• Title/Summary/Keyword: Multi-Biometrics

Search Result 47, Processing Time 0.024 seconds

Personal Identification Using Teeth Images

  • Kim Tae-Woo;Cho Tae-Kyung;Park Byoung-Soo;Lee Myung-Wook
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.435-437
    • /
    • 2004
  • This paper presents a personal identification method using teeth images. The method uses images for teeth expressions of anterior and posterior occlusion state and LDA-based technique. Teeth images give merits for recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, personal identification for 12 people was successful. It was shown that our method can contribute to multi-modal authentication systems.

  • PDF

Automatic 3D Head Pose-Normalization using 2D and 3D Interaction (자동 3차원 얼굴 포즈 정규화 기법)

  • Yu, Sun-Jin;Kim, Joong-Rock;Lee, Sang-Youn
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.211-212
    • /
    • 2007
  • Pose-variation factors present a significant problem in 2D face recognition. To solve this problem, there are various approaches for a 3D face acquisition system which was able to generate multi-view images. However, this created another pose estimation problem in terms of normalizing the 3D face data. This paper presents a 3D head pose-normalization method using 2D and 3D interaction. The proposed method uses 2D information with the AAM(Active Appearance Model) and 3D information with a 3D normal vector. In order to verify the performance of the proposed method, we designed an experiment using 2.5D face recognition. Experimental results showed that the proposed method is robust against pose variation.

  • PDF

An Effective Retinal Vessel and Landmark Detection Algorithm in RGB images

  • Jung Eun-Hwa
    • International Journal of Contents
    • /
    • v.2 no.3
    • /
    • pp.27-32
    • /
    • 2006
  • We present an effective algorithm for automatic tracing of retinal vessel structure and vascular landmark extraction of bifurcations and ending points. In this paper we deal with vascular patterns from RGB images for personal identification. Vessel tracing algorithms are of interest in a variety of biometric and medical application such as personal identification, biometrics, and ophthalmic disorders like vessel change detection. However eye surface vasculature tracing in RGB images has many problems which are subject to improper illumination, glare, fade-out, shadow and artifacts arising from reflection, refraction, and dispersion. The proposed algorithm on vascular tracing employs multi-stage processing of ten-layers as followings: Image Acquisition, Image Enhancement by gray scale retinal image enhancement, reducing background artifact and illuminations and removing interlacing minute characteristics of vessels, Vascular Structure Extraction by connecting broken vessels, extracting vascular structure using eight directional information, and extracting retinal vascular structure, and Vascular Landmark Extraction by extracting bifurcations and ending points. The results of automatic retinal vessel extraction using jive different thresholds applied 34 eye images are presented. The results of vasculature tracing algorithm shows that the suggested algorithm can obtain not only robust and accurate vessel tracing but also vascular landmarks according to thresholds.

  • PDF

Tracking by Detection of Multiple Faces using SSD and CNN Features

  • Tai, Do Nhu;Kim, Soo-Hyung;Lee, Guee-Sang;Yang, Hyung-Jeong;Na, In-Seop;Oh, A-Ran
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.61-69
    • /
    • 2018
  • Multi-tracking of general objects and specific faces is an important topic in the field of computer vision applicable to many branches of industry such as biometrics, security, etc. The rapid development of deep neural networks has resulted in a dramatic improvement in face recognition and object detection problems, which helps improve the multiple-face tracking techniques exploiting the tracking-by-detection method. Our proposed method uses face detection trained with a head dataset to resolve the face deformation problem in the tracking process. Further, we use robust face features extracted from the deep face recognition network to match the tracklets with tracking faces using Hungarian matching method. We achieved promising results regarding the usage of deep face features and head detection in a face tracking benchmark.

A User Authentication System using Multi-Modal Biometrics (다중 생체 인식을 이용한 사용자 인증시스템)

  • Geum, Myung-Hwan;Kim, Jung-Soo;Lee, Jun-Gyu;Lee, Bong-Hwan
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1049-1051
    • /
    • 2007
  • 생체인식 기술은 급속도로 발전하고 있지만 각각의 생체 정보를 이용한 단일 생체인식 기술은 생체 방식에 따라 여러 가지 문제점이 노출되고 있다. 따라서 두 가지 이상의 생체 정보를 결합하여 단일 생체인식 기술의 문제점을 극복하고 보다 좋은 인식률을 확보하기 위해 다중 생체 인식 시스템이라는 복합 시스템이 제안되었다. 본 논문에서는 웹 기반의 다중 생체 인식 시스템을 개발하여 이를 인터넷 전자입찰시스템에 적용하였다. 얼굴 및 음성 인식 정보를 이용하여 인증 시스템에 로그인 하도록 구현하여 일반적인 웹사이트에서도 다중 생체 인식 시스템을 적용할 수 있음을 보였다.

Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient (상관계수를 이용하여 인식률을 향상시킨 rank-level fusion 방법)

  • Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1007-1017
    • /
    • 2019
  • Currently, most biometrics system authenticates users by using single biometric information. This method has many problems such as noise problem, sensitivity to data, spoofing, a limitation of recognition rate. One method to solve this problems is to use multi biometric information. The multi biometric authentication system performs information fusion for each biometric information to generate new information, and then uses the new information to authenticate the user. Among information fusion methods, a score-level fusion method is widely used. However, there is a problem that a normalization operation is required, and even if data is same, the recognition rate varies depending on the normalization method. A rank-level fusion method that does not require normalization is proposed. However, a existing rank-level fusion methods have lower recognition rate than score-level fusion methods. To solve this problem, we propose a rank-level fusion method with higher recognition rate than a score-level fusion method using correlation coefficient. The experiment compares recognition rate of a existing rank-level fusion methods with the recognition rate of proposed method using iris information(CASIA V3) and face information(FERET V1). We also compare with score-level fusion methods. As a result, the recognition rate improve from about 0.3% to 3.3%.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

A Study on Evolution Strategy of the Next Generation Mobile Terminals (차세대 이동단말의 발전 전략에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.131-135
    • /
    • 2005
  • Nowadays, the demand for the wireless technology has gradually increased to support the services of high speed wired internet and also the interest of a mobile terminal convergence has increased. In the next generation, the mobile terminal could merge with the celluar phone, wireless LAN, portable internet, digital multimedia brodcasting, mobile game and sensor(smart-tag and biometrics) through the unified single user interface. Moreover, the system is supported to multi-mode at difference networks, which have variable functions and high performance for available service. Inthis paper, we investigate the minimum requirements and the core technologies of the next generation mobile terminals.

  • PDF

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

Design and Implementation of File Access Control System using Multi PIN and Biometrics based on Java Card (JAVA CARD기반의 생체정보 및 다중PIN을 이용한 파일접근 제어 시스템 설계 및 구현)

  • Gu, Eun-Hee;Shin, In-Chul
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1075-1078
    • /
    • 2004
  • 급속한 정보기술 및 인터넷의 발달로 인해 네트워크를 통한 정보의 교류가 활발해지고 온라인 뱅킹 등 전자상거래와 관련된 산업의 규모가 커지면서 정보보안과 휴대용이 용이한 스마트카드는 여러 활용분야에서 사용되고 있다. 계속적인 하드웨어 기술의 발전으로 스마트카드의 표준으로 자리 잡고 있는 자바카드는 스마트카드 플랫폼에 자바의 기술을 접목시킨 것으로써 객체지향 중심의 기법으로 보안상 매우 좋은 이점을 지니고 있다. 또한 특성이 다른 하드웨어에서 같은 동작을 할 수 있는 개방형 운영체제를 가짐으로써 다양한 다수의 응용 프로그램을 수용할 수 있는 유연성을 가지게 한다. 본 논문에서는 이러한 자바카드의 특성을 이용하여 하나의 회원 카드로 다수의 사용자가 사용할 수 있는 접근통제가 가능한 회원카드를 설계하였다. 사용자에게 발급된 하나의 카드에 들어있는 정보를 개인이 아닌 다수의 사용자가 서로 다른 PIN을 이용하여 카드 내에 있는 사용자 정보를 접근하여 개인 정보의 확인, 관리내용 업데이트, 내용에 따른 청구를 카드 하나로 가능하게 하였다. 이때 사용자 인증수단으로 사용되는 PIN의 보안성을 높이기 위해 개인별로 고유한 생체인식의 한 구성요소인 서명 데이터를 이용하여 패스워드가 가지는 보안상의 취약요소를 없애 보다 안전한 사용자 인증을 하고자 한다. 이러한 자바카드의 이용기술과 생체인식 및 다중PIN을 이용한 사용자 인증, 파일의 보안 등급의 차등적인 접근권한을 설계하고 마지막으로 비주얼한 응용프로그램을 구현함으로써 카드를 보다 안전하고 편리하게 사용할 수 있기를 기대한다.

  • PDF