• Title/Summary/Keyword: image-based authentication

Search Result 139, Processing Time 0.034 seconds

A Study on SVD & DWT -based watermarking for protecting rightful ownership (정당한 소유권 보호를 위한 DWT와 SVD기반의 디지털 워터마킹에 대한 연구)

  • 구대욱;한수영;이동규;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1815-1818
    • /
    • 2003
  • Digital watermarking is technique, which owner's information is inserted in digital image, with intention to protecting a copyright of digital image. In watermarking for copyright and authentication, watermark shouldn't be distorted or disappeared after general image processes like a compression and filtering. In this paper, we present a new digital image watermarking algorithm which combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD). Simulation results show that the newly proposed algorithm is not only robust nevertheless variable attacks like noise, filtering and JPEG compression but also secure in application.

  • PDF

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

A Margin-based Face Liveness Detection with Behavioral Confirmation

  • Tolendiyev, Gabit;Lim, Hyotaek;Lee, Byung-Gook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.187-194
    • /
    • 2021
  • This paper presents a margin-based face liveness detection method with behavioral confirmation to prevent spoofing attacks using deep learning techniques. The proposed method provides a possibility to prevent biometric person authentication systems from replay and printed spoofing attacks. For this work, a set of real face images and fake face images was collected and a face liveness detection model is trained on the constructed dataset. Traditional face liveness detection methods exploit the face image covering only the face regions of the human head image. However, outside of this region of interest (ROI) might include useful features such as phone edges and fingers. The proposed face liveness detection method was experimentally tested on the author's own dataset. Collected databases are trained and experimental results show that the trained model distinguishes real face images and fake images correctly.

Wavelet Based Intelligence image Watermarking Using Machine Vision of LabVIEW (LabVIEW의 Machine Vision을 이용한 웨이블릿 기반 지능형 이미지 Watermarking)

  • 송윤재;강두영;김형권;안태천
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.521-524
    • /
    • 2004
  • Recently, acgis of authentication and crcator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repealed through the entire image and adapted to the content of the image. Achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility and significant for invisible and robust watermark. We realize wavelet based image watermarking using Machine Vision of LabVIEW.

  • PDF

Improved CRT-based Image Watermarking in DCT Domain for Copyright Protection (저작권 보호를 위한 DCT 영역에서의 향상된 CRT 기반 영상 워터마킹)

  • Bae, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1163-1170
    • /
    • 2013
  • Digital watermarking techniques have been used as one of the means for copyright protection and authentication of multimedia data. Conventional Chinese Remainder Theorem(CRT)-based spatial domain watermarking techniques do not perform well under JPEG compression. However, it is seen that the CRT-based watermarking technique in Discrete Cosine Transform(DCT) domain performs well for JPEG compression. In this paper, an improved CRT-based image watermarking method in the DCT domain is proposed. The proposed method provides better robustness which decreases changes of absolute difference of residues against rounding errors due to DCT conversion and various attacks. Experimental results show that the proposed method has a good robustness against various attacks compared with the conventional CRT-based watermarking in DCT domain.

Implementation of Finger Vein Authentication System based on High-performance CNN (고성능 CNN 기반 지정맥 인증 시스템 구현)

  • Kim, Kyeong-Rae;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.197-202
    • /
    • 2021
  • Biometric technology using finger veins is receiving a lot of attention due to its high security, convenience and accuracy. And the recent development of deep learning technology has improved the processing speed and accuracy for authentication. However, the training data is a subset of real data not in a certain order or method and the results are not constant. so the amount of data and the complexity of the artificial neural network must be considered. In this paper, the deep learning model of Inception-Resnet-v2 was used to improve the high accuracy of the finger vein recognizer and the performance of the authentication system, We compared and analyzed the performance of the deep learning model of DenseNet-201. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly. There is no preprocessing for the image in the finger vein authentication system, and the results are checked through EER.

Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image (어깨너머 공격에 강한 PIN과 패턴 이미지 기반의 사용자 인증 방법)

  • Kim, Young-Sam;Kim, Soo-Hyung;Jin, Seung-Hun
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1138-1141
    • /
    • 2010
  • 모바일 기기나 ATM에서의 사용자 인증에는 PIN(Personal Identification Number)이 주로 사용된다. 그 이유는, PIN은 사용자가 외우기 쉽고 단순한 UI(User Interface)로 구현이 가능하다는 장점이 있기 때문이다. 하지만 PIN은 어깨너머 공격에 취약하다는 단점이 있다. 기존의 연구들은 이미지 기반, 인식 기반, PIN과 이미지의 혼합방식을 이용한 다양한 사용자 인증 방법들을 제안하였다. 하지만 이들 연구는 모바일의 작은 화면을 고려하지 않아 구현이 어렵거나, 어깨너머 공격에 취약하거나, 사용자에게 기억에 대한 부담을 증가시키는 등의 문제점이 있다. 본 논문에서는 PIN과 패턴 이미지를 결합하여 모바일 기기에 적합하면서, 어깨너머 공격에 대해 기존의 방법들에 비해 안전하고 사용자가 외워야 하는 기호(숫자, 이미지 등)가 적은 사용자 인증 방법을 제안한다.

3D Medical Image Data Watermarking Applied to Healthcare Information Management System (헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.870-881
    • /
    • 2009
  • The rapid development of healthcare information management for 3D medical digital library, 3D PACS and 3D medical diagnosis has addressed security issues with medical IT technology. This paper presents multiple 3D medical image data for protection, authentication, indexing and diagnosis information hiding applied to healthcare information management. The proposed scheme based on POCS watermarking embeds the robust watermark for doctor's digital signature and information retrieval indexing key to the distribution of vertex curvedness and embeds the fragile watermark for diagnosis information and authentication reference message to the distance difference of vertex. The multiple embedding process designs three convex sets for robustness, fragileness and invisibility and projects 3D medical image data onto three convex sets alternatively and iteratively. Experimental results confirmed that the proposed scheme has the robustness and fragileness to various 3D geometric and mesh modifiers at once.

Reversible Watermarking Based On Histogram Shifting (히스토그램 쉬프팅 기법을 이용한 리버서블 워터마킹)

  • Hwang, Jin-Ha;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.168-174
    • /
    • 2007
  • In this paper, we propose a reversible watermarking algorithm where an original image can be recovered from the watermarked image. Most watermarking algorithms cause degradation of image quality in original digital contents in the process of embedding watermarks. In the proposed algorithm, the original image can be obtained when the degradation is removed from the watermarked image after extracting watermark information. In the proposed algorithm, we utilize a peak point of image histogram and the location map and modify pixel values slightly to embed data. Because the peak point of image histogram and the location map are employed in this algorithm, there is no need of extra information transmitted to the receiving side. As the locations watermark embedding are identified using the location map, the amount of watermark data can increase through recursive embedding.

A Watermarking Technique using Block-based Wavelet Transform (블록 기반 웨이블릿 변환을 이용한 워터마킹 기법)

  • 이정수;김회율
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.290-299
    • /
    • 2000
  • In this paper, we introduce a watermarking technique using a block-based wavelet transform. Our objective is to achieve the invisibility of the watermark embedded into an image. That is, the difference between the original image and the watermarked image is perceptually invisible. Also, we propose a scheme that is robust to common Image processing by embedding the watermark into ail frequencies. Especially, we certified that the proposed watermarking algorithm was robust to JPEG compression and noise. In addition, our detection scheme can detect the manipulated area for the purpose of authentication. From the experimental results, we conclude that the proposed watermarking system satisfied the objectives proposed in this paper.

  • PDF