• Title/Summary/Keyword: face authentication

Search Result 159, Processing Time 0.021 seconds

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention (전염성 확산 차단을 위한 음성인식 기반의 출입통제시스템 설계)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.19-24
    • /
    • 2020
  • WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.

Speaker verification with ECAPA-TDNN trained on new dataset combined with Voxceleb and Korean (Voxceleb과 한국어를 결합한 새로운 데이터셋으로 학습된 ECAPA-TDNN을 활용한 화자 검증)

  • Keumjae Yoon;Soyoung Park
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.2
    • /
    • pp.209-224
    • /
    • 2024
  • Speaker verification is becoming popular as a method of non-face-to-face identity authentication. It involves determining whether two voice data belong to the same speaker. In cases where the criminal's voice remains at the crime scene, it is vital to establish a speaker verification system that can accurately compare the two voice evidence. In this study, to achieve this, a new speaker verification system was built using a deep learning model for Korean language. High-dimensional voice data with a high variability like background noise made it necessary to use deep learning-based methods for speaker matching. To construct the matching algorithm, the ECAPA-TDNN model, known as the most famous deep learning system for speaker verification, was selected. A large dataset of the voice data, Voxceleb, collected from people of various nationalities without Korean. To study the appropriate form of datasets necessary for learning the Korean language, experiments were carried out to find out how Korean voice data affects the matching performance. The results showed that when comparing models learned only with Voxceleb and models learned with datasets combining Voxceleb and Korean datasets to maximize language and speaker diversity, the performance of learning data, including Korean, is improved for all test sets.

A System for Improving Fairness of Online Test Using Camera (카메라를 이용한 온라인 시험 공정성 강화 시스템)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1427-1435
    • /
    • 2009
  • E-Learning is different from the traditional classroom learning and examinees can take a class individually anywhere by online. And it is difficult to proctor an examination because they also take a test by online. However the results of the online test are included in their examination scores. Therefore, it is very important to authenticate the examinees. In this paper, we propose improvement of fairness system for online test using camera. Students can take a picture after every online classes and it has been saved. And during the test, ELTS(e-Learning Test System) takes images, detects the faces, and protects from getting another person to sit for cheating. After examination, the images have been transferred with the answer sheets to the cyber school management system. And a report card will be printed out with the user's images. Moreover, it will authenticate oneself and protect the online test from cheating.

  • PDF

A Study on LMS Using Effective User Interface in Mobile Environment (모바일 환경에서 효과적인 사용자 인터페이스를 이용한 LMS에 관한 연구)

  • Kim, Si-Jung;Cho, Do-Eun
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.76-81
    • /
    • 2012
  • With the spread of the various mobile devices, the studies on the learning management system based on the u-learning are actively proceeding. The u-learning-based learning management system is very convenient in that there are no restrictions on the various access devices as well as the access time and place. However, the judgments on the authentication for the user and whether learning is focused on are difficult. In this paper, the voice and user face capture interface rather than the common user event oriented interface was applied to the learning management system. When a user is accessing the learning management system, user's registered password is input and login as voice, and the user's learning attitude is judged through the response utterance of simple words during the process of learning through contents. As a result of evaluating the proposed learning management system, the user's learning achievement and concentration were improved, thus enabling the manager to monitor the user's abnormal learning attitude.

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire (무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법)

  • Lee, Su-Yeon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.7-11
    • /
    • 2019
  • Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.

Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It (행정전자서명 암호체계 기술 현황 분석 및 고도화 방향)

  • Younghoon Jung;Dongyoung Roh;Bonwook Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.13-31
    • /
    • 2023
  • Korean Government-PKI (GPKI) is a public-key infrastructure which provides authentication and security functions for information system used by central government, local governments, and public institutions of the Republic of Korea to provide their own administrative and public services. The current cryptosystem of GPKI was established in the early 2000s, and more than ten years have passed since the last improvement in 2010. Over the past decade or so, the information security, including cryptography, has undergone many changes and will continue to face many changes. Therefore, for the sustainable security of GPKI, it is necessary to review the security of the cryptosystem at this point. In this paper, we analyze the current status and the security of technologies and standards used in the system. We identify cryptographic algorithms with degraded security, international standards which are obsoleted or updated, and cryptographic parameters that should be revised for the high security level. And based on this, we make several suggestions on the reorganization of cryptographic algorithms and related technologies for the security enhancement of GPKI.

A Study on the Unmanned convenience Store Operation System from the Viewpoint of Visual Merchandising (비주얼 머천다이징 관점에서의 무인 편의점 운영시스템에 관한 연구)

  • Seo, Jung-Hwa;Yang, Hoe-Chang;Park, Chul-Ju;Youn, Myoung-Kil
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.45-53
    • /
    • 2018
  • Purpose - The purpose of the study was to investigate operation system of current convenience store and competing retail store and to find out development of unattended convenience store. Operators can save labor cost and solve labor seeking when opening shop under suitable environment and commerce area, and assure of employee's safety. Customers are allowed to select commodity comfortably without disclosure of face and to shorten standby time at simple store opening, buying and paying and to produce convenient living environment by financing, delivery and goods control. This study examined effect and problems of operation of existing and unattended convenience store from point of view of visual merchandising to find out model of unattended convenience store and to strengthen competitiveness of convenience store business. Research design, data, and methodology - Research procedure of accomplishment of goal of the study was: The study investigated state of distribution business, and role and definition of VMD. First, VMD played an important role of promotion and competitiveness of unattended convenience stores. Second, the author investigated research and cases of unattended convenience stores 14 months, that is to say, from August 15, 2017 to October 15, 2018. Third, the author investigated on-the-spot three of common convenience stores, three of unattended convenience stores and three of retailers one month, that is to say, June 1, 2018 to July 1, 2018. The subject was convenience stores and retailers selling similar type of products at Seoul and metropolitan area. Results - Layout, selling place, brand identity, goods assortment, authentication system, product information cognition and control, buying and payment system, security system, salesmen, promotion and other services should be improved from point of view of merchandising. Structure, furniture, lighting, voice, façade, VP, PP, IP and POP should be developed. Conclusions - Unattended convenience stores saved operating cost and lessened labor and gave visitors convenience and comfortable shopping and made use of resources effectively. Further studies with quantitative analysis shall find out strategic conditions for promotion of unattended convenience stores.

Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient (상관계수를 이용하여 인식률을 향상시킨 rank-level fusion 방법)

  • Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1007-1017
    • /
    • 2019
  • Currently, most biometrics system authenticates users by using single biometric information. This method has many problems such as noise problem, sensitivity to data, spoofing, a limitation of recognition rate. One method to solve this problems is to use multi biometric information. The multi biometric authentication system performs information fusion for each biometric information to generate new information, and then uses the new information to authenticate the user. Among information fusion methods, a score-level fusion method is widely used. However, there is a problem that a normalization operation is required, and even if data is same, the recognition rate varies depending on the normalization method. A rank-level fusion method that does not require normalization is proposed. However, a existing rank-level fusion methods have lower recognition rate than score-level fusion methods. To solve this problem, we propose a rank-level fusion method with higher recognition rate than a score-level fusion method using correlation coefficient. The experiment compares recognition rate of a existing rank-level fusion methods with the recognition rate of proposed method using iris information(CASIA V3) and face information(FERET V1). We also compare with score-level fusion methods. As a result, the recognition rate improve from about 0.3% to 3.3%.