• Title/Summary/Keyword: biometric information

Search Result 580, Processing Time 0.026 seconds

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology (보안성이 향상된 퍼지추출 기술 기반 사용자 인증 및 키 동의 스킴)

  • Choi, Younsung;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2016
  • Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

User Authentication System based on Auto Identification and Data Collection (자동인식 및 데이터 수집을 이용한 사용자 인증 시스템)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.75-82
    • /
    • 2018
  • As user of mobile device increases, various user authentication methods are actively researched. The user authentication methods includes a method of using a user ID and a password, a method of using user biometric feature, a method of using location based, and a method of authenticating secondary authentication such as OTP(One Time Password) method is used. In this paper, we propose a user system which improves the problem of existing authentication method and encryption can proceed in a way that user desires. The proposed authentication system is composed of an authentication factor collection module that collects authentication factors using a mobile device, a security key generation module that generates a security key by combining the collected authentication factors, and a module that performs authentication using the generated security key module.

Calibration of 9 axis sensor data for high immersion feeling of VR user (VR 사용자의 높은 몰입감을 위한 9축센서 데이터의 보정)

  • Kim, Dong-min;Lim, Ji-yong;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.400-403
    • /
    • 2018
  • The VR / AR market has grown significantly due to the development of Virtual Reality and Augmented Reality, the core technologies of the Fourth Industrial Revolution. According to a report released by the Korea Science and Engineering Corporation (KISTEP), the global VR / AR market will grow to $ 105 billion by 2022. An important key to the growth of the VR / AR market is user immersion. VR is dependent on technology of hardware such as display and sensor for biometric signal recognition. In order to improve user's immersion feeling, it is important to transmit sensor data to display device more accurately and quickly. In this paper, we consider various sensor hardware dependencies of VR, and compare various correction methods and filtering methods to lower the Motion to Photon (MTP) time that user movement is fully reflected on the display using sensor devices.

  • PDF

Smart Elderly-care System using Smart-phone (스마트폰을 이용한 고령자용 스마트 간병 시스템)

  • Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.129-135
    • /
    • 2017
  • In this paper, we propose a system to monitor the condition of elderly people who are uncomfortable by using smart-phone and biometric sensor at any time and for care-givers to provide with the best medical service anytime and anywhere. The proposed system monitors the status of the elderly through various bionic sensors installed in the hospital ward based on the Arduino system and not only provides the physiological and medical services required by the elderly, but also informs the guardian so that he can cope with the emergency. In conclusion, this paper suggests that a reading light used by elderly people can operate as a home server with a biosensor using Arduino and Android applications (Apps.), and the smart-phone of care-givers is configured as a remote management and a emergency call system. Therefore, this study suggests important ways to improve the satisfaction of medical service for the both elderly people and care-givers of chronic diseases in the future.

Analysis of Needs for Development of Young Child's Products based on ICT (ICT기반 영유아용 제품개발을 위한 요구도 분석)

  • Lee, Seok Jae;Ko, Eun Mi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.605-611
    • /
    • 2020
  • The purpose of this study is to analyze the perception and demand of industrial sites necessary for the development of ICT-based products for young child, to seek effective support plans for ICT-based young child product developers that help with smart child rearing in the era of low birthrate. To this end, first, it was found that various and active promotions of specialized organizations or centers that have jointly utilized equipment are necessary. Second, it was found that many companies were willing to use equipment for the development of ICT-based young child's products. Third, the demand for corporate support was to provide information, equipment utilization, technical guidance and biometric information. Based on these results, it was proposed to expand related infrastructure that can efficiently support the development of ICT-based products for young child.

Multimodal Biometrics Recognition from Facial Video with Missing Modalities Using Deep Learning

  • Maity, Sayan;Abdel-Mottaleb, Mohamed;Asfour, Shihab S.
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.6-29
    • /
    • 2020
  • Biometrics identification using multiple modalities has attracted the attention of many researchers as it produces more robust and trustworthy results than single modality biometrics. In this paper, we present a novel multimodal recognition system that trains a deep learning network to automatically learn features after extracting multiple biometric modalities from a single data source, i.e., facial video clips. Utilizing different modalities, i.e., left ear, left profile face, frontal face, right profile face, and right ear, present in the facial video clips, we train supervised denoising auto-encoders to automatically extract robust and non-redundant features. The automatically learned features are then used to train modality specific sparse classifiers to perform the multimodal recognition. Moreover, the proposed technique has proven robust when some of the above modalities were missing during the testing. The proposed system has three main components that are responsible for detection, which consists of modality specific detectors to automatically detect images of different modalities present in facial video clips; feature selection, which uses supervised denoising sparse auto-encoders network to capture discriminative representations that are robust to the illumination and pose variations; and classification, which consists of a set of modality specific sparse representation classifiers for unimodal recognition, followed by score level fusion of the recognition results of the available modalities. Experiments conducted on the constrained facial video dataset (WVU) and the unconstrained facial video dataset (HONDA/UCSD), resulted in a 99.17% and 97.14% Rank-1 recognition rates, respectively. The multimodal recognition accuracy demonstrates the superiority and robustness of the proposed approach irrespective of the illumination, non-planar movement, and pose variations present in the video clips even in the situation of missing modalities.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

AHRS Sensor Data Correction for Improved Immersion in VR (VR의 몰입감 향상을 위한 AHRS 센서 데이터 값 보정)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1413-1420
    • /
    • 2018
  • The VR / AR market has grown significantly due to the development of virtual reality and augmented reality in the core technology field of the 4th Industrial Revolution. Since VR is basically focused on space and time, and the human brain is very sensitive to temporal events, it is important to make accurate I / O interface technology, one of the virtual reality technologies, not to affect the brain's cognitive ability. VR depends on the technology of the hardware such as the display and the sensor for biometric signal recognition. In this paper, in order to prevent the sensitive brain from affecting the sensor device in consideration of hardware dependency of VR, it is necessary to make various corrections to lower the motion to photon (MTP) to 20m / s or less experiments on the method and filtering were carried out.

Online Signature Verification Method using General Handwriting Data and 1-class SVM (일반 필기 데이터와 단일 클래스 SVM을 이용한 온라인 서명 검증 기법)

  • Choi, Hun;Heo, Gyeongyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1435-1441
    • /
    • 2018
  • Online signature verification is one of the simple and efficient methods of identity verification and has less resistance than other biometric technologies. To handle signature verification as a classification problem, it is necessary to gather forgery signatures, which is not easy in most practical applications. It is not easy to obtain a large number of genuine signatures either. In this paper, one class SVM is used to tackle the forgery signature problem and someone else's signatures are used as general handwriting data to solve the genuine signature problem. Someone else's signature does not share shape-based features with the signature to be verified, but it contains the general characteristics of a signature and useful in verification. Verification rate can be improved by using the general handwriting data, which can be confirmed through the experimental results.