• Title/Summary/Keyword: Biometric

Search Result 769, Processing Time 0.026 seconds

Steganography based Multi-modal Biometrics System

  • Go, Hyoun-Joo;Moon, Dae-Sung;Moon, Ki-Young;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.1
    • /
    • pp.71-76
    • /
    • 2007
  • This paper deals with implementing a steganography based multi-modal biometric system. For this purpose, we construct a multi-biometrics system based on the face and iris recognition. Here, the feature vector of iris pattern is hidden in the face image. The recognition system is designed by the fuzzy-based Linear Discriminant Analysis(LDA), which is an expanded approach of the LDA method combined by the theory of fuzzy sets. Furthermore, we present a watermarking method that can embed iris information into face images. Finally, we show the advantages of the proposed watermarking scheme by computing the ROC curves and make some comparisons recognition rates of watermarked face images with those of original ones. From various experiments, we found that our proposed scheme could be used for establishing efficient and secure multi-modal biometric systems.

Voice Verification System for m-Commerce on CDMA Network

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.4E
    • /
    • pp.176-182
    • /
    • 2003
  • As the needs for wireless Internet service is increasing, the needs for secure m-commerce is also increasing. Conventional security techniques are reinforced by biometric security technique. This paper utilized the voice as biometric security techniques. We developed speaker verification system for m-commerce (mobile commerce) via wireless internet and wireless application protocol (WAP). We named this system the mVprotek. We implemented the system as client-server architecture. The clients are mobile phone simulator and personal digital assistant (PDA). The verification results are obtained by integrating the mVprotek system with SK Telecom's code dimension multiple access (CDMA) system. Utilizing f-ratio weighting and virtual cohort model normalization showed much better performance than conventional background model normalization technique.

Development of Smart Healthcare Scheduling Monitoring System for Elderly Health Care

  • Cho, Sooyong;Lee, Sang Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.51-59
    • /
    • 2018
  • Health care has attracted a lot of attention, recently due to an increase in life expectancy and interest in health. Various biometric data of the user are collected by using the air pressure sensor, gyro sensor, acceleration sensor, and heart rate sensor to perform the Smart Health Care Activity Tracker function. Basically, smartphone application is made and tested for biometric data collection, but the Arduino platform and bio-signal measurement sensor are used to confirm the accuracy of the measured value of the smartphone. Use the Google Maps API to set user goals and provide guidance on the location of the user and the points the user wants. Also, the basic configuration of the main UI is composed of the screen of the camera, and it is possible for the user to confirm the forward while using the application, so that accident prevention is possible.

The Development of QR-ID Card based on Biometric Data (바이오메트릭 데이터를 이용한 QR-ID 카드 개발)

  • Song, Kyu-hyun;Kim, Dong-hee;Yun, Sung-hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.371-374
    • /
    • 2014
  • 현재 국내에서 사용되고 있는 신분 인증 시스템은 주민등록번호와 같은 개인 정보를 기반으로 인증을 수행하여, 프라이버시 침해 위협이 존재한다. 그 해결 방안으로 가상 ID를 이용하는 I-PIN과 e-ID 카드가 제안되었지만, 문제점은 ID와 패스워드만 알고 있다면 누구나 도용이 가능하고 오프라인에서 사용하는 플라스틱 카드의 경우 위 변조가 가능하다는 한계를 갖는다. 본 논문에서는 주민등록번호를 대체할 식별 데이터인 QR-ID를 생성하고, 이에 기반을 둔 QR-ID 카드를 제안한다. QR 코드는 인식기에 대한 제약이 적고 일부 데이터 조작만으로 새로운 QR 코드 생성이 가능하여 노출 시 새로운 ID로 갱신할 수 있으며, QR-ID는 소유자의 바이오메트릭 데이터로 암호화되어 타인이 복호화 할 수 없다.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

The Implementation of Non-contact Door-lock System for Preventing Fingerprint (비접촉식 지문방지 도어락 시스템 구현)

  • Kim, Hyun Ok;Moon, Kwang Soo;Kim, Seung Gyu;Kim, Doo Yong;Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.13 no.4
    • /
    • pp.77-81
    • /
    • 2014
  • There have been developed in authentication systems for information using biometric information approaches such as fingerprint, face, and iris. In general, a door-lock system is operated by touching keypads, which remains fingerprints on the keypads. Such door-lock systems do not protect personal information from others due to the exposure of fingerprints to keypads. In this paper, we propose the new door-lock system that does not leave fingerprints on the keypads. Without touching keypad the system works because the system accepts authentication information by using illuminance sensor and LED. The experiment shows that the implemented door-lock system works well under any circumstance.

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Walking Features Detection for Human Recognition

  • Viet, Nguyen Anh;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.787-795
    • /
    • 2008
  • Human recognition on camera is an interesting topic in computer vision. While fingerprint and face recognition have been become common, gait is considered as a new biometric feature for distance recognition. In this paper, we propose a gait recognition algorithm based on the knee angle, 2 feet distance, walking velocity and head direction of a person who appear in camera view on one gait cycle. The background subtraction method firstly use for binary moving object extraction and then base on it we continue detect the leg region, head region and get gait features (leg angle, leg swing amplitude). Another feature, walking speed, also can be detected after a gait cycle finished. And then, we compute the errors between calculated features and stored features for recognition. This method gives good results when we performed testing using indoor and outdoor landscape in both lateral, oblique view.

  • PDF

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

Design of Bio-Information Process based on Digital Composite Sensing (디지털 복합센싱 생체정보 프로세스 설계)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.507-510
    • /
    • 2014
  • The initial process configuration of biometric information system is performed by the same sequences statically and consistently without changing after the system is running. However, this static process configuration appears an inefficient performance to the applications of the mobile biometric information system in the mobile computing environment. This work proposes the dynamic process design and execution method as a way to overcome these inefficient processes.

  • PDF