• Title/Summary/Keyword: VAULT

Search Result 218, Processing Time 0.025 seconds

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

Radian of the vault influencing the seismic performances of straight wall arch underground structures

  • Ma, Chao;Lu, Dechun;Qi, Chengzhi;Du, Xiuli
    • Structural Engineering and Mechanics
    • /
    • v.78 no.5
    • /
    • pp.637-649
    • /
    • 2021
  • Great efforts have been conducted to investigate the seismic performances of the arch and rectangular underground structures, however, the differences between seismic responses of these two types of underground structures, especially the vault radian influencing the seismic responses of arch structures are not clarified. This paper presents a detailed numerical investigation on the seismic responses of arch underground structures with different vault radians, and aims to illustrate the rule that vault radian affects the seismic responses of underground structures. Five arch underground structures are built for nonlinear soil-structure interaction analysis. The internal forces of the structural components of the underground structures only under gravity are discussed detailedly, and an optimum vault radian for perfect load-carrying functionality of arch underground structures is suggested. Then the structures are analyzed under seven scaled ground motions, amounting to a total of 35 dynamic calculations. The numerical results show that the vault radian can have beneficial effects on the seismic response of the arch structure, compared to the rectangular underground structures, causing the central columns to suffer smaller axial force and horizontal deformation. The conclusions provide some directive suggestions for the seismic design of the arch underground structures.

Security of Password Vaults of Password Managers (패스워드 매니저의 패스워드 저장소 보안 취약점 분석)

  • Jeong, Hyera;So, Jaewoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1047-1057
    • /
    • 2018
  • As the number of services offered on the Internet exponentially increases, password managers are increasing popular applications that store several passwords in an encrypted database (or password vault). Browser-integrated password managers or locally-installed password managers store the password vault on the user's device. Although a web-based password manager stores the password vault on the cloud server, a user can store the master password used to sign in the cloud server on her device. An attacker that steals a user's encrypted vault stored in the victim's device can make an offline attack and, if successful, all the passwords in the vault will be exposed to the attacker. This paper investigates the vulnerability of the password vault stored in the device and develops attack programs to verify the vulnerability of the password vault.

Experimental investigation into brick masonry arches' (vault and rib cover) behavior reinforced by FRP strips under vertical load

  • Takbash, Majid Reza;Morshedi, Abbas Ali Akbarzadeh;Sabet, Seyyed Ali
    • Structural Engineering and Mechanics
    • /
    • v.67 no.5
    • /
    • pp.481-492
    • /
    • 2018
  • The current experimental study is the reinforcement of the simple curvature vault masonry structures. In this study, we discuss complex structure include vault and rib cover with two radii and actual dimensions under a vertical load. The unreinforced structure data were compared with analysis data. The analysis data are in good agreement with experimental data. In the first experiment, a structure without reinforcement is tested and according to the test results, the second structure was reinforced using the carbon polymer fibers and the same test is done to see the effects of reinforcement. Based on the test results of the first structure, the first cracks are created in the vault. Moreover, the reinforcement with carbon fibers will increase the loading capacity of the structure around 35%.

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

Invariant Iris Code extraction for generating cryptographic key based on Fuzzy Vault (퍼지볼트 기반의 암호 키 생성을 위한 불변 홍채코드 추출)

  • Lee, Youn-Joo;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.321-322
    • /
    • 2006
  • In this paper, we propose a method that extracts invariant iris codes from user's iris pattern in order to apply these codes to a new cryptographic construct called fuzzy vault. The fuzzy vault, proposed by Juels and Sudan, has been used to manage cryptographic key safely by merging with biometrics. Generally, iris data has intra-variation of iris pattern according to sensed environmental changes, but cryptography requires correctness. Therefore, to combine iris data and fuzzy vault, we have to extract an invariant iris feature from iris pattern. In this paper, we obtain invariant iris codes by clustering iris features extracted by independent component analysis(ICA) transform. From experimental results, we proved that the iris codes extracted by our method are invariant to sensed environmental changes and can be used in fuzzy vault.

  • PDF

Fuzzy Vault System based on Iris for Protecting Cryptographic Key (암호 키의 보안을 위한 홍채 기반의 퍼지볼트 시스템)

  • Lee, Youn-Joo;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.241-242
    • /
    • 2007
  • In this paper, we propose a fuzzy vault system using iris data. The fuzzy vault, proposed by Juels and Sudan, has been used to protect cryptographic key with biometric information. In order to combine the fuzzy vault scheme with iris data, we used iris features extracted by ICA method and clustering technique. From our experimental results, we proved that the propose fuzzy vault system is robust to sensed environmental change.

  • PDF

Relationship between The Shape of Palatal Vault and Tooth and The Thickness of Palatal Masticatory Mucosa (구개 및 치아 형태와 구개부 저작점막의 두께와의 연관성)

  • Seok, Hwa-Suk;Lee, Man-Sub;Kwon, Young-Hyunk;Park, Joon-Bong
    • Journal of Periodontal and Implant Science
    • /
    • v.33 no.3
    • /
    • pp.519-531
    • /
    • 2003
  • The aim of present investigation was to clinically measure the thickness of palatal masticatory mucosa in the hard palate as potential donor site for mucogingival surgery, to determine the relation to shape of palatal vault, form of tooth, gender, and to serve the clinical criteria t o choose the proper surgical technique. 84(mean age:25yrs) systemically and periodontally healthy volunteers participated in this study and 18 standard measurement points were defined in the hard palate, located on 3 lies which ran at different distances parallel to the gingival margin. 6 positions were designated on each of these 3 lines between the level of canine and 2nd molar and a bone sounding technique using a periodontal probe with minimal local anesthesia was utilized to assess the thickness of palatal masticatory mucosa. Student t-test was used to determine the difference in mucosal thickness between 2 groups gender, shape of palatal vault (high palatal vault vs. low palatal vault), tooth form (short-wide vs. long narrow) The result of this study were as follows: 1. Soft tissue thickness progressively increased in sites further away from the gingival margin (p<0.01). 2. Depending on position, in line a and line c the masticatory mucosal thickness increased from Ca to M2(p<0.01), but in line b the thickness increased from Ca to P2, and decreased to M1 and increased again to M2. 3. Gender did not influence the thickness of masticatory mucosa. 4. Palatal vault shape was associated with the thickness of masticatory mucosa. Thickness of low palatal vault group was thicker than high palatal group between P2 and M2 position. 5. Form of tooth did not influence the thickness of masticatory mucosa. In conclusion, palatal vault shape was associated with the thickness of masticatory mucosa. So, mucogingival surgery can be considered as a treatment modality in high palatal vault group. But, Gender and tooth form did not influence the thickness of masticatory mucosa.

Does the palatal vault form have an influence on the scan time and accuracy of intraoral scans of completely edentulous arches? An in-vitro study

  • Osman, Reham;Alharbi, Nawal
    • The Journal of Advanced Prosthodontics
    • /
    • v.14 no.5
    • /
    • pp.294-304
    • /
    • 2022
  • PURPOSE. The purpose of this study was to evaluate the influence of different palatal vault configurations on the accuracy and scan speed of intraoral scans (IO) of completely edentulous arches. MATERIALS AND METHODS. Three different virtual models of a completely edentulous maxillary arch with different palatal vault heights- Cl I moderate (U-shaped), Cl II deep (steep) and Cl III shallow (flat)-were digitally designed using CAD software (Meshmixer; Autodesk, USA) and 3D-printed using SLA-based 3D-printer (XFAB; DWS, Italy) (n = 30; 10 specimens per group). Each model was scanned using intraoral scanner (Trios 3; 3ShapeTM, Denmark). Scanning time was recorded for all samples. Scanning accuracy (trueness and precision) were evaluated using digital subtraction technique using Geomagic Control X v2020 (Geomagic; 3DSystems, USA). One-way analysis of variance (ANOVA) test was used to detect differences in scanning time, trueness and precision among the test groups. Statistical significance was set at α = .05. RESULTS. The scan process could not be completed for Class II group and manufacturer's recommended technique had to be modified. ANOVA revealed no statistically significant difference in trueness and precision values among the test groups (P=.959 and P=.658, respectively). Deep palatal vault (Cl II) showed significantly longer scan time compared to Cl I and III. CONCLUSION. The selection of scan protocol in complex cases such as deep palatal vault is of utmost importance. The modified, adopted longer path scan protocol of deep vault cases resulted in increased scan time when compared to the other two groups.

A Study on Seed Conservation Trends in Asia to Seed Vault's Preservation of Overseas Seeds (시드볼트의 해외 종자 확보 강화를 위한 아시아권역 종자보존 동향조사)

  • Chihyeon Song;Minsun Kim;Seojin Kim;Jongwoo Nam;Hayan Lee;Hyejin Lee;Haneul Lee;Keehwa Bae
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2023.04a
    • /
    • pp.27-27
    • /
    • 2023
  • 최근 기후위기 등으로 인해 생물다양성 감소 우려가 높아지고 있으며, 식물유전자원 보존의 강화를 위해 수많은 국제협약이 체결되고 있다. 자국의 생물다양성을 보호하고, 전 세계의 기후위기 취약식물의 보존을 위해 대한민국 산림청은 세계 최초로 지하터널형 야생식물종자 영구저장시설인 '시드볼트(Seed Vault)'를 경상북도 봉화에 설립하였다. 시드볼트는 안전한 종자의 저장을 위해 온도 -20℃, 습도 RH 40% 이하를 유지하며, 환경 변화를 최소화하기 위해 매일 시설 점검을 진행하고 있다. 시드볼트의 미션은 '기후위기 대응 생물다양성 확보'이며, 전 세계 종자저장의 선도기관으로 2022년 12월 기준으로 5,424종 192,625점을 확보하였으며, 2030년까지 1만 종 30만 점을 목표로 하고 있다. 전 세계 식물 종의 보호를 위해 국제기구와 협력하고 있으나, 해외 종자의 저장이 더욱 강화되어야 하며, 향후 시드볼트 종자저장 네트워크 구축에 참고하기 위한 해외 사례를 조사하였다. 아시아에서는 중국이 다량의 식물종을 수집하고 있으나, 해당 자료에 대한 공개는 이루어지지 않고 있으며, 일본은 농업식량 식물자원 중심으로 종자를 보존하고 있으며, 태국, 대만, 싱가포르 및 몽골 및 중앙아시아 국가의 종자수집과 보존은 근래 확대되는 추세이다. FAO의 Plant Genetic Resources for Food And Agriculture 관련 수집 자료에 따르면, 아시아지역 25개 국가에서 984,019점의 식물유전자원을 보고하였다. 본 연구를 바탕으로 아시아지역의 종자보존 네트워크를 구축하여 해외 종자의 안전한 저장을 통해 아시아 야생식물자원 다양성 보전 가치를 통합하는 시설로 성장하고자 한다.

  • PDF