• Title/Summary/Keyword: Iris Authentication

Search Result 49, Processing Time 0.023 seconds

Dynamic Signature Verification System for the User Authentication Security (사용자 인증 보안을 위한 동적 서명인증시스템)

  • 김진환;조혁규;차의영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.131-134
    • /
    • 2002
  • As the increased use of computer, wired/wireless/mobile Internet, security in using Internet becomes a more important problem. Thus, biometric technology using physical and behavior characteristics of a person is hot issue. Many different types of biometric technologies of a person such as fingerprint, face, iris, vein, DNA, brain wave, palm, voice, dynamic signature, etc. had already been studied but remained unsuccessful because they do not meet social demands. However, recently many of these technologies have been actively revived and researchers have developed new products on various commercial fields. Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, the down/up/movement of pen when the signer input his signature with an electronic pen for his authentication. Then signature verification system collects mentioned above various feature information and compares it with the original one and simultaneously analyzes to decide whether signature is forgery or true. The prospect of signature verification technology is very promising and its use will be wide spread in terms of economy, security, practicality, stability and convenience.

  • PDF

The Implementation of Non-contact Door-lock System for Preventing Fingerprint (비접촉식 지문방지 도어락 시스템 구현)

  • Kim, Hyun Ok;Moon, Kwang Soo;Kim, Seung Gyu;Kim, Doo Yong;Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.13 no.4
    • /
    • pp.77-81
    • /
    • 2014
  • There have been developed in authentication systems for information using biometric information approaches such as fingerprint, face, and iris. In general, a door-lock system is operated by touching keypads, which remains fingerprints on the keypads. Such door-lock systems do not protect personal information from others due to the exposure of fingerprints to keypads. In this paper, we propose the new door-lock system that does not leave fingerprints on the keypads. Without touching keypad the system works because the system accepts authentication information by using illuminance sensor and LED. The experiment shows that the implemented door-lock system works well under any circumstance.

Piezoelectric Ultrasound MEMS Transducers for Fingerprint Recognition

  • Jung, Soo Young;Park, Jin Soo;Kim, Min-Seok;Jang, Ho Won;Lee, Byung Chul;Baek, Seung-Hyub
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.5
    • /
    • pp.286-292
    • /
    • 2022
  • As mobile electronics become smarter, higher-level security systems are necessary to protect private information and property from hackers. For this, biometric authentication systems have been widely studied, where the recognition of unique biological traits of an individual, such as the face, iris, fingerprint, and voice, is required to operate the device. Among them, ultrasound fingerprint imaging technology using piezoelectric materials is one of the most promising approaches adopted by Samsung Galaxy smartphones. In this review, we summarize the recent progress on piezoelectric ultrasound micro-electro-mechanical systems (MEMS) transducers with various piezoelectric materials and provide insights to achieve the highest-level biometric authentication system for mobile electronics.

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application

  • Lee, Sungju;Sa, Jaewon;Cho, Hyeonjoong;Park, Daihee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6152-6168
    • /
    • 2017
  • Recently, the biometric-based authentication systems such as FIDO (Fast Identity Online) are increased in mobile computing environments. The biometric-based authentication systems are performed on the mobile devices with the battery, the improving energy efficiency is important issue. In the case, the size of images (i.e., face, fingerprint, iris, and etc.) affects both recognition accuracy and energy consumption, and hence the tradeoff analysis between the both recognition accuracy and energy consumption is necessary. In this paper, we propose an energy-efficient way to authenticate based on biometric information with tradeoff analysis between the both recognition accuracy and energy consumption in multimedia IoT (Internet of Things) transmission environments. We select the facial information among biometric information, and especially consider the multicore-based mobile devices. Based on our experimental results, we prove that the proposed approach can enhance the energy efficiency of GABOR+LBP+GRAY VALUE, GABOR+LBP, GABOR, and LBP by factors of 6.8, 3.6, 3.6, and 2.4 over the baseline, respectively, while satisfying user's face recognition accuracy.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

Implementation and Evaluation of ECG Authentication System Using Wearable Device (웨어러블 디바이스를 활용한 ECG 인증 시스템 구현 및 평가)

  • Heo, Jae-Wook;Jin, Sun-Woo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As mobile technologies such as Internet of Things (IoT)-based smart homes and financial technologies (FinTech) are developed, authentication by smart devices is used everywhere. As a result, presence-based biometric authentication using smart devices has become a new mainstream in knowledge-based authentication methods like the existing passwords. The electrocardiogram (ECG) is less prone to forgery, and high-level personal identification is its unique feature from among various biometric authentication methods, such as the pulse, fingerprints, the face, and the iris. Biometric authentication using an ECG is receiving a great deal of attention due to its uses in healthcare and FinTech. In this study, we implemented an ECG authentication system that allows users to easily measure and authenticate their ECG waveforms using a miniaturized wearable device, rather than a large and expensive measurement device. The implemented ECG authentication system identifies ECG features through P-Q-R-S-T feature point identification, and was user-certified under the proposed authentication protocols. Finally, assessment of measurements in a majority of adult males showed a relatively low false acceptance rate of 1.73%, and a low false rejection rate of 4.14%, in a stable normal state. In a high-activity state, the false acceptance rate was 13.72%, and the false rejection rate was 21.68%. In a high-heart rate state, the false acceptance rate was 10.48%, and the false rejection rate was 11.21%.

The biometric authentication technology, which makes overseas trip possible without passports (여권 없이도 외국 여행이 가능한 생체 측정 인증 기술)

  • Shim, Hyun Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.88-95
    • /
    • 2012
  • The passport is not only an officially proven document in order to identify the nationalities of travelers, but also request for protections of travelers. Since the overseas trips have been increased, the uses of forged or modulated passports are also now rapidly increasing. The forged or modulated passports are mainly used by international criminal organization or offenders, who are restricted by immigration control, in order to avoid under the radar and conceal their identities. The purpose of biometric authentication technology is to define one's unique identities through the comparative analysis one's unique finger prints, iris, sweat gland, blood vessel, palm pattern, vein distribution, voice, and etc. We have been studying about applicable and possibilities of the biometric authentication technology for overseas travel without passports. In hence, we have been also collected various of technical references of using biometric authentication, and have been analyzed what is the best biometric to be alternatively used instead of passports.

  • PDF

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.