• Title/Summary/Keyword: 지문인식

Search Result 512, Processing Time 0.024 seconds

Development of a Sign Language Learning Assistance System using Mediapipe for Sign Language Education of Deaf-Mutility (청각장애인의 수어 교육을 위한 MediaPipe 활용 수어 학습 보조 시스템 개발)

  • Kim, Jin-Young;Sim, Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1355-1362
    • /
    • 2021
  • Recently, not only congenital hearing impairment, but also the number of people with hearing impairment due to acquired factors is increasing. The environment in which sign language can be learned is poor. Therefore, this study intends to present a sign language (sign language number/sign language text) evaluation system as a sign language learning assistance tool for sign language learners. Therefore, in this paper, sign language is captured as an image using OpenCV and Convolutional Neural Network (CNN). In addition, we study a system that recognizes sign language behavior using MediaPipe, converts the meaning of sign language into text-type data, and provides it to users. Through this, self-directed learning is possible so that learners who learn sign language can judge whether they are correct dez. Therefore, we develop a sign language learning assistance system that helps us learn sign language. The purpose is to propose a sign language learning assistance system as a way to support sign language learning, the main language of communication for the hearing impaired.

Enhancing the problem of password-based authentication using FIDO (FIDO를 활용한 패스워드 기반 인증방식의 문제점 개선 연구)

  • Lee, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.620-623
    • /
    • 2022
  • 최근 이메일 해킹사고의 유형을 살펴보면 사회공학적인 기법을 활용한 피싱메일 공격이 대다수를 차지하고 있는 상황이다. 그중 사용자의 패스워드를 빼내기 위한 공격메일이 기존 첨부파일에 악성코드를 삽입해서 보내지는 방식보다 월등히 높아졌다고 할 수 있다. 이는 공격자가 이메일 내용에 관심이 높아진 것으로 이메일은 사용자의 성향, 직업, 라이프스타일 파악뿐만 아니라 해커가 원하는 중요자료가 저장되어 있을 가능성이 매우 높으며 또 다른 공격대상자를 선정할 수 있는 좋은 창구가 될 수 있을 것이기 때문이다. 만일 피싱메일에 노출되어 패스워드가 해커의 손에 넘어 갔다면 많은 보안대책이 무용지물이 된다. 많은 보안 전문가들은 패스워드를 8자리 이상으로 하되 영문대·소문자와 숫자 그리고 특수문자를 포함하고, 사이트별 규칙성이 없이 모두 다르게 설정해야 하며, 정기적으로 바꿔야 한다고 조언한다. 이러한 조언은 패스워드를 크랙할 경우 안전할 수 있지만 요즘처럼 한 개인이 100여개 이상의 사이트에 대한 패스워드를 관리해야 한다면 현실적으로 불가능한 조언이 되고 말 것이다. 이러한 상황에 2017년 6월 미국 국립표준기술연구소(NIST)에서 '특별 간행 800-63-3: 디지털 인증 가이드라인'을 발표하게 된다. 내용은 그동안 보안전문가들이 권고했던 내용과는 많은 차이가 있다. 오히려 자주 바꾸는 것이 문제가 될 수 있다는 내용이다. 자세한 내용은 본 논문에서 살펴보도록 한다. 우리는 스마트폰 등을 사용함으로써 2-Factor인증에 활용하고 있다. 스마트폰 인증의 대표적인 방법은 지문·얼굴인식 등 생체인증 방식을 사용한다. 패스워드 없이도 편리하고 안전하게 인증을 할 수 있다는 점이 장점이다. 이러한 상황에 FIDO라는 인증 프레임워크가 인기를 얻고 있다. FIDO(Fast IDentity Online)는 비밀번호의 문제점을 해결하기 위한 목적으로 FIDO 얼라이언스에 의해 제안된 사용자 인증 프레임워크다. 향후 FIDO로의 대체가 패스워드 문제의 대안이 될 수 있을 것이다. 이제는 패스워드 대신 생체인증 체계로 대체할 수 있는 시대가 되었다고 할 수 있다. 본 논문에서는 패스워드의 문제점을 살펴보고 이를 대체할 수 있는 FIDO기반의 인증체계가 대안이 될 수 있는 근거를 제시하고자 한다.

  • PDF

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.

An Exploratory research on patent trends and technological value of Organic Light-Emitting Diodes display technology (Organic Light-Emitting Diodes 디스플레이 기술의 특허 동향과 기술적 가치에 관한 탐색적 연구)

  • Kim, Mingu;Kim, Yongwoo;Jung, Taehyun;Kim, Youngmin
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.135-155
    • /
    • 2022
  • This study analyzes patent trends by deriving sub-technical fields of Organic Light-Emitting Diodes (OLEDs) industry, and analyzing technology value, originality, and diversity for each sub-technical field. To collect patent data, a set of international patent classification(IPC) codes related to OLED technology was defined, and OLED-related patents applied from 2005 to 2017 were collected using a set of IPC codes. Then, a large number of collected patent documents were classified into 12 major technologies using the Latent Dirichlet Allocation(LDA) topic model and trends for each technology were investigated. Patents related to touch sensor, module, image processing, and circuit driving showed an increasing trend, but virtual reality and user interface recently decreased, and thin film transistor, fingerprint recognition, and optical film showed a continuous trend. To compare the technological value, the number of forward citations, originality, and diversity of patents included in each technology group were investigated. From the results, image processing, user interface(UI) and user experience(UX), module, and adhesive technology with high number of forward citations, originality and diversity showed relatively high technological value. The results provide useful information in the process of establishing a company's technology strategy.

Method of Biological Information Analysis Based-on Object Contextual (대상객체 맥락 기반 생체정보 분석방법)

  • Kim, Kyung-jun;Kim, Ju-yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.41-43
    • /
    • 2022
  • In order to prevent and block infectious diseases caused by the recent COVID-19 pandemic, non-contact biometric information acquisition and analysis technology is attracting attention. The invasive and attached biometric information acquisition method accurately has the advantage of measuring biometric information, but has a risk of increasing contagious diseases due to the close contact. To solve these problems, the non-contact method of extracting biometric information such as human fingerprints, faces, iris, veins, voice, and signatures with automated devices is increasing in various industries as data processing speed increases and recognition accuracy increases. However, although the accuracy of the non-contact biometric data acquisition technology is improved, the non-contact method is greatly influenced by the surrounding environment of the object to be measured, which is resulting in distortion of measurement information and poor accuracy. In this paper, we propose a context-based bio-signal modeling technique for the interpretation of personalized information (image, signal, etc.) for bio-information analysis. Context-based biometric information modeling techniques present a model that considers contextual and user information in biometric information measurement in order to improve performance. The proposed model analyzes signal information based on the feature probability distribution through context-based signal analysis that can maximize the predicted value probability.

  • PDF

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Analysis of Mistakes in Photosynthesis Unit in Biology II Textbooks and Survey of Biology Teachers' Recognition on them (생물 II 교과서 광합성 단원의 오류 분석 및 생물 교사의 오류 인지 조사)

  • Park, Hae-Kyung;Yoon, Ki-Soon;Kwon, Duck-Kee
    • Journal of Science Education
    • /
    • v.32 no.1
    • /
    • pp.33-46
    • /
    • 2008
  • The purpose of this study was to know whether or not any wrongful description or simple errors were in photosynthesis unit of Biology II textbook under 7th national curriculum and if so, to know whether or not high school teachers recognized and corrected properly the mistakes. The mistakes in photosynthesis unit of text books were determined by the comparison with several reference books and through examination by three plant physiologists in 8 different Biology II textbooks. After the mistakes were analysed, the survey using contents of textbook containing the mistakes was conducted on high school teachers teaching Biology II. As a result, 48 mistakes were determined in 13 subjects. As many as four mistakes were found even in one subject in a certain textbook and a same mistake was found repeatedly in several textbooks. The survey result showed that the teachers who pointed exactly the mistakes out corrected properly, however, the percentage of these ones out of 35 teachers replied to survey was less than 50%. The ratios of correction out of total number of responses were high in question #6 (43%), #4-3 (40%), and #1-2 (32%) which were containing a simple mistake in graph, a wrong word and a wrong picture, respectively. But, no one pointed out and made correction in question #5-1 and #5-2 which were containing Z scheme of light reaction without the legend of vertical axis that should be explained as electron energy or standard reduction potential. The result indicates the possibility that the mistakes in photosynthesis unit of Biology II textbook can be corrected and teached properly by teachers may be low. In order to reduce the possibility that students may have misconceptions about photosynthesis, the list of print's errors should be provided to the teachers and/or the training program and/or workshop for in-service high school biology teachers was recommended.

  • PDF

A Study on the Change of Materials and Fabrication Techniques of Stone Figures in Royal Tombs of the Joseon Period - Focusing on Shindobi, Pyo-Seok, and Sang-Seok - (조선시대 왕릉 석물의 재료와 제작 방법 변화에 관한 연구 - 신도비와 표석, 상석을 중심으로 -)

  • Cha, Moonsung
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.4
    • /
    • pp.56-77
    • /
    • 2019
  • Bi-Seok is a treasure trove of funeral rites and an important cultural asset that can shed light on the historical and social history of calligraphy, but research of the topic is still insignificant. In particular, research on the production method of Bi-Seok remains an unproven field. The production of Bi-Seok can be roughly divided into ma-jeong (refining stone), sculpture, and the Buk-chil (process of engraving letters) process. This article reveals some facts: First, performing ma-jeong to the Sang-Seok, Honyu-Seok, Bi-seok, which are known to be God's things. This process is needed because of the change in the perception of the Honyu-Seok due to the settlement and propagation of Confucian ceremonial rituals in the times of hardship in 1592 and 1636. As the crafting process of ma-jeong did not remain concrete, it was only possible to examine the manufacturing process of Bi-Seok through its materials and tools. Second, the rapid proliferation of Oh-Seok and Sa-jeo-chwi-yong (purchase of things made by private citizens) in the Yeongjo era has great importance in social and cultural history. When the Gang-Hwa-Seok of the commodity were exhausted, the Oh-Seok that was used by Sadebu (upper civil class) were used in the tomb of Jangneung, which made Oh-Seok popular among people. In particular, the use of Oh-Seok and the Ma-Jeong process could minimize chemical and physical damage. Third, the writing method of the Bi-seok is Buk-chil. After Buk-Chil of Song Si-Yeol was used on King Hyojong's tomb, the Buk-Chil process ( printing the letters on the back of the stone and rubbing them to make letters) became the most popular method in Korea and among other East Asian countries, and the fact that it was institutionalized to this scale was quite impressive. Buk-Chil became more sophisticated by using red ink rather than black ink due to the black color that results from Oh-Seok. Fourth, the writing method changes in the late Joseon Dynasty. Until the time of Yeongjo's regime, when inscribing, the depth of the angle was based on the thickness of the stroke, thus representing the shade. This technique, of course, did not occur at every Pyo-Seok or Shindobi, but was maintained by outstanding artisans belonging to government agencies. Therefore, in order to manufacture Bi-Seok, Suk-seok, YeonJeong, Ma-jeong, Jeong-Gan, ChodoSeoIp, Jung-Cho, Ip-gak, Gyo-Jeong, and Jang-Hwang, a process was needed to make one final product. Although all of these methods serve the same purpose of paying respects and propagandizing the great work of deceased persons, through this analysis, it was possible to see the whole process of Pyo-Seok based upon the division of techniques and the collaboration of the craftsmen.