• Title/Summary/Keyword: image authentication

Search Result 243, Processing Time 0.025 seconds

Privacy-Preserving Facial Image Authentication Framework for Drones (드론을 위한 암호화된 얼굴 이미지 인증 프레임워크 제안)

  • Hyun-A Noh;Joohee Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.229-230
    • /
    • 2024
  • 최근 드론으로 극한 환경에서 범죄 수배자 및 실종자를 탐색하는 시도가 활발하다. 이때 생체 인증 기술인 얼굴 인증 기술을 사용하면 탐색 효율이 높아지지만, 암호화되지 않은 인증 프로토콜 적용 시 생체 정보 유출의 위험이 있다. 본 논문에서는 드론이 수집한 얼굴 이미지 템플릿을 암호화하여 안전하게 인증할 수 있는 효율적인 생체 인증 프레임워크인 DF-PPHDM(Privacy-Preserving Hamming Distance biometric Matching for Drone-collected Facial images)을 제안한다. 수집된 얼굴 이미지는 암호문 형태로 서버에 전달되며 서버는 기존 등록된 암호화된 템플릿과의 Hamming distance 분석을 통해 검증한다. 제안한 DF-PPHDM을 RaspberryPI 4B 환경에서 직접 실험하여 분석한 결과, 한정된 리소스를 소유한 드론에서 효율적인 구현이 가능하며, 인증 단계에서 7.83~155.03 ㎲ (microseconds)가 소요된다는 것을 입증하였다. 더불어 서버는 드론이 전송한 암호문으로부터 생체 정보를 복구할 수 없으므로 프라이버시 침해 문제를 예방할 수 있다. 향후 DF-PPHDM에 AI(Artificial Intelligence)를 결합하여 자동화 기능을 추가하고 코드 최적화를 통해 성능을 향상시킬 예정이다.

Multiple Barcode Watermarking Technique for Improve Robustness and Imperceptibility (강인성과 비지각성 향상을 위한 다중 바코드 워터마킹 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1723-1729
    • /
    • 2016
  • Digital watermarking is tried to get an optimum tradeoffs between its performance characteristics, robustness, transparency and capacity. This paper is, therefore, suggesting a watermarking technique that builds multiple barcodes in various frequency bands to implement embedded watermarks that is imperceptible and robust against various attacks. Even though a watermark technique with duplicated barcode watermarks embedded in various frequency bands can satisfy robustness as there is high possibility that watermarks embedded in an image remains after various attacks, the duplicated barcode data can weaken imperceptibility. Thus, to satisfy the conflicting characteristic requirements of watermarks, robustness and imperceptibility, different barcode data is embedded in each frequency band. The test shows that ownership authentication with the technique suggested in this thesis does not require specialized hardware, and extracted watermarks can be easily identified through a mobile barcode scanner app, which allows low complexity, low cost and swift identification.

Multipurpose Watermarking Scheme Based on Contourlet Transform (컨투어렛 변환 기반의 다중 워터마킹 기법)

  • Kim, Ji-Hoon;Lee, Suk-Hwan;Park, Seung-Seob;Kim, Ji-Hong;Oh, Sei-Woong;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.929-940
    • /
    • 2009
  • This paper presents multipurpose watermarking scheme in coutourlet transform domain for copyright protection, authentication and transform detection. Since contourlet transform can detect more multi direction edge and smooth contour than wavelet transform, the proposed scheme embeds multi watermarks in contourlet domain based on 4-level Laplacian pyramid and 2-level directional filter bank. In the first stage of the robust watermarking scheme for copyright protection, we generates the sequence of circle patterns according to watermark bits and projects these patterns into the average of magnitude coefficients of high frequency directional subbands. Then the watermark bit is embedded into variance distribution of the projected magnitude coefficients. In the second stage that is the semi-fragile watermarking scheme for authentication and transform detection, we embed the binary watermark image in the low frequency subband of higher level by using adaptive quantization modulation scheme. From the evaluation experiment using Checkmark 2.1, we verified that the proposed scheme is superior to the conventional scheme in a view of the robustness and the invisibility.

  • PDF

Fingerprint-Based Personal Authentication Using Directional Filter Bank (방향성 필터 뱅크를 이용한 지문 기반 개인 인증)

  • 박철현;오상근;김범수;원종운;송영철;이재준;박길흠
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.4
    • /
    • pp.256-265
    • /
    • 2003
  • To improve reliability and practicality, a fingerprint-based biometric system needs to be robust to rotations of an input fingerprint and the processing speed should be fast. Accordingly, this paper presents a new filterbank-based fingerprint feature extraction and matching method that is robust to diverse rotations and reasonably fast. The proposed method fast extracts fingerprint features using a directional filter bank, which effectively decomposes an image into several subband outputs Since matching is also performed rapidly based on the Euclidean distance between the corresponding feature vectors, the overall processing speed is so fast. To make the system robust to rotations, the proposed method generates a set of feature vectors considering various rotations of an input fingerprint and then matches these feature vectors with the enrolled single template feature vector. Experimental results demonstrated the high speed of the proposed method in feature extraction and matching, along with a comparable verification accuracy to that of other leading techniques.

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

Identity Verification in Financial Transactions Using a Stylus Pen (스타일러스 펜을 활용한 금융 거래에서의 본인 인증)

  • Kim, Hyun-Ji;Jang, Kyung-Bae;Kwon, Hyeok-Dong;Kim, Hyun-Jun;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.379-388
    • /
    • 2020
  • As the use of credit cards increases, security threats increase. In particular, despite being vulnerable to related crimes, such as fraudulent use of credit cards and theft of names, there are virtually no security procedures to authenticate the validity of user while paying with the credit card. In order to overcome these limitations of current credit card payments, we add a process of signing payment using a stylus pen with built-in acceleration sensor in the existing transaction method, and classifying and comparing the image of the signature and signature information measured by the sensor through the convolutional neural network. we propose a method to improve security in financial transactions by performing the user authentication process through the possession of the stylus pen and the characteristic values of the signature.

LAB color illumination revisions for the improvement of non-proper image (비정규 영상의 개선을 위한 LAB 컬러조명보정)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.191-197
    • /
    • 2010
  • Many does an application and application but the image analysis of face detection considerably is difficult. In order for with effect of the illumination which is irregular in the present paper America the illumination to range evenly in the face which is detected, detects a face territory, Complemented the result which detects only the front face of existing. With LAB color illumination revisions compared in Adaboost face detection of existing and 32% was visible the face detection result which improves. Bought two images which are input and executed Glassfire label rings. Compared Area critical price and became the area of above critical value and revised from RGB smooth anger and LAB images with LCFD system algorithm. The operational conversion image which is extracted like this executed a face territory detection in the object. In order to extract the feature which is necessary to a face detection used AdaBoost algorithms. The face territory remote login with the face territory which tilts in the present paper, until Multi-view face territory detections was possible. Also relationship without high detection rate seems in direction of illumination, With only the public PC application is possible was given proof user authentication field etc.

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security (출입 보안을 위한 레이블링을 이용한 영역 분리 및 지문 중심점 추출)

  • Lee, Keon-Ik;Jeon, Young-Cheol;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.243-251
    • /
    • 2008
  • This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in $128{\times}128$ size into the size of $4{\times}4$ pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.

  • PDF

Genuine discrimination application using image matching (칼러정보 및 망점 정보를 활용한 코드인증시스템 개발)

  • Choi, Do-young;Kim, Jin-su;Kim, Ji-su;Han, Ga-young;Han, Ha-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.170-172
    • /
    • 2017
  • Due to the technological advances in modern society, the distinction between mask and authenticity is becoming very difficult. to solve these problems, this paper describes a high-level improvement of the image processing technique of the code authentication system which discriminates the good and the bad by using the color information and the dot information. Labels were given to each genuine article and the article, which can not be distinguished from each other. In the proposed method, image matching of labels is performed using the opencv library, and genuine and good products are discriminated by using the halftone dots and w dot dots of each label. In this paper, the proposed method stores genuine and good labels on the server and compares them with the user's labels to determine genuine products.

  • PDF