• Title/Summary/Keyword: Fingerprint Verification

Search Result 78, Processing Time 0.023 seconds

A Moving Terminal's Coordinates Prediction Algorithm and an IoT Application

  • Kim, Daewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.63-74
    • /
    • 2017
  • Recently in the area of ICT, the M2M and IoT are in the spotlight as a cutting edge technology with the help of advancement of internet. Among those fields, the smart home is the closest area to our daily lives. Smart home has the purpose to lead a user more convenient living in the house with WLAN (Wireless Local Area Network) or other short-range communication environments using automated appliances. With an arrival of the age of IoT, this can be described as one axis of a variety of applications as for the M2H (Machine to Home) field in M2M. In this paper, we propose a novel technique for estimating the location of a terminal that freely move within a specified area using the RSSI (Received Signal Strength Indication) in the WLAN environment. In order to perform the location estimation, the Fingerprint and KNN methods are utilized and the LMS with the gradient descent method and the proposed algorithm are also used through the error correction functions for locating the real-time position of a moving user who is keeping a smart terminal. From the estimated location, the nearest fixed devices which are general electric appliances were supposed to work appropriately for self-operating of virtual smart home. Through the experiments, connection and operation success rate, and the performance results are analyzed, presenting the verification results.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

Organic Photorefractive Composites for Optical Information Processing

  • Oh, Jin-Woo;Hwang, Ui-Jung;Choi, Chil-Sung;Kim, Nak-Joong
    • Proceedings of the Polymer Society of Korea Conference
    • /
    • 2006.10a
    • /
    • pp.164-164
    • /
    • 2006
  • Polymeric photorefractive materials exhibit two attractive features, the large refractive index modulation (up to the order of $10^{-2}$) and the optical erasabilility of recorded holographic information. These advantages make the organic photorefractive materials to become candidates for optical data processing, e.g., pattern recognition and fingerprint verification. In this work, we demonstrate optically controlled SLMs using photorefractive composite. An incoherent image imposed in Xe-lamp light was converted into a coherent image.

  • PDF

Fake News Reliability Verification Platform based on Blockhain Technology (블록체인 기술 기반의 가짜 뉴스 신뢰성 검증 플랫폼)

  • Lee, Se-Hoon;Moon, Hyo-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.78-79
    • /
    • 2018
  • 최근 가짜뉴스가 무분별하게 확산되면서 가짜뉴스로 인한 경제적, 사회적 비용이 커지고 있다. 하루에 발생하는 가짜뉴스는 방대하며, 실제 뉴스기사를 악의적으로 재생산 또는 언론사를 사칭하는 방식으로 유포되고 있다. 이를 구분하기 위한 연구가 많으나, 공인된 뉴스 기사인지에 대한 신뢰성 입증과 관련된 연구 논문은 매우 적은 상황이다. 본 논문에서는 가짜뉴스 문제를 해결하기 위해 뉴스 플랫폼에 블록체인을 적용, 공인된 뉴스 제공자가 기사 내용에 대한 Fingerprint를 블록체인에 기록하여 공인된 기사 내용에 대한 신뢰성을 검증하는 방안에 대해 제안한다.

  • PDF

A Study on the Extraction of Nail's Region from PC-based Hand-Geometry Recognition System Using GA (GA를 이용한 PC 기반 Hand-Geometry 인식시스템의 Nail 영역 추출에 관한 연구)

  • Kim, Young-Tak;Kim, Soo-Jong;Park, Ju-Won;Lee, Sang-Bae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.506-511
    • /
    • 2004
  • Biometrics is getting more and more attention in recent years for security and other concerns. So far, only fingerprint recognition has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry has been used for biometric verification and identification because of its acquisition convenience and good performance for verification and identification performance. Hence, it can be a good candidate for online checks. Therefore, this paper proposes a Hand-Geometry recognition system based on geometrical features of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. This paper proposes thirty relevant features for a Hand-Geometry recognition system. However, during experimentation, it was discovered that length measured from the tip of the finger was not a reliable feature. Hence, we propose a new technique based on Genetic Algorithm for extraction of the center of nail bottom, in order to use it for the length feature.

A Study on Fingerprint-Based Coil Alignment Improvement Technique for Magnetic Resonant Wireless Power Transfer System (핑거프린트 방식의 자기 공진형 무선전력전송 코일 정렬 상태 개선 기법 연구)

  • Kim, Sungjae;Lee, Euibum;Ku, Hyunchul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.38-44
    • /
    • 2019
  • This paper proposes fingerprint-based positioning methods which can be used in a magnetic resonant wireless power transfer(WPT) system and verifies their performance. A new receiver coil with small orthogonal auxiliary coils is proposed to measure magnetic field signals in three axial directions. The magnitude and phase characteristics of the three-axis electromotive force can be obtained by using the proposed coil. To predict a position with the measured values, we propose a lookup table-based method and linear discriminant analysis-based method. For verification, the proposed methods are applied to predict 75 positions of the 6.78 MHz WPT system, and the performances such as accuracy and computation time are compared.

Robust Reference Point and Feature Extraction Method for Fingerprint Verification using Gradient Probabilistic Model (지문 인식을 위한 Gradient의 확률 모델을 이용하는 강인한 기준점 검출 및 특징 추출 방법)

  • 박준범;고한석
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.95-105
    • /
    • 2003
  • A novel reference point detection method is proposed by exploiting tile gradient probabilistic model that captures the curvature information of fingerprint. The detection of reference point is accomplished through searching and locating the points of occurrence of the most evenly distributed gradient in a probabilistic sense. The uniformly distributed gradient texture represents either the core point itself or those of similar points that can be used to establish the rigid reference from which to map the features for recognition. Key benefits are reductions in preprocessing and consistency of locating the same points as the reference points even when processing arch type fingerprints. Moreover, the new feature extraction method is proposed by improving the existing feature extraction using filterbank method. Experimental results indicate the superiority of tile proposed scheme in terms of computational time in feature extraction and verification rate in various noisy environments. In particular, the proposed gradient probabilistic model achieved 49% improvement under ambient noise, 39.2% under brightness noise and 15.7% under a salt and pepper noise environment, respectively, in FAR for the arch type fingerprints. Moreover, a reduction of 0.07sec in reference point detection time of the GPM is shown possible compared to using the leading the poincare index method and a reduction of 0.06sec in code extraction time of the new filterbank mettled is shown possible compared to using the leading the existing filterbank method.

A Study on Conformance Testing Method to Verify the BioAPI Based System Module (BioAPl기반 시스템 모듈을 검증하기 위한 적합성시험 방법 연구)

  • Lee Yoo-Young;Kwon Young-Bin
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.759-768
    • /
    • 2004
  • Recently the biometric recognition technology is intensively studied and the standardization of the technology has been highly demanded for its commercialization. Currently many blometric recognition products are being developed based on the BioAPl(Biometric Application Program-ming Interface) specification. However, the reliable testing tools (or scenarios) to evaluate performance and conformance of the products are not shown yet. In this paper, a conformance testing method is presented, which verifies a biometric recognition system to meet the requirements of the BioAPl standard. Two different testing procedures are used in the proposed method. The first procedure evaluates that each functions offered in the BioAPl specification are correctly implemented and that the functions are actually used in the system. Through the Procedure, a BSP(Biometric Service Provider) system is executed on the framework of the BioAPl functions. It requires selection of parameters and prece-dent functions that should be executed first. The second procedure evaluates the abilities of module management, handling operations and ver-ification process by the analysis of the test cases. It tests the correctness of the system operation when a testing scenario is given. The proposed testing method is applied on a fingerprint verification BSP using the sample BSP provided by the BioAPl consortium. The experimental results shows the benefits of the proposed testing method.

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

The Implementation of Integrity Verification Tool for Fingerprint Recognition Systems (지문인식시스템 무결성 검증 도구 구현)

  • 윤덕현;김기욱;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.941-946
    • /
    • 2002
  • 지문인식 시스템이 네트워크 기반에서 서버 매칭 형식으로 운영될 경우 클라이언트 매칭과는 달리 데이터의 전송과정에 많은 취약성이 존재한다. 지문인식은 휴대의 불편함이 없고, 분실이나 도난의 위험성도 없으며, 추측이 거의 불가능하므로 높은 안전성을 제공하는 장점을 가지고 있다. 그러나 지문데이터는 한 번 도난을 당하거나 네트워크 상에서 전송 도중 공격자를 통해 도청이 된다면 그 사용자는 앞으로 지문인식을 이용할 수 없다는 단점이 존재한다. 이에 대하여 전송 포맷 기술과 전송 데이터 보안의 표준화가 이루어지고 있다. 따라서 본 논문에서는 클라이언트에서 추출한 지문 특징점 데이터를 매칭을 위해 서버로 데이터를 전송할 경우 무결성의 적합성을 검증하기 위한 도구를 구현하였다. 신분위장 및 재전송 공격들의 위협으로부터 안전한 사용자 신분 확인을 보장하기 위해서 전송되는 지문 데이터의 인중, 무결성, 기밀성이 요구되며, 이를 위해 지문 데이터의 MAC(Message Authentication Code)과 암호화 기법을 이용하였다. 이때 전송 데이터의 기밀성을 위해서 Triple-DES와 SEED 암호 알고리즘을 사용하였고 무결성을 위해 MD5와 SHA-1 해쉬 함수를 사용하였다. 클라이언트에서 데이터를 전송할 때 두 가지의 지문데이터를 전송하는 실험을 통하여 결과를 비교하였다. 첫째, 변조된 지문데이터를 전송하였을 경우 데이터가 변조되었음을 알려주는 결과를 보여준다. 둘째, 변조되지 않은 지문데이터를 전송하였을 경우 이 데이터는 변조되었다는 메시지를 출력함으로써 무결성 검증 실험은 이루어진다.

  • PDF