• Title/Summary/Keyword: 홍채 패턴

Search Result 62, Processing Time 0.028 seconds

Iris Feature Selection Using Genetic Algorithm (웨이블릿과 주성분분석을 이용한 홍채 특징 추출)

  • 김귀주;이일병
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.550-552
    • /
    • 2003
  • 패턴인식에서 사용되는 모든 영상을 해석할 수 있는 시스템은 현재 어려운 문제이므로 먼저문제 영역을 해석하는 방법이 일반적이다. 이는 영상의 이해 및 특정 정보값을 사용하여 특징으로 사용하기 위하여 특징을 추출한다. 특징 추출시 정보의 손실 없이 데이터를 줄이는 작업이 연구되어오고 있지만 이는 사람의 주관적인 경험으로 알고리즘의 내부 파라미터를 결정하고 바꾸어야 하는 문제점을 가지고 있다. 본 논문에서는 웨이블릿 변환으로 얻어진 sub-band들을 특징으로 추출하고 결과를 통계적인 방법인 주성분분석을 이용하여 특징 차원을 감소시켜 인식의 정확도를 향상시키는 방법을 제안한다.

  • PDF

A Preference of Smartphone Locking Algorithms Using Delphi and AHP (Aanalytic Hierarchy Process) (델파이와 계층분석기법을 이용한 스마트폰 잠금 알고리즘 선호도 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1228-1233
    • /
    • 2019
  • Recently, a variety of algorithms using encryption technology have been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve the unlocking problem through human biometrics technology, which has already succeeded in commercializing. These include finger print recognition, face recognition, and iris recognition. In this study, the evaluation items are five algorithms, including finger print recognition, face recognition, iris recognition, pattern recognition, and password input method. Based on the algorithms adopted, the AHP (analytic hierarchy process) technique was used to calculate the preferred priorities for smartphone users. Finger print recognition ( .400) was the top priority for smartphone users. Next, pattern recognition ( .237) was placed in the second priority for smartphone users. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

On Pattern Kernel with Multi-Resolution Architecture for a Lip Print Recognition (구순문 인식을 위한 복수 해상도 시스템의 패턴 커널에 관한 연구)

  • 김진옥;황대준;백경석;정진현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2067-2073
    • /
    • 2001
  • Biometric systems are forms of technology that use unique human physical characteristics to automatically identify a person. They have sensors to pick up some physical characteristics, convert them into digital patterns, and compare them with patterns stored for individual identification. However, lip-print recognition has been less developed than recognition of other human physical attributes such as the fingerprint, voice patterns, retinal at blood vessel patterns, or the face. The lip print recognition by a CCD camera has the merit of being linked with other recognition systems such as the retinal/iris eye and the face. A new method using multi-resolution architecture is proposed to recognize a lip print from the pattern kernels. A set of pattern kernels is a function of some local lip print masks. This function converts the information from a lip print into digital data. Recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The multi-resolution architecture allows us to reduce the false recognition rate from 15% to 4.7%. This paper shows that a lip print is sufficiently used by the measurements of biometric systems.

  • PDF

바이오 인식 기술 적용 현황 및 서비스 문제점 연구 (모바일 기기를 중심으로)

  • Song, Cho-Rong;Park, Jae-Hyeok;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.66-76
    • /
    • 2015
  • 최근 카드사 정보 유출과 더불어 유출된 개인정보를 악용한 범죄가 빈번하게 일어남에 따라 정보보호에 대한 관심과 중요성이 높아지고 있다. 국내 스마트폰 가입자 수도 4100만 명을 넘어가면서 모바일 보안에 대한 중요성 역시 강조되고 있는 가운데 지문, 홍채, 얼굴, 목소리, 눈동자 등 개개인의 고유 정보를 이용하여 인증하는 바이오 인식 기술이 주목을 받고 있다. 최근 휴대폰 제조업체들도 스마트폰 기기 내에 바이오 인식 기술을 탑재하여 기존의 인증 방식인 잠금 패턴이나 PIN 방식보다 강화된 보안성을 제공하고 있다. 또한 모바일 결제 서비스 이용 증가에 따라 바이오 인식 결제 서비스를 제공.이용할 수 있어 그 활용성은 매우 클 것으로 전망된다. 하지만 바이오 데이터의 안전한 처리 문제, 바이오 인식 서비스의 부족 등과 같은 문제점이 따르는 실정이다. 본고에서는 바이오 인식 기술의 적용 현황 및 국내외 동향을 살펴보고 바이오 인식 시장의 문제점 분석과 이에 따른 개선 방향에 대해서 연구한다.

Nymi Band firmware attack scenarios and countermeasures research (Nymi Band 펌웨어 공격 시나리오 및 대응방안 연구)

  • Hur, Yun-A;Shin, Young-Hyun;Lee, Kwang-Jae;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.733-734
    • /
    • 2015
  • 사용자 인증의 중요성이 강조되고 있는 추세에 따라 지문인식, 홍채인식, 안면 인식 등 생체인증 기술이 적용되어 디바이스 보안성이 향상되고 있다. 이런 흐름에 맞춰 심장박동패턴을 이용하는 새로운 보안 기술이 선보여지고 있는 가운데 심전도(ECG)방식을 통해 사용자인증을 하는 Nymi Band라는 웨어러블이 관심을 받고 있다. 그러나 해당 디바이스의 펌웨어 조작 가능성이 보안 취약점으로 제시되어 본 논문에서는 Nymi Band의 핵심 기술 분석을 거쳐 펌웨어 공격의 구체적인 시나리오를 구상하고, 그에 따른 대응 방안을 제안하는 연구를 진행하고자 한다.

Effects of EDTA on morphology of hydroxyapatite prepared by hydrothermal method (수열합성법에 의해 합성된 수산화아파타이트 결정의 입자 형상에 관한 EDTA의 영향)

  • Choi, Bong-Seok;Kim, Dong-Hyun;Kim, Tae-Wan;Park, Hong-Chae;Yoon, Seog-Young
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.21 no.2
    • /
    • pp.75-81
    • /
    • 2011
  • Hydroxyapatite (HAP) crystals with hexagonal structure have been successfully synthesized by using EDTA(ethylene diamine tetraacetic acid) as chelate under hydrothermal condition. The as-prepared HAp powders were characterized by XRD and SEM. The XRD result indicated that the products were preferentially oriented along c-axis. The SEM photographs showed that the morphology of the HAp crystals was well controlled by the reaction parameters such as temperature, pH value, and the molar ratio of EDTA/Ca.

Research Trend of Biometrics (생체인식기술의 연구동향)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.824-827
    • /
    • 2005
  • The need to be able to identify other individual human beings is fundamental to the security and has been true since the beginning of human history. Physical or behavioral characteristics (finger-scan, face-scan, voice, palm, iris, retina, signature, human DNA, keystroke, vain, gait etc.) of a person are used to authenticate the person. The biometric technologies allow for a greater reliability of authentication as compared with password systems for physical access, network security, e-commerce, and so on. In this paper, we describe various technologies, market analysis, multi-modal system, standardization, privacy issue and future prospect of biometrics.

  • PDF

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

Fast Detection of Finger-vein Region for Finger-vein Recognition (지정맥 인식을 위한 고속 지정맥 영역 추출 방법)

  • Kim, Sung-Min;Park, Kang-Roung;Park, Dong-Kwon;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.23-31
    • /
    • 2009
  • Recently, biometric techniques such as face recognition, finger-print recognition and iris recognition have been widely applied for various applications including door access control, finance security and electric passport. This paper presents the method of using finger-vein pattern for the personal identification. In general, when the finger-vein image is acquired from the camera, various conditions such as the penetrating amount of the infrared light and the camera noise make the segmentation of the vein from the background difficult. This in turn affects the system performance of personal identification. To solve this problem, we propose the novel and fast method for extracting the finger-vein region. The proposed method has two advantages compared to the previous methods. One is that we adopt a locally adaptive thresholding method for the binarization of acquired finger-vein image. Another advantage is that the simple morphological opening and closing are used to remove the segmentation noise to finally obtain the finger-vein region from the skeletonization. Experimental results showed that our proposed method could quickly and exactly extract the finger-vein region without using various kinds of time-consuming filters for preprocessing.