• 제목/요약/키워드: Biometric Key

검색결과 89건 처리시간 0.019초

Reflection-type Finger Vein Recognition for Mobile Applications

  • Zhang, Congcong;Liu, Zhi;Liu, Yi;Su, Fangqi;Chang, Jun;Zhou, Yiran;Zhao, Qijun
    • Journal of the Optical Society of Korea
    • /
    • 제19권5호
    • /
    • pp.467-476
    • /
    • 2015
  • Finger vein recognition, which is a promising biometric method for identity authentication, has attracted significant attention. Considerable research focuses on transmission-type finger vein recognition, but this type of authentication is difficult to implement in mobile consumer devices. Therefore, reflection-type finger vein recognition should be developed. In the reflection-type vein recognition field, the majority of researchers concentrate on palm and palm dorsa patterns, and only a few pay attention to reflection-type finger vein recognition. Thus, this paper presents reflection-type finger vein recognition for biometric application that can be integrated into mobile consumer devices. A database is built to test the proposed algorithm. A novel method of region-of-interest localization for a finger vein image is introduced, and a scheme for effectively extracting finger vein features is proposed. Experiments demonstrate the feasibility of reflection-type finger vein recognition.

바이오정보 기반 전환 부인봉쇄 다중서명 기법 (The Biometric based Convertible Undeniable Multi-Signature Scheme)

  • 윤성현
    • 한국산학기술학회논문지
    • /
    • 제11권5호
    • /
    • pp.1670-1676
    • /
    • 2010
  • 디지털 콘텐츠는 쉽게 조작 및 복사가 가능하며 원본과 복사본의 구분이 어렵다. 콘텐츠 저작자의 권리보호 및 안전한 콘텐츠 분배를 위해서 디지털 서명 기법이 사용된다. 일반적으로 애니메이션, 동영상, 게임 등의 디지털 콘텐츠는 여러 사람의 노력으로 완성된다. 공동 저작자들의 권리 및 권익을 보호할 수 있는 정보보호 기법의 적용이 필수적이다. 본 논문에서는 바이오정보에 기반을 둔 전환 부인봉쇄 다중서명 기법을 제안한다. 제안한 방법은 바이오 정보 기반의 키를 생성하기 때문에 키 위탁이 불가능하며 서명자가 직접 서명 생성 및 검증에 참여해야 한다. 또한 필요에 따라서 부인봉쇄 서명을 일반 서명으로 전환하여 검증자에 의한 자체 서명검증이 가능하다. 제안한 방법의 응용으로 공동으로 저작된 디지털 콘텐츠에 대한 저작권 보호 및 분배 방안을 제시한다.

모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계 (A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments)

  • 김형욱;김범용;전문석
    • 한국산학기술학회논문지
    • /
    • 제18권1호
    • /
    • pp.32-39
    • /
    • 2017
  • 최근 모바일 클라우드 서비스가 증가하고 있으며, 특히 하나의 클라우드 컴퓨팅 서비스의 제약을 넘어 멀티 클라우드 방식에 관한 연구가 활발하게 진행되고 있다. 멀티 클라우드 환경에서 상호 협약된 서비스 제공자들 간의 추가적인 클라우드 서비스를 이용하기 위해 사용자는 다중 인증이 필요하다. 기존 연구에서 SSO를 이용한 방식은 SSO 서버를 통해 모든 인증이 이루어지기 때문에 악의적인 공격에 의해 SSO 서버의 서비스 불가 시 모든 클라우드 서비스 사용이 불가능하다. 또한 브로커를 이용한 방식에서는 사용자가 가입하지 않은 서비스 제공자에게 인증정보를 노출하게 되는 취약점이 존재한다. 본 논문에서는 추가 클라우드 사용 시 노출이 없는 생체인식을 이용한 안전한 사용자 인증 프로토콜을 제안한다. 제안하는 프로토콜은 멀티 클라우드 환경에서 각각의 클라우드에 인증을 위한 정보를 저장하지 않으며 한 번의 생체인증으로 여러 클라우드를 사용할 수 있다. 키의 안정성 측면에서 키 합의 과정과 키 공간 크기를 통해 안정성을 확보하였으며 중간자 공격, 재생 공격 등의 다양한 공격 방식에 대한 무력화를 통한 안전한 모바일 클라우드 서비스를 제공한다.

시점 변화에 강인한 실루엣 기반 게이트 인식 (Silhouette-based Gait Recognition for Variable Viewpoint)

  • 나진영;강성숙;정승도;최병욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅳ
    • /
    • pp.1883-1886
    • /
    • 2003
  • Gait is defined as "a manor of walking". It can used as a biometric measure to recognize known persons. Gait is an idiosyncratic feature determined by an individual's weight, stride length, and posture combined with characteristic motion. but its feature extracted from images varies with the viewpoint. In this paper, we propose a gait recognition method using a planer homography, which is robust for viewpoint variation. We represent an individual as key-silhouettes. And we endow key-silhouettes with weight calculated using the characteristic of PCA. Experimental result shows that proposed method is robust for viewpoint variation as images synthesised same viewpoint.

  • PDF

의자의 틸트 기능이 사용자의 생체 신호 및 안락도에 미치는 영향 분석 (Analysis of the Impact of Chair Tilt Function on Users' Biometric Signals and Comfort)

  • 경슬기
    • 대한의용생체공학회:의공학회지
    • /
    • 제45권2호
    • /
    • pp.75-80
    • /
    • 2024
  • This research investigates the influence of chair tilt functionality on biometric signals and user comfort, addressing the ergonomic challenges posed by modern sedentary lifestyles. Through an experimental study involving eight male participants, the impact of chair tilt on electromyography (EMG), heart rate, metabolic rate, pressure distribution, and distance between the lumbar spine and the lumbar support part of the chair was measured across different seating postures. The study utilized chairs with both synchronous and non-synchronous tilt mechanisms to explore how adjustments in chair design affect user comfort and physiological responses during prolonged sitting. Key findings suggest that chair tilt functionality can significantly reduce muscle activity and energy expenditure, enhancing user comfort and potentially mitigating health risks associated with prolonged sedentary behavior. Notably, the study revealed a preference among participants for chairs that aligned the rotational center of the tilt with the hip joint, highlighting the importance of this ergonomic feature in enhancing user comfort. Additionally, the research proposes a novel methodology for assessing seating comfort through the analysis of both biometric and physical signals, providing valuable insights for the development of ergonomic chair designs focused on user health and comfort.

안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구 (A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle)

  • 이근호
    • 디지털융복합연구
    • /
    • 제12권2호
    • /
    • pp.549-554
    • /
    • 2014
  • IT와 융합한 지능형 자동차에 대한 연구가 현재 활발히 진행중이다. 안전한 지능형 자동차 서비스를 위해 다양한 통신 기술이 제공이 되고 있다. 지능형 자동차가 통신기술을 이용한 서비스가 제공되면서 다양한 보안위협 요소가 도출되고 있다. 지능형 자동차에서 보안 인증 솔루션을 위해서는 소유권, 지식, 생체정보를 포함하고 있어야 한다. 본 논문에서는 지능형 자동차의 보안위협 요소를 분석하고 지능형 자동차의 보안 솔루션인 생체정보를 이용한 인증 기법을 제공한다. 기존의 지능형 자동차 인증보안 솔루션보다 높은 보안성을 갖는 구현의 문제점이 해결되도록 사용자 생체인증기법을 제안한다.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

A Survey on Face-based Cryptographic Key Generation

  • Dang, Thao;Choi, Deokjai
    • 스마트미디어저널
    • /
    • 제9권2호
    • /
    • pp.39-50
    • /
    • 2020
  • Derivation cryptographic keys from human biometrics opens a new promising research area when it can be used efficiently for not only verification or recognition tasks, but also symmetric-key based applications. Among existing biometric traits, face is considered as the most popular biometrics since facial features are informative and discriminative. In this paper, we present a comprehensive survey of Face-based key generation (FKGS). First, we summarize the trend of FKGS researches and sum up the methods which play important roles in the proposed key generation systems. Then we present the evaluation and the general performance analysis; from that, we give a discussion about the advantages and disadvantages of surveyed studies to clarify the fundamental requirements and the main challenges when implementing FKGS in practice. Finally, an outlook on future prospects is given.

RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates

  • Lee, Dae-Jong;Shin, Yong-Nyuo;Park, Seon-Hong;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권4호
    • /
    • pp.286-292
    • /
    • 2011
  • Biometrics systems are used in a wide range of areas, including the area of crime prevention, due to their unique characteristics. However, serious problems can occur if biometric information is disclosed to an unauthorized user. To address these issues, this paper proposes a real valued fuzzy vault method, which adopts a real number error correction code to implement a fuzzy vault scheme for protecting fingerprint temples. The proposed method provides the benefit of allowing the private key value to be changed at any time, unlike biometric template such as a fingerprint, which is not easily renewable even if its security has been breached. The validity of the proposed method is verified for fingerprint verification.

Biometric Certificate on Secure Group Communication

  • 한군희
    • 중소기업융합학회논문지
    • /
    • 제4권4호
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF