Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.2.171

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment  

Cho, Ik-Hyun (Division of Information Communication, Baekseok University)
Lee, Keun-Ho (Division of Information Communication, Baekseok University)
Publication Information
Journal of Digital Convergence / v.17, no.2, 2019 , pp. 171-176 More about this Journal
Abstract
In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.
Keywords
Iot; Moire; Shadow moire; Projection moire; Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. Kang, B. R. Lee & T. Y. Kim. (2001). Data Encryption Using the Morie Patterns. KOREA INFORMATION SCIENCE SOCIETY, 28(21), 670-672. DOI : 10.12811/JKCS.201.11.2.129   DOI
2 Y. H. Kim, J. K. Yang & H. B. Kim. (2014). Trends in M2M/IoT and Security Threats. Korea Institute Of Information Security And Cryptology, 24(6), 48-59. http://www.dbpia.co.kr/Article/NODE06073336
3 S. H. PARK. (2017). A Design of secure and efficient authentication scheme using bioinformation in IoT environment. Paper of Masters degree. Soongsil University, Seoul.
4 W. J. Ryu, Y. J. Kang & Y. K. Kwon. (1997). Improvement of accuracy of surface measurement in the phase-shifting shadow moire method. Korean Society Of Precision Engineering, 402-406. http://www.dbpia.co.kr/Article/NODE00860399
5 C. R Seo, J. P. Lee, K. H. Lee, Y. B. Jeon & J. S. Park. (2017). A Proposal for Improvement of Detection of User Based on Facial, Authentication Using Digital Projection Moire. Journal of Spring Conference, 24(1), 366-367.
6 J. W. Joo, S. I. Kang, M. K. Kim & J. Y. Park. (2009). Measurements of Human Body Abdomen Using Shadow Moire in Laboratory. Journal of Industrial Science and Technology Institute, 23(2), 75-84.
7 W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2005). A Study on 3-D Shape Measurement and Application by using Digital Projection Moire(I). Journal of the Korean Society for Precision Engineering, 22(7), 88-93. http://www.dbpia.co.kr/Article/NODE00855484
8 D. H. LEE & N. J. BARK. (2016). Security certification and security management plan for IoT products. The Journal of The Korean Institute of Communication Sciences, 33(12), 28-34. http://www.dbpia.co.kr/Article/NODE07065797
9 W. J. Ryu & Y. J. Kang. (2005). Shape Measurement Method by using Moire Phenomenon. Journal of the Korean Society for Precision Engineering, 22(4), 7-12. http://www.dbpia.co.kr/Article/NODE00855874
10 S. W. Kim, Y. B. Choi, J. T. Oh & M. S. Jung. (1998). Phase-shifting Grating Projection Moire Topography. Transactions of the Korean Society of Mechanical Engineers, 22(5), 850-857. http://www.dbpia.co.kr/Article/NODE00340770
11 W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2007). A Study on 3-D Shape Measurement and Application by Using Digital Projection Moire (II). Journal of the Korean Society for Precision Engineering, 24(5), 62-67. http://www.dbpia.co.kr/Article/NODE00845858
12 Y. H. Shin. (2016). A Study on the Security Technology of Real-time Biometric Data in IoT Environment. Journal of the Korea Society of Computer and Information, 21(1), 85-90. http://www.dbpia.co.kr/Article/NODE06597823   DOI
13 D. H. Kim, S. O. Yun & O. P. Iee, (2013). Security for IoT service. The Journal of The Korean Institute of Communication Sciences, 30(8), 53-59. http://www.dbpia.co.kr/Article/NODE02235872
14 W. J. Ryu, J. P. Choi, J. K. An & Y. J. Kang. (2001). A Study on the Virtual Grating Projection Moire Topography for the Shape Measurement of Human Face. Korean Society Of Precision Engineering, 49-52. http://www.dbpia.co.kr/Article/NODE00864760
15 Y. J. Kang, W. J. Ryu & Y. K. Kwon. (1998). A Study on the Improvement of Accuracy of Surface Measurement in the Phase-Shifting Shadow Moire Method. Journal of the Korean Society for Precision Engineering, 15(10), 96-102. http://www.dbpia.co.kr/Article/NODE01695695