• Title/Summary/Keyword: 지문인증

Search Result 254, Processing Time 0.027 seconds

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.

RF Fingerprinting Scheme for Authenticating 433MHz Band Transmitters (433 MHz 대역 송신기의 인증을 위한 RF 지문 기법)

  • Young Min, Kim;Woongsup, Lee;Seong Hwan, Kim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.69-75
    • /
    • 2023
  • Small communication devices used in the Internet of Things are vulnerable to various hacking because they do not apply advanced encryption techniques due to their low memory capacity or slow computation speed. In order to increase the authentication reliability of small-sized transmitters operating in 433MHz band, we introduce an RF fingerprint and adopt a convolutional neural network (CNN) as a classification algorithm. The preamble signal transmitted by each transmitter are extracted and collected using software-defined-radio to constitute a training data set, which is used for training the CNN. We tested identification of 20 transmitters in four different scenarios and obtained high identification accuracy. In particular, the accuracy of 95.8% and 92.6% was obtained, respectively in the scenario where the test was performed at a location different from the transmitter's location at the time of collecting training data, and in the scenario where the transmitter moves at walking speed.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

The Implementation of the Multiple Security System Based on RFID and Biometrics (RFID와 생체인식기반 다중보안 시스템 구현)

  • Lee, Jae-Yong;Joung, Lyang-Jae;Kim, Jang-Hui;Kang, Dae-Seong
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2006.06a
    • /
    • pp.1-4
    • /
    • 2006
  • 본 논문에서는 보다 높은 보안 체계를 요구하는 환경에서 개인의 얼괄 인증과 RFID의 인증을 통한 다중 보안 시스템을 제안하고자 한다. 이 시스템은 추출된 얼굴 영상의 특징 벡터들을 각각 사용자의 태그에 저장하고 개인 인증 시 얼굴 영상의 입력과 비교 및 판독에 사용하도록 한다. 태그의 생체정보와 입력 얼굴영상에서 추출한 특징벡터가 일치하여야만 Database에 접근이 가능하며, 만약 하나라도 만족하지 못하면 인증은 실패한다. 이것은 사람의 얼굴뿐만 아니라 지문, 홍채 등의 생체인증 기술과 RFID와의 결합으로 보다 안전하고 효과적인 개인 인증 기술로 사용될 수 있을 것이다.

  • PDF

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.

Improvement of Fingerprints Orientation Field using Model-based algorithm and Sobel Operator (모델링과 Sobel Operator의 결합을 통한 지문 영상의 방향성 추출 알고리즘 개선)

  • Choi, Young;Lee, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.81-84
    • /
    • 2006
  • 특징점 추출 기반의 지문인식 알고리즘에서 방향정보는 이진화 과정 및 지문 분류, 인증에 쓰이므로 매우 중요하다. 모델기반의 방향정보를 추정하는 방법은 영상 전체에 있는 노이즈에 대하여 매우 강건하지만, 상처와 같이 국부적으로 존재하는 노이즈 정보의 추출에는 취약하다. Sobel Operator의 경우에는 국부적인 노이즈 요소에는 민감한 특정을 보인다. 따라서 본 논문에서는 모델링된 방향정보와 Sobel Operator 의 방향 정보를 백터에 의한 상호 결합하여 영상의 방향 정보를 개선하고 노이즈 블록을 추정하는 방법을 제안한다.

  • PDF

SoC Implementation of Fingerprint Feature Extraction System with Ridge Following (융선추적을 이용한 지문 특징점 추출기의 SoC 구현)

  • 김기철;박덕수;정용화;반성범
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.97-107
    • /
    • 2004
  • This paper presents an System-on-Chip(SoC) implementation of fingerprint feature extraction system. Typical fingerprint feature extraction systems employ binarization and thinning processes which cause many extraction errors for low qualify fingerprint images and degrade the accuracy of the entire fingerprint recognition system. To solve these problems, an algorithm directly following ridgelines without the binarization and thinning process has been proposed. However, the computational requirement of the algorithm makes it hard to implement it on SoCs by using software only. This paper presents an implementation of the ridge-following algorithm onto SoCs. The algorithm has been modified to increase the efficiency of hardwares. Each function block of the algorithm has been implemented in hardware or in software by considering its computational complexity, cost and utilization of the hardware, and efficiency of the entire system. The fingerprint feature extraction system has been developed as an IP for SoCs, hence it can be used on many kinds of SoCs for smart cards.

한국의 바이오인식기술 국제표준화 활동현황

  • Kim, Nak-Hyun;Kim, Jason
    • Review of KIISC
    • /
    • v.24 no.4
    • /
    • pp.33-38
    • /
    • 2014
  • 바이오인식 기술은 사람 신체의 고유한 특징을 기반으로 사용자를 식별, 인증할 수 있는 융합 기술로써, 다양한 활용 가능성을 가진 보안기술이다. 최근 아이폰 5s, 갤럭시 S5 등의 모바일 기기에 지문인식 기술이 채용되어 바이오정보를 활용한 기기 인증 등의 서비스를 제공하고 있으며, 향후 모바일 지급 결재 등 다양한 응용 서비스에도 바이오인식 기술적용이 확대될 전망이다. 본 기고에서는 우리나라가 바이오인식분야에서 ISO, ITU 등 국제표준화기구에서의 표준화 활동현황 및 전망을 살펴보고, 모바일 바이오인식 응용기술 등 향후 기술진화에 따른 발전 전망을 예측해 보도록 한다.

Vulnerability Analysis of Secure USB: Based on the Password Authentication of Product B (보안 USB 취약점 분석: B 제품 비밀번호 인증을 기반으로)

  • Lee, Kyungroul;Jang, Wonyoung;Lee, Sun-Young;Yim, Kangbin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.155-157
    • /
    • 2018
  • 사용자의 개인정보 및 기업의 기밀정보와 같인 데이터의 안전한 이동 및 저장을 위하여 저장장치 보안 기술이 등장하였으며, 보안 USB와 보안 디스크 제품이 대표적으로 등장하였다. 이러한 제품은 저장되는 데이터를 안전하게 보호하기 위하여 사용자 인증 기술 및 데이터 암호 기술, 접근 제어 기술 등의 보안 기술을 적용한다. 특히, 사용자 인증 기술은 비밀번호 인증 기술이 대표적으로 활용되며, 인증을 강화하기 위하여 지문 인증 및 홍체 인증이 활용되고 있다. 따라서 본 논문에서는 보안 USB 제품, 특히 B 제품을 기반으로 적용된 사용자 인증 기술을 분석하고 이를 통하여 발생 가능한 보안 취약점을 분석한다. 분석 결과, 제품 B에 적용된 비밀번호 인증에서 발생 가능한 취약점을 도출하였으며, 이를 통하여 사용자 인증을 우회하여 저장장치 내부에 저장된 데이터의 탈취 가능함을 검증하였다.