• Title/Summary/Keyword: Multi-Biometrics

Search Result 47, Processing Time 0.023 seconds

Trends of Multi-modal Biometric Technology (다중 생체인식 기술 동향)

  • Gil, Y.H.;Chung, Y.S.;Ahn, D.S.;LEe, K.H.;Pan, S.B.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.84-92
    • /
    • 2005
  • 생체인식 기술은 다양한 온라인 서비스의 보급에 의해 비대면상에서의 안전한 개인 인증 수단이 요구됨에 따라 신뢰성을 제공하는 사용자 인증의 수단으로 부각되었다. 그러나, 생체인식의 실제 응용에 있어 기대되는 성능을 만족시킬 수 없는 경우가 발생할 수 있으며 이에 따라 여러 종류의 생체인식 기술을 함께 사용하여 성능을 향상시키고 신뢰도를 높이는 다중 생체인식(multi-modal biometrics) 기술이 활발하게 연구되고 있다. 본 고에서는 다중 생체인식 기술의 동향을 살펴보고 IC 카드 기반 다중 생체인식시스템에 대해 논의한다.

An Empirical Study of Multi-Modal Biometrics using Face and Fingerprint (얼굴과 지문을 결합한 다중 생체인식 시스템의 실험적 연구)

  • 강효섭;한영찬;김학일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.622-624
    • /
    • 2002
  • 생체인식 기술은 급속도로 발전하고 있지만 개개의 생체 정보를 이용한 단일 생체인식 기술은 생체 방식에 따라 각각의 문제점이 노출되고 있는 상황이다. 이에 두 가지 이상의 생체 정보를 결합하여 단일 생체인식 기술의 문제점을 극복하고 보다 좋은 인식률을 확보하기 위해 다중 생체인식 시스템(Multi-Modal Bio-metries System)이라는 복합 시스템이 제안 되었다. 이 논문에서는 생체인식 산업의 특성 및 개인 인증 방법으로 사용중인 단일 생체인식 시스템의 문제점을 알아보고 그 해결방안으로 다중 생체인식 시스템의 확률단계(Probability Level)에서 더 좋은 성능을 보여주기 위해 각각의 시스템에 가중치(Weight)를 부여 할 경우, EER(Equal Error Rate)이 단일 생체인식 시스템에 보다 가중치를 부여 했을 때 낮아짐과 동시에 ROC 커브도 (Receiver Operating Characteristic Curve) 좋아짐을 보였다.

  • PDF

Driving School Attendance Management System based on Multi-modal Biometrics (다중 바이오인식 기반 운전면허학원 근태관리 시스템)

  • Kim, Yong-Joong;Park, Sung-Ho;Choi, Woo-Joon;Seo, Dae-Young
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.506-509
    • /
    • 2010
  • 본 논문에서는 지문과 얼굴정보를 이용한 다중 바이오인식 기술(Multi-modal Biometric Technology)을 이용한 운전면허학원 근태관리 시스템 구현에 대해 논한다. 지문인식은 Neurotechnology사의 Free Fingerprint Verification SDK를 사용하였으며, 얼굴인식은 얼굴검출 단계에 Adaboost, 특징추출 단계에 Gabor Wavelet Transform을 이용하였다. 마지막 단계인 인식단계는 두 특징벡터 간의 유클리디언 거리를 이용한다. 두 바이오정보를 통한 인증(Verification)의 결정여부는 AND규칙을 이용하여 두 가지의 바이오정보 인증과정을 모두 통과하여야만 최종 인증확인이 되도록 구현하였다. 성능테스트는 10명의 적은 테스트 집합을 이용하였으며 지문과 얼굴정보를 각각 이용하였을 때보다 두 정보를 결합하였을 때 더 나은 인식률을 보였다.

Industrialization of Augmented Reality Contents : Focusing on the 21st Century's Films and Augmented Reality Arts (증강현실 콘텐츠의 산업화 : 21세기 영화와 증강현실 예술을 중심으로)

  • Kim, Hee-Young
    • Cartoon and Animation Studies
    • /
    • s.35
    • /
    • pp.347-374
    • /
    • 2014
  • The aim of this article is to consider the future of industrialization of Augmented Reality contents focusing on cinematic imagination of films that used Augmented Reality techniques and artistic imagination of Augmented Reality Arts in the 21st century. The film showing future technology through cinematic imagination plays an role in the presentation of future vision important. Augmented Reality Arts show the big picture of future arts, future aspect of society, and future culture by using technically possible present technology. I classified the researched films according to Augmented Reality technique. It is expected that Gesture Recognition will develop with transparent display device techniques, Hologram techniques will be changed into individualized communication styles, Biometrics will be able to evolve into multi-Biometrics, and Wearable Computer will develop in the aspect of physical body augmentation and then industrialize. In Augmented Reality Arts, it seems that the various utilization of avatar will be related to Hologram, the utilization of the physiological phenomenon of the human body will be related to Biometrics, the mixture of reality and virtual reality will utilize display devices through Gesture Recognition, and a new experiment of HMD(Head-Mounted Display) will industrialize with the diversification of Wearable Computer. Augmented Reality contents created through the imagination and representation in the films and arts take a role in helping human life, and, at the same time, show the future image industrialized in the way of combination between human and environment without a medium.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

The Undeniable Digital Multi-Signature Scheme based on Biometric Information (생체정보 기반의 부인봉쇄 디지털 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.3
    • /
    • pp.549-555
    • /
    • 2007
  • A digital signature scheme provides integrity of the document, authentication and non-repudiation of a signer. Usually the key for digital signature is stored in hard disk or removal disk storage. The drawback of this approach is that the signer can let the agent to sign instead of the signer by providing the key information. It can be abused in applications such as electronic election. In this paper, we propose the undeniable biometric digital multi-signature scheme suitable for applications where the signer should not make an agent sign instead of himself/herself. The undeniable multi-signature scheme requires many signers and only the designated user can confirm the authenticity of multi-signature. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. As the key is generated through the signer's fingerprint image, it's also secure against signing by an agent.

  • PDF

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

Study on Using Teeth Images in Biometrics (생체 인식에서 치아 영상의 이용에 관한 연구)

  • Kim, Tae-Woo;Cho, Tae-Kyung;Lee, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.200-205
    • /
    • 2006
  • Abstract This paper presents a personal identification method based on BMME and LDA for images acquired at anterior and posterior occlusion expression of teeth. The method consists of teeth region extraction, BMME, and pattern recognition forthe images acquired at the anterior and posterior occlusion state of teeth. Two occlusions can provide consistent teeth appearance in images and BMME can reduce matching error in pattern recognition. Using teeth images can be beneficial in recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, the algorithm was successful in teeth recognition for personal identification for 20 people, which encouraged our method to be able to contribute to multi-modal authentication systems.

  • PDF

Secure Biometric Hashing by Random Fusion of Global and Local Features

  • Ou, Yang;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.875-883
    • /
    • 2010
  • In this paper, we present a secure biometric hashing scheme for face recognition by random fusion of global and local features. The Fourier-Mellin transform and Radon transform are adopted respectively to form specialized representation of global and local features, due to their invariance to geometric operations. The final biometric hash is securely generated by random weighting sum of both feature sets. A fourfold key is involved in our algorithm to ensure the security and privacy of biometric templates. The proposed biometric hash can be revocable and replaced by using a new key. Moreover, the attacker cannot obtain any information about the original biometric template without knowing the secret key. The experimental results confirm that our scheme has a satisfactory accuracy performance in terms of EER.

Security Method on the Multi-modal Biometrics Data (암호이론을 이용한 다중생체데이터 전송상의 보안)

  • Go Hyeon-Ju;Yu Byeong-Jin;Kim Yong-Min;Jeon Myeong-Geun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.183-186
    • /
    • 2006
  • 생체인식은 정보처리시스템에 있어서 네트웍 보안, 시스템 보안, 어플리케이션 보안 등에 사용되는 개인인증 및 확인을 위한 하나의 기법으로 볼 수 있으며, 개인정보를 포함한 데이터의 보호를 위해서 본인이나 승인된 사용자만이 네트웍이나 물리적 접근 등을 통하여 접근하고자 하는 것이다. 본 논문에서는 얼굴인식과 홍채인식 시스템을 융합한 다중생체인식 시스템을 구현하였으며, 다중생체인식 시스템에서 구현된 생체데이터를 안전하게 전송할 수 있는 방법으로 블록 암호 알고리듬 ARIA를 침입에 대한 보안 방법으로 제안하였다. 이에 다중생체 특징벡터를 128비트의 블록 크기를 이용하여 암호화 하였으며, 생체 특징벡터를 이용하여 128비트의 키로 사용하였다.

  • PDF