• Title/Summary/Keyword: 오거부율

Search Result 8, Processing Time 0.023 seconds

A Study on Face Recognition using Hierarchical Classification of Facial Principal Component (얼굴 주성분의 계층적 분류를 이용한 얼굴인식에 관한 연구)

  • Choi, Jae-Young;Kim, Nak-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.649-652
    • /
    • 2002
  • PCA 방법은 입력 차원을 수학적으로 줄일 수 있는 장점 때문에 패턴인식 부분에서 널리쓰이고 있다. 얼굴인식에서의 PCA는 학습 패턴의 분산을 최대로 하는 기저 벡터들인 고유얼굴을 만들어 얼굴인식이 필요한 영상을 이 기저 벡터에 투사시켜 이때 나온 인자들과 원래 각 개인의 대표 인자값과의 거리 비교로 얼굴을 인식하는 방법이다. 그러나 조명등의 영향에 매우 민감하며 거리값으로 얼굴을 인식하기 때문에 다양한 변화에 따라 오인식률이 높아진다. 이는 인식률을 높이고자 임계값을 높게 설정하는 과정에서 발생하는 오류이며, 이를 방지하기 위해 임계치를 낮게 설정하면 오거부율이 높아진다. 이에 본 연구에서는 PCA에 입력되는 패턴들을 사전에 비교, 분류하여 PCA 연산시에 분산과 변위를 최대한으로 가질 수 있도록 하였다. 그러하여, 기존의 PCA보다 상당히 낮은 임계값으로도 오거부율의 증가를 막았으며, 낮은 임계값 설정으로 인하여 오인식률을 낮추는 결과를 얻을 수 있었다. 이는 기존의 PCA 방법을 사용하는 인식시스템에서 종종 발생하는 허가되지 않아야 하는 외부인을 인증시키는 사례를 줄일 수 있다.

  • PDF

Fingerprint Identification Algorithm using Pixel Direction Factor in Blocks (블록별 화소방향성분을 이용한 지문의 동일성 판별 알고리즘)

  • Cho Nam-Hyung;Lee Joo-Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.123-130
    • /
    • 2005
  • In this paper, fingerprint identification algorithm using pixel direction factor in blocks is proposed to minimize false acceptance ratio and to apply security system. The proposed algorithm is that a fingerprint image is divided by 16 blocks, then feature parameters which have direct factors of $0^{\circ},\;45^{\circ},\;90^{\circ}\;and\;135^{\circ}$ is extracted for each block. Membership function of a reference fingerprint and an input fingerprint for the extracted parameters is calculated, then identification of two fingerprint is distinguished using fuzzy inference. False acceptance ratio is evaluated about different fingerprints of In kinds regardless of sex and shape which are obtained from adults, and false rejection ratio is evaluated about fingerprints which are obtained by adding fingerprints of 10 kinds on different fingerprints of 100 kinds. The experiment results is that false acceptance ratio is average $0.34\%$ about experiment of 4,950 times, and false rejection ratio is average $3.7\%$ about experiment of 1,000 times. The proposed algerian is excellent for recognition rate and security.

A Study on the Multi-Modal Biometrics System (다중생체인식 시스템을 이용한 사용자인증에 관한 연구)

  • 서정우;민동옥;문종섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.301-303
    • /
    • 2003
  • 기존의 아이디와 패스워드를 이용한 사용자 인증방식의 문제점 및 한계를 해결하기 위하여 생체인식 기술 (Biometric technology)이 연구되었다. 하지만 단일 생체인식 기술은 오인식률(False Acceptance Rate), 오거부율(False Rejection Rate)등의 문제점을 가지고있다. 최근에 단일 생체인식 기술의 한계를 극복하고 사용자 인증 성능 향상과 신뢰도를 높이기 위하여 다중 생체 인식(Multi-modal biometrics)에 관한 연구개발이 활발하다. 이 논문은 지문인식과 얼굴인식 기술을 활용하여 사용자 인증을 수행함으로써 단일 시스템에서 발생하는 한계점을 극복함과 동시에 좀더 안정적인 사용자 인증이 가능한 방법을 제시한다.

  • PDF

Contactless Biometric Using Thumb Image (엄지손가락 영상을 이용한 비접촉식 바이오인식)

  • Lim, Naeun;Han, Jae Hyun;Lee, Eui Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.671-676
    • /
    • 2016
  • Recently, according to the limelight of Fintech, simple payment using biometric at smartphone is widely used. In this paper, we propose a new contactless biometric method using thumb image without additional sensors unlike previous biometrics such as fingerprint, iris, and vein recognition. In our method, length, width, and skin texture information are used as features. For that, illumination normalization, skin region segmentation, size normalization and alignment procedures are sequentially performed from the captured thumb image. Then, correlation coefficient is calculated for similarity measurement. To analyze recognition accuracy, genuine and imposter matchings are performed. At result, we confirmed the FAR of 1.68% at the FRR of 1.55%. In here, because the distribution of imposter matching is almost normal distribution, our method has the advantage of low FAR. That is, because 0% FAR can be achieved at the FRR of 15%, the proposed method is enough to 1:1 matching for payment verification.

An Off-line Signature Verification Using PCA and LDA (PCA와 LDA를 이용한 오프라인 서면 검증)

  • Ryu Sang-Yeun;Lee Dae-Jong;Go Hyoun-Joo;Chun Myung-Geun
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.645-652
    • /
    • 2004
  • Among the biometrics, signature shows more larger variation than the other biometrics such as fingerprint and iris. In order to overcome this problem, we propose a robust offline signature verification method based on PCA and LDA. Signature is projected to vertical and horizontal axes by new grid partition method. And then feature extraction and decision is performed by PCA and LDA. Experimental results show that the proposed offline signature verification has lower False Reject Rate(FRR) and False Acceptance Rate(FAR) which are 1.45% and 2.1%, respectively.

Wavelet Transform Technology for Translation-invariant Iris Recognition (위치 이동에 무관한 홍채 인식을 위한 웨이블렛 변환 기술)

  • Lim, Cheol-Su
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.459-464
    • /
    • 2003
  • This paper proposes the use of a wavelet based image transform algorithm in human iris recognition method and the effectiveness of this technique will be determined in preprocessing of extracting Iris image from the user´s eye obtained by imaging device such as CCD Camera or due to torsional rotation of the eye, and it also resolves the problem caused by invariant under translations and dilations due to tilt of the head. This technique values through the proposed translation-invariant wavelet transform algorithm rather than the conventional wavelet transform method. Therefore we extracted the best-matching iris feature values and compared the stored feature codes with the incoming data to identify the user. As result of our experimentation, this technique demonstrate the significant advantage over verification when it compares with other general types of wavelet algorithm in the measure of FAR & FRR.

A Study on Modified Clustering Algorithm for Text-Dependent Speaker Verification System (문장종속 화자확인 시스템을 위한 개선된 군집화 알고리즘에 관한 연구)

  • 강철호;정희석
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.7
    • /
    • pp.548-553
    • /
    • 2004
  • In this paper we propose modified LBG algorithm to minimize quantization errors. When we apply conventional LBG algorithm for speaker verification system, problems that result from small amount of training data can be generated. That is, quantization error comes from fixed-sized codebook without any consideration for speaker characteristics and splitting vector in the wrong direction worsen performance of speaker verification system. So, we propose modified clustering method that has variable sized codebook according to speaker characteristics and makes right splitting direction by finding the farthest member away from mean and then find another member from the member. Simulation results show effectiveness of the proposed algorithm.

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.