• Title/Summary/Keyword: biometric information

Search Result 580, Processing Time 0.027 seconds

An Authentication Protocol using Fuzzy Signature Vault Scheme (퍼지서명볼트스킴을 이용한 인증 프로토콜)

  • Moon, Hyun-Yi;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.4
    • /
    • pp.172-177
    • /
    • 2008
  • In this paper, we design an authentication protocol based on Fuzzy Signature Vault Scheme using a light signature feature extraction method for user convenience and efficiency of electronic commerce. The signature is used broadly in electronic commerce because it is one of the simple and low-cost biometric items. However, signature has a problem that there are few low-cost and safe protocols. To solve this problem, we design a feature extraction method which is adequate for characters of signature and Fuzzy Vault Scheme. In addition, we design and analyze an efficient authentication protocol with some parameters used in this procedure. The followings are advantages when this protocol is applied to authentication procedure; 1) using convenient and low-cost signatures, 2) being possible to verify users with spending only about second for signature processing and authentication, 3) one time on transmission for sign-in and verification and 4) getting user authentication with secret value at the same time.

Development of a Visitor Recognition System Using Open APIs for Face Recognition (얼굴 인식 Open API를 활용한 출입자 인식 시스템 개발)

  • Ok, Kisu;Kwon, Dongwoo;Kim, Hyeonwoo;An, Donghyeok;Ju, Hongtaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.169-178
    • /
    • 2017
  • Recently, as the interest rate and necessity for security is growing, the demands for a visitor recognition system are being increased. In order to recognize a visitor in visitor recognition systems, the various biometric methods are used. In this paper, we propose a visitor recognition system based on face recognition. The visitor recognition system improves the face recognition performance by integrating several open APIs as a single algorithm and by performing the ensemble of the recognition results. For the performance evaluation, we collected the face data for about five months and measured the performance of the visitor recognition system. As the results of the performance measurement, the visitor recognition system shows a higher face recognition rate than using a single face recognition API, meeting the requirements on performance.

Development of Feature Extraction Algorithm for Finger Vein Recognition (지정맥 인식을 위한 특징 검출 알고리즘 개발)

  • Kim, Taehoon;Lee, Sangjoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.9
    • /
    • pp.345-350
    • /
    • 2018
  • This study is an algorithm for detecting vein pattern features important for finger vein recognition. The feature detection algorithm is important because it greatly affects recognition results in pattern recognition. The recognition rate is degraded because the reference is changed according to the finger position change. In addition, the image obtained by irradiating the finger with infrared light is difficult to separate the image background and the blood vessel pattern, and the detection time is increased because the image preprocessing process is performed. For this purpose, the presented algorithm can be performed without image preprocessing, and the detection time can be reduced. SWDA (Down Slope Trace Waveform) algorithm is applied to the finger vein images to detect the fingertip position and vein pattern. Because of the low infrared transmittance, relatively dark vein images can be detected with minimal detection error. In addition, the fingertip position can be used as a reference in the classification stage to compensate the decrease in the recognition rate. If we apply algorithms proposed to various recognition fields such as palm and wrist, it is expected that it will contribute to improvement of biometric feature detection accuracy and reduction of recognition performance time.

Fingerprint-Based Personal Authentication Using Directional Filter Bank (방향성 필터 뱅크를 이용한 지문 기반 개인 인증)

  • 박철현;오상근;김범수;원종운;송영철;이재준;박길흠
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.4
    • /
    • pp.256-265
    • /
    • 2003
  • To improve reliability and practicality, a fingerprint-based biometric system needs to be robust to rotations of an input fingerprint and the processing speed should be fast. Accordingly, this paper presents a new filterbank-based fingerprint feature extraction and matching method that is robust to diverse rotations and reasonably fast. The proposed method fast extracts fingerprint features using a directional filter bank, which effectively decomposes an image into several subband outputs Since matching is also performed rapidly based on the Euclidean distance between the corresponding feature vectors, the overall processing speed is so fast. To make the system robust to rotations, the proposed method generates a set of feature vectors considering various rotations of an input fingerprint and then matches these feature vectors with the enrolled single template feature vector. Experimental results demonstrated the high speed of the proposed method in feature extraction and matching, along with a comparable verification accuracy to that of other leading techniques.

Sliding Active Camera-based Face Pose Compensation for Enhanced Face Recognition (얼굴 인식률 개선을 위한 선형이동 능동카메라 시스템기반 얼굴포즈 보정 기술)

  • 장승호;김영욱;박창우;박장한;남궁재찬;백준기
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.155-164
    • /
    • 2004
  • Recently, we have remarkable developments in intelligent robot systems. The remarkable features of intelligent robot are that it can track user and is able to doface recognition, which is vital for many surveillance-based systems. The advantage of face recognition compared with other biometrics recognition is that coerciveness and contact that usually exist when we acquire characteristics do not exist in face recognition. However, the accuracy of face recognition is lower than other biometric recognition due to the decreasing in dimension from image acquisition step and various changes associated with face pose and background. There are many factors that deteriorate performance of face recognition such as thedistance from camera to the face, changes in lighting, pose change, and change of facial expression. In this paper, we implement a new sliding active camera system to prevent various pose variation that influence face recognition performance andacquired frontal face images using PCA and HMM method to improve the face recognition. This proposed face recognition algorithm can be used for intelligent surveillance system and mobile robot system.

Geometric Transform-Invariant Gait Recognition Using Modified Radon Transform (변형된 라돈 변환을 이용한 기하학적 형태 불변 보행인식)

  • Jang, Sang-Sik;Lee, Seung-Won;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.67-75
    • /
    • 2011
  • This paper presents a scale and rotation-invariant gait recognition method using R-transform, which is computed by projecting squared coefficients of Radon transform. Since R-transform is invariant to translation, rotation, and scaling, it particularly suitable for extracting object poses without camera calibration. Coefficients of R-transform are used to compute correlation, and the maximum correlation value determines the similarity between two gait images. The proposed method requires neither camera calibration nor geometric compensation, and as a result, it makes robust gait recognition possible without additional compensation for translation, rotation, and scaling.

The Mobile Meeting Authentication Scheme Providing Mobility and Privacy (이동성과 프라이버시를 제공하는 모바일 회의 인증 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.243-248
    • /
    • 2014
  • The demand for messenger service goes on growing rapidly with widespread use of smartphones. Generally, the smartphone messenger provides group communication functions in which users can make the group and communicate with each other. In the mobile meeting, the attendees can participate in the meeting with use of smartphone messengers wherever they are. To make the mobile meeting put to practical use, the mobility and privacy should be ensured to attendees. To satisfy the mobility requirement, the user which is not belong to the group members should not be able to participate in the meeting. To ensure the privacy requirement, the attendees should have not to repudiate the meeting results. In this study, the mobile meeting authentication scheme is proposed which provides mobility and privacy. The proposed scheme consists of meeting group creation, group key generation, group signature and verification protocols. All attendees should have to participate in the signature verification because it is based on the challenge-response type protocol. Thus, it's not possible to collude with malicious attendees to change the meeting results.

The Interaction Expressed in 21st Century's Digital Fashion - Focused on the Luminescence digital fashion designs - (21세기 디지털 패션에 나타난 인터랙션 - 발광형 디지털 패션디자인을 중심으로 -)

  • Heo, Seungyeun;Lee, Younhee
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.4
    • /
    • pp.17-29
    • /
    • 2013
  • The purpose of this study is to analyze the factors of action and reaction through the examples of luminescence digital fashion design, which is a part of the interactive digital paradigm in 21st century, and to classify types of interaction expressed in luminescence digital fashion design. The significance of this study is to provide an effective database for researches on new ideas and expression methods of fashion design using luminescence digital device. The contents are as follows. First, identifying the concepts of interaction, digital fashion, and luminescence digital device. Second, analyzing the factors that put the luminescence digital device into effect through materials such as the collected photos and the stimulus behind the materials. Third, analyzing and classifying types of reaction according to the types of stimulus in luminescence digital fashion design. Detailed use of luminescence digital devices in Fashion designs did not start until after 2000 so the scope of this study starts from 2000 and on. The methods of this study are as follows. The theoretical frameworks of digital fashion and interaction were setup by using information from various related books, papers, and internet sites. In addition, the empirical analysis was performed using collected photos and explanations through related Internet sites of digital fashion. Through the study, the interaction types in 21st century's luminescence digital fashion design can be expressed variously according to the current input type, biometric recognition type, environment recognition type.

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

Adaptive Hybrid Fingerprint Matching Method Based on Minutiae and Filterbank (특징점과 필터뱅크에 기반한 적응적 혼합형 지문정합 방법)

  • 정석재;박상현;문성림;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.959-967
    • /
    • 2004
  • Jain et al. proposed the hybrid matching method which was combined the minutia-based matching method and the filter-bank based matching method. And, their experimental results proved the hybrid matching method was more effective than each of them. However, this hybrid method cannot utilize each peculiar advantage of two methods. The reason is that it gets the matching score by simply summing up each weighted matching score after executing two methods individually. In this paper, we propose new hybrid matching method. It mixes two matching methods during the feature extraction process. This new hybrid method has lower ERR than the filter-bank based method and higher ERR than the minutia-based method. So, we propose the adaptive hybrid scoring method, which selects the matching score in order to preserve the characteristics of two matching methods. Using this method, we can get lower ERR than the hybrid matcher by Jain et al. Experimental results indicate that the proposed methods can improve the matching performance up to about 1% in ERR.