• Title/Summary/Keyword: Correlation detection method

Search Result 929, Processing Time 0.028 seconds

Liveness Detection of Fingerprints Using Correlation Filters (상관 필터를 이용한 위조 지문 검출 방법)

  • Choi, Hee-Seung;Choi, Kyung-Taek;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.355-358
    • /
    • 2005
  • Fingerprint recognition systems are the most widely used in biometrics for personal authentication. As they become more familiar, the security weaknesses of fingerprint sensors are becoming better known. In this paper, we propose a liveness detection method that applies correlation filter to the fingerprint recognition systems. The physiological characteristic of sweat pore, observed only in live people, is used as a measure to classify 'live' fingers from 'spoof' fingers. Previous works show that detection of sweat pores and perspiration patterns in fingerprint images can be used as an anti-spoofing measure. These methods don't consider the characteristic of pores in each individual. We construct the correlation filters of each individual which are composed of their pore information. We make the final decision about the "livens" of fingerprint using correlation output. The proposed algorithm was applied to a data set of 110 live, 110 spoof fingerprint images from optical fingerprint scanner and achieved classification rate of 80%.

  • PDF

A Study on the Five Senses Information Processing for HCI (HCI를 위한 오감정보처리에 관한 연구)

  • Lee, Hyeon Gu;Kim, Dong Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.77-85
    • /
    • 2009
  • In this paper, we propose data format for smell, taste, touch with speech and vision which can be transmitted and implement a floral scent detection and recognition system. We provide representation method of data of smell, taste, and touch. Also, proposed floral scent recognition system consists of three module such as floral scent acquisition module using Metal Oxide Semiconductor (MOS) sensor array, entropy-based floral scent detection module, and floral scent recognition module using correlation coefficients. The proposed system calculates correlation coefficients of the individual sensor between feature vector(16 sensors) from floral scent input point until the stable region and 12 types of reference models. Then, this system selects the floral scent with the maximum similarity to the calculated average of individual correlation coefficients. To evaluate the floral scent recognition system using correlation coefficients, we implemented an individual floral scent recognition system using K-NN with PCA and LDA that are generally used in conventional electronic noses. In the experimental results, the proposed system performs approximately 95.7% average recognition rate.

A Study on an Integer Frequency Offset Estimation and Compensation for DOCSIS 3.1 Downstream

  • Bae, JaeHwui;Song, JinHyuk;Ra, Sang-Jung;Choi, Dong-Joon;Jung, Joon-Young;Hur, Namho
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.39-46
    • /
    • 2017
  • In this paper, we propose an integer frequency offset estimation and compensation method based on PLC preamble correlation in DOCSIS 3.1 Downstream system. The proposed method determines the PLC preamble subcarrier location recovered from PLC data and the one obtained from PLC preamble correlation. We showed the performance of PLC preamble detection in the received signal through the maximum value detection of PLC preamble correlation. Thus we can estimate and compensate for the integer frequency offset by computing the difference of PLC subcarrier locations.

Pedestrian Safety Road Marking Detection Using LRF Range and Reflectivity (LRF (Laser Range Finder) 거리와 반사도를 이용한 보행자 보호용 노면표시 검출기법 연구)

  • Im, Sung-Hyuck;Im, Jun-Hyuck;Yoo, Seung-Hwan;Jee, Gyu-In
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.1
    • /
    • pp.62-68
    • /
    • 2012
  • In this paper, a detection method of a pedestrian safety road marking was proposed. The proposed algorithm uses laser range and reflectivity of a range finder (LRF). For a detection of crosswalk marking and stop line, the DFT (Discrete Fourier Transform) of reflectivity and cross-correlation method between the reference replica and the measured reflectivity are used. A speed bump is detected through measuring an altitude difference of two LRFs which have the different tilted angle. Furthermore, we proposed a velocity constrained a detection method of a speed bump. Finally, the proposed methods are tested in on-line, on the pavement of a road. The considered road markings are wholly detected. The localization errors of both road markings are smaller than 0.4 meter.

An Aggregate Detection of Event Correlation using Fuzzy Control (퍼지제어를 이용한 관련성 통합탐지)

  • 김용민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.135-144
    • /
    • 2003
  • An intrusion detection system shows different result over overall detection area according to its detection characteristics of inner detection algorithms or techniques. To expand detection areas, we requires an integrated detection which can be archived both by deploying a few detection systems which detect different detection areas and by combining their results. In addition to expand detection areas, we need to decrease the workload of security managers by false alarms and improve the correctness by minimizing false alerts which happen during the process of integration. In this paper, a method for aggregation detection use fuzzy inference to integrate a vague detection results which imply the characteristics of detection systems. Their analyzed detection characteristics are expressed as fuzzy membership functions and fuzzy rule bases which are applied through the process of fuzzy control. And, it integrate a vague decision results and minimize the number of false alerts by reflecting the characteristics of detection systems. Also it does minimize inference objects by applying thresholds decided through several experiments.

Double-Talk Detection Based on Soft Decision for Acoustic Echo Suppression (음향학적 반향 제거를 위한 Soft Decision 기반의 동시통화 검출)

  • Park, Yun-Sik;Chang, Joon-Hyuk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.3
    • /
    • pp.285-289
    • /
    • 2009
  • In this paper, we propose a novel double-talk detection (DTD) technique based on soft decision in the frequency domain. In the proposed method, global near-end speech presence probability (GNSPP) considering the statistical model assumption and voice activity detection (VAD) decision of the near-end and far-end signal are applied to the DTD algorithm in the frequency domain instead of the traditional hard decision scheme using cross-correlation coefficients. The performance of the proposed algorithm is evaluated by the objective test under various environments, and yields better results compared with the conventional scheme.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

Calculation of Effective Angular Correlation in the HPGe Spectroscopy of Co-60 $\gamma$-rays

  • Kim, In-Jung;Sun, Gwang-Min;Park, H. D.;Bae, Young-Dug
    • Nuclear Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.22-29
    • /
    • 2002
  • The angular correlation effect was investigated for Co-60 ${\gamma}$-ray spectroscopy by using HPGe detector and the effective angular correlation was theoretically calculated by considering the finite detector solid angle. For the calculation of effective angular correlation, the detection efficiency as a function of ${\gamma}$-ray incident direction was obtained by using Monte Carlo method and the first interaction model. The results and the methods used in the calculation are discussed.

Canonical correlation analysis based fault diagnosis method for structural monitoring sensor networks

  • Huang, Hai-Bin;Yi, Ting-Hua;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.1031-1053
    • /
    • 2016
  • The health conditions of in-service civil infrastructures can be evaluated by employing structural health monitoring technology. A reliable health evaluation result depends heavily on the quality of the data collected from the structural monitoring sensor network. Hence, the problem of sensor fault diagnosis has gained considerable attention in recent years. In this paper, an innovative sensor fault diagnosis method that focuses on fault detection and isolation stages has been proposed. The dynamic or auto-regressive characteristic is firstly utilized to build a multivariable statistical model that measures the correlations of the currently collected structural responses and the future possible ones in combination with the canonical correlation analysis. Two different fault detection statistics are then defined based on the above multivariable statistical model for deciding whether a fault or failure occurred in the sensor network. After that, two corresponding fault isolation indices are deduced through the contribution analysis methodology to identify the faulty sensor. Case studies, using a benchmark structure developed for bridge health monitoring, are considered in the research and demonstrate the superiority of the new proposed sensor fault diagnosis method over the traditional principal component analysis-based and the dynamic principal component analysis-based methods.

Flow based Sequential Grouping System for Malicious Traffic Detection

  • Park, Jee-Tae;Baek, Ui-Jun;Lee, Min-Seong;Goo, Young-Hoon;Lee, Sung-Ho;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3771-3792
    • /
    • 2021
  • With the rapid development of science and technology, several high-performance networks have emerged with various new applications. Consequently, financially or socially motivated attacks on specific networks have also steadily become more complicated and sophisticated. To reduce the damage caused by such attacks, administration of network traffic flow in real-time and precise analysis of past attack traffic have become imperative. Although various traffic analysis methods have been studied recently, they continue to suffer from performance limitations and are generally too complicated to apply in existing systems. To address this problem, we propose a method to calculate the correlation between the malicious and normal flows and classify attack traffics based on the corresponding correlation values. In order to evaluate the performance of the proposed method, we conducted several experiments using examples of real malicious traffic and normal traffic. The evaluation was performed with respect to three metrics: recall, precision, and f-measure. The experimental results verified high performance of the proposed method with respect to first two metrics.