Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.5.1085

Study of Biometrics using Tritone Paradox  

Jung, Changhoon (INHA University)
Shin, DongOh (INHA University)
Nyang, DaeHun (INHA University)
Lee, KyungHee (The University of Suwon)
Abstract
In music theory, the triton is defined as a musical interval composed of three adjacent whole tones(or six semitones), which generates a harmonic and melodic dissonance. The triton paradox is an auditory illusion which is heard as ascending by some people and as descending by others. In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing uniqueness and consistency through the user experiences. We also propose some authentication schemes which provides protection against key logging, shoulder surfing, and brute force attacks.
Keywords
Biometrics; Tritone Paradox; Authentication Protocol; Auditory Sense;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 B. Lee, "A Study on the High-speed Iris Recognition System," Master Thesis, Graduate School of Kyung Hee University, Aug. 2011.
2 D. Moon, S. Jung, T. Kim, Y. Chung and K. Moon, "An Watermarking Algorithm for Multimodal Biometric Systems," Korea Institute of Information Security and Cryptology, Vol. 15, No, 4, pp. 93-100, Aug. 2005.
3 D. Nyang, A. Mohaisen and J. Kang, "Keylogging-resistant Visual Authentication Protocols," Transactions on Mobile Computing, Vol. 1, No. 8, pp. 2566-2579, Nov. 2014.
4 R. Plamondon and G. Lorette, "Automatic Signature Verification And Writer Identification - The State Of The Art," Pattern Recognition, Vol. 22, No. 2, pp. 107-131, 1989.   DOI
5 D. Deutsch, "A Musical Paradox," Music Perception, Vol. 3, No. 3, pp. 275-280, 1986.   DOI
6 D. Deutsch, "The Tritone Paradox: An Influence of Language on Music Perception," Music Perception, 8, pp. 335-347, 1991.   DOI
7 W. Suh and B. Hong, "The tritone paradox : Its presence and form of distribution in Korean people," Psychological Science, Vol. 7, No. 1, pp. 65-74, 1998.
8 T. Matsumoto, H. Matsumoto, K. Yamada and S. Hoshino, "Impact of Artificial "Gummy" Fingers on Fingerprint Systems," Proceedings of SPIE, Vol. 4677, pp. 275-289, Apr. 2002.
9 R.A. Virginia, T.G. Pedro, A.F. Fernando, G. Javier, F. Julian and O.G. Javier, "Direct Attacks Using Fake Images in Iris Verification," Lecture Notes in Computer Science, Vol. 5372, pp. 181-190, 2008.
10 K. Cho, "A Legislative Study on the Protection of Biometric Information," Korean Public Law Association, Vol. 37, No. 1-2, pp. 181-200, Oct. 2008.
11 S. Kim, "A Study on Authentication Technics Using Biometrics," Master Thesis, Graduate School of Hanyang University, Feb. 2006.
12 G. Yadav and C. Kant, "Biometric Security: A Grand Challenge," International journal of Computer Science & Communication, Vol. 4, No. 2, pp. 27-31, Sep. 2013.
13 W. Eom and I. Jeon, "Development for Reliability Quality and Performance Evaluate Model of Fingerprint Recognition System," Journal of Korea Contents Association, Vol. 11, No. 2, pp. 79-87, Feb. 2011.   DOI
14 A.K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, Vol. 2008, No. 113, Jan. 2008.