• Title/Summary/Keyword: Biometrics Recognition

Search Result 219, Processing Time 0.03 seconds

A Survey on Face-based Cryptographic Key Generation

  • Dang, Thao;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.39-50
    • /
    • 2020
  • Derivation cryptographic keys from human biometrics opens a new promising research area when it can be used efficiently for not only verification or recognition tasks, but also symmetric-key based applications. Among existing biometric traits, face is considered as the most popular biometrics since facial features are informative and discriminative. In this paper, we present a comprehensive survey of Face-based key generation (FKGS). First, we summarize the trend of FKGS researches and sum up the methods which play important roles in the proposed key generation systems. Then we present the evaluation and the general performance analysis; from that, we give a discussion about the advantages and disadvantages of surveyed studies to clarify the fundamental requirements and the main challenges when implementing FKGS in practice. Finally, an outlook on future prospects is given.

Face Recognition Using Frequency Characteristics of Facial Images (얼굴 영상의 주파수 특성을 이용한 얼굴 인식)

  • Choi, Jean;Chung, Yun-Su;Yoo, Jang-Hee
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.395-396
    • /
    • 2006
  • 본 논문에서는 얼굴 인식의 성능을 효율적으로 향상시키기 위하여 Discrete Cosine Transform (DCT)와 Principal Component Analysis(PCA)에 기반한 새로운 특징 추출 방법을 제안한다. 얼굴 영상의 공간 영역은 DCT를 이용하여 주파수 영역으로 변환되며, DCT 도메인에서 얼굴 영상이 갖는 고유한 주파수 특성을 최적화 하는 주파수 밴드 영역을 추출한다. 차원이 축소된 데이터는 PCA 를 이용하여 데이터의 변별력에 가장 적합한 얼굴의 특징을 추출하고 Nearest Neighbor Classification 을 통해 본인여부를 확인 한다. 실험 결과 제안된 방법은 데이터의 차원을 효과적으로 축소하면서 기존의 얼굴 인식 방법에 비해 높은 인식률 향상을 보였다.

  • PDF

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication (특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체 정보 데이터의 가역성에 대한 보안 문제 분석)

  • Kim, Koon-Soon;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.51-59
    • /
    • 2008
  • The biometrics has been researched as a means for authenticating user's identity. Among the biometrics schemes for face recognition, the eigenvector-based schemes, which use eigenvector made from training data for transforming test data to abstracted data, are widely adopted. From those schemes, however, it is hard to expect cancelable feature, which is a general concept for security in the biometrics. In this paper, we point out the security problem that is the recovery of valuable face information from the abstracted face data and consider a possible attack scenario by showing our experiment results.

Temple and Maternity Ward Security using FPRS

  • Ambeth Kumar, V.D.;Ramakrishnan, M.;Jagadeesh Kannan, R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.633-637
    • /
    • 2013
  • A wide range of applications for Foot Print Recognition System is discussed in this paper. The whole concept works under the principle that foot print is a parameter associated with biometrics that is very common as well as distinct. Its foremost application is at the government hospitals in the under developed and third world nations where there aren't the best of facilities. This system can be applied in the maternity ward of the hospitals for the identification or differentiation of the infants. Till date there has been no specialized system adopted for this purpose. The Foot Print Recognition System will overcome all the defects of any biometrics when applied here. Since the child will be very delicate for an iris scan and it will not be able to open its eyes wide or to correctly place its finger print on the sensor since the hands of a new born infant will be closed for a while. The Foot Print Recognition system can also be implemented in temples where there are cases of theft often reported. This can be used to grant access to the karpagraham of the deity by authorized users alone. These 2 applications of FPRS are discussed in this paper.

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition (통계적 형상 기반의 얼굴인식을 위한 가변얼굴템플릿 생성방법)

  • Lee, Chul-Han;Jung, Min-Yi;Kim, Jong-Sun;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.27-36
    • /
    • 2007
  • Changeable biometrics identify a person using transformed biometric data instead of original biometric data in order to enhance privacy and security in biometrics when biometric data is compromised. In this paper, a novel scheme which generates changeable face templates for statistical appearance-based face recognition is proposed. Two different original face feature vectors are extracted from two different appearance-based approaches, respectively, each original feature vector is normalized, and its elements are re-ordered. Finally a changeable face template is generated by weighted addition between two normalized and scrambled feature vectors. Since the two feature vectors are combined into one by a two to one mapping, the original two feature vectors are not easily recovered from the changeable face template even if the combining rule is known. Also, when we need to make new changeable face template for a person, we change the re-ordering rule for the person and make a new feature vector for the person. Therefore, the security and privacy in biometric system can be enhanced by using the proposed changeable face templates. In our experiments, we analyze the proposed method with respect to performance and security using an AR-face database.

Industrialization of Augmented Reality Contents : Focusing on the 21st Century's Films and Augmented Reality Arts (증강현실 콘텐츠의 산업화 : 21세기 영화와 증강현실 예술을 중심으로)

  • Kim, Hee-Young
    • Cartoon and Animation Studies
    • /
    • s.35
    • /
    • pp.347-374
    • /
    • 2014
  • The aim of this article is to consider the future of industrialization of Augmented Reality contents focusing on cinematic imagination of films that used Augmented Reality techniques and artistic imagination of Augmented Reality Arts in the 21st century. The film showing future technology through cinematic imagination plays an role in the presentation of future vision important. Augmented Reality Arts show the big picture of future arts, future aspect of society, and future culture by using technically possible present technology. I classified the researched films according to Augmented Reality technique. It is expected that Gesture Recognition will develop with transparent display device techniques, Hologram techniques will be changed into individualized communication styles, Biometrics will be able to evolve into multi-Biometrics, and Wearable Computer will develop in the aspect of physical body augmentation and then industrialize. In Augmented Reality Arts, it seems that the various utilization of avatar will be related to Hologram, the utilization of the physiological phenomenon of the human body will be related to Biometrics, the mixture of reality and virtual reality will utilize display devices through Gesture Recognition, and a new experiment of HMD(Head-Mounted Display) will industrialize with the diversification of Wearable Computer. Augmented Reality contents created through the imagination and representation in the films and arts take a role in helping human life, and, at the same time, show the future image industrialized in the way of combination between human and environment without a medium.

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF