• Title/Summary/Keyword: Biometric identification

Search Result 140, Processing Time 0.026 seconds

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Development of Electrocardiogram Identification Algorithm using SVM classifier (SVM분류기를 이용한 심전도 개인인식 알고리즘 개발)

  • Lee, Sang-Joon;Lee, Myoung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.3
    • /
    • pp.654-661
    • /
    • 2011
  • This paper is about a personal identification algorithm using an ECG that has been studied by a few researchers recently. Previously published algorithm can be classified as two methods. One is the method that analyzes of ECG features and the other is the morphological analysis of ECG. The main characteristic of proposed algorithm can be classified the method of analysis ECG features. Proposed algorithm adopts DSTW(Down Slope Trace Wave) for extracting ECG features, and applies SVM(Support Vector Machine) to training and testing as a classifier algorithm. We choose 18 ECG files from MIT-BIH Normal Sinus Rhythm Database for estimating of algorithm performance. The algorithm extracts 100 heartbeats from each ECG file, and use 40 heartbeats for training and 60 heartbeats for testing. The proposed algorithm shows clearly superior performance in all ECG data, amounting to 93.89% heartbeat recognition rate and 100% ECG recognition rate.

Implementation and Evaluation of ECG Authentication System Using Wearable Device (웨어러블 디바이스를 활용한 ECG 인증 시스템 구현 및 평가)

  • Heo, Jae-Wook;Jin, Sun-Woo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As mobile technologies such as Internet of Things (IoT)-based smart homes and financial technologies (FinTech) are developed, authentication by smart devices is used everywhere. As a result, presence-based biometric authentication using smart devices has become a new mainstream in knowledge-based authentication methods like the existing passwords. The electrocardiogram (ECG) is less prone to forgery, and high-level personal identification is its unique feature from among various biometric authentication methods, such as the pulse, fingerprints, the face, and the iris. Biometric authentication using an ECG is receiving a great deal of attention due to its uses in healthcare and FinTech. In this study, we implemented an ECG authentication system that allows users to easily measure and authenticate their ECG waveforms using a miniaturized wearable device, rather than a large and expensive measurement device. The implemented ECG authentication system identifies ECG features through P-Q-R-S-T feature point identification, and was user-certified under the proposed authentication protocols. Finally, assessment of measurements in a majority of adult males showed a relatively low false acceptance rate of 1.73%, and a low false rejection rate of 4.14%, in a stable normal state. In a high-activity state, the false acceptance rate was 13.72%, and the false rejection rate was 21.68%. In a high-heart rate state, the false acceptance rate was 10.48%, and the false rejection rate was 11.21%.

An Innovative Fingerprinting Procedure for Human Identification

  • Kim, Young-Sam;Yoon, Kwang-Sang;Eom, Yong-Bin;Seo, Joong-Seok;Kim, Jong-Bae
    • Biomedical Science Letters
    • /
    • v.15 no.3
    • /
    • pp.187-197
    • /
    • 2009
  • Fingerprinting is a frontier technique that is the most frequently applied for human identification throughout the world. All citizens over 17 year old living in the Republic of Korea must be fingerprinted to obtain a certificate of resident registration. In Korea, for this reason, human identification through fingerprints has been far better developed and used efficiently both in crime scene investigation and in confirmation of an unidentified body. Scientific approaches have been made to accurately extract the metamorphosed fingerprints in various environments. Because most of the studies on fingerprinting have been accomplished with biometric techniques, researches on restoration of human dermal tissue and taking custody data after collecting fingerprints have been comparatively undermined. In this study, a newly innovative method for fingerprint extraction was developed using the polyester film with print powders and the high temperature-moisturizing method. Compared to the conventional fingerprinting method of paper with ink, minutiae numbers of fingerprints were greatly increased in polyester film with print powders after restoration of fingertips by high temperature-moisturization. This newly developed procedure would be an efficient fingerprinting technique which could be utilized in scientific investigation and in personal identification in the future. Furthermore, the new method for restoration and extraction of fingerprints are easy and inexpensive to practice for a number of human identification.

  • PDF

User Identification Using Real Environmental Human Computer Interaction Behavior

  • Wu, Tong;Zheng, Kangfeng;Wu, Chunhua;Wang, Xiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3055-3073
    • /
    • 2019
  • In this paper, a new user identification method is presented using real environmental human-computer-interaction (HCI) behavior data to improve method usability. User behavior data in this paper are collected continuously without setting experimental scenes such as text length, action number, etc. To illustrate the characteristics of real environmental HCI data, probability density distribution and performance of keyboard and mouse data are analyzed through the random sampling method and Support Vector Machine(SVM) algorithm. Based on the analysis of HCI behavior data in a real environment, the Multiple Kernel Learning (MKL) method is first used for user HCI behavior identification due to the heterogeneity of keyboard and mouse data. All possible kernel methods are compared to determine the MKL algorithm's parameters to ensure the robustness of the algorithm. Data analysis results show that keyboard data have a narrower range of probability density distribution than mouse data. Keyboard data have better performance with a 1-min time window, while that of mouse data is achieved with a 10-min time window. Finally, experiments using the MKL algorithm with three global polynomial kernels and ten local Gaussian kernels achieve a user identification accuracy of 83.03% in a real environmental HCI dataset, which demonstrates that the proposed method achieves an encouraging performance.

Market Analysis of Hand Vascular Pattern Recognition System (손혈관 인식 시스템 시장분석)

  • Kim, Jae-Woo;Yeo, Woon-Dong;Bae, Sang-Jin;Seong, Kyung-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.117-119
    • /
    • 2004
  • Biometrics are best defined as measurable physiological and behavioral characteristics that can be utilized to verify the identity of an individual. Biometric technologies will continue to improve, becoming even more accurate and reliable as technology evolves. In this paper, we review the state of the hand vascular patterns identification technology and analyse the opportunities and threats of the technology in the markets.

  • PDF

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;Hong, Sug-Jun;Lee, Hee-Sung;Ann, Toh-Kar;Kim, Eun-Tai;Park, Mig-Non
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.15-18
    • /
    • 2007
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e. both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion is considered at decision level. The proposed algorithm is tested on the NLPR database.

  • PDF

Improvement of Digital Identify Proofing Service through Trend Analysis of Online Personal Identification

  • JongBae Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.1-8
    • /
    • 2023
  • This paper analyzes the trends of identification proofing services(PIPSs) to identify and authenticate users online and proposes a method to improve PIPS based on alternative means of resident registration numbers in Korea. Digital identity proofing services play an important role in modern society, but there are some problems. Since they handle sensitive personal information, there is a risk of information leakage, hacking, or inappropriate access. Additionally, online service providers may incur additional costs by applying different PIPSs, which results in online service users bearing the costs. In particular, in these days of globalization, different PIPSs are being used in various countries, which can cause difficulties in international activities due to lack of global consistency. Overseas online PIPSs include expansion of biometric authentication, increase in mobile identity proofing, and distributed identity proofing using blockchain. This paper analyzes the trend of PIPSs that prove themselves when identifying users of online services in non-face-to-face overseas situations, and proposes improvements by comparing them with alternative means of Korean resident registration numbers. Through the proposed method, it will be possible to strengthen the safety of Korea's PIPS and expand the provision of more reliable identification services.