• Title/Summary/Keyword: 인증기법

Search Result 1,456, Processing Time 0.029 seconds

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment (씬클라이언트 환경에서 클라우드 컴퓨팅을 이용한 N-Screen 세션 관리 기반의 N-Screen 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.21-32
    • /
    • 2012
  • We develop architecture of a virtual aggregation gateway (VAG) which enables composite application streaming based on N-Screen-as-a-Service (NaaS) using cloud computing in thin-client environment. We also discuss the problem of server computing burden in large scale multi-client case for screens sharing with composite application streaming over the internet. In particular, we propose an efficient Framework of N-Screen Session Manager which manages all media signaling that are necessary to deliver demanded contents. Furthermore, it will provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers. The objectives of proposing N-Screen Session Manager are to (1) manage session status of all communication sessions (2) manage handling of received request and replies (3) allow users to playback multimedia contents anytime with variety of devices for screen sharing and (4) allow users to transfer an ongoing communication session from one device to another. Furthermore, we discuss the major security issues that occur in Session Initiation Protocol as well as minimizing delay resulted from session initiations (playback or transfer session).

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

On the Optimal Selection of Wireless Access in Interoperating Heterogeneous Wireless Networks (3G/WLAN/휴대인터넷 연동상황을 고려한 사용자의 최적 무선접속서비스 선택방법에 대한 연구)

  • Cho Geun-Ho;Choe Jin-Woo;Jun Sung-Ik;Kim Young-Sae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.456-477
    • /
    • 2006
  • Due to advances in wireless communication technology and increasing demand for various types of wireless access, cellular, WLAN, and portable internet(such as WiBro and IEEE 802.16) systems are likely to be integrated into a unified wireless access system. This expectation premises the availability of multi-mode handsets and cooperative interworking of heterogenous wireless access networks allied by roaming contracts. Under such environments, a user may lie in the situation where more than one wireless accesses are available at his/her location, and he/she will want to choose the 'best' access among them. In this paper, we define the 'best' access(es) as the access(es) that charges minimum cost while fulfilling the required QoS of wireless access, and address the problem of choosing the optimal set of accesses theoretically by introducing a graph representation of service environment. Two optimal selection algorithms are proposed, which individually consider cases where single or multiple wireless access can be supported by multi-mode handsets.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Analysis of the Present Status and Characteristics of Environmental Product Declaration of Ready-mixed Concrete (레디믹스트 콘크리트의 환경성적표지 현황 및 특성 분석)

  • Kim, Rak-Hyun;Kim, Gwang-Hyun;Park, Won-Jun;Roh, Seung-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.2
    • /
    • pp.137-148
    • /
    • 2022
  • Recently, in the concrete industry, the development and commercialization of low-carbon products of ready-mixed concrete have emerged as part of the efforts to realize carbon neutrality. This study aims to investigate the current status of environmental product declaration(EPD) of ready-mixed concrete and to analyze the characteristics of carbon emissions by compressive strength, life cycle stage, and region. To this end, the related certification system requiring the calculation of carbon emissions in the concrete industry was analyzed. The target of analyzing the current status of carbon emissions was set as a product of ready-mixed concrete that acquired EPD certification based on the life cycle assessment method. In addition, the trend of carbon emissions according to each characteristic was reviewed by analyzing carbon emissions by the life cycle of ready-mixed concrete products, analyzing carbon emissions by standard, and analyzing carbon emissions by region. As a result, the carbon emissions in the pre-production stage were 99% compared to total carbon emissions., and as it increased from 18MPa to 40MPa, carbon emissions also increased. Even with the same specifications, the carbon emissions in the capital region were higher than in the southern region.

Development of Thickness Measurement Method From Concrete Slab Using Ground Penetrating Radar (GPR 기반 콘크리트 슬래브 시공 두께 검측 기법 개발)

  • Lee, Taemin;Kang, Minju;Choi, Minseo;Jung, Sun-Eung;Choi, Hajin
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.3
    • /
    • pp.39-47
    • /
    • 2022
  • In this paper, we proposed a thickness measurement method of concrete slab using GPR, and the verification of the suggested algorithm was carried out through real-scale experiment. The thickness measurement algorithm developed in this study is to set the relative dielectric constant based on the unique shape of parabola, and time series data can be converted to thickness information. GPR scanning were conducted in four types of slab structure for noise reduction, including finishing mortar, autoclaved lightweight concrete, and noise damping layer. The thickness obtained by GPR was compared with Boring data, and the average error was 1.95 mm. In order to investigate the effect of finishing materials on the slab, additional three types of finishing materials were placed, and the following average error was 1.70 mm. In addition, sampling interval from device, the effect of radius on the shape of parabola, and Boring error were comprehensively discussed. Based on the experimental verification, GPR scanning and the suggested algorithm have a great potential that they can be applied to the thickness measurement of finishing mortar from concrete slab with high accuracy.

Person Identification based on Clothing Feature (의상 특징 기반의 동일인 식별)

  • Choi, Yoo-Joo;Park, Sun-Mi;Cho, We-Duke;Kim, Ku-Jin
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • With the widespread use of vision-based surveillance systems, the capability for person identification is now an essential component. However, the CCTV cameras used in surveillance systems tend to produce relatively low-resolution images, making it difficult to use face recognition techniques for person identification. Therefore, an algorithm is proposed for person identification in CCTV camera images based on the clothing. Whenever a person is authenticated at the main entrance of a building, the clothing feature of that person is extracted and added to the database. Using a given image, the clothing area is detected using background subtraction and skin color detection techniques. The clothing feature vector is then composed of textural and color features of the clothing region, where the textural feature is extracted based on a local edge histogram, while the color feature is extracted using octree-based quantization of a color map. When given a query image, the person can then be identified by finding the most similar clothing feature from the database, where the Euclidean distance is used as the similarity measure. Experimental results show an 80% success rate for person identification with the proposed algorithm, and only a 43% success rate when using face recognition.

Comparison of The Importance of Evaluation Items for Landscape Performance and Sustainability Using Analytic Network Process (ANP) (ANP기법을 이용한 조경성능 및 친환경 평가항목 중요도 비교)

  • Ryu, Myeung-Ji;Lee, Hyung-Sook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.6
    • /
    • pp.45-52
    • /
    • 2019
  • As international criteria and standards are required in the fields of design and construction, landscape performance must also be considered not only for the value of the landscape but also for providing quality assurance and sustainability. Given the lack of research on landscape performance, the present research was purposed to analyze the importance of potential assessment categories and items using an analytical network process. A list of assessment items, which is composed of 20 items and 6 categories, was derived through a literature review and a preliminary survey of 11 landscape professionals. An ANP model was established and a survey was conducted among 30 landscape practitioners to determine the weight of priorities considering the criteria. The results of ANP showed that the categories of site selection, preservation and health, and convenience had high priorities while materials had the lowest importance score. For the assessment items, a monitoring plan was the highest importance, followed by cultural/ historic preservation, management cost reduction, and natural ground areas. Despite the difficulties in quantifying landscape achievements, most respondents agreed that there needs to be an evaluation system for landscape performance in order to assure the quality and sustainability of landscape development. More research and discussion are needed to develop an assessment system for landscape performance that is applicable to Korean context.