• Title/Summary/Keyword: Security Verification

Search Result 685, Processing Time 0.022 seconds

Face Recognition using Extended Center-Symmetric Pattern and 2D-PCA (Extended Center-Symmetric Pattern과 2D-PCA를 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.111-119
    • /
    • 2013
  • Face recognition has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous applications, such as access control, surveillance, security, credit-card verification, and criminal identification. In this paper, we propose a simple descriptor called an ECSP(Extended Center-Symmetric Pattern) for illumination-robust face recognition. The ECSP operator encodes the texture information of a local face region by emphasizing diagonal components of a previous CS-LBP(Center-Symmetric Local Binary Pattern). Here, the diagonal components are emphasized because facial textures along the diagonal direction contain much more information than those of other directions. The facial texture information of the ECSP operator is then used as the input image of an image covariance-based feature extraction algorithm such as 2D-PCA(Two-Dimensional Principal Component Analysis). Performance evaluation of the proposed approach was carried out using various binary pattern operators and recognition algorithms on the Yale B database. The experimental results demonstrated that the proposed approach achieved better recognition accuracy than other approaches, and we confirmed that the proposed approach is effective against illumination variation.

A Numerical Analysis for Blast Pressure and Impulse from Free-Air Burst (자유공중폭발에 의한 폭발압력과 충격량에 대한 수치해석)

  • Shin, Jinwon;Lee, Kyungkoo
    • Journal of Korean Society of Steel Construction
    • /
    • v.28 no.4
    • /
    • pp.271-280
    • /
    • 2016
  • The need to accurate quantification of blast pressure loading in the near field is important because the focus of security design of critical infrastructure, buildings and bridges is for near-field detonations. Incident and reflected pressures for near-field detonations are very difficult to be measured by commercially available pressure transducers due to the high pressure and temperature, which requires a verified and validated computational fluid dynamics code to reasonably predict the near-field pressures and impulses. This paper presents numerical studies to verify and validate a CFD code for calculations of incident and reflected overpressures and impulses. The near field is emphasized and recommendations for mesh sizes to optimally simulate the near-field detonation are provided.

Basic Study for Securing Stable Water Resources in Coastal Area (해안지역 안정적 수자원 확보를 위한 기초적 연구)

  • Koh, Byoung-Ryoun;Oh, Young-Hun;Ahn, Seung-Seop
    • Journal of Environmental Science International
    • /
    • v.23 no.12
    • /
    • pp.1977-1985
    • /
    • 2014
  • Many countries around the world are amplifying interest and studies on irrigation, flood control and environment with concern on serious water problems. Especially for irrigation in water supply vulnerable areas such as coastal areas - islands, business on underwater resource security facilities are promoted to secure stable water resources due to development of society and increase of life quality. Also, various policies such as reuse of leaking underwater, utilization of underwater at waterfront, and artificial recharge, etc are planned and designed. In order to develop small sized underwater resource secure technology, verification of seawater-freshwater interface is executed and how the balance between these will develop is a great interest of coastal areas - islands. In this study, seawater-freshwater interface behavior analysis experiment was conducted while reflecting properties of coastal areas - islands and executed hydraulic similitude of saltwater intrusion form control technology on abstraction.

A Study on the Residential Behavior of Cheju Province (제주도 지역 거주자의 주거 행태에 관한 연구)

  • 이정림;김봉애
    • Journal of the Korean housing association
    • /
    • v.8 no.3
    • /
    • pp.81-90
    • /
    • 1997
  • Cheju province exposes a separated residential culture compared to the mainland area. since it has its own unique climate, natural features. Therefore, this study tried to grasp the residential behavior. was based on the questionnaire to Cheju province people, using the approach by statistic verification. This study also focused and aimed on suggesting the basic data about housing plan which is appropriate to the climate. natural features requirement from inhabitants through the comparison and analysis between the mainland area and Cheju province. The results of the study are as follows; Firstly. the diversified applicative study on ‘Ol-rae’. ‘Ma-dang’, ‘Yoo-young’ and so forth that is traditional outside garden of Cheju is imperative, because in urban area people think traffics, vicinity, etc. are more significant, and in rural area people think occupying large outside space is more significant. Secondly. in the study of the degree of satisfaction on the housing, most of the people's was ‘neutral’ and in rural area quite a lot of negative reaction exposed. This is owing to the uniform introduction on residential style of the mainland area. Thirdly, housing plan should be considered family members' housing needs and provincial characteristics, meanwhile most of the people answered positively about the residential value which is considered very significant lately, for instance, security of privacy. appropriate plan for child's room.

  • PDF

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

Design of a Realtime Interactive Authentication Method using PKI in the Wireless Network (무선 네트워크 기반에서 PKI 방식을 이용한 상호인증 프로토콜 설계)

  • Park, Jea-Seong;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.873-877
    • /
    • 2008
  • There were many exposed problems in previous authentication method on LAN. Especially Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about $802.1{\times}$ and user authentication method applying PKI. But certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. In this paper, I applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems.

  • PDF

Face Recognition using 2D-PCA and Image Partition (2D - PCA와 영상분할을 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.31-40
    • /
    • 2012
  • Face recognition refers to the process of identifying individuals based on their facial features. It has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous consumer applications, such as access control, surveillance, security, credit-card verification, and criminal identification. However, illumination variation on face generally cause performance degradation of face recognition systems under practical environments. Thus, this paper proposes an novel face recognition system using a fusion approach based on local binary pattern and two-dimensional principal component analysis. To minimize illumination effects, the face image undergoes the local binary pattern operation, and the resultant image are divided into two sub-images. Then, two-dimensional principal component analysis algorithm is separately applied to each sub-images. The individual scores obtained from two sub-images are integrated using a weighted-summation rule, and the fused-score is utilized to classify the unknown user. The performance evaluation of the proposed system was performed using the Yale B database and CMU-PIE database, and the proposed method shows the better recognition results in comparison with existing face recognition techniques.

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data

  • Shen, Wenting;Yu, Jia;Yang, Guangyang;Zhang, Yue;Fu, Zhangjie;Hao, Rong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3319-3338
    • /
    • 2016
  • Cloud storage is becoming more and more popular because of its elasticity and pay-as-you-go storage service manner. In some cloud storage scenarios, the data that are stored in the cloud may be shared by a group of users. To verify the integrity of cloud data in this kind of applications, many auditing schemes for shared cloud data have been proposed. However, all of these schemes do not consider the access authorization problem for users, which makes the revoked users still able to access the shared cloud data belonging to the group. In order to deal with this problem, we propose a novel public auditing scheme for shared cloud data in this paper. Different from previous work, in our scheme, the user in a group cannot any longer access the shared cloud data belonging to this group once this user is revoked. In addition, we propose a new random masking technique to make our scheme preserve both data privacy and identity privacy. Furthermore, our scheme supports to enroll a new user in a group and revoke an old user from a group. We analyze the security of the proposed scheme and justify its performance by concrete implementations.

Function verification and demonstration of mobile Gallery-Auction using NFC-based 2-Factor electronic payment (NFC 기반 2 Factor 전자결제를 이용한 모바일 갤러리-옥션의 기능 검증 및 시현)

  • Cha, Yoon Seok;Oh, Soo Hee;Kim, YongIl;Noh, SunKuk
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.24-30
    • /
    • 2018
  • Acquisition of the FIDO authentication technology in pursuit of improved security function of the NFC-based 2 factor electronic payment system enabled GenoTech Ch., Ltd. to develop its new service, Gallery-Auction, demoed at Daegu Exhibition. The demonstration was followed by the improvement requests in banner creation & installation, changes in UI, changes in order of operation, etc, which were taken into account for the succeeding update. During the second demonstration held at 'Art: Gwangju: 17,' it analyzed and visualized the number of visitors per hour there.

Influence on the Use Intention of Alipay Payment Service by Chinese Tourists Visiting Korea

  • HE, Ming-Guang;KIM, Hwa-Kyung;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.7-13
    • /
    • 2019
  • Purpose: In the past, the South Korean government made various efforts to attract Chinese tourists, resulting in gradually more inbound tourists. In 2016, the number of Chinese tourists to South Korea peaked at 8.06 million and became the top source market. Nevertheless, increasing numbers of consumers choose to adopt the mobile payment tool instead of cash and credit cards in modern times with developed IT services. Research design, data, and methodology: IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used to analyze the data, which was collected from hotel employees in China from March 25 to May 10. Results: First, Interactivity, security, convenience, local information supply and user interface had positive effects on satisfaction and reliability. Second, it was believed that the convenience of Alipay played a positive role in increasing reliability and satisfaction through verification. Third, the role of use rate was found to be important in the development of Alipay functions. Conclusions: Based on the result, an analysis on the development of the Alipay market and the use of Alipay in South Korea is warranted. Furthermore, this paper will serve as a basis for flexible strategic plans for the development of Alipay and SMEs in South Korea.