• Title/Summary/Keyword: Biometric

Search Result 769, Processing Time 0.028 seconds

PKI-based Registration Authority using Efficient Human Iris Recognition Information (홍채 패턴 정보를 이용한 공개키 기반의 등록기관)

  • Lee, Kwan-Yong;Lim, Shin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.864-873
    • /
    • 2001
  • In this paper, a new approach to building a registration authority for issuing PKI-based certificates is presented to make the process of identifying an individual more secure and reliable by utilizing human iris recognition technology. The tasks of the proposed system associated with the manipulation of irises except for the general functions of registration authorities can be categorized into three modules, the acquisition of iris images, the registration of iris information, and the verification of users by means of iris patterns. The information among the three modules is safely exchanged through encryption and decryption with a symmetric cryptographic method. As a feature extraction method for a given iris image, a wavelet transform is applied to represent a feature vector with a small dimension of information obtained by subsampling an image corresponding to lower frequency bands successively without loss of information. Through the experiments on human iris recognition technology we proposed and applied to the registration authority, the potential of biometric technology in various applications is confirmed.

  • PDF

Acceptance of the Smart Clothing According to Trend and Information Innovation (유행혁신성과 정보혁신성에 따른 스마트의류 수용)

  • Noh, Mi-Jin;Park, Hyun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.350-363
    • /
    • 2011
  • This study is to examine the effect of the purchase intention toward smart clothing on the perceived usefulness, perceived ease of use, perceived enjoyment, trust, and social influence, and the moderating effect of the customers' characteristics like the trend and information innovation. After pictures about the smart clothing for biometric measurement were provided, 256 questionnaires targeted at 20s were gathered. The results of this study are as follows. First, perceived usefulness, perceived ease of use, and perceived enjoyment had an positive effect on the purchase intention of smart clothing. Second, interactions between perceived enjoyment, trust, and social influence and trend innovation had an effect on the purchase intention of smart clothing. Finally, interactions between perceived ease of use, perceived enjoyment, and social influence and information innovation had an influence on the purchase intention of smart clothing. This study can provide various guidelines for researches and companies relative to smart clothing.

One Grip based Doorpull Shaped Doorlock System using Fingerprint Recognition and Touch Pattern (지문 인식과 터치 패턴을 이용한 원그립 기반 문고리 통합형 도어록 시스템)

  • Jang, Min-Soon;Park, Tea-Min;Lee, Jung-Kwon;Wang, Bo-Hyeun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.30-36
    • /
    • 2016
  • Recently, digital doorlock systems have been employing biometric recognition and smartphone as personal authentification means. The performance of a digital doorlock system is determined by the two conflicting indices such as security and convenience. This paper proposes and implements one grip based doorpull shaped doorlock systems using fingerprint and touch sensor grip pattern. The proposed system sequentially performs fingerprint recognition and grip pattern identification when a user grips the doorpull in order to open the door. This method so called 'One Grip' is considered to enhance security while maintaining users' convenience. We expect the proposed method can solve the phone missing problem encountered in developing smart doorlock systems based on smartphones.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology (보안성이 향상된 퍼지추출 기술 기반 사용자 인증 및 키 동의 스킴)

  • Choi, Younsung;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2016
  • Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.

Iris Image Enhancement for the Recognition of Non-ideal Iris Images

  • Sajjad, Mazhar;Ahn, Chang-Won;Jung, Jin-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1904-1926
    • /
    • 2016
  • Iris recognition for biometric personnel identification has gained much interest owing to the increasing concern with security today. The image quality plays a major role in the performance of iris recognition systems. When capturing an iris image under uncontrolled conditions and dealing with non-cooperative people, the chance of getting non-ideal images is very high owing to poor focus, off-angle, noise, motion blur, occlusion of eyelashes and eyelids, and wearing glasses. In order to improve the accuracy of iris recognition while dealing with non-ideal iris images, we propose a novel algorithm that improves the quality of degraded iris images. First, the iris image is localized properly to obtain accurate iris boundary detection, and then the iris image is normalized to obtain a fixed size. Second, the valid region (iris region) is extracted from the segmented iris image to obtain only the iris region. Third, to get a well-distributed texture image, bilinear interpolation is used on the segmented valid iris gray image. Using contrast-limited adaptive histogram equalization (CLAHE) enhances the low contrast of the resulting interpolated image. The results of CLAHE are further improved by stretching the maximum and minimum values to 0-255 by using histogram-stretching technique. The gray texture information is extracted by 1D Gabor filters while the Hamming distance technique is chosen as a metric for recognition. The NICE-II training dataset taken from UBRIS.v2 was used for the experiment. Results of the proposed method outperformed other methods in terms of equal error rate (EER).

A Face Recognition System using Eigenfaces: Performance Analysis (고유얼굴을 이용한 얼굴 인식 시스템: 성능분석)

  • Kim, Young-Lae;Wang, Bo-Hyeun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.400-405
    • /
    • 2005
  • This paper analyzes the performance of a face recognition algorithm using the eigenfaces method. In the absence of robust personal recognition schemes, a biometric recognition system has essentially researched to improve their shortcomings. A face recognition system in biometries is widely researched in the field of computer vision and pattern recognition, since it is possible to comprehend intuitively our faces. The proposed system projects facial images onto a feature space that effectively expresses the significant variations among known facial images. The significant features are known as 'eigenfaces', because they are the eigenvectors(principal components) of the set of faces. The projection operation characterizes an individual face by a weighted sum of the eigenface features, and to recognize a particular face it is necessary only to compare these weights to those of known individuals. In order to analyze the performance of the system, we develop a face recognition system by using Harvard database in Harvard Robotics Laboratory. We present the recognition rate according to variations on the lighting condition, numbers of the employed eigenfaces, and existence of a pre-processing step. Finally, we construct a rejection curve in order to investigate the practicability of the recognition method using the eigenfaces.

Study on the Criminal Information System of Police Cooperation Organization between European Nations (유럽의 국가간 경찰협력기구의 범죄정보시스템에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.263-271
    • /
    • 2008
  • This study is about the criminal information system of police cooperation organization between European nations. The criminal information system of police cooperation organization between European nations is the organization created by the sign of the Europol convention in 26 July 1995 and the effectuation in 1 October 1998 for European nations' cooperative confrontation with frequent international terror, international organization crime, drug trafficking, illegal immigrant smuggling, and other critical crimes. From the beginning, this organization established the criminal information system for overcoming the working limits of previous international police organization. This system consists of information system, work file, and index system and enables every national unit or other law enforcement agents to collect, exchange, and utilize the information. Additionally, it try to keep in step with the rapidly change time, such as the integration with CMS, the establishment of correspondence system against cyber crime, and the introduction of biometric database. The criminal information system of the Europol gives important suggestions to the police cooperation organization between nations, besides prevention and suppression against the international crimes in Europe.

  • PDF

Ontology-based u-Healthcare System for Patient-centric Service (환자중심서비스를 위한 온톨로지 기반의 u-Healthcare 시스템)

  • Jung, Yong Gyu;Lee, Jeong Chan;Jang, Eun Ji
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • U-healthcare is real-time monitoring of personal biometric information using by portable devices, home network and information and communication technology based healthcare systems, and fused together automatically to overcome the constraints of time and space are connected with hospitals and doctors. As u-healthcare gives health service in anytime and anywhere, it becomes to be a new type of medical services in patients management and disease prevention. In this paper, recent changes in prevention-oriented care is analyzed in becoming early response for Healthcare Information System by requirements analysis for technology development trend. According to the healthcare system, PACS, OCS, EMR and emergency medical system, U-healthcare is presenting the design of a patient-centered integrated client system. As the relationship between the meaning of the terms is used in the ontology, information models in the system is providing a common vocabulary with various levels of formality. In this paper, we propose an ontology-based system for patient-centered services, including the concept of clustering to clustering the data to define the relationship between these ontologies for more systematic data.

  • PDF

Design of Diigence/Indolence System using a Smart Phone (스마트폰을 이용한 근태관리시스템의 설계)

  • Jo, Hyun Joon;Lee, Dong Gi;Kim, Min Gyu;Park, Jin Soo;Kim, Dong Hyun;Ban, Chae Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.307-309
    • /
    • 2013
  • Diligence/Indolence records are the basic data at a human resource management and the essential data for measure salaries of employees. However, since the D/I systems using RFIDs or biometric sensors require hish costs to build and operate the D/I systems, it is difficult for to small business or self-employed business to use them. In this paper, we propose the Diligence/Indolence system to use the location identification of a smart phon. To locate the position of an employee, the WiFi signal of a smart phone and the wireless access point are exploited. Because the pre-owned hardware resources are used and initial building costs are low, it is easy for small business to use the proposed D/I system with low cost.

  • PDF