• Title/Summary/Keyword: Information on iris

Search Result 228, Processing Time 0.026 seconds

Multimodal System by Data Fusion and Synergetic Neural Network

  • Son, Byung-Jun;Lee, Yill-Byung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.2
    • /
    • pp.157-163
    • /
    • 2005
  • In this paper, we present the multimodal system based on the fusion of two user-friendly biometric modalities: Iris and Face. In order to reach robust identification and verification we are going to combine two different biometric features. we specifically apply 2-D discrete wavelet transform to extract the feature sets of low dimensionality from iris and face. And then to obtain Reduced Joint Feature Vector(RJFV) from these feature sets, Direct Linear Discriminant Analysis (DLDA) is used in our multimodal system. In addition, the Synergetic Neural Network(SNN) is used to obtain matching score of the preprocessed data. This system can operate in two modes: to identify a particular person or to verify a person's claimed identity. Our results for both cases show that the proposed method leads to a reliable person authentication system.

A Study on Eye Detection by Using Adaboost for Iris Recognition in Mobile Environments (Adaboost를 이용한 모바일 환경에서의 홍채인식을 위한 눈 검출에 관한 연구)

  • Park, Kang-Ryoung;Park, Sung-Hyo;Cho, Dal-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.4
    • /
    • pp.1-11
    • /
    • 2008
  • In this paper, we propose the new eye detection method by using adaboost (adaptive boosting) method. Also, to reduce the false alarm rate which identifies the non-eye region as genuine eye that is the Problems of previous method using conventional adaboost, we proposed the post processing methods which used the cornea specular reflection and determined the optimized ratio of eye detecting box. Based on detected eye region by using adaboost, we performed the double circular edge detector for localizing a pupil and an iris region at the same time. Experimental results showed that the accuracy of eye detection was about 98% and the processing time was less than 1 second in mobile device.

A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

  • Konidala M. Divyan;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.669-685
    • /
    • 2003
  • Nowadays mobile phones and PDAs are part and parcel of our lives. By carrying a portable mobile device with us all the time we are already living in partial Pervasive Computing Environment (PCE) that is waiting to be exploited very soon. One of the advantages of pervasive computing is that it strongly supports the deployment of Location-Based Service(s) (LBSs). In PCE, there would be many competitive service providers (SPs) trying to sell different or similar LBSs to users. In order to reserve a particular service, it becomes very difficult for a low-computing and resource-poor mobile device to handle many such SPs at a time, and to identify and securely communicate with only genuine ones. Our paper establishes a convincing trust model through which secure job delegation is accomplished. Secure Job delegation and cost effective cryptographic techniques largely help in reducing the burden on the mobile device to securely communicate with trusted SPs. Our protocol also provides users privacy protection, replay protection, entity authentication, and message authentication, integrity, and confidentiality. This paper explains our protocol by suggesting one of the LBSs namely“Secure Automated Taxi Calling Service”.

  • PDF

Biometric technology comparison analysis for the security reinforcement of the ATM (ATM 보안 강화를 위한 생체인식기술 분석)

  • Kwon, Yong-Kwan;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.1
    • /
    • pp.16-20
    • /
    • 2016
  • In this paper, we analyze the characteristics and ATM applications for fingerprint, iris, vein recognition technology that can be applied to the ATM to reinforce security. Describe the important requirements to be considered when introducing a biometric authentication in the ATM, and were compared to each biometric authentication scheme based on these requirements. Fingerprint authentication has limitations in accuracy, iris recognition is a big weakness in user convenience, whereas vein recognition has the advantage of being hygienic, yet excellent accuracy and secrecy. Vein authentication approach is expected to be expanded to apply to ATM due to the many advantages.

Implementation for the Biometric User Identification System Based on Smart Card (SMART CARD 기반 생체인식 사용자 인증시스템의 구현)

  • 주동현;고기영;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.25-31
    • /
    • 2004
  • This paper is research about the improvement of recognition rate of the biometrics user identification system using the data previously stored in the non contact Ic smart card. The proposed system identifies the user by analyzing the iris pattern his or her us. First, after extracting the area of the iris from the image of the iris of an eye which is taken by CCD camera, and then we save PCA Coefficient using GHA(Generalized Hebbian Algorithm) into the Smart Card. When we confirmed the users, we compared the imformation of the biometrics of users with that of smart card. In case two kinds of information was the same, we classified the data by using SVM(Support Vector Machine). The Experimental result showed that this system outperformed the previous developed system.

  • PDF

Improving SVM Classification by Constructing Ensemble (앙상블 구성을 이용한 SVM 분류성능의 향상)

  • 제홍모;방승양
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.251-258
    • /
    • 2003
  • A support vector machine (SVM) is supposed to provide a good generalization performance, but the actual performance of a actually implemented SVM is often far from the theoretically expected level. This is largely because the implementation is based on an approximated algorithm, due to the high complexity of time and space. To improve this limitation, we propose ensemble of SVMs by using Bagging (bootstrap aggregating) and Boosting. By a Bagging stage each individual SVM is trained independently using randomly chosen training samples via a bootstrap technique. By a Boosting stage an individual SVM is trained by choosing training samples according to their probability distribution. The probability distribution is updated by the error of independent classifiers, and the process is iterated. After the training stage, they are aggregated to make a collective decision in several ways, such ai majority voting, the LSE(least squares estimation) -based weighting, and double layer hierarchical combining. The simulation results for IRIS data classification, the hand-written digit recognition and Face detection show that the proposed SVM ensembles greatly outperforms a single SVM in terms of classification accuracy.

LVQ Network Design using SOM (SOM을 이용한 LVQ 네트워크 설계)

  • 정경권;이용구;엄기환
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.5
    • /
    • pp.280-288
    • /
    • 2003
  • In this paper, we propose a design method of the LVQ network using the SOM. The proposed method determines subclasses and initial reference vectors of the LVQ network using the SOM. The efficacy of the proposed method is verified by means of simulations on iris data of Fisher and character recognition. The results show that the proposed method improves considerably on the performance of the conventional LVQ network.

A Study on Research Support Service of the National R&D Full Cycle (국가 연구개발 전주기 연구지원서비스에 관한 연구)

  • Kwak, Seung-Jin;Park, Jin Ho;Kang, Bong-suk;Kim, Dou-Gyun;Oh, Sunhye
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.405-423
    • /
    • 2022
  • The purpose of this study was to establish a national R&D lifecycle and to propose a research support service plan. In particular, in terms of providing research support services, a plan to provide services in connection with IRIS and NTIS, which are national research support systems, was proposed. To this end, the current status of IRIS and NTIS was analyzed, a linkage plan according to the role of each system was proposed, and an R&D lifecycle was established by analyzing previous studies and cases at home and abroad. Through current status analysis and case analysis, research support services that can be provided at each stage on the entire R&D lifecycle were proposed.

Analysis of Preference for Encryption Algorithm Based on Decision Methodology (의사 결정 방법론을 기반한 암호화 알고리즘 선호도 분석)

  • Jin, Chan-Yong;Shin, Seong-Yoon;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.167-168
    • /
    • 2019
  • Lately, variety of algorithms using encryption technology has been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve through human biometrics technology which has already succeeded in commercialization. These include finger print recognition, face recognition, and iris recognition. In this study, we selected biometrics recognition technology and pattern recognition and password input methods which are already commercialized as evaluation items. The evaluation items are five algorithms including finger print recognition, face recognition iris recognition, pattern recognition and password input method. Based on these algorithms, analytic hierarchy process is used to analyze the preference of smartphone users. Also, the theoretical implications are presented based on the analysis results.

  • PDF

Result of the 1st Worldwide Internet Voting System

  • Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.219-224
    • /
    • 2002
  • In this paper, after designing an efficient and secure Internet voting protocol (called as “votopia”) based on modified Ohkubo et. al.'s scheme [8] under Public Key Infrastructure (PKI), we have implemented this system and served via the Internet to select the Most Valuable Players and Best Goal Keepers of 2002 FIFA World Cup Korea/Japan$\^$TM/. The sketch of voting protocol, practical implementation and voting result arc described.

  • PDF