• Title/Summary/Keyword: Multiple Biometric

Search Result 43, Processing Time 0.025 seconds

Implementation of Medical Device Integration Module for Integrated Patient Monitoring System

  • Park, Myeong-Chul;Jung, Hyon-Chel;Choi, Duk-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.79-86
    • /
    • 2017
  • In this paper, we implement a common module that can integrate multiple biometric information for integrated patient monitoring system. Conventional biomedical instruments have many devices attached to each patient, making it difficult to monitor abnormality signs of many patients in real time. In this paper, we propose a module for an integrated monitoring system that can perform centralized monitoring using a common module that integrates multiple measurement devices. A protocol for sending and receiving packets between the measuring device and the common module is designed, and the packets transmitted through the network are stored and managed through the integrated monitoring system and provide information to various users such as medical staff. The results of this study are expected to contribute to the management of patients and efficient medical services in hospitals.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

The design of Biometrics System to enhance the security through the Distributed Stored of Multiple Split bio_Templates (생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계)

  • Hong, Yoon Kee;Yoon, Ji Won
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.31-39
    • /
    • 2016
  • The biometrics information is very useful by the convenience of ownership and using. but the risk of crime of malicious re-uses and infringement of personal privacy exist because the biometrics information is impossible to change typically when the illegal interception occurred from others. therefore the importance of security on stored management of biometrics information has been increased steadily. the existing biometric authentication system has been stored only encrypted complete template at a single storage place. In this paper, we designed the Distributed Stored of Multiple Split bio_Template System that a template is divided in different ways by each user and stored in other storage places from personal information to relieve user's anxiety about the saved template and illegally leaked through restored only template to authenticate and then delete.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

User Identification Using Real Environmental Human Computer Interaction Behavior

  • Wu, Tong;Zheng, Kangfeng;Wu, Chunhua;Wang, Xiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3055-3073
    • /
    • 2019
  • In this paper, a new user identification method is presented using real environmental human-computer-interaction (HCI) behavior data to improve method usability. User behavior data in this paper are collected continuously without setting experimental scenes such as text length, action number, etc. To illustrate the characteristics of real environmental HCI data, probability density distribution and performance of keyboard and mouse data are analyzed through the random sampling method and Support Vector Machine(SVM) algorithm. Based on the analysis of HCI behavior data in a real environment, the Multiple Kernel Learning (MKL) method is first used for user HCI behavior identification due to the heterogeneity of keyboard and mouse data. All possible kernel methods are compared to determine the MKL algorithm's parameters to ensure the robustness of the algorithm. Data analysis results show that keyboard data have a narrower range of probability density distribution than mouse data. Keyboard data have better performance with a 1-min time window, while that of mouse data is achieved with a 10-min time window. Finally, experiments using the MKL algorithm with three global polynomial kernels and ten local Gaussian kernels achieve a user identification accuracy of 83.03% in a real environmental HCI dataset, which demonstrates that the proposed method achieves an encouraging performance.

The Prevalence of High Myopia in 19 Year-Old Men in Busan, Ulsan and Gyeongsangnam-Do (부산, 울산 및 경상남도 만 19세 남자의 고도근시 유병률)

  • Lee, Sang-Joon;Urm, Sang-Hwa;Yu, Byeng-Chul;Sohn, Hae-Sook;Hong, Young-Seoub;Noh, Maeng-Seok;Lee, Yong-Hwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.44 no.1
    • /
    • pp.56-64
    • /
    • 2011
  • Objectives: The purpose of this study was to estimate the prevalence and correlated factors of high myopia in 19 year-old men in Southeast Korea. Methods: This retrospective study was based on the medical checkup data of conscription during 2005. The study subjects were 19 years old men in Busan, Ulsan and Gyeongsangnam-do. The health checkup data of the conscripts consisted of noncycloplegic autorefraction test, the biometric data and social factors. To analyze the social and biometric effects, we classified the biometric factors into 4 or 5 groups and the social factors into 3 groups. High myopia was defined as a spherical equivalent of under -6.0 diopter. Data analysis was performed using the chi square test for trends and multiple logistic regression analysis. The SAS(version 9.1) program was used for all the analyses. Results: The prevalence of high myopia was 12.39% (6256 / 50 508). The factors correlated with high myopia were the residence area (OR, 2.07; 95% CI, 1.77 to 2.4 for small city; OR, 2.01; 95% CI, 1.72 to 2.34 for metropolis; the reference group was rural area), academic achievement (OR, 1.43; 95% CI, 1.34 to 1.53 for students of 4-and 6-year-course university; the reference group was high school graduates & under) and blood pressure (OR, 1.54; 95% CI, 1.10 to 2.16 for hypertension; OR, 1.09; 95% CI, 1.02 to 1.17 for prehypertension; OR, 1.10; 95% CI, 1.01 to 1.20 for hypotension; the reference group was normal blood pressure). Conclusions: More than one tenth of the young men were high myopia as one of the risk factor for visual loss. Further studies on high myopia and its complications are needed to improve eye health in Southeast Korea.

Boundary Stitching Algorithm for Fusion of Vein Pattern (정맥패턴 융합을 위한 Boundary Stitching Algorithm)

  • Lim, Young-Kyu;Jang, Kyung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.521-524
    • /
    • 2005
  • This paper proposes a fusion algorithm which merges multiple vein pattern images into a single image, larger than those images. As a preprocessing step of template matching, during the verification of biometric data such as fingerprint image, vein pattern image of hand, etc., the fusion technique is used to make reference image larger than the candidate images in order to enhance the matching performance. In this paper, a new algorithm, called BSA (Boundary Stitching Algorithm) is proposed, in which the boundary rectilinear parts extracted from the candidate images are stitched to the reference image in order to enlarge its matching space. By applying BSA to practical vein pattern verification system, its verification rate was increased by about 10%.

  • PDF

Face Recognition Using a Facial Recognition System

  • Almurayziq, Tariq S;Alazani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.280-286
    • /
    • 2022
  • Facial recognition system is a biometric manipulation. Its applicability is simpler, and its work range is broader than fingerprints, iris scans, signatures, etc. The system utilizes two technologies, such as face detection and recognition. This study aims to develop a facial recognition system to recognize person's faces. Facial recognition system can map facial characteristics from photos or videos and compare the information with a given facial database to find a match, which helps identify a face. The proposed system can assist in face recognition. The developed system records several images, processes recorded images, checks for any match in the database, and returns the result. The developed technology can recognize multiple faces in live recordings.

Reviewing the Utilization of Smart Airport Security - Case Study of Different Technology Utilization -

  • Sung-Hwan Cho;Sang Yong Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.3
    • /
    • pp.172-177
    • /
    • 2023
  • The main purpose of the research was to review the global trends of airport's smart security technologies. Moreover, using the case studies of airport using smart security, this paper tried to propose the implication how the findings through the case studies may be important for airport policy and will impact the future research of airport operation. It is expected in the future the aviation security technology with biometric information evolves from single identification to multiple identification technology which has combined application of iris, vein and others. Facing post COVID-19 era, the number of passengers traveling through airports continues increase dramatically and the risks as well, the role of AI becomes even more crucial. With AI based automated security robotics airport operators could effectively handle the growing passenger and cargo volume and address the associated issues Smart CCTV analysis with A.I. and IoT applying solutions could also provide significant support for airport security.

Comparison of GEE Estimation Methods for Repeated Binary Data with Time-Varying Covariates on Different Missing Mechanisms (시간-종속적 공변량이 포함된 이분형 반복측정자료의 GEE를 이용한 분석에서 결측 체계에 따른 회귀계수 추정방법 비교)

  • Park, Boram;Jung, Inkyung
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.5
    • /
    • pp.697-712
    • /
    • 2013
  • When analyzing repeated binary data, the generalized estimating equations(GEE) approach produces consistent estimates for regression parameters even if an incorrect working correlation matrix is used. However, time-varying covariates experience larger changes in coefficients than time-invariant covariates across various working correlation structures for finite samples. In addition, the GEE approach may give biased estimates under missing at random(MAR). Weighted estimating equations and multiple imputation methods have been proposed to reduce biases in parameter estimates under MAR. This article studies if the two methods produce robust estimates across various working correlation structures for longitudinal binary data with time-varying covariates under different missing mechanisms. Through simulation, we observe that time-varying covariates have greater differences in parameter estimates across different working correlation structures than time-invariant covariates. The multiple imputation method produces more robust estimates under any working correlation structure and smaller biases compared to the other two methods.