• Title/Summary/Keyword: Fingerprints

Search Result 371, Processing Time 0.024 seconds

Bacterial Diversity of the South Pacific Sponge, Dactylospongia metachromia Based on DGGE Fingerprinting (DGGE에 의한 남태평양 해면 Dactylospongia metachromia의 공생세균 다양성)

  • Jeong, In-Hye;Park, Jin-Sook
    • Korean Journal of Microbiology
    • /
    • v.49 no.4
    • /
    • pp.377-382
    • /
    • 2013
  • The bacterial community structures of the marine sponge, Dactylospongia metachromia, collected from Chuuk of Micronesia on February 2012, were analyzed by denaturing gradient gel electrophoresis (DGGE). The DGGE fingerprints of two individuals of D. metachromia, CH607 and CH840 showed the same band patterns. The sequences derived from DGGE bands revealed 93~100% similarities with known bacterial species in the public database and high similarity with uncultured bacterial clones. The bacterial community structures of both D. metachromia sponges (CH607, CH840) were composed of 6 phyla, 8 classes: Alphaproteobacteria, Betaproteobacteria, Gammaproteobacteria, Acidobacteria, Actinobacteria, Chloroflexi, Cyanobacteria, Spirochaetes. DGGE fingerprint - based phylogenetic analysis revealed that the bacterial community profiles were identical in two individuals of the same sponge species collected from the same geographical location.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

Development of Fingerprints for Quality Control of Acorus species by Gas Chromatography/Mass Spectrometry

  • Yu, Se-Mi;Kim, Eun-Kyung;Lee, Je-Hyun;Lee, Kang-Ro;Hong, Jong-Ki
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.5
    • /
    • pp.1547-1553
    • /
    • 2011
  • An effective analytical method of gas chromatography/mass spectrometry (GC/MS) was developed for the rapid determination of essential oils in the crude extract of Acorus species (Acorus gramineus, Acorus tatarinowii, and Acorus calamus). Major phenypropanoids (${\beta}$,${\alpha}$-asarone isomers, euasarone, and methyleugenol) and ${\beta}$-caryophyllene in Acorus species were used as marker compounds and determined for the quality control of herbal medicines. To extract marker compounds, various extraction techniques such as solvent immersion, mechanical shaking, and sonication were compared, and the greatest efficiency was observed with sonication extraction using petroleum ether. The dynamic range of the GC/MS method depended on the specific analyte; acceptable quantification was obtained between 10 and 2000 ${\mu}g/mL$ for ${\beta}$-asarone, 10 and 500 ${\mu}g/mL$ for ${\alpha}$-asarone, 10 and 200 ${\mu}g/mL$ for methyleugenol, and between 5 and 100 ${\mu}g/mL$ for ${\beta}$-caryophyllene. The method was deemed satisfactory by inter- and intra-day validation and exhibited both high accuracy and precision, with a relative standard deviation < 10%. Overall limits of detection were approximately 0.34-0.83 ${\mu}g/mL$, with a standard deviation (${\sigma}$)-to-calibration slope (s) ratio (${\sigma}$/s) of 3. The limit of quantitation in our experiments was approximately 1.13-3.20 ${\mu}g/mL$ at a ${\sigma}$/s of 10. On the basement of method validation, 20 samples of Acorus species collected from markets in Korea were monitored for the quality control. In addition, principal component analysis (PCA) and hierarchical cluster analysis (HCA) were performed on the analytical data of 20 different Acorus species samples in order to classify samples that were collected from different regions.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

The Biometric Authentication Scheme Capable of Multilevel Security Control (보안레벨 조절이 가능한 바이오메트릭 인증 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A fingerprint is unique to each person and can be represented as a digital form. As the fingerprint is the part of human body, fingerprint recognition is much more easy to use and secure rather than using password or resident card for user authentication. In addition, as the newly released smart phones have built-in camera and fingerprint sensors, the demand for biometric authentication is increasing rapidly. But, the drawback is that the fingerprint can be counterfeited easily and if it's exposed to the hacker, it cannot be reused. Thus, the original fingerprint template should be transformed for registration and authentication purposes. Existing transformation functions use passcode to transform the original template to the cancelable form. Additional module is needed to input the passcode, so it requires more cost and lowers the usability. In this paper, we propose biometric authentication scheme that is economic and easy to use. The proposed scheme is consisted of cancelable biometric template creation, registration and user authentication protocols, and can control several security levels by configuring the number of fingerprints and scan times. We also analyzed that our scheme is secure against the brute-force attack and the active attacks.

A Study on Digital Fingerprinting Technology for the Copyright Protection of the Image Contents Printout (이미지 콘텐츠 출력물의 저작권보호를 위한 디지털 핑거프린팅 기술에 관한 연구)

  • Seo, Yong-Seok;Kim, Won-Gyum;Lee, Seon-Hwa;Suh, Young-Ho;Hwang, Chi-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.242-245
    • /
    • 2006
  • This paper addresses an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits ID information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template a multi-bits fingerprint is embedded repeatedly like a tiling pattern into the spatial domain of the image. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

Image Superimposition for the Individual Identification Using Computer Vision System (컴퓨터 시각 인식 기법을 이용한 영상 중첩법에 의한 개인식별)

  • Ha-Jin Kim
    • Journal of Oral Medicine and Pain
    • /
    • v.21 no.1
    • /
    • pp.37-54
    • /
    • 1996
  • In this thesis, a new superimposition scheme using a computer vision system was proposed with 7 pairs of skull and ante-mortem photographs, which were already identified through other tests and DNA fingerprints at the Korea National Institute of Scientific Investigation. At this computer vision system, an unidentified skull was caught by video-camcoder with the MPEG and a ante-mortem photograph was scanned by scanner. These two images were processed and superimposed using pixel processing. Recognition of the individual identification by anatomical references was performed on the two superimposed images. These results were as followings. 1. For the enhancement of skull and ante-mortem photographs, various image processing schemes, such as SMOOTH, SHARPEN, EMBOSS, MOSAIC, ENGRAVE, INVERT, NEON and COLOR TO MONO, were applied using 3*5 window processing. As an image processing result of these methods, the optimal techniques were NEON, INVERT and ENGRAVE for the edge detection of skull and ante-mortem photograph. 2. Using various superimposition image processing techniques (SRCOR, SRCAND, SRCINVERT, SRCERASE, DSTINVERT, MERGEPAINT) were compared for the enhancement of image recognition. 3. By means of the video camera, the skull image was inputed directly to a computer system : superimposing it on the ante-mortem photograph made the identification more precise and time-saving. As mentioned above, this image processing techniques for the superimposition of skull and ante-mortem photographs simply used the previous approach, In other wrods, taking skull photographs and developing it to the same size as the ante-mortem photographs. This system using various image processing techniques on computer screen, a more precise and time-saving superimposition technique could be able to be applied in the area of individual identification in forensic practice.

  • PDF

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

Identification and Distribution of Bacillus Species in Doenjang by Whole-Cell Protein Patterns and 16S rRNA Gene Sequence Analysis

  • Kim, Tae-Woon;Kim, Young-Hoon;Kim, Sung-Eon;Lee, Jun-Hwa;Park, Cheon-Seok;Kim, Hae-Yeong
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.8
    • /
    • pp.1210-1214
    • /
    • 2010
  • Many bacteria are involved in the fermentation of doenjang, and Bacillus species are known to perform significant roles. Although SDS-PAGE has been frequently used to classify and identify bacteria in various samples, the microbial diversity in doenjang has not yet been investigated. This study aims to determine the identity and distribution of dominant Bacillus species in doenjang using SDS-PAGE profiles of whole-cell proteins and 16S rRNA gene sequencing. Reference Bacillus strains yielded differential SDS-PAGE banding patterns that could be considered to be highly specific fingerprints. Grouping of bacterial strains isolated from doenjang samples by whole-cell protein patterns was confirmed by analysis of their 16S rRNA gene sequences. B. subtilis was found to be the most dominant strain in most of the samples, whereas B. licheniformis and B. amyloliquefaciens were less frequently found but were also detected in several samples. The results obtained in this study show that a combined identification method using SDS-PAGE profiles of whole-cell proteins and subsequent 16S rRNA gene sequence analysis could successfully identify Bacillus species isolated from doenjang.

S-haplotypes and Genetic Diversity in 'Danji' Radish (Raphanus sativus L. var. hortensis)

  • Ahn, Yulkyun;Kim, Hyukjun;Han, Dongyeop;Park, Younghoon
    • Horticultural Science & Technology
    • /
    • v.32 no.2
    • /
    • pp.210-216
    • /
    • 2014
  • The distribution of S-haplotypes and genetic relationships were evaluated for 47 accessions of 'Danji' radish (Raphanus sativus L. var. hortensis Baker f. gigantissimus Makino) originating from Jeju Island in South Korea. A total of 22 S-haplotype-specific SCAR markers for the S locus glycoprotein (SLG) and S receptor kinase (SRK) loci were tested, and six primer sets amplified locus-specific PCR fragments from at least one 'Danji' radish accession. S5 and S21 alleles atthe SLG locus were the most frequently distributed, and detected from 87.5% and 64.6% of the accessions, respectively. The frequency of the class-II haplotype at the SLG locus was 75%, more frequent than the class-I haplotype. The S23 allele at the SRK locus was detected from 7 accessions. Grouping of the accessions based on S-allele composition revealed three major groups, while 8 accessions showed a unique allelic composition. The genetic diversity of 47 'Danji' radishes and 1 'Gwandong' radish were also evaluated with 38 RAPD primers. A total of 312 bands were scored, and showed that 138 bands (44.2%) were monomorphic among the accessions, whereas 174 (55.8%) bands were polymorphic. Polymorphism rates ranged from 0.2 to 1.0, indicating significant variations in detecting polymorphism across RAPD primers. The genetic similarity coefficients among all pairs of the 48accessions varied from 0.62 to 0.93, and 42% of the comparisons exhibited values higher than 0.85. All the cultivars could be distinguished based on the DNA fingerprints revealed by RAPD. The comparisons between the dendrograms based on S-haplotypes and RAPDs indicate an unrelated and sporadic distribution for several accessions; however, there was a tendency for accessions with the same S-allelic composition to group into the same cluster.