• Title/Summary/Keyword: Information on iris

Search Result 228, Processing Time 0.025 seconds

Setting of the Operating Conditions of Stereo CCTV Cameras by Weather Condition

  • Moon, Kwang;Pyeon, Mu Wook;Lee, Soo Bong;Lee, Do Rim
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.6
    • /
    • pp.591-597
    • /
    • 2014
  • A wide variety of image application methods, such as aerial image, terrestrial image, terrestrial laser, and stereo image point are currently under investigation to develop three-dimensional 3D geospatial information. In this study, matching points, which are needed to build a 3D model, were examined under diverse weather conditions by analyzing the stereo images recorded by closed circuit television (CCTV) cameras installed in the U-City. The tests on illuminance and precipitation conditions showed that the changes in the number of matching points were very sensitively correlated with the changes in the illuminance levels. Based on the performances of the CCTV cameras used in the test, this study was able to identify the optimal values of the shutter speed and iris. As a result, compared to an automatic control mode, improved matching points may be obtained for images filmed using the data obtained through this test in relation to different weather and illuminance conditions.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

Data Mining Algorithm Based on Fuzzy Decision Tree for Pattern Classification (퍼지 결정트리를 이용한 패턴분류를 위한 데이터 마이닝 알고리즘)

  • Lee, Jung-Geun;Kim, Myeong-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1314-1323
    • /
    • 1999
  • 컴퓨터의 사용이 일반화됨에 따라 데이타를 생성하고 수집하는 것이 용이해졌다. 이에 따라 데이타로부터 자동적으로 유용한 지식을 얻는 기술이 필요하게 되었다. 데이타 마이닝에서 얻어진 지식은 정확성과 이해성을 충족해야 한다. 본 논문에서는 데이타 마이닝을 위하여 퍼지 결정트리에 기반한 효율적인 퍼지 규칙을 생성하는 알고리즘을 제안한다. 퍼지 결정트리는 ID3와 C4.5의 이해성과 퍼지이론의 추론과 표현력을 결합한 방법이다. 특히, 퍼지 규칙은 속성 축에 평행하게 판단 경계선을 결정하는 방법으로는 어려운 속성 축에 평행하지 않는 경계선을 갖는 패턴을 효율적으로 분류한다. 제안된 알고리즘은 첫째, 각 속성 데이타의 히스토그램 분석을 통해 적절한 소속함수를 생성한다. 둘째, 주어진 소속함수를 바탕으로 ID3와 C4.5와 유사한 방법으로 퍼지 결정트리를 생성한다. 또한, 유전자 알고리즘을 이용하여 소속함수를 조율한다. IRIS 데이타, Wisconsin breast cancer 데이타, credit screening 데이타 등 벤치마크 데이타들에 대한 실험 결과 제안된 방법이 C4.5 방법을 포함한 다른 방법보다 성능과 규칙의 이해성에서 보다 효율적임을 보인다.Abstract With an extended use of computers, we can easily generate and collect data. There is a need to acquire useful knowledge from data automatically. In data mining the acquired knowledge needs to be both accurate and comprehensible. In this paper, we propose an efficient fuzzy rule generation algorithm based on fuzzy decision tree for data mining. We combine the comprehensibility of rules generated based on decision tree such as ID3 and C4.5 and the expressive power of fuzzy sets. Particularly, fuzzy rules allow us to effectively classify patterns of non-axis-parallel decision boundaries, which are difficult to do using attribute-based classification methods.In our algorithm we first determine an appropriate set of membership functions for each attribute of data using histogram analysis. Given a set of membership functions then we construct a fuzzy decision tree in a similar way to that of ID3 and C4.5. We also apply genetic algorithm to tune the initial set of membership functions. We have experimented our algorithm with several benchmark data sets including the IRIS data, the Wisconsin breast cancer data, and the credit screening data. The experiment results show that our method is more efficient in performance and comprehensibility of rules compared with other methods including C4.5.

Webcam-Based 2D Eye Gaze Estimation System By Means of Binary Deformable Eyeball Templates

  • Kim, Jin-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.575-580
    • /
    • 2010
  • Eye gaze as a form of input was primarily developed for users who are unable to use usual interaction devices such as keyboard and the mouse; however, with the increasing accuracy in eye gaze detection with decreasing cost of development, it tends to be a practical interaction method for able-bodied users in soon future as well. This paper explores a low-cost, robust, rotation and illumination independent eye gaze system for gaze enhanced user interfaces. We introduce two brand-new algorithms for fast and sub-pixel precise pupil center detection and 2D Eye Gaze estimation by means of deformable template matching methodology. In this paper, we propose a new algorithm based on the deformable angular integral search algorithm based on minimum intensity value to localize eyeball (iris outer boundary) in gray scale eye region images. Basically, it finds the center of the pupil in order to use it in our second proposed algorithm which is about 2D eye gaze tracking. First, we detect the eye regions by means of Intel OpenCV AdaBoost Haar cascade classifiers and assign the approximate size of eyeball depending on the eye region size. Secondly, using DAISMI (Deformable Angular Integral Search by Minimum Intensity) algorithm, pupil center is detected. Then, by using the percentage of black pixels over eyeball circle area, we convert the image into binary (Black and white color) for being used in the next part: DTBGE (Deformable Template based 2D Gaze Estimation) algorithm. Finally, using DTBGE algorithm, initial pupil center coordinates are assigned and DTBGE creates new pupil center coordinates and estimates the final gaze directions and eyeball size. We have performed extensive experiments and achieved very encouraging results. Finally, we discuss the effectiveness of the proposed method through several experimental results.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

Guidelines for Safe and Reliable PUF Implementation (안전하고 신뢰성 있는 PUF 구현을 위한 가이드라인)

  • Lee, Donggeon;Lee, Yeonchoel;Kim, Kyunghoon;Park, Jong-Gyu;Choi, Yong-Je;Kim, Howon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.241-259
    • /
    • 2014
  • A PUF is a technology for distinguishing a device from other devices like biological information such as humans' iris or fingerprints. Over the past decade, many researchers studied various methods for implementing PUFs and utilizing them in identification, random number generation, key distribution and authentication. However, various attacks on the PUFs are the major reason to inhibiting the proliferation of PUF. For the reasons, various technologies are being studied to enhance safety of PUFs. In this paper, we will see several PUF implementations and various attacks on PUFs, and suggest guidelines for securely implementing PUFs. We expect our guidelines would be the foundation for implementing the secure and reliable PUFs.

A Comprehensive Framework for Estimating Pedestrian OD Matrix Using Spatial Information and Integrated Smart Card Data (공간정보와 통합 스마트카드 자료를 활용한 도시철도 역사 보행 기종점 분석 기법 개발)

  • JEONG, Eunbi;YOU, Soyoung Iris;LEE, Jun;KIM, Kyoungtae
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.5
    • /
    • pp.409-422
    • /
    • 2017
  • TOD (Transit-Oriented Development) is one of the urban structure concentrated on the multifunctional space/district with public transportation system, which is introduced for maintaining sustainable future cities. With such trends, the project of building complex transferring centers located at a urban railway station has widely been spreaded and a comprehensive and systematic analytical framework is required to clarify and readily understand the complicated procedure of estimation with the large scale of the project. By doing so, this study is to develop a comprehensive analytical framework for estimating a pedestrian OD matrix using a spatial information and an integrated smart card data, which is so called a data depository and it has been applied to the Samseong station for the model validation. The proposed analytical framework contributes on providing a chance to possibly extend with digitalized and automated data collection technologies and a BigData mining methods.

An Off-line Signature Verification Using PCA and LDA (PCA와 LDA를 이용한 오프라인 서면 검증)

  • Ryu Sang-Yeun;Lee Dae-Jong;Go Hyoun-Joo;Chun Myung-Geun
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.645-652
    • /
    • 2004
  • Among the biometrics, signature shows more larger variation than the other biometrics such as fingerprint and iris. In order to overcome this problem, we propose a robust offline signature verification method based on PCA and LDA. Signature is projected to vertical and horizontal axes by new grid partition method. And then feature extraction and decision is performed by PCA and LDA. Experimental results show that the proposed offline signature verification has lower False Reject Rate(FRR) and False Acceptance Rate(FAR) which are 1.45% and 2.1%, respectively.

Comparison of the Optical properties of Schematic Eyes by using the Seidel aberrations (자이델 수차를 이용한 모형안의 광학적 성능 비교)

  • Kim, Bong-Hwan;Lim, Hyeon-Seon;Ji, Taek-Sang
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.9 no.2
    • /
    • pp.269-280
    • /
    • 2004
  • For the studying of the optical property of the human eye by using the Seidel aberrations with schematic eyes, we have used the several paraxial and fine schematic eyes. In another world, after fixing the iris ot aperture pinhole on the anterior of lens, we investigated how the surface contributions and the surface asphericity affected the optical properties of schematic eyes by using the Seidel aberration coefficients variation. Also, by analysis of dividing both a relaxed state and the accommodation state of the eye, we investigated the change of the optical properties during the change of accommodation.

  • PDF

Asbestos Exposure and Health Risk Assessment in Asbestos-Containing Buildings (석면함유 건축물의 석면 노출 및 위해성 평가)

  • Jeong, Jae-Won;Kim, Kwang-Su;Cho, Sun-Ja;Lee, Sang-Joon
    • Journal of Environmental Science International
    • /
    • v.21 no.9
    • /
    • pp.1069-1078
    • /
    • 2012
  • This study was performed to evaluate the asbestos exposure levels and to calculate excess lifetime cacer risks(ELCRs) in asbestos-containing buildings for maintenance and management. The range of airborne asbestos concentration of 33 buildings was 0.0018 ~ 0.0126 f/cc and one site exceeded indoor air-quality recommended limit 0.01 f/cc. And ELCRs based on US EPA IRIS(Integrated risk information system) model are 1.5E-06 ~ 3.9E-05 levels, and there was no site showed 1.0E-04 (one person per million) level or more, and 11 sites showed 1.0E-05 (one person per 100,000 people) level or more. To prevent the release of asbestos fibers, it needs operation and maintenance of asbestos-containing building materials, and there are some methods such as removal, repairment, enclosure and encapsulation. In conclusion, a risk-based air action level for asbestos in air is an appropriate metric for asbestos-containing building management.