• Title/Summary/Keyword: Vulnerability Recognition

Search Result 27, Processing Time 0.045 seconds

A Study on Reconstruction Vulnerability of Daugman's Iriscode

  • Youn, Soung-Jo;Anusha, B.V.S;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.35-40
    • /
    • 2019
  • In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.

Design of 2D face recognition security planning to vulnerability (2차원 안면인식의 취약성 보안 방안 설계)

  • Lee, Jaeung;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.243-245
    • /
    • 2017
  • In the face recognition technology, which has been studied a lot, the security of the face recognition technology is improved by receiving the depth data as a weak point for the 2D. In this paper, we expect the effect of cost reduction by enhancing the security of 2D by taking new features of eye flicker that each person possesses as new data information.

  • PDF

A Study of Machine Learning based Face Recognition for User Authentication

  • Hong, Chung-Pyo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.19 no.2
    • /
    • pp.96-99
    • /
    • 2020
  • According to brilliant development of smart devices, many related services are being devised. And, almost every service is designed to provide user-centric services based on personal information. In this situation, to prevent unintentional leakage of personal information is essential. Conventionally, ID and Password system is used for the user authentication. This is a convenient method, but it has a vulnerability that can cause problems due to information leakage. To overcome these problem, many methods related to face recognition is being researched. Through this paper, we investigated the trend of user authentication through biometrics and a representative model for face recognition techniques. One is DeepFace of FaceBook and another is FaceNet of Google. Each model is based on the concept of Deep Learning and Distance Metric Learning, respectively. And also, they are based on Convolutional Neural Network (CNN) model. In the future, further research is needed on the equipment configuration requirements for practical applications and ways to provide actual personalized services.

Development of the Smart Doorlock with Triple Security Function (삼중 보안 기능을 가지는 스마트 도어락 개발)

  • Moon, Seo-Young;Min, Kyeong-Won;Seo, Jae-Sub;Lee, Seon-Woo;Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.115-124
    • /
    • 2020
  • We studied smart door lock of triple security system that strengthened the security capability as it is thought that the criminal case by security vulnerability of door lock is serious in modern society. Remote locking/unlocking function, voice recognition function through mobile phone application built on Eclipse App and optical fingerprint recognition function are implemented in the door lock. Finally, it was confirmed that the security of the door lock can be strengthened through evaluation results of the app-based operation test, the voice recognition operation test, and the fingerprint recognition operation test on the experiment-made door lock system.

Fingerprint Recognition System for On-line User Authentication (온라인 사용자 인증을 위한 지문인식 시스템)

  • Han, Sang-Hoon;Lee, Ho;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.283-292
    • /
    • 2006
  • Interest about a latest security connection technology rises, and try to overcome security vulnerability Certification about on-line user methods through fingerprint that is biometries information apply. In this study, designs and implements fingerprint recognition system that is invariant to rotation by fingerprint recognition system for certification about on-line user. Proposed method focused in matching process through pre-process of fingerprint image, feature point extraction. Improved process time and correct recognition rate in fingerprint recognition system that is invariant to rotation presented in existing study. Also, improved noise, distortion problems that happen in preprocess of existing study applying directional Laplacian filter.

  • PDF

Pensar la Fraternidad en la Diferencia

  • Jurado, Jenniffer Londono
    • Iberoamérica
    • /
    • v.21 no.1
    • /
    • pp.107-125
    • /
    • 2019
  • How to conceive fraternity in difference? I will hold two premises to answer this question. First: fraternity is an ineradicable element of the Political. Second: the recognition of fraternity in difference is a precondition for the consolidation of fraternal relations in Latin America in the context of coloniality. On the same path, I will show that fraternity must be thought of as difference in order to face the logic of neoliberal life imposed by capitalism in globalization. The articulation of both premises in the political praxis would contribute to the preservation of our life in common; in conditions of dignified existence. The fraters of precariousness and vulnerability are the ones who can re-establish being-with- and being-together.

A Study on the Improvement Plan of Voice Recognition Security Vulnerability (음성인식 보안 취약점 개선방안에 대한 연구)

  • Kim, YeonJeong;Yun, HyeMin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.746-748
    • /
    • 2017
  • 음성인식을 사용하는 이용자가 많아지는 요즘, 이를 악용하여 개인정보를 탈취하고, 휴대폰을 해킹하는 등 정보보호 상의 문제점이 많아지고 있다. 이 논문에서는 음성인식 중에서도 IoT 기기의 음성비서를 이용하는 사용자들의 개인정보보호를 위해 음성인식의 보안 정도를 높이고, 본인인증을 더 확실히 할 수 있는 방안을 제안한다.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment (스마트워크 환경에 적합한 얼굴인식 기반 사용자 인증 기법)

  • Byun, Yun-Sang;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.314-325
    • /
    • 2013
  • Smartwork is future-oriented work-environment to bring swift business transaction and convenient for users. In domestic and foreign various countries, It's already prompting introduction of smartwork. Users process work to access frequently from the outside in smartwork that's a similar client/server environment to existing Cloud Computing environment. Necessary of user authentication is increasing to be solvable to security vulnerability because there is possibility that malware flows in and leaks company's confidential information by unauthorized users especially in smartwork environment. Therefore we propose User Authentication scheme based face recognition is applicable to smartwork environment to analyze established User Authentication scheme. environment.

An Analysis of Marine Casualty Reduction by SMART Navigation Service: Accident Vulnerability Monitoring System (SV10) (한국형 e-Navigation 서비스에 따른 해양사고 저감 효과 분석 - 사고취약선박 모니터링 지원 서비스(SV10)를 중심으로 -)

  • Hong, Taeho;Jeong, Gyugwon;Kim, Geonung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.5
    • /
    • pp.504-510
    • /
    • 2018
  • Marine casualties are caused mainly by collisions and grounding, due to human error. The SMART Navigation Service is preparing a measure to reduce marine casualties caused by human error and establish an LTE Accident Vulnerability Monitoring System (SV10) to evaluate the danger of collision or grounding for a vessel based on location information collected on land. This service will also share real-time vessel locations and danger information with related agencies to enable them to respond more quickly to accidents on land. In this study, statistical reports on marine casualties and investigation reports provided by the Korea Maritime Safety Tribunal are analyzed, so the percentage of marine casualties that could be reduced using the SV10 service could be identified.