• Title/Summary/Keyword: Security Verification

Search Result 685, Processing Time 0.026 seconds

A Study on Extraction of Irregular Iris Patterns (비정형 홍채 패턴 분리에 관한 연구)

  • Won, Jung-Woo;Cho, Seong-Won;Kim, Jae-Min;Baik, Kang-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.169-174
    • /
    • 2008
  • Recently, biometric systems are of interest for the reliable security system. Iris recognition technology is one of the biometric system with the highest reliability. Various iris recognition methods have been proposed for automatic personal identification and verification. These methods require accurate iris segmentation for successful processing because the iris is a small part of an acquired image. The iris boundaries have been parametrically modeled and subsequently detected by circles or parabolic arcs. Since the iris boundaries have a wide range of edge contrast and irregular border shapes, the assumption that they can be fit to circles or parabolic arcs is not always valid. In some cases, the shape of a dilated pupil is slightly different from a constricted one. This is especially true when the pupil has an irregular shape. This is why this research is important. This paper addresses how to accurately detect iris boundaries for improved iris recognition, which is robust to noises.

Research on Robust Face Recognition against Lighting Variation using CNN (CNN을 적용한 조명변화에 강인한 얼굴인식 연구)

  • Kim, Yeon-Ho;Park, Sung-Wook;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.325-330
    • /
    • 2017
  • Face recognition technology has been studied for decades and is being used in various areas such as security, entertainment, and mobile services. The main problem with face recognition technology is that the recognition rate is significantly reduced depending on the environmental factors such as brightness, illumination angle, and image rotation. Therefore, in this paper, we propose a robust face recognition against lighting variation using CNN which has been recently re-evaluated with the development of computer hardware and algorithms capable of processing a large amount of computation. For performance verification, PCA, LBP, and DCT algorithms were compared with the conventional face recognition algorithms. The recognition was improved by 9.82%, 11.6%, and 4.54%, respectively. Also, the recognition improvement of 5.24% was recorded in the comparison of the face recognition research result using the existing neural network, and the final recognition rate was 99.25%.

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

Finding Industries for Big Data Usage on the Basis of AHP (AHP 기반의 빅데이터 활용을 위한 산업 탐색)

  • Lee, Sang-Won;Kim, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.21-27
    • /
    • 2016
  • Big Data is gathering all the attention from every business community. Pervasive use of machine-to-machine (M2M) applications and mobile devices bring an explosion of data. By analyzing this data, the private and public sectors can benefit in the areas of cost reduction and productivity. The Korean government is actively pursuing Big Data initiatives to promote its usage. This paper aims to select industries which fit for the development of Big Data with a verification of the experts. The analytic hierarchy process (AHP) is applied to systematically derive the opinion of more than 50 professionals. Medical / welfare, transportation / warehousing, information and communications / information security, energy, the financial sector have been identified as promising industries. The results can be utilized in developing Big Data best practices thus contributing industrial development.

An Approach for Worm Propagation Modeling using Scanning Traffic Profiling (스캐닝 트래픽의 프로파일링을 통한 인터넷 웜 확산 모델링 기법)

  • Shon, Tae-Shik;Koo, Bon-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.67-74
    • /
    • 2010
  • Recently, the early detection and prevention of worm research is mainly studying based on the analysis of generalized worm propagation property. However, it is not easy to do Worm early detection with its attributes because the modeling method for Worm propagation is vague and not specified yet. Worm scanning method is exceedingly effect to Worm propagation process. This paper describes a modeling method and its simulations to estimate various worm growth patterns and their corresponding propagation algorithms. It also tests and varies the impact of various improvements, starting from a trivial simulation of worm propagation and the underlying network infrastructure. It attempts to determine the theoretical maximum propagation speed of worms and how it can be achieved. Moreover, we present the feasibility of the proposed model based on real testbed for verification.

An enhanced signcryption protocol for providing for providing forward secrecy (전방 비밀성을 제공하는 개선된 Signcryption 프로토콜)

  • 이경현;조현호;이준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.653-663
    • /
    • 2002
  • The signature-then-encryption based on RSA scheme provides forward secrecy, but requires 4 modulo exponentiation operations in total, and the signcryption scheme proposed by Zheng simultaneously fulfills both the functions of digital signature and symmetric key encryption in a logically single step, and with a computational cost significantly smaller than that required by the current standard signature-then-encryption, but it can not provide forward secrecy. In this paper, we propose an enhanced signcryption scheme which can provide forward secrecy with lower computational cost and lower communication overhead comparing with those of the signature-then-encryption based on RSA, and with a similar communication overhead of Zheng's scheme. The proposed scheme can be also easily modified to the direct signature verification scheme by the recipient without using the recipient's private key. Additionally, we suggest a new design protocol with server-supported signatures which solves the CRLs(Certificate Revocation Lists) burden and provides non-repudiation of origin. This protocol with server-supported signatures also can be applied to the original signcryption scheme proposed by Zheng in order to improve security.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

Test Standard for Reliability of Automotive Semiconductors: AEC-Q100 (자동차 반도체의 신뢰성 테스트 표준: AEC-Q100)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.578-583
    • /
    • 2021
  • This paper describes acceleration tests for reliability of semiconductors. It also describes AEC-Q100, international test standard for reliability of automotive semiconductors. Semiconductors can be used for dozens of years. So acceleration tests are essential to test potential problems over whole period of product where test time is minimized by applying intensive stresses. AEC-Q100 is a typical acceleration test in automotive semiconductors, and it is designed to find various failures in semiconductors and to analyze their causes of occurance. So it finds many problems in design and fabrication as well as it predicts lifetime and reliability of semiconductors. AEC-Q100 consists of 7 test groups such as accelerated environmental stress tests, accelerated lifetime simulation tests, package assembly integrity tests, die fabrication reliability tests, electrical verification tests, defect screening tests, and cavity package integrity tests. It has 4 grades from grade 0 to grade 3 based on operational temperature. AEC-Q101, Q102, Q103, Q104, and Q200 are applied to discrete semiconductors, optoelectronic semiconductors, sensors, multichip modules, and passive components, respectively.

An Optimized Hardware Implementation of SHA-3 Hash Functions (SHA-3 해시 함수의 최적화된 하드웨어 구현)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.886-895
    • /
    • 2018
  • This paper describes a hardware design of the Secure Hash Algorithm-3 (SHA-3) hash functions that are the latest version of the SHA family of standards released by NIST, and an implementation of ARM Cortex-M0 interface for security SoC applications. To achieve an optimized design, the tradeoff between hardware complexity and performance was analyzed for five hardware architectures, and the datapath of round block was determined to be 1600-bit on the basis of the analysis results. In addition, the padder with a 64-bit interface to round block was implemented in hardware. A SoC prototype that integrates the SHA-3 hash processor, Cortex-M0 and AHB interface was implemented in Cyclone-V FPGA device, and the hardware/software co-verification was carried out. The SHA-3 hash processor uses 1,672 slices of Virtex-5 FPGA and has an estimated maximum clock frequency of 289 Mhz, achieving a throughput of 5.04 Gbps.

A Study on Building System of e-Discovery about Logistics Information of Safty Agricultural-livestock Products (안심 농축수산물 물류정보에 관한 e-Discovery시스템 구축 연구)

  • Jung, Kyung-yong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.287-290
    • /
    • 2014
  • The Large-scale Agricultural & Livestock Products consists largely of distribution at The nation's of school and military foods. but false information on the Agricultural & Livestock Products in a safe food supply has become a social issue. The food suppliers deliver food resource in a school-large food establishments such as Change to domestic high-quality Livestock products from low-quality foreign Livestock products, Change to eco-friendly agricultural produce from normal agricultural produce, Change to fresh vegetables from contaminated vegetables. In this paper, e-Discovery system applies to the methods and security of incorrect logistics information and evidential data about illegal products of agriculture & livestock, it is necessary as studies about compensation and liability.

  • PDF