• Title/Summary/Keyword: Signature recognition

Search Result 83, Processing Time 0.028 seconds

3D face recognition based on facial surface information (얼굴 표면의 형태정보를 이용한 3차원 얼굴인식)

  • Lee, Dong-Joo;Shin, Hyoung-Chul;Sohn, Kwang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.423-424
    • /
    • 2006
  • This paper describes a 3D face recognition using different devices for 3D faces and input faces which include several different pose. Before the recognition stage, through the EC-SVD, all data have to be preprocessed and normalized. At recognition stage, we propose the multi-point signature method for measuring facial surface information. And we use the root mean square error for matching. From the experiment results, we have 92.5% recognition rate.

  • PDF

A Study on the Pattern Recognition of EMG Signals for Head Motion Recognition (머리 움직임 인식을 위한 근전도 신호의 패턴 인식 기법에 관한 연구)

  • 이태우;전창익;이영석;유세근;김성환
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.2
    • /
    • pp.103-110
    • /
    • 2004
  • This paper proposes a new method on the EMG AR(autoregressive) modeling in pattern recognition for various head motions. The proper electrode placement in applying AR or cepstral coefficients for EMG signature discrimination is investigated. EMG signals are measured for different 10 motions with two electrode arrangements simultaneously. Electrode pairs are located separately on dominant muscles(S-type arrangement), because the bandwidth of signals obtained from S-type placement is wider than that from C-type(closely in the region between muscles). From the result of EMG pattern recognition test, the proposed mIAR(modified integrated mean autoregressive model) technique improves the recognitions rate around 17-21% compared with other the AR and cepstral methods.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

Iris Recognition Using Ridgelets

  • Birgale, Lenina;Kokare, Manesh
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.445-458
    • /
    • 2012
  • Image feature extraction is one of the basic works for biometric analysis. This paper presents the novel concept of application of ridgelets for iris recognition systems. Ridgelet transforms are the combination of Radon transforms and Wavelet transforms. They are suitable for extracting the abundantly present textural data that is in an iris. The technique proposed here uses the ridgelets to form an iris signature and to represent the iris. This paper contributes towards creating an improved iris recognition system. There is a reduction in the feature vector size, which is 1X4 in size. The False Acceptance Rate (FAR) and False Rejection Rate (FRR) were also reduced and the accuracy increased. The proposed method also avoids the iris normalization process that is traditionally used in iris recognition systems. Experimental results indicate that the proposed method achieves an accuracy of 99.82%, 0.1309% FAR, and 0.0434% FRR.

The Voice Template based User Authentication Scheme Suitable for Mobile Commerce Platform (모바일 상거래 플랫폼에 적합한 음성 템플릿 기반의 사용자 인증 기법)

  • Yun, Sung-Hyun;Koh, Hoon
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.215-222
    • /
    • 2012
  • A smart phone has functions of both telephone and computer. The wide spread use of smart phones has sharply increased the demand for mobile commerce. The smart phone based mobile services are available anytime, anywhere. In commercial transactions, a digital signature scheme is used to make legally binding signature to prove both integrity of commercial document and verification of the signer. Smart phones are more risky compared with personal computers on the problems of how to protect privacy information. It's also easy to let proxy user to authenticate instead of the smart phone owner. In existing password or token based schemes, the ID is not physically bound to the owner. Thus, those schemes can not solve the problem of proxy authentication. To utilize the smart phone as the platform of mobile commerce, a study on the new type of authentication scheme is needed where the scheme should provide protocol to get legally binding signature and not to authenticate proxy user. In this paper, we create the mobile ID by using both the USIM and voice template of the smart phone owner. We also design and implement the user authentication scheme based on the mobile ID.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

Fake Discrimination using Time Information in CNN-based Signature Recognition (CNN 기반 서명인식에서 시간정보를 이용한 위조판별)

  • Choi, Seouing-Ho;Jung, Sung Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.293-294
    • /
    • 2017
  • 본 논문에서는 CNN 기반 서명인식에서 시간정보를 이용하여 위조서명을 보다 정확하게 판별하는 방법을 제안한다. 시간정보를 이용하는 첫 번째 방법은 서명하는 전체 시간을 동일한 개수의 등 간격으로 나누어 각각의 이미지를 얻고 이를 합성하여 이용하는 방법이다. 두 번째 방법은 동일한 개수의 등 간격으로 나누어진 각각의 이미지를 CNN-LSTM 으로 판별하는 방법이다. 동일한 개수의 등 간격으로 나누어진 이미지들에는 서명의 속도에 따른 모양의 차이가 발생하기 때문에 비록 최종 서명의 모양이 원본과 매우 유사하다고 하더라도 속도가 다른 경우 위조임을 판별할 수 있다. 두 명의 서명에 대하여 실험을 한 결과 최종 서명이 매우 유사하더라도 속도가 다른 경우 위조로 판별할 수 있음을 보였다. 다만 이미지 합성 과정에 만들어진 새로운 정보로 인하여 진짜 서명을 가짜로 판별할 수 있는 가능성도 늘어날 수 있음을 확인하였다.

  • PDF

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure

  • Jung, Yong-Hoon;Roh, Jeong-Serk;Rhee, Sang-Burm
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1788-1793
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

Symbol recognition using vectorial signature matching for building mechanical drawings

  • Cho, Chi Yon;Liu, Xuesong;Akinci, Burcu
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.155-177
    • /
    • 2019
  • Operation and Maintenance (O&M) phase is the main contributor to the total lifecycle cost of a building. Previous studies have described that Building Information Models (BIM), if available with detailed asset information and their properties, can enable rapid troubleshooting and execution of O&M tasks by providing the required information of the facility. Despite the potential benefits, there is still rarely BIM with Mechanical, Electrical and Plumbing (MEP) assets and properties that are available for O&M. BIM is usually not in possession for existing buildings and generating BIM manually is a time-consuming process. Hence, there is a need for an automated approach that can reconstruct the MEP systems in BIM. Previous studies investigated automatic reconstruction of BIM using architectural drawings, structural drawings, or the combination with photos. But most of the previous studies are limited to reconstruct the architectural and structural components. Note that mechanical components in the building typically require more frequent maintenance than architectural or structural components. However, the building mechanical drawings are relatively more complex due to various type of symbols that are used to represent the mechanical systems. In order to address this challenge, this paper proposed a symbol recognition framework that can automatically recognize the different type of symbols in the building mechanical drawings. This study applied vector-based computer vision techniques to recognize the symbols and their properties (e.g., location, type, etc.) in two vector-based input documents: 2D drawings and the symbol description document. The framework not only enables recognizing and locating the mechanical component of interest for BIM reconstruction purpose but opens the possibility of merging the updated information into the current BIM in the future reducing the time of repeated manual creation of BIM after every renovation project.