• Title/Summary/Keyword: Point Signature

Search Result 77, Processing Time 0.026 seconds

Spherical Signature Description of 3D Point Cloud and Environmental Feature Learning based on Deep Belief Nets for Urban Structure Classification (도시 구조물 분류를 위한 3차원 점 군의 구형 특징 표현과 심층 신뢰 신경망 기반의 환경 형상 학습)

  • Lee, Sejin;Kim, Donghyun
    • The Journal of Korea Robotics Society
    • /
    • v.11 no.3
    • /
    • pp.115-126
    • /
    • 2016
  • This paper suggests the method of the spherical signature description of 3D point clouds taken from the laser range scanner on the ground vehicle. Based on the spherical signature description of each point, the extractor of significant environmental features is learned by the Deep Belief Nets for the urban structure classification. Arbitrary point among the 3D point cloud can represents its signature in its sky surface by using several neighborhood points. The unit spherical surface centered on that point can be considered to accumulate the evidence of each angular tessellation. According to a kind of point area such as wall, ground, tree, car, and so on, the results of spherical signature description look so different each other. These data can be applied into the Deep Belief Nets, which is one of the Deep Neural Networks, for learning the environmental feature extractor. With this learned feature extractor, 3D points can be classified due to its urban structures well. Experimental results prove that the proposed method based on the spherical signature description and the Deep Belief Nets is suitable for the mobile robots in terms of the classification accuracy.

A Comparative Analysis on the Korean and Chinese Electronic Signature System (한.중 전자서명제도에 관한 비교 연구)

  • Kim, Sun-Kwang;Kim, Jong-Hun
    • International Commerce and Information Review
    • /
    • v.11 no.4
    • /
    • pp.47-73
    • /
    • 2009
  • Electronic Commerce has become the leading method of business in many countries. And related laws are being established and is operating in Korea and China. In this circumstance, Korea's electronic signature law was enacted on February 5, 1999, and has been applied from July 1, 1999. But China's electronic signature law was enacted on August 28, 2004, and has been formally applied from April 1, 2005. This paper is to drive problems of the electronic signature system and law and to show the whole point to be considered in enterprise and the present status of internal and external service under the basis of electronic trade. The purpose of this study aims to present a comparative analysis on the Korean and Chinese electronic signature system and law. In addition to, another point of this paper is suggestions for improvement of legal problem.

  • PDF

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes

  • Mashhadi, Samaneh
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.249-262
    • /
    • 2016
  • In 2004, Yang et al. proposed a threshold proxy signature scheme that efficiently reduced the computational complexity of previous schemes. In 2009, Hu and Zhang presented some security leakages of Yang's scheme and proposed an improvement to eliminate the security leakages that had been pointed out. In this paper, we will point out that both Yang and Hu's schemes still have some security weaknesses, which cannot resist warrant attacks where an adversary can forge valid proxy signatures by changing the warrant $m_w$. We also propose two secure improvements for these schemes.

Online Signature Verification using Extreme Points and Writer-dependent Features (변곡점과 필자고유특징을 이용한 온라인 서명 인증)

  • Son, Ki-Hyoung;Park, Jae-Hyun;Cha, Eui-Young
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1220-1228
    • /
    • 2007
  • This paper presents a new system for online signature verification, approaching for finding gaps between a point-to-point matching and a segment-to-segment matching. Each matching algorithm has been separately used in previous studies. Various features with respect to each matching algorithm have been extracted for solving two-class classification problem. We combined advantages of the two algorithms to implement an efficient system for online signature verification. In the proposed method, extreme feints are used to extract writer-dependent features. In addition, using the writer-dependent features proves to be more adaptive than using writer-independent features in terms of efficiency of classification and verification in this paper.

  • PDF

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

An efficient method for directory management of the partitioned signature file (분할 시그너춰 화일을 위한 효율적인 디렉토리 관리 기법)

  • 김상욱;황환규;최황규;윤용익
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.3
    • /
    • pp.32-45
    • /
    • 1998
  • A partitioned signature file is an enhancement of the signature file that divides all the signatures into blocks in such a way that each block contains the signatures with the same key. Its directory storesall the keys as meta information for avoiding unnecessary block accesses by examming them first before the acture searching of the blocks.. Efficient directory management is very important in large databasse environments since ist size gets larger proportionally to that of the database. In this paper, we first point out the problems in the directory management methods of the previous partitioned signature files, and then present a new one solving them. OUr method offers good features in the followint three aspects: (1) suitability for large database environments, (2) adaptability to dynamic situations, and (3) storage overhead for the directory. Moreover, we can seamlessly integrate it as a subcomponent into previously-developed general-purpose storage engines. These features show that our method is applicableto signature-based access structures for the content-based retrieval in various multimedia applications such as hypermedia systems, digital library systems, multimedia document systems, multimedia mailing systems, and so on.

  • PDF

On-line Signature Verification using Segment Matching and LDA Method (구간분할 매칭방법과 선형판별분석기법을 융합한 온라인 서명 검증)

  • Lee, Dae-Jong;Go, Hyoun-Joo;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1065-1074
    • /
    • 2007
  • Among various methods to compare reference signatures with an input signature, the segment-to-segment matching method has more advantages than global and point-to-point methods. However, the segment-to-segment matching method has the problem of having lower recognition rate according to the variation of partitioning points. To resolve this drawback, this paper proposes a signature verification method by considering linear discriminant analysis as well as segment-to-segment matching method. For the final decision step, we adopt statistical based Bayesian classifier technique to effectively combine two individual systems. Under the various experiments, the proposed method shows better performance than segment-to-segment based matching method.

AN EFFICIENT AND SECURE STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGS

  • Islam, Sk Hafizul;Biswas, G.P.
    • Journal of applied mathematics & informatics
    • /
    • v.31 no.3_4
    • /
    • pp.425-441
    • /
    • 2013
  • In literature, several strong designated verifier signature (SDVS) schemes have been devised using elliptic curve bilinear pairing and map-topoint (MTP) hash function. The bilinear pairing requires a super-singular elliptic curve group having large number of elements and the relative computation cost of it is approximately two to three times higher than that of elliptic curve point multiplication, which indicates that bilinear pairing is an expensive operation. Moreover, the MTP function, which maps a user identity into an elliptic curve point, is more expensive than an elliptic curve scalar point multiplication. Hence, the SDVS schemes from bilinear pairing and MTP hash function are not efficient in real environments. Thus, a cost-efficient SDVS scheme using elliptic curve cryptography with pairingfree operation is proposed in this paper that instead of MTP hash function uses a general cryptographic hash function. The security analysis shows that our scheme is secure in the random oracle model with the hardness assumption of CDH problem. In addition, the formal security validation of the proposed scheme is done using AVISPA tool (Automated Validation of Internet Security Protocols and Applications) that demonstrated that our scheme is unforgeable against passive and active attacks. Our scheme also satisfies the different properties of an SDVS scheme including strongness, source hiding, non-transferability and unforgeability. The comparison of our scheme with others are given, which shows that it outperforms in terms of security, computation cost and bandwidth requirement.

Design of RBFNNs Pattern Classifier Realized with the Aid of PSO and Multiple Point Signature for 3D Face Recognition (3차원 얼굴 인식을 위한 PSO와 다중 포인트 특징 추출을 이용한 RBFNNs 패턴분류기 설계)

  • Oh, Sung-Kwun;Oh, Seung-Hun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.6
    • /
    • pp.797-803
    • /
    • 2014
  • In this paper, 3D face recognition system is designed by using polynomial based on RBFNNs. In case of 2D face recognition, the recognition performance reduced by the external environmental factors such as illumination and facial pose. In order to compensate for these shortcomings of 2D face recognition, 3D face recognition. In the preprocessing part, according to the change of each position angle the obtained 3D face image shapes are changed into front image shapes through pose compensation. the depth data of face image shape by using Multiple Point Signature is extracted. Overall face depth information is obtained by using two or more reference points. The direct use of the extracted data an high-dimensional data leads to the deterioration of learning speed as well as recognition performance. We exploit principle component analysis(PCA) algorithm to conduct the dimension reduction of high-dimensional data. Parameter optimization is carried out with the aid of PSO for effective training and recognition. The proposed pattern classifier is experimented with and evaluated by using dataset obtained in IC & CI Lab.

Rotated Object and Angle Detection based on Signature Information (Signature 기반의 회전된 물체의 인식 및 각도 검출 기법)

  • Yoon, Hyun-Sup;Han, Young-Joon;Hahn, Hern-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.837-838
    • /
    • 2008
  • This paper presents a new signature and Fourier descriptor based algorithm for recognizing a rotated object and its rotation angle. Fourier descriptor is used to represent an object using its frequence parameters which are not influenced by rotation. once the object is recognized, the point with the largest auto-correlation coefficient which can be calculated from signature of the object is used to find angle of the object. The outstanding performance of the proposed algorithm has been tested with the test images where more than 10 2D objects arbitrarily located on a table.

  • PDF