• Title/Summary/Keyword: Biometric System

Search Result 361, Processing Time 0.023 seconds

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Fast Fingerprint Alignment Method and Weighted Feature Vector Extraction Method in Filterbank-Based Fingerprint Matching (필터뱅크 기반 지문정합에서 빠른 지문 정렬 방법 및 가중치를 부여한 특징 벡터 추출 방법)

  • 정석재;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.71-81
    • /
    • 2004
  • Minutiae-based fingerprint identification systems use minutiae points, which cannot completely characterize local ridge structures. Further, this method requires many methods for matching two fingerprint images containing different number of minutiae points. Therefore, to represent the fired length information for one fingerprint image, the filterbank-based method was proposed as an alternative to minutiae-based fingerprint representation. However, it has two shortcomings. One shortcoming is that similar feature vectors are extracted from the different fingerprints which have the same fingerprint type. Another shortcoming is that this method has overload to reduce the rotation error in the fingerprint image acquisition. In this paper, we propose the minutia-weighted feature vector extraction method that gives more weight in extracting feature value, if the region has minutiae points. Also, we Propose new fingerprint alignment method that uses the average local orientations around the reference point. These methods improve the fingerprint system's Performance and speed, respectively. Experimental results indicate that the proposed methods can reduce the FRR of the filterbank-based fingerprint matcher by approximately 0.524% at a FAR of 0.967%, and improve the matching performance by 5% in ERR. The system speed is over 1.28 times faster.

The Korean Gastric Cancer Cohort Study: Study Protocol and Brief Results of a Large-Scale Prospective Cohort Study

  • Eom, Bang Wool;Kim, Young-Woo;Nam, Byung-Ho;Ryu, Keun Won;Jeong, Hyun-Yong;Park, Young-Kyu;Lee, Young-Joon;Yang, Han-Kwang;Yu, Wansik;Yook, Jeong-Hwan;Song, Geun Am;Youn, Sei-Jin;Kim, Heung Up;Noh, Sung-Hoon;Park, Sung Bae;Yang, Doo-Hyun;Kim, Sung
    • Journal of Gastric Cancer
    • /
    • v.16 no.3
    • /
    • pp.182-190
    • /
    • 2016
  • Purpose: This study aimed to establish a large-scale database of patients with gastric cancer to facilitate the development of a nationalcancer management system and a comprehensive cancer control policy. Materials and Methods: An observational prospective cohort study on gastric cancer was initiated in 2010. A total of 14 cancer centers throughout the country and 152 researchers were involved in this study. Patient enrollment began in January 2011, and data regarding clinicopathological characteristics, life style-related factors, quality of life, as well as diet diaries were collected. Results: In total, 4,963 patients were enrolled until December 2014, and approximately 5% of all Korean patients with gastric cancer annually were included. The mean age was $58.2{\pm}11.5$ years, and 68.2% were men. The number of patients in each stage was as follows: 3,394 patients (68.4%) were in stage IA/B; 514 patients (10.4%), in stage IIA/B; 469 patients (9.5%), in stage IIIA/B/C; and 127 patients (2.6%), in stage IV. Surgical treatment was performed in 3,958 patients (79.8%), endoscopic resection was performed in 700 patients (14.1%), and 167 patients (3.4%) received palliative chemotherapy. The response rate for the questionnaire on the quality of life was 95%; however, diet diaries were only collected for 27% of patients. Conclusions: To provide comprehensive information on gastric cancer for patients, physicians, and government officials, a large-scale database of Korean patients with gastric cancer was established. Based on the findings of this cohort study, an effective cancer management system and national cancer control policy could be developed.

Software development for the visualization of brain fiber tract by using 24-bit color coding in diffusion tensor image

  • Oh, Jung-Su;Song, In-Chan;Ik hwan Cho;Kim, Jong-Hyo;Chang, Kee-Hyun;Park, Kwang-Suk
    • Proceedings of the KSMRM Conference
    • /
    • 2002.11a
    • /
    • pp.133-133
    • /
    • 2002
  • Purpose: The purpose of paper is to implement software to visualize brain fiber tract using a 24-bit color coding scheme and to test its feasibility. Materials and Methods: MR imaging was performed on GE 1.5 T Signa scanner. For diffusion tensor image, we used a single shot spin-echo EPI sequence with 7 non-colinear pulsed-field gradient directions: (x, y, z):(1,1,0),(-1,1,0),(1,0,1),(-1,0,1),(0,1,1),(0,1,-1) and without diffusion gradient. B-factor was 500 sec/$\textrm{mm}^2$. Acquisition parameters are as follows: TUTE=10000ms/99ms, FOV=240mm, matrix=128${\times}$128, slice thickness/gap=6mm/0mm, total slice number=30. Subjects consisted of 10 normal young volunteers (age:21∼26 yrs, 5 men, 5 women). All DTI images were smoothed with Gaussian kernel with the FWHM of 2 pixels. Color coding schemes for visualization of directional information was as follows. HSV(Hue, Saturation, Value) color system is appropriate for assigning RGB(Red, Green, and Blue) value for every different directions because of its volumetric directional expression. Each of HSV are assigned due to (r,$\theta$,${\Phi}$) in spherical coordinate. HSV calculated by this way can be transformed into RGB color system by general HSV to RGB conversion formula. Symmetry schemes: It is natural to code the antipodal direction to be same color(antipodal symmetry). So even with no symmetry scheme, the antipodal symmetry must be included. With no symmetry scheme, we can assign every different colors for every different orientation.(H =${\Phi}$, S=2$\theta$/$\pi$, V=λw, where λw is anisotropy). But that may assign very discontinuous color even between adjacent yokels. On the other hand, Full symmetry or absolute value scheme includes symmetry for 180$^{\circ}$ rotation about xy-plane of color coordinate (rotational symmetry) and for both hemisphere (mirror symmetry). In absolute value scheme, each of RGB value can be expressed as follows. R=λw|Vx|, G=λw|Vy|, B=λw|Vz|, where (Vx, Vy, Vz) is eigenvector corresponding to the largest eigenvalue of diffusion tensor. With applying full symmetry or absolute value scheme, we can get more continuous color coding at the expense of coding same color for symmetric direction. For better visualization of fiber tract directions, Gamma and brightness correction had done. All of these implementations were done on the IDL 5.4 platform.

  • PDF

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Various Quality Fingerprint Classification Using the Optimal Stochastic Models (최적화된 확률 모델을 이용한 다양한 품질의 지문분류)

  • Jung, Hye-Wuk;Lee, Jee-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.143-151
    • /
    • 2010
  • Fingerprint classification is a step to increase the efficiency of an 1:N fingerprint recognition system and plays a role to reduce the matching time of fingerprint and to increase accuracy of recognition. It is difficult to classify fingerprints, because the ridge pattern of each fingerprint class has an overlapping characteristic with more than one class, fingerprint images may include a lot of noise and an input condition is an exceptional case. In this paper, we propose a novel approach to design a stochastic model and to accomplish fingerprint classification using a directional characteristic of fingerprints for an effective classification of various qualities. We compute the directional value by searching a fingerprint ridge pixel by pixel and extract a directional characteristic by merging a computed directional value by fixed pixels unit. The modified Markov model of each fingerprint class is generated using Markov model which is a stochastic information extraction and a recognition method by extracted directional characteristic. The weight list of classification model of each class is decided by analyzing the state transition matrixes of the generated Markov model of each class and the optimized value which improves the performance of fingerprint classification using GA (Genetic Algorithm) is estimated. The performance of the optimized classification model by GA is superior to the model before the optimization by the experiment result of applying the fingerprint database of various qualities to the optimized model by GA. And the proposed method effectively achieved fingerprint classification to exceptional input conditions because this approach is independent of the existence and nonexistence of singular points by the result of analyzing the fingerprint database which is used to the experiments.

Wearable oxygen saturation measurement platform for worker safety management (작업자의 안전관리를 위한 웨어러블 산소포화도 측정 플랫폼)

  • Lee, Yun Ju;Song, Chai Jong;Yoo, Sun Kook
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.30-38
    • /
    • 2022
  • It is important to grasp biometric data in real time for prompt action in the event of a safety accident at a work site where the risk of safety accidents exists. Among them, blood oxygen saturation is the most important factor in maintaining human life, so real-time oxygen saturation measurement and monitoring is necessary according to the situation as a preemptive response for worker safety management. By receiving real-time bio-signals from workers wearing health and life-risk protective clothing, and sharing and analyzing the worker's risk status in an external system, it is possible to diagnose the worker's current condition and efficiently respond to emergencies that may occur to the worker. In this paper, we propose a wearable oxygen saturation measurement platform technology that can monitor the risk of harmful gases and oxygen saturation of the wearer in real time and ensure the wearer's activity and safety in order to cope with emergency situations at the scene of an accident. If we overcome the limitations identified through the results of the proposed system later and apply improved biodata such as motion correction to the platform, we expect that it will be usable not only in hazardous gas environments, but also in hospitals and homes for emergency patients.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Fast Detection of Finger-vein Region for Finger-vein Recognition (지정맥 인식을 위한 고속 지정맥 영역 추출 방법)

  • Kim, Sung-Min;Park, Kang-Roung;Park, Dong-Kwon;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.23-31
    • /
    • 2009
  • Recently, biometric techniques such as face recognition, finger-print recognition and iris recognition have been widely applied for various applications including door access control, finance security and electric passport. This paper presents the method of using finger-vein pattern for the personal identification. In general, when the finger-vein image is acquired from the camera, various conditions such as the penetrating amount of the infrared light and the camera noise make the segmentation of the vein from the background difficult. This in turn affects the system performance of personal identification. To solve this problem, we propose the novel and fast method for extracting the finger-vein region. The proposed method has two advantages compared to the previous methods. One is that we adopt a locally adaptive thresholding method for the binarization of acquired finger-vein image. Another advantage is that the simple morphological opening and closing are used to remove the segmentation noise to finally obtain the finger-vein region from the skeletonization. Experimental results showed that our proposed method could quickly and exactly extract the finger-vein region without using various kinds of time-consuming filters for preprocessing.