• Title/Summary/Keyword: 생체암호

Search Result 46, Processing Time 0.025 seconds

PKI-based Registration Authority using Efficient Human Iris Recognition Information (홍채 패턴 정보를 이용한 공개키 기반의 등록기관)

  • Lee, Kwan-Yong;Lim, Shin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.864-873
    • /
    • 2001
  • In this paper, a new approach to building a registration authority for issuing PKI-based certificates is presented to make the process of identifying an individual more secure and reliable by utilizing human iris recognition technology. The tasks of the proposed system associated with the manipulation of irises except for the general functions of registration authorities can be categorized into three modules, the acquisition of iris images, the registration of iris information, and the verification of users by means of iris patterns. The information among the three modules is safely exchanged through encryption and decryption with a symmetric cryptographic method. As a feature extraction method for a given iris image, a wavelet transform is applied to represent a feature vector with a small dimension of information obtained by subsampling an image corresponding to lower frequency bands successively without loss of information. Through the experiments on human iris recognition technology we proposed and applied to the registration authority, the potential of biometric technology in various applications is confirmed.

  • PDF

Revisiting Permutation Transformation Scheme for Cancelable Face Recognition (취소 가능한 얼굴 인식을 지원하는 치환 변환 기법에 대한 고찰)

  • Kim, Koon-Soon;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.37-46
    • /
    • 2006
  • It is known to be hard to apply cryptographic one-way functions to the recognition system using bio-information directly. As one of the solutions about that problem there is a permutation transformation scheme. However, they did not show my algorithmic behavior or any performance analysis of the transformation by experiment. In this paper, by showing the recognition ratio of the transformed scheme by experiment, we prove that that scheme is sound. Also, we adopt their transformation to LDA(Linear Discriminant Analysis) to show the experimental results. In the negative side, we introduce a new type of attack against the permutation transformation schemes. finally, we briefly mention a generalization of the permutation transformation for countermeasure of the attack at the end of this paper.

User Authentication Protocol preserving Enhanced Anonymity and Untraceability for TMIS

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.93-101
    • /
    • 2023
  • In this paper, as a result of analyzing the TMIS authentication protocol using ECC and biometric information proposed by Chen-Chen in 2023, there were security problems such as user impersonation attack, man-in-the-middle attack, and user anonymity. Therefore, this paper proposes an improved authentication protocol that provides user anonymity to solve these problems. As a result of analyzing the security of the protocol proposed in this paper, it was analyzed to be secure for various attacks such as offline password guessing attack, user impersonation attack, smart-card loss attack, insider attack, perfect forward attack. It has also been shown to provided user privacy by guaranteeing user anonymity and untraceability, which must be guaranteed in TMIS. In addition, there was no significant increase in computational complexity, so the efficiency of execution time was achieved. Therefore, the proposed protocol in this paper is a suitable user authentication protocol for TMIS.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Photosynthetic and Growth Responses of Chinese Cabbage to Rising Atmospheric CO2 (대기 중 CO2 농도의 상승에 대한 배추의 광합성과 생장 반응)

  • Oh, Soonja;Son, In-Chang;Wi, Seung Hwan;Song, Eun Young;Koh, Seok Chan
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.18 no.4
    • /
    • pp.357-365
    • /
    • 2016
  • The effects of elevated atmospheric $CO_2$ on photosynthesis and growth of Chinese cabbage (Brassica campestris subsp. napus var. pekinensis) were investigated to predict productivity in highland cropping in an environment where $CO_2$ levels are increasing. Vegetative growth, based on fresh weight of the aerial part, and leaf characteristics (number, area, length, and width) of Chinese cabbage grown for 5 weeks, increased significantly under elevated $CO_2$ ($800{\mu}mol{\cdot}mol^{-1}$) compared to ambient $CO_2$ ($400{\mu}mol{\cdot}mol^{-1}$). The photosynthetic rate (A), stomatal conductance ($g_s$), and water use efficiency (WUE) increased, although the transpiration rate (E) decreased, under elevated atmospheric $CO_2$. The photosynthetic light-response parameters, the maximum photosynthetic rate ($A_{max}$) and apparent quantum yield (${\varphi}$), were higher at elevated $CO_2$ than at ambient $CO_2$, while the light compensation point ($Q_{comp}$) was lower at elevated $CO_2$. In particular, the maximum photosynthetic rate ($A_{max}$) was higher at elevated $CO_2$ by 2.2-fold than at ambient $CO_2$. However, the photosynthetic $CO_2$-response parameters such as light respiration rate ($R_p$), maximum Rubisco carboxylation efficiency ($V_{cmax}$), and $CO_2$ compensation point (CCP) were less responsive to elevated $CO_2$ relative to the light-response parameters. The photochemical efficiency parameters ($F_v/F_m$, $F_v/F_o$) of PSII were not significantly affected by elevated $CO_2$, suggesting that elevated atmospheric $CO_2$ will not reduce the photosynthetic efficiency of Chinese cabbage in highland cropping. The optimal temperature for photosynthesis shifted significantly by about $2^{\circ}C$ under elevated $CO_2$. Above the optimal temperature, the photosynthetic rate (A) decreased and the dark respiration rate ($R_d$) increased as the temperature increased. These findings indicate that future increases in $CO_2$ will favor the growth of Chinese cabbage on highland cropping, and its productivity will increase due to the increase in photosynthetic affinity for light rather than $CO_2$.