• Title/Summary/Keyword: Fingerprint authentication

Search Result 138, Processing Time 0.027 seconds

The Personal Time based Fingerprint Authentication Scheme Safe Against Forged Fingerprint Attack (위조 지문 공격에 안전한 인증길이 기반의 지문 인증 기법)

  • Yoon, Dayea;Kim, Seunggyu;Yu, Jina;Kim, Hyeongju;Yun, Sunghyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.301-302
    • /
    • 2016
  • 최근 바이오메트릭 센서를 내장한 스마트폰 및 모바일 기기의 보급으로 바이오메트릭 인증에 대한 사람들의 관심이 증대되고 있다. 지문 인식은 사람마다 고유한 지문 정보를 이용하여 사용자를 인증하는 것으로 다른 바이오메트릭 인증 방법에 비하여 상대적으로 비용이 저렴하고 인식률이 높아 많은 응용에 적용된다. 하지만 사람의 지문은 실리콘 또는 젤라틴과 같은 물질을 이용해 쉽게 위조가 가능한 단점이 있다. 따라서, 지문인식용 센서는 온도, 빛 등의 2차적인 인증 수단을 함께 측정할 수 있어야 하는데, 이 경우 비용이 많이 들게 된다. 본 연구에서는 인증길이(지문인식을 위해서 스캔한 시간)와 지문인식에 사용된 손가락을 2차적인 인증 수단으로 사용하여 위조 지문 공격에 대응할 수 있는 지문 인증 기법을 제안한다. 제안한 기법은 2차 인증을 위한 키패드 기반의 패스워드 입력 부담을 줄일 수 있고 경제적이다.

The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security (출입 보안을 위한 레이블링을 이용한 영역 분리 및 지문 중심점 추출)

  • Lee, Keon-Ik;Jeon, Young-Cheol;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.243-251
    • /
    • 2008
  • This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in $128{\times}128$ size into the size of $4{\times}4$ pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.

  • PDF

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.

The biometric authentication technology, which makes overseas trip possible without passports (여권 없이도 외국 여행이 가능한 생체 측정 인증 기술)

  • Shim, Hyun Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.88-95
    • /
    • 2012
  • The passport is not only an officially proven document in order to identify the nationalities of travelers, but also request for protections of travelers. Since the overseas trips have been increased, the uses of forged or modulated passports are also now rapidly increasing. The forged or modulated passports are mainly used by international criminal organization or offenders, who are restricted by immigration control, in order to avoid under the radar and conceal their identities. The purpose of biometric authentication technology is to define one's unique identities through the comparative analysis one's unique finger prints, iris, sweat gland, blood vessel, palm pattern, vein distribution, voice, and etc. We have been studying about applicable and possibilities of the biometric authentication technology for overseas travel without passports. In hence, we have been also collected various of technical references of using biometric authentication, and have been analyzed what is the best biometric to be alternatively used instead of passports.

  • PDF

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

A Study on the System of Risk Management in the Int'l Trade by Internet Network (인터넷무역위험(貿易危險)의 관리체계(管理體系)에 관한 고찰(考察))

  • Ha, Kang-Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.239-261
    • /
    • 2001
  • There are many kinds of risk in int'l trade by internet network, such as credit risk, mercantile risk, contingency risk, exchange risk, physical risk and the risk on internet network. Especially, risk management against credit risk and the risk on internet network are very important. The former is conventional but more important these days. The latter is a new risk that has been incurred owing to the int'l trade by internet network. The system of risk management against the former are firstly, to surely research credit of counterpart by internet, secondly, to certify the entity by password or fingerprint, thirdly, to pay the price under a letter of credit, fourthly, to use the system of int'l trade such as bolero, trade card, finally, to use the authority of electronic trade services. The system of risk management against the latter are firstly, to install the firewall on the own computer network, secondly, to entrust the management own computer network to the network security services firm, thirdly, to electronically communicate with counterpart through the certification authority, finally, to insure against the own network risk with the security insurance company.

  • PDF

(A User Authentication System Using Geometric Analysis and Similarity Comparison) (얼굴의 기하학적 분석과 유사도 비교를 이용한 사용자 인증 시스템)

  • 최내원;류동엽;지정규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1269-1278
    • /
    • 2002
  • The more high growth of knowledge, the more need personal identity technique. Fingerprint or iris of the eye identity techniques are already commercialized and used various field. Using human face recognition or authentication are not high performance yet. But application for an organism or face recognition are expected getting important. We propose a user recognition system by verifying similarity comparison of eye and lip component images which are splitted, calculated characteristic rate of each facial components and added weight to special formula. Through test proposed methods and analysis the result, we got a high recognition rate.

  • PDF