2021
  • There is a problem that unknown paintings are sophisticated in the level of forgery, making it difficult for even experts to determine whether they are genuine or counterfeit. These problems can be suspected of forgery even if the genuine product is submitted, which can lead to a decline in the value of the work and the artist. To address these issues, in this paper, we propose a system to classify chromaticity data among extracted data through objective analysis into quadrants, extracting comparisons and intersections, and estimating authors of unknown paintings using XRF and hyperspectral spectrum data from corresponding points.

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

Development of a bioassay for screening of resistance to Tomato spotted wilt virus isolate from Korea (국내 분리 토마토반점위조바이러스의 저항성 판별을 위한 생물검정법 개발)

  • Kwak, Hae-Ryun;Choi, Hyeon-Yong;Hong, Su-Bin;Hur, On-Sook;Byun, Hee-Seong;Choi, Hong-Soo;Kim, Mikyeong
    • Korean Journal of Environmental Biology
    • /
    • v.39 no.3
    • /
    • pp.319-328
    • /
    • 2021
  • Tomato spotted wilt virus (TSWV) is one of the most destructive viruses worldwide, which causes severe damage to economically important crops, such as pepper and tomato. In this study, we examined the molecular and biological characterization of a TSWV isolate (SW-TO2) infecting tomato and compared it to the recently reported isolates from boxthorn, butterbur, and angelica plants. The phylogenetic analysis based on the complete genome sequences confirmed that SW-TO2 was clustered with those of isolates from boxthorn and pepper in Korea with the maximum nucleotide identities ranging from 98% to 99%. We developed the bioassay method for screening TSWV resistance and tested some commercial pepper and tomato cultivars for resistance evaluation of four isolates of TSWV. TSWV resistance was evaluated as TSWV resistance when all the following three conditions were satisfied: first, when symptoms of necrotic spots or no symptoms were present in the inoculated leaves; second, when there were no symptoms in the upper leaves; and third, when the upper leaves were negative as a result of RT-PCR diagnosis.

Authentication of Rapeseed Oil Using an Electronic Nose Based on Mass Spectrometry (MS-전자코를 이용한 유채유의 진위 여부 판별)

  • Hong, Eun-Jeung;Son, Hee-Jin;Choi, Jin-Young;Noh, Bong-Soo
    • Korean Journal of Food Science and Technology
    • /
    • v.43 no.1
    • /
    • pp.105-109
    • /
    • 2011
  • To determine mixing ratios for mixtures of rapeseed oil and other oils, an electronic nose (E-nose) based on a mass spectrometer system was used. Rapeseed oil was blended with soy bean oil or corn oil at ratios of 100:0, 97:3, 94:6, 91:9, 88:12, 85:15, and 80:20, respectively. The intensities of each fragment from the mixed rapeseed oil by E-nose based on MS were completely different from those of the soy bean oil and corn oil. The obtained data were used for discriminant function analysis (DFA). DFA plots indicated a significant separation of pure rapeseed oil and soy bean oil or corn oil and their mixtures. The added concentration of soy bean oil or corn oil to rapeseed oil was highly correlated to the first discriminant function score (DF1). When soy bean oil was added to rapeseed oil, it was possible to predict the following equation: DF1=-0.170*conc. of soy bean oil+0.431 ($r^2=0.989$). For corn oil the equation was: DF1=-0.1*conc. of corn oil+0.4 ($r^2=0.844$). The use of an E-nose based on a MS system is as an efficient method for the authentication of pure rapeseed oil.

Analysis on Digital Image Composite Using Interpolation (보간을 이용한 디지털 이미지 합성 분석)

  • Song, Geun-Sil;Yun, Yong-In;Lee, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.3
    • /
    • pp.457-466
    • /
    • 2010
  • In this paper, we propose a new method for detecting digital forgery that identify interpolated region between digital composited images. For detecting the interpolation factor and the tampered regions, we perform two algorithms: The first algorithm is to estimate the interpolation factors using the differential equation for forgery image along the horizontal, vertical, and diagonal directions, respectively; The second algorithm is to scan the interpolation factors along each direction for detection areas as the mask of the optical window size($64{\times}64$) in order to find out the forgery region. A detection map of the forgery is classified with the magnitude of estimated interpolation factors into colors. This detection map can be used to find out interpolated regions from the tampered image. Experimental results demonstrate the proposed algorithms are proven on several examples. We also show the proposed approach is to accurately detect interpolated regions from digital composite images.

Optical encryption system using random divided image and joint transform correlator (무작위 분할 영상과 결합변환 광 상관기를 이용한 암호화 시스템)

  • 최상규;서동환;신창목;김수중;배장근
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.636-642
    • /
    • 2003
  • We proposed the optical system using two divided halftone images to hide the original image and a joint transform correlator. The encryption procedure is performed by the Fourier transform of the product of each divided image by visual cryptography and the same random image which is generated by computer processing. As a result, we can obtain two Fourier divided images which are used as the encrypted image and the decrypting key, respectively. In the decryption procedure, both the encrypted image and the decrypting key are located on the joint input plane. Then the original image is reconstructed on a CCD camera which is located in the output plane. An autocorrelation term of joint transform correlator contributes to decrypt the original image. To demonstrate the efficiency of the proposed system, computer simulations and noise analysis are performed. The result show that the proposed system is a very useful optical certification system.

PCA 알고리즘과 개선된 퍼지 신경망을 이용한 여권 인식 및 얼굴 인증

  • Jung Byung-Hee;Park Choong-Shik;Kim Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2006.06a
    • /
    • pp.336-343
    • /
    • 2006
  • 본 논문에서는 여권 영 상에서 PCA 알고리즘을 이용한 얼굴 인증과 개선된 퍼지 신경망을 이용한 여권 코드 인식 방법을 제안한다. 본 논문에서는 여권영상에 대해 소벨 연산자를 이용하여 에지를 추출하고 에지가 추출된 영상을 수평 스미어링하여 여권코드 영역을 추출한다. 추출된 여권 코드 영역의 기울기를 검사하여 기울기 보정을 하고, 여권 코드 영역을 이진화 한다. 이진화된 여권 코드 영역에 대하여 8방향윤곽선 추적 알고리즘을 적용하여 여권 코드를 추출한다. 추출된 여권 코드는 퍼지 신경망을 개선하여 여권 코드 인식에 적용한다. 개선된 퍼지 신경 망은 입력층과 중간층 사이의 학습 구조로는 FCM 클러스터링 알고리즘을 적용하고 중간층과 출력층 사이의 학습은 일반화된 델타학습 방법을 적용한다. 그리고 학습 성능을 개선하기 위하여 중간층과 출력층의 가중치 조정에 적용되는 학습률을 동적으로 조정하기 위해 퍼지 제어 시스템을 적용한다. 제안된 퍼지 신경망은 목표값과 출력값의 차이에 대한 절대값이 ${\epsilon}$ 보다 적거나 같으면 정확으로 분류하고 크면 부정확으로 분류하여 정확의 총 개수를 퍼지 제어 시스템에 적용하여 학습률과 모멘텀을 동적으로 조정한다. 여권의 주어진 규격에 근거하여 사진 영역을 추출하고 추출된 사진 영역에 대하여 YCbCr와 RGB 정보를 이용하여 얼굴영역을 추출한다. 추출된 얼굴 영역을 PCA 알고리즘과 스냅샷(Snap-Shot) 방법을 적용하여 얼굴 영역의 위조를 판별한다. 제안된 방법의 여권 코드 인식과 얼굴 인증의 성능을 평가하기 위하여 실제 여권 영상에 적용한 결과, 기존의 방법보다 여권 코드 인식과 얼굴 인증에 있어서 효율적인 것을 확인하였다.s, whereas AVs provide much better security.크는 기준년도부터 2031년까지 5년 단위로 계획된 장래도로를 반영하여 구축된다. 교통주제도 및 교통분석용 네트워크는 국가교통DB구축사업을 통해 구축된 자료로서 교통체계효율화법 제9조의4에 따라 공공기관이 교통정책 및 계획수립 등에 활용할 수 있도록 제공하고 있다. 건설교통부의 승인절차를 거쳐 제공하며 활용 후에는 갱신자료 및 활용결과를 통보하는 과정을 거치도록 되어있다. 교통주제도는 국가의 교통정책결정과 관련분야의 기초자료로서 다양하게 활용되고 있으며, 특히 ITS 노드/링크 기본지도로 활용되는 등 교통 분야의 중요한 지리정보로서 구축되고 있다..20{\pm}0.37L$, 72시간에 $1.33{\pm}0.33L$로 유의한 차이를 보였으므로(F=6.153, P=0.004), 술 후 폐환기능 회복에 효과가 있다. 4) 실험군과 대조군의 수술 후 노력성 폐활량은 수술 후 72시간에서 실험군이 $1.90{\pm}0.61L$, 대조군이 $1.51{\pm}0.38L$로 유의한 차이를 보였다(t=2.620, P=0.013). 5) 실험군과 대조군의 수술 후 일초 노력성 호기량은 수술 후 24시간에서 $1.33{\pm}0.56L,\;1.00{\ge}0.28L$로 유의한 차이를 보였고(t=2.530, P=0.017), 술 후 72시간에서 $1.72{\pm}0.65L,\;1.33{\pm}0.3L$로 유의한 차이를 보였다(t=2.540, P=0.016). 6) 대상자의 술 후 폐환기능에 영향을 미치는 요인은 성별로 나타났다. 이에 따

  • PDF

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.