• Title/Summary/Keyword: 지문인증

Search Result 254, Processing Time 0.023 seconds

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

(A User Authentication System Using Geometric Analysis and Similarity Comparison) (얼굴의 기하학적 분석과 유사도 비교를 이용한 사용자 인증 시스템)

  • 최내원;류동엽;지정규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1269-1278
    • /
    • 2002
  • The more high growth of knowledge, the more need personal identity technique. Fingerprint or iris of the eye identity techniques are already commercialized and used various field. Using human face recognition or authentication are not high performance yet. But application for an organism or face recognition are expected getting important. We propose a user recognition system by verifying similarity comparison of eye and lip component images which are splitted, calculated characteristic rate of each facial components and added weight to special formula. Through test proposed methods and analysis the result, we got a high recognition rate.

  • PDF

Enhancement of Iris Masking Security using DNN and Blurring (DNN과 블러링을 활용한 홍채 마스킹 보안 강화 기술)

  • Seungmin Baek;Younghae Choi;Chanwoo Hong;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.141-146
    • /
    • 2022
  • The iris, a biometric information, is safe, unique, and reliable, such as fingerprints, and is personal information that can significantly lower the misrecognition rate than other biometric authentication. However, due to the nature of biometric authentication, it is impossible to replace it if it is stolen. There is a case in which an actual iris photo is taken and 3d printed so that the eyes work as if they were in front of the camera. As such, there is a possibility of iris leakage through high-definition images and photos. In this paper, we propose to improve iris masking performance by supplementing iris region masking research based on existing blurring techniques. Based on the results derived in this study, it is expected that it can be used for the security of video conference programs and electronic devices.

Design of a Vulnerability Exploit Framework for Secure External Hard Disks (보안 외장 하드디스크 취약점 익스플로잇 프레임워크 설계)

  • Sejun Hong;Wonbin Jeong;Sujin Kwon;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.117-121
    • /
    • 2024
  • 기존의 외장 하드디스크는 보안 기능의 부재로 인하여, 비인가자로부터 디스크가 탈취되는 경우에는 저장된 데이터가 유출되거나 훼손되는 문제점이 존재한다. 이러한 문제점을 보완하기 위하여, 보안 기능을 제공하는 보안 외장 하드디스크가 등장하였지만, 보안 기능 중 패스워드나 지문 인증과 같은 사용자 인증을 우회하는 취약점이 지속적으로 발견됨으로써, 비인가자가 장치 내부에 안전하게 저장된 데이터에 접근하는 보안위협이 발생하였다. 이러한 보안위협은 국가사이버안보센터에서 공개한 보안 요구사항을 만족하지 못하거나, 만족하더라도 설계나 구현 과정에서 내포된 취약점으로 인하여 발생한다. 본 논문은 이와 같이 보안 외장 하드디스크에서 발생하는 취약점을 점검하기 위한 목적으로 보안 외장 하드디스크 익스플로잇 프레임워크를 설계하였다. 취약점을 점검하기 위한 전체 프레임워크를 설계하였고, 프레임워크에서 제공하는 각 기능 및 유즈케이스 다이어그램을 설계하였으며, 설계된 프레임워크를 활용한다면, 현재 상용화되었거나 추후 개발될 보안 외장 하드디스크를 대상으로 안전성을 평가할 것으로 판단된다. 그뿐만 아니라, 안전성 평가 결과를 기반으로, 보안 외장 하드디스크에 내재된 취약점을 보완함으로써 안전성을 더욱 향상시키고, 수동으로 분석하여야만 하는 보안 외장 하드디스크의 취약점 점검을 자동화함으로써, 안전성을 평가하는 시간과 비용 또한 절감할 것으로 사료된다.

  • PDF

A Study on Secure Mobile Payment Service for the Market Economy Revitalization (시장 경제 활성화를 위한 안전한 모바일 전자결제 방안 연구)

  • Kim, Hyung-Uk;Jung, Yong-Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.41-48
    • /
    • 2017
  • Recently, there has been a lot of ongoing research regarding financial transactions and payments due to the emergence of financial technology (FinTech). Payments have been processed through cash and credit cards, and payment methods have been simplified and are more convenient, with mobile payment via mobile cards and mobile phones. This study offers a new mobile payment method by using a mobile phone instead of a card reader or terminal. For payments, authentication is processed with the user's biometrics and a built-in fingerprint scanner, and the payment is processed after receiving an authentication code issued by the authorizing institution to confirm the user's identity. User biometrics and payment information is secured from any kind of malicious hacker by saving it in a Fast Identity Online (FIDO) Trusted Execution Environment (TEE) section in a smartphone. Regarding key security, every key is securely created in the FIDO TEE section, providing secure mobile payment by neutralizing various malicious attacks, including sniffing and the man-in-the middle attack.

주성분 분석 기법을 이용한 침윤소화약제의 일치성 분석

  • Kim, Seong-Su;Jo, Nam-Uk;Lee, Dong-Ho
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.23-24
    • /
    • 2013
  • 침윤소화약제는 소화용수와 혼합시 표면장력을 저하시켜 침투성을 향상시키는 약제로 다공성 적층물질의 화재를 진압하기 위하여 사용된다. 목조건물 및 다공성물질, 적층물질에서 화재가 발생한 경우, 일반소화용수로는 재발화의 가능성이 있는 물질의 심부까지 침투하기 어려워 심부화재로 전이될 가능성이 높다. 따라서 소화용수에 침윤소화약제를 혼합함으로써 침투성능을 향상시켜 연소물질 심부의 화재를 진압하며 이에 대한 기준 연구가 절실히 요구되고 있는 현시점에서 침윤소화약제의 성능을 평가할 수 있는 기법의 필요성 또한 커지고 있다. 이에 본 연구에서는 분석학적 기법을 통하여 침윤소화약제의 성분에 대하여 제품별 공통 성분과 제품별 특성성분 데이터를 지문영역으로 확보하였다. 이러한 일치성 평가를 실시함으로써 인증을 득한 소화약제의 사후 관리 기법으로 활용하고자 기초연구를 실시하였다.

  • PDF

Authentication System based on Fingerprint Scan for Safety Streaming Service (안전한 스트리밍 서비스를 위한 지문인식기반 인증시스템)

  • Jo, Je-Gyeong;Seo, Jong-Won;Lee, Hyung-Woo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.246-249
    • /
    • 2006
  • 현재 인터넷 상에서 수많은 멀티미디어들이 쏟아져 나오고 있다. 그로 인해 멀티미디어 서비스의 기술이 점점 발전해가며 그에 따라 멀티미디어의 불법 복제 또한 발달하였다 기존의 ID와Password를 입력하여 로그인 하던 시스템에서 수많은 해킹이 이루어졌으며 자신도 모르는 사이 자신의 아이디로 가입이 되고 결제가 되어 멀티미디어를 이용하고 있는 경우가 많아지고 있다. 이러한 많은 해킹의 위험으로부터 멀티미디어를 보호해야 할 필요가 있으며 그로 인해 현재 수많은 발달과 관심이 쏟아지는 바이오 인식을 이용하여 멀티미디어 서비스를 한 차원 더 발전시키고자 한다.

  • PDF

Fingerprint Authentication Based on Minutiae Quandrangle Defined by Neighboring Two Delaunay Triangles (이웃한 두 Delaunay 삼각형이 만드는 특징점 사각형에 기반한 지문 인증)

  • 차순백;조상현;성효경;최홍문
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.721-724
    • /
    • 2000
  • This paper presents fingerprint authentication method based on minutiae quadrangle definded by neighboring two Delaunay triangles. In this method, we first make minutiae triangle through Delaunay triangulation which adaptively connect neighboring minutiae according to the local minutiae density distribution, and then use feature vectors in authentication which is extracted from the minutiae quadrangle formed by neighboring two minutiae triangles. This prevents the degradation of matching ratio caused by the errors in image processing or local deformation of the fingerprint, and we can authenticate more discriminately as this method reflects wider local area's topological features than the features extracted from the individual minutiae triangles. To evaluate the proposed algorithm's performance, experiment are conducted on 120 fingerprints, of which size is 256 ${\times}$ 364 with 500dpi resolution. Robust authentications are possible with low FRR.

  • PDF

Volume Holographic Fingerprint Recognition System for Personal Identification (개인 인증을 위한 체적 홀로그래픽 지문인식 시스템)

  • 이승현
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.256-263
    • /
    • 1998
  • In this paper, we propose a volume holographic fingerprint recognition system based on optical correlator for personal identification. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the security verification system.

  • PDF