DOI QR코드

DOI QR Code

IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment

  • 조익현 (백석대학교 정보통신학부) ;
  • 이근호 (백석대학교 정보통신학부)
  • Cho, Ik-Hyun (Division of Information Communication, Baekseok University) ;
  • Lee, Keun-Ho (Division of Information Communication, Baekseok University)
  • 투고 : 2018.11.30
  • 심사 : 2019.02.20
  • 발행 : 2019.02.28

초록

현대에는 모든 사물, 기기들이 인터넷으로 연결되고 네트워크를 통해 IoT 제품을 쉽게 접하면서 IoT 제품을 사용하고 있다. 사용자들의 편리성을 위하여 원격으로 IoT 제품을 직접 조작하지 않고 자동으로 조작할 수 있다. 사용자들이 IoT 제품을 이용하여 생활의 편리성을 향상하기 위한 다양한 연구개발이 진행되고 있다. 하지만 사용자의 편리성만을 추구하다 보니 보안적인 측면에서는 사용자의 개인정보 노출이 되는 심각한 문제가 발생하고 있다. 본 논문에서는 IoT 제품에 무아레 기술을 적용하는 방법을 제안하여 보안의 성능을 향상하고, 무아레 현상 방법인 그림자식 무아레, 영사식 무아레를 이용한 사용자 얼굴 인증으로 IoT 제품의 안전성을 높이는 방법을 제안한다. 기존의 IoT 제품과 무아레 기술이 적용된 IoT 제품을 비교해 보면 무아레 기술이 적용된 IoT 제품이 보안적인 측면에서 안전하다.

In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

키워드

DJTJBT_2019_v17n2_171_f0001.png 이미지

Fig. 1. Moire pattern

DJTJBT_2019_v17n2_171_f0003.png 이미지

Fig. 2. Experimental set-up

DJTJBT_2019_v17n2_171_f0004.png 이미지

Fig. 3. Topology plot of a strain and a datum

DJTJBT_2019_v17n2_171_f0005.png 이미지

Fig. 4. Projection moire a flow chart

DJTJBT_2019_v17n2_171_f0006.png 이미지

Fig. 5. Measurement flow chart

DJTJBT_2019_v17n2_171_f0007.png 이미지

Fig. 6. Measurement flow chart

Table 1. IoT comparative table

DJTJBT_2019_v17n2_171_t0001.png 이미지

참고문헌

  1. H. Kang, B. R. Lee & T. Y. Kim. (2001). Data Encryption Using the Morie Patterns. KOREA INFORMATION SCIENCE SOCIETY, 28(21), 670-672. DOI : 10.12811/JKCS.201.11.2.129
  2. Y. H. Kim, J. K. Yang & H. B. Kim. (2014). Trends in M2M/IoT and Security Threats. Korea Institute Of Information Security And Cryptology, 24(6), 48-59. http://www.dbpia.co.kr/Article/NODE06073336
  3. S. H. PARK. (2017). A Design of secure and efficient authentication scheme using bioinformation in IoT environment. Paper of Masters degree. Soongsil University, Seoul.
  4. W. J. Ryu, Y. J. Kang & Y. K. Kwon. (1997). Improvement of accuracy of surface measurement in the phase-shifting shadow moire method. Korean Society Of Precision Engineering, 402-406. http://www.dbpia.co.kr/Article/NODE00860399
  5. C. R Seo, J. P. Lee, K. H. Lee, Y. B. Jeon & J. S. Park. (2017). A Proposal for Improvement of Detection of User Based on Facial, Authentication Using Digital Projection Moire. Journal of Spring Conference, 24(1), 366-367.
  6. W. J. Ryu & Y. J. Kang. (2005). Shape Measurement Method by using Moire Phenomenon. Journal of the Korean Society for Precision Engineering, 22(4), 7-12. http://www.dbpia.co.kr/Article/NODE00855874
  7. S. W. Kim, Y. B. Choi, J. T. Oh & M. S. Jung. (1998). Phase-shifting Grating Projection Moire Topography. Transactions of the Korean Society of Mechanical Engineers, 22(5), 850-857. http://www.dbpia.co.kr/Article/NODE00340770
  8. J. W. Joo, S. I. Kang, M. K. Kim & J. Y. Park. (2009). Measurements of Human Body Abdomen Using Shadow Moire in Laboratory. Journal of Industrial Science and Technology Institute, 23(2), 75-84.
  9. Y. H. Shin. (2016). A Study on the Security Technology of Real-time Biometric Data in IoT Environment. Journal of the Korea Society of Computer and Information, 21(1), 85-90. http://www.dbpia.co.kr/Article/NODE06597823 https://doi.org/10.9708/JKSCI.2016.21.1.085
  10. D. H. Kim, S. O. Yun & O. P. Iee, (2013). Security for IoT service. The Journal of The Korean Institute of Communication Sciences, 30(8), 53-59. http://www.dbpia.co.kr/Article/NODE02235872
  11. W. J. Ryu, J. P. Choi, J. K. An & Y. J. Kang. (2001). A Study on the Virtual Grating Projection Moire Topography for the Shape Measurement of Human Face. Korean Society Of Precision Engineering, 49-52. http://www.dbpia.co.kr/Article/NODE00864760
  12. W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2007). A Study on 3-D Shape Measurement and Application by Using Digital Projection Moire (II). Journal of the Korean Society for Precision Engineering, 24(5), 62-67. http://www.dbpia.co.kr/Article/NODE00845858
  13. Y. J. Kang, W. J. Ryu & Y. K. Kwon. (1998). A Study on the Improvement of Accuracy of Surface Measurement in the Phase-Shifting Shadow Moire Method. Journal of the Korean Society for Precision Engineering, 15(10), 96-102. http://www.dbpia.co.kr/Article/NODE01695695
  14. W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2005). A Study on 3-D Shape Measurement and Application by using Digital Projection Moire(I). Journal of the Korean Society for Precision Engineering, 22(7), 88-93. http://www.dbpia.co.kr/Article/NODE00855484
  15. D. H. LEE & N. J. BARK. (2016). Security certification and security management plan for IoT products. The Journal of The Korean Institute of Communication Sciences, 33(12), 28-34. http://www.dbpia.co.kr/Article/NODE07065797