• Title/Summary/Keyword: 지문방식

Search Result 139, Processing Time 0.027 seconds

An effective method for comparing similarity of document with Multi-Level alignment (다단계정렬을 활용한 효율적인 문서 유사도 비교법)

  • Seo, Jong-Kyu;Hwang, Hae-Lyen;Cho, Hwan-Gue
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.402-405
    • /
    • 2012
  • 문서와 문서간의 유사도들 측정하는 방법 은 크게 지문법 (fingerprint)을 이용한 방법과 서열 정렬(sequence alignment)알고리즘을 이용한 방법이 있다. 두 방법은 각각 속도와 정확도라는 장점을 가지고 있다. 다단계정렬(MLA, Multi-Level alignment))는 이러한 두 방법을 조합하여 탐색 속도와 정확도 사이의 비중을 사용자가 결정할 수 있도록 하기 위한 방법이다.[1] 다단계 정렬은 두 문서를 단위 블록(basis block)로 나누고 블록 간의 벡터를 비교하여 유사도를 측정하게 되는데, 본 연구에서는 초성 추출 및 어간 추출을 통해 단위 블록의 벡터를 빠른 시 간에 생성하고 비교하는 방법과 다단계 탐색을 통해 정확도를 유지하면서 빠르게 유사도를 측정하는 방식에 대해 설명한다. 실험결과 제안 방법을 통해 다단계 정렬 방법을 이용한 대용량 문서 비교의 속도가 2 배 이상 빨라짐을 보인다.

An Input Method for Decimal Password Based on Eyeblink Patterns (눈깜빡임 패턴에 기반한 십진 패스워드 입력 방법)

  • Lee, Seung Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.656-661
    • /
    • 2022
  • Password with a combination of 4-digit numbers has been widely adopted for various authentication systems (such as credit card authentication, digital door lock systems and so on). However, this system could not be safe because the 4-digit password can easily be stolen by predicting it from the fingermarks on the keypad or display screen. Furthermore, due to the prolonged COVID-19 pandemic, contactless method has been preferred over contact method in authentication. This paper suggests a new password input method based on eyeblink pattern analysis in video sequence. In the proposed method, when someone stands in front of a camera, the sequence of eyeblink motions is captured (according to counting signal from 0 to 9 or 9 to 0), analyzed and encoded, producing the desired 4-digit decimal numbers. One does not need to touch something like keypad or perform an exaggerated action, which can become a very important clue for intruders to predict the password.

A musical study on Kangwon Sangkangrye - Focusing on the perfoming style of Chogye Order - ('강원상강례(講院上講禮)'의 음악적 연구 - 조계종을 중심으로 -)

  • Cha, Hyoung-Suk
    • (The) Research of the performance art and culture
    • /
    • no.37
    • /
    • pp.391-435
    • /
    • 2018
  • This is the first study in Musicology that discusses the features of Kangwon Sangkangrye(the pre-lecture ritual in Buddhism). In this thesis, I reviewed and compared the similarity and uniqueness between Kangwon Sangkangrye in "Seokmunuibom" and the one being performed these days. The musical relation between the performance shown in the historical record and the one in contemporary ritual was illustrated here based on the findings derived from the anlaysis on its bell(小鐘) performance. The analysis made upon musical sources recorded on-site shows the characteristics of contemporary Kangwon Sangkangrye. Following is a brief summary of this study. The review and comparison between Kangwon Sangkangrae in "Seokmunuibom" and the one being performed these days showed that the second type, which was significantly different from the first type, was closer to that of the historical record. The performers at Unmunsa Temple and Chungamsa Temple seemed to be following the tradition bell(小鐘) performance style which was found in the text of the historical record. Through the analysis on Kangwon Sangkangrae, I found that it has musical characteristics as follows. The vocal range of type 1 and type 2 was mostly performed within Minor 7th and didn't exceed the perfect 8th. The melodic structure of type 1 starts with do'-la of naedeureum and ended with the melody which downscaled from do' and finalized from mi to la. Usually the mode was in menari-tori but at some lecture halls a few cases found to be upscaled from sol to la which differentiates it from the typical menari-tori of folk songs. Like the typical way of traditional rites, the singing was divided into two parts: the leading call and the following choral response. Most were sung to be one syllable on one or two tones or one syllable lasting for several tones and the musical forms were varied by musical pieces. Meantime, Sangkangrae at Haeinsa Temple was differed from that of the other temples in terms of ritual procedure and vocal style. It added Korean version of and the lead vocal skipped the first phrase of the Sasul. The melodic structure of Type 2 started with do'-la of naedeureum and was finalized as the same way of Type 1. The mode of was not the same as typical menari-tori but the Jeongrye(prostration) and Balweon(a great vow) were identical to the menari-tori of folk songs. The singing was done in two forms, solo and unison, and the lyric-attachment of Gesong was one syllable for one or two tones and that of Jeongrye and Balweon were one syllable for one or two tones + one syllable for several tones. The musical form of Jeongrye is A-B-C and A-C. Balweon didn't display a certain periodicity but still maintained sense of unity and formality through repetition of the finalizing melody.

Expansion of Personal Identification to Vitalize the Use of Unmanned Civil Service Issuing Machines for Gongju-si (공주시 무인민원발급기 이용 활성화를 위한 신분 확인 확대 방안)

  • Kim, Eui Seok;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.156-158
    • /
    • 2021
  • An initial local government center received direct asking from citizens, wrote the documents by hand, and issued them. Later the appearance of computers, printers, and faxes made it possible to handle civil complaints through copying. Since 2010, as the e-government has started, entering civil service requests into computers after identification by themselves and printing the results has become established. In addition, with the introduction of unmanned administrative services, civil services become available in various places, which causes the increased satisfaction of citizens. One of the services is an unmanned civil service issuing machine, and more than 20 kinds of documents, including a copy of resident registration, can be issued directly. Of course, additional help may be needed if citizens are not familiar with the latest technologies. However, the unmanned civil service issuing machine is a highly satisfactory way in that it is less time-limited as citizens can visit a community center or city hall after the end of work. However, the main problem is that resident registration numbers and fingerprint recognition are required depending on the type of issuance, which increases the inconvenience of handling citizen complaints and is shunned. To solve this problem, we aim to study a method for improving the fingerprint recognition method of unmanned civil service issuing machines by expanding personal identification.

  • PDF

A Study on Secure Mobile Payment Service for the Market Economy Revitalization (시장 경제 활성화를 위한 안전한 모바일 전자결제 방안 연구)

  • Kim, Hyung-Uk;Jung, Yong-Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.41-48
    • /
    • 2017
  • Recently, there has been a lot of ongoing research regarding financial transactions and payments due to the emergence of financial technology (FinTech). Payments have been processed through cash and credit cards, and payment methods have been simplified and are more convenient, with mobile payment via mobile cards and mobile phones. This study offers a new mobile payment method by using a mobile phone instead of a card reader or terminal. For payments, authentication is processed with the user's biometrics and a built-in fingerprint scanner, and the payment is processed after receiving an authentication code issued by the authorizing institution to confirm the user's identity. User biometrics and payment information is secured from any kind of malicious hacker by saving it in a Fast Identity Online (FIDO) Trusted Execution Environment (TEE) section in a smartphone. Regarding key security, every key is securely created in the FIDO TEE section, providing secure mobile payment by neutralizing various malicious attacks, including sniffing and the man-in-the middle attack.

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.

Enhancing the problem of password-based authentication using FIDO (FIDO를 활용한 패스워드 기반 인증방식의 문제점 개선 연구)

  • Lee, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.620-623
    • /
    • 2022
  • 최근 이메일 해킹사고의 유형을 살펴보면 사회공학적인 기법을 활용한 피싱메일 공격이 대다수를 차지하고 있는 상황이다. 그중 사용자의 패스워드를 빼내기 위한 공격메일이 기존 첨부파일에 악성코드를 삽입해서 보내지는 방식보다 월등히 높아졌다고 할 수 있다. 이는 공격자가 이메일 내용에 관심이 높아진 것으로 이메일은 사용자의 성향, 직업, 라이프스타일 파악뿐만 아니라 해커가 원하는 중요자료가 저장되어 있을 가능성이 매우 높으며 또 다른 공격대상자를 선정할 수 있는 좋은 창구가 될 수 있을 것이기 때문이다. 만일 피싱메일에 노출되어 패스워드가 해커의 손에 넘어 갔다면 많은 보안대책이 무용지물이 된다. 많은 보안 전문가들은 패스워드를 8자리 이상으로 하되 영문대·소문자와 숫자 그리고 특수문자를 포함하고, 사이트별 규칙성이 없이 모두 다르게 설정해야 하며, 정기적으로 바꿔야 한다고 조언한다. 이러한 조언은 패스워드를 크랙할 경우 안전할 수 있지만 요즘처럼 한 개인이 100여개 이상의 사이트에 대한 패스워드를 관리해야 한다면 현실적으로 불가능한 조언이 되고 말 것이다. 이러한 상황에 2017년 6월 미국 국립표준기술연구소(NIST)에서 '특별 간행 800-63-3: 디지털 인증 가이드라인'을 발표하게 된다. 내용은 그동안 보안전문가들이 권고했던 내용과는 많은 차이가 있다. 오히려 자주 바꾸는 것이 문제가 될 수 있다는 내용이다. 자세한 내용은 본 논문에서 살펴보도록 한다. 우리는 스마트폰 등을 사용함으로써 2-Factor인증에 활용하고 있다. 스마트폰 인증의 대표적인 방법은 지문·얼굴인식 등 생체인증 방식을 사용한다. 패스워드 없이도 편리하고 안전하게 인증을 할 수 있다는 점이 장점이다. 이러한 상황에 FIDO라는 인증 프레임워크가 인기를 얻고 있다. FIDO(Fast IDentity Online)는 비밀번호의 문제점을 해결하기 위한 목적으로 FIDO 얼라이언스에 의해 제안된 사용자 인증 프레임워크다. 향후 FIDO로의 대체가 패스워드 문제의 대안이 될 수 있을 것이다. 이제는 패스워드 대신 생체인증 체계로 대체할 수 있는 시대가 되었다고 할 수 있다. 본 논문에서는 패스워드의 문제점을 살펴보고 이를 대체할 수 있는 FIDO기반의 인증체계가 대안이 될 수 있는 근거를 제시하고자 한다.

  • PDF

System for Real-time Vissage Certification (실시간 얼굴인식 시스템)

  • Lee, In-Seong;Hong, Young-Min;Song, Young-Cheol;Kim, Ji-Chan;Hong, Jeongn-Jo
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1997-1998
    • /
    • 2011
  • 범용적으로 쓰여지고 있는 id카드를 이용한 출입방식의 경우 카드 분실, 미소지시 또는 손상시 불편함을 초래하며 실질적인 보안의 효과를 기대하기에는 부족한 부분이 많은 실정이다. 또한 전국에 사업장을 가지고 있는 기업의 경우는 보안업체별 소스코드를 공개하지 않음에 따라 id카드를 통일하기 위하여 최초 설치 업체에 종속되는 문제점도 가지고 있다. 그리고 지문인식, 홍체인식 및 정맥인식 등은 출입통제시스템 자체의 단점과 더불어 이용자들의 불편함 그리고 정보수집에 따른 불쾌감을 발생하는 문제점을 가지고 있다. 이러한 단점을 극복할수 있는 얼굴인식 시스템의 경우 다양한 상황에서의 얼굴 검출 및 정보 처리등에 대한 문제점이 있어 정지화상이나 신분증에 화상데이타를 입력하여 비교하는 방법등에 대한 실용화가 많이 되어지고 있는 실정이나 이 역시 id카드가 없으면 출입이 허가되지 않는다는 문제점이 있다. 이러한 문제점을 극복하고 자연스러운 상태에서 인증 및 출입이 허가된다면 가장 이상적이고 경제적인 출입통제시스템 구축이 가능하므로 본 논문에서는 위 문제점에 대한 대안을 제시하고 증명을 통하여 현장에서 충분이 적용될 수 있음을 입증하고자 한다.

  • PDF

An Off-line Signature Verification Using PCA and LDA (PCA와 LDA를 이용한 오프라인 서면 검증)

  • Ryu Sang-Yeun;Lee Dae-Jong;Go Hyoun-Joo;Chun Myung-Geun
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.645-652
    • /
    • 2004
  • Among the biometrics, signature shows more larger variation than the other biometrics such as fingerprint and iris. In order to overcome this problem, we propose a robust offline signature verification method based on PCA and LDA. Signature is projected to vertical and horizontal axes by new grid partition method. And then feature extraction and decision is performed by PCA and LDA. Experimental results show that the proposed offline signature verification has lower False Reject Rate(FRR) and False Acceptance Rate(FAR) which are 1.45% and 2.1%, respectively.