• Title/Summary/Keyword: Biometric Recognition

Search Result 241, Processing Time 0.02 seconds

Super-Resolution Iris Image Restoration using Single Image for Iris Recognition

  • Shin, Kwang-Yong;Kang, Byung-Jun;Park, Kang-Ryoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.117-137
    • /
    • 2010
  • Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; however, for good performance, it requires the diameter of the iris to be greater than 200 pixels in an input image. So, a conventional iris system uses a camera with a costly and bulky zoom lens. To overcome this problem, we propose a new method to restore a low resolution iris image into a high resolution image using a single image. This study has three novelties compared to previous works: (i) To obtain a high resolution iris image, we only use a single iris image. This can solve the problems of conventional restoration methods with multiple images, which need considerable processing time for image capturing and registration. (ii) By using bilinear interpolation and a constrained least squares (CLS) filter based on the degradation model, we obtain a high resolution iris image with high recognition performance at fast speed. (iii) We select the optimized parameters of the CLS filter and degradation model according to the zoom factor of the image in terms of recognition accuracy. Experimental results showed that the accuracy of iris recognition was enhanced using the proposed method.

User Authentication Method using EEG Signal in FIDO System (FIDO 시스템에서 EEG 신호를 이용한 사용자 인증 방법)

  • Kim, Yong-Ki;Chae, Cheol-Joo;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.465-471
    • /
    • 2018
  • Recently, biometric technology has begun to be used as a fusion of IT technology and financial system. Using this biometric technology, FIDO(Fast Identity Online) technology, Samsung and Apple started Samsung Pay and Apple Pay service. FIDO authentication technology replaces existing authentication methods such as passwords. Among the biometric technologies, fingerprint recognition technology is attracting attention because it can minimize the device and user rejection at a relatively low price. However, fingerprint information has a limited number of users and it can not be reused if fingerprint information is leaked by an external attacker. Therefore, in this paper, we propose a method to authenticate a user using EEG signal which is one of biometrics technologies. W propose a method to use EEG signal measurement value in FIDO system by using convenience channel by using short channel EEG device. And propose a method to utilize EEG signal when the user recognizes a specific entity by measuring the EEG signal before and after recognizing a specific entity.

A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone (퍼지볼트와 스테가노그래피를 이용한 스마트폰 지문 인증 시스템)

  • Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.419-426
    • /
    • 2015
  • This paper proposes a fingerprint verification system on a fuzzy vault with steganography for a smartphone. While biometric-based authentication can provide strong security, the biometric data must be handled carefully as it cannot be re-enrolled when it is revealed to other people. When the transformed data is used for authentication, the original biometric data can be protected. In this paper, we combine a fingerprint verification system with a fuzzy vault scheme to protect the fingerprint data of a smartphone user. In addition, the transformed data using a fuzzy vault scheme increases the security as it is concealed by the steganography scheme. The result of the experiment using fingerprint databases shows that the proposed scheme provides a high level of convenience and security for authentication of a smartphone having with a fingerprint sensor.

A Study on User Authentication with Smartphone Accelerometer Sensor (스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구)

  • Seo, Jun-seok;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

Development of Robust-to-Rotation Iris Feature Extraction Algorithms For Embedded System (임베디드 시스템을 위한 회전에 강인한 홍채특징 추출 알고리즘 개발)

  • Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.4
    • /
    • pp.25-32
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil, and head tilting. This paper is appropriate for the embedded environment using local gradient histogram embedded system using iris feature extraction methods have implement. The proposed method enables high-speed feature extraction and feature comparison because it requires no additional processing to obtain the rotation invariance, and shows comparable performance to the well-known previous methods.

  • PDF

Periocular Recognition Using uMLBP and Attribute Features

  • Ali, Zahid;Park, Unsang;Nang, Jongho;Park, Jeong-Seon;Hong, Taehwa;Park, Sungjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6133-6151
    • /
    • 2017
  • The field of periocular biometrics has gained wide attention as an alternative or supplemental means to conventional biometric traits such as the iris or the face. Periocular biometrics provide intermediate resolution between the iris and the face, which enables it to support both. We have developed a periocular recognition system by using uniform Multiscale Local Binary Pattern (uMLBP) and attribute features. The proposed system has been evaluated in terms of major factors that need to be considered on a mobile platform (e.g., distance and facial pose) to assess the feasibility of the use of periocular biometrics on mobile devices. Experimental results showed 98.7% of rank-1 identification accuracy on a subset of the Face Recognition Grand Challenge (FRGC) database, which is the best performance among similar studies.

Palmprint recognition system using wavelet transform (웨이블릿 변환을 이용한 장문인식시스템)

  • Choi, Seung-Dal;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.114-116
    • /
    • 2006
  • This paper is to propose the palm print recognition system using wavelet transform. The palm print is frequently used as the material for the biometric recognition system such as the finger print, iris, face, etc. Since the palm print has lots of properties which include principle line, wrinkles, ridge and so forth, the ways of the implementation of the system are various. In this paper, at first, the palm print image is acquired and then some level of wavelet transform is performed. The coefficients become to be some blocks size of M by N after divided into the horizontal, vertical, diagonal components each level. The mean values, which are calculated with values of each block, are used as the feature vector. To compare between the stored template and the acquired vectors, we adopt the PNN (Probability Neural Network) method.

  • PDF

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

Implementation of Face Recognition Applications for Factory Work Management

  • Rho, Jungkyu;Shin, Woochang
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.246-252
    • /
    • 2020
  • Facial recognition is a biometric technology that is used in various fields such as user authentication and identification of human characteristics. Face recognition applications are practically used in various fields, but very few applications have been developed to improve the factory work environment. We implemented applications that uses face recognition to identify a specific employee in a factory .work environment and provide customized information for each employee. Factory workers need documents describing the work in order to do their assigned work. Factory managers can use our application to register documents needed for each worker, and workers can view the documents assigned to them. Each worker is identified using face recognition, and by tracking the worker's face during work, it is possible to know that the worker is in the workplace. In addition, as a mobile app for workers is provided, workers can view the contents using a tablet, and we have defined a simple communication protocol to exchange information between our applications. We demonstrated the applications in a factory work environment and found several improvements were required for practical use. We expect these results can be used to improve factory work environments.