• Title/Summary/Keyword: Fingerprints

Search Result 371, Processing Time 0.022 seconds

Effects of Quicklime Treatment on Survival of Bacteria and Structure of Bacterial Community in Soil (생석회 처리가 토양 세균의 생존과 군집구조에 미치는 영향)

  • Zo, Young-Gun
    • Journal of Soil and Groundwater Environment
    • /
    • v.17 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • When quicklime is added into soil for various purposes, abrupt changes in soil chemistry may affect essential ecological functions played by indigenous bacterial communities in soil. The magnitude of influence was estimated by observing changes in abundance and diversity of soil bacteria after quicklime treatment. When several soil samples were treated up to 20% (w/w) quicklime, plate count of viable cells ranged $10^2{\sim}10^3$ CFU $g^{-1}$, showing a reduction of more than $10^4$ times from viable counts of the untreated sample. Diversity of the bacterial isolates that survived after quicklime treatment was analyzed by conducting $GTG_5$ rep-PCR fingerprinting. There were only two types of fingerprints common to both 5% and 20% quicklime samples, implying that bacteria surviving at different strength of quicklime treatment differed depending on their tolerance to quicklime-treated condition. Isolates surviving the quicklime treatments were further characterized by Gram staining and endospore staining. All isolates were found to be Gram positive bacteria, and 85.4% of them displayed endospores state. In conclusion, most bacteria surviving quicklime treatment appear to be endospores. This finding suggests that most of ecological functions of bacteria in soil are lost with quicklime treatment.

Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination

  • Zhang, Qiu-yu;Xu, Fu-jiu;Bai, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.522-539
    • /
    • 2021
  • In order to solve the problems of the existing audio fingerprint method when extracting audio fingerprints from long speech segments, such as too large fingerprint dimension, poor robustness, and low retrieval accuracy and efficiency, a robust audio fingerprint retrieval method based on feature dimension reduction and feature combination is proposed. Firstly, the Mel-frequency cepstral coefficient (MFCC) and linear prediction cepstrum coefficient (LPCC) of the original speech are extracted respectively, and the MFCC feature matrix and LPCC feature matrix are combined. Secondly, the feature dimension reduction method based on information entropy is used for column dimension reduction, and the feature matrix after dimension reduction is used for row dimension reduction based on energy feature dimension reduction method. Finally, the audio fingerprint is constructed by using the feature combination matrix after dimension reduction. When speech's user retrieval, the normalized Hamming distance algorithm is used for matching retrieval. Experiment results show that the proposed method has smaller audio fingerprint dimension and better robustness for long speech segments, and has higher retrieval efficiency while maintaining a higher recall rate and precision rate.

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.

Indoor Logistics Location Tracking System with Fingerprint (핑거프린트를 적용한 실내 물류 위치추적 시스템)

  • Kim, Doan;Jeon, Sung woo;Jung, Junhee;Bae, Sangjung;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.594-596
    • /
    • 2019
  • In this paper, we propose an indoor logistic tracking system that identifies the location and inventory of the logistics in the room based on fingerprints. Through this, we constructed the actual infrastructure of the logistics center and designed and implemented the logistics management system. The proposed system collects the signal strength through the location terminal and generates the signal map to locate the goods. The location terminal is composed of a UHF RFID reader and a wireless LAN card, reads the peripheral RFID signal and the signal of the wireless AP, and transmits it to the web server. This allows the user to communicate with the server through the smartphone app and get information and location of nearby items.

  • PDF

Deep Learning-based Indoor Positioning System Using CSI (채널 상태 정보를 이용한 딥 러닝 기반 실내 위치 확인 시스템)

  • Zhang, Zhongfeng;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.1-7
    • /
    • 2020
  • Over the past few years, Wi-Fi signal based indoor positioning system (IPS) has been researched extensively because of its low expenses of infrastructure deployment. There are two major aspects of location-related information contained in Wi-Fi signals. One is channel state information (CSI), and one is received signal strength indicator (RSSI). Compared to the RSSI, the CSI has been widely utilized because it is able to reveal fine-grained information related to locations. However, the conventional IPS that employs a single access point (AP) does not exhibit decent performance especially in the environment of non-line-of-sight (NLOS) situations due to the reliability degeneration of signals caused by multipath fading effect. In order to address this problem, in this paper, we propose a novel method that utilizes multiple APs instead of a single AP to enhance the robustness of the IPS. In our proposed method, a hybrid neural network is applied to the CSIs collected from multiple APs. By relying more on the fingerprint constructed by the CSI collected from an AP that is less affected by the NLOS, we find that the performance of the IPS is significantly improved.

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol (Yong-Lee의 익명 핑거프린팅 프로토콜의 안전성 취약점 및 개선 방안)

  • Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.151-155
    • /
    • 2006
  • In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

K-Means Clustering with Deep Learning for Fingerprint Class Type Prediction

  • Mukoya, Esther;Rimiru, Richard;Kimwele, Michael;Mashava, Destine
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.29-36
    • /
    • 2022
  • In deep learning classification tasks, most models frequently assume that all labels are available for the training datasets. As such strategies to learn new concepts from unlabeled datasets are scarce. In fingerprint classification tasks, most of the fingerprint datasets are labelled using the subject/individual and fingerprint datasets labelled with finger type classes are scarce. In this paper, authors have developed approaches of classifying fingerprint images using the majorly known fingerprint classes. Our study provides a flexible method to learn new classes of fingerprints. Our classifier model combines both the clustering technique and use of deep learning to cluster and hence label the fingerprint images into appropriate classes. The K means clustering strategy explores the label uncertainty and high-density regions from unlabeled data to be clustered. Using similarity index, five clusters are created. Deep learning is then used to train a model using a publicly known fingerprint dataset with known finger class types. A prediction technique is then employed to predict the classes of the clusters from the trained model. Our proposed model is better and has less computational costs in learning new classes and hence significantly saving on labelling costs of fingerprint images.

Research Trends in CNN-based Fingerprint Classification (CNN 기반 지문분류 연구 동향)

  • Jung, Hye-Wuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.653-662
    • /
    • 2022
  • Recently, various researches have been made on a fingerprint classification method using Convolutional Neural Networks (CNN), which is widely used for multidimensional and complex pattern recognition such as images. The CNN-based fingerprint classification method can be executed by integrating the two-step process, which is generally divided into feature extraction and classification steps. Therefore, since the CNN-based methods can automatically extract features of fingerprint images, they have an advantage of shortening the process. In addition, since they can learn various features of incomplete or low-quality fingerprints, they have flexibility for feature extraction in exceptional situations. In this paper, we intend to identify the research trends of CNN-based fingerprint classification and discuss future direction of research through the analysis of experimental methods and results.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.