• Title/Summary/Keyword: Biometric information

Search Result 583, Processing Time 0.037 seconds

A Survey on the Public Awareness of the Bioinformation Utilization (바이오정보 활용에 대한 시민 인식 조사 연구)

  • Choi, Kyujin;Kim, Byoungsoo;Oh, Byoung-il;Chang, Yeo-Kyung;Lee, Eun-woo;Byeon, Hyejin;Lee, Sangyun
    • Journal of Science and Technology Studies
    • /
    • v.17 no.1
    • /
    • pp.117-144
    • /
    • 2017
  • In Korea, currently, only the growth possibility of bioinformation industry has received the public attention, and social discussion on bioinformation management is meager. Based on this critical perspective, this study investigates the current status of public awareness of the bioinformation which can be a basis for the social discussion for bioinformation management. The most significant characteristics identified in the survey is that many citizens, while expressing their agreement on the use of biometric technology by purpose and taking an open stance on national fingerprint information collection, have considerable concern for the identity authentication system using the current biometric technology. In particular, the survey pointed out that it is hard to trust the institutions that collect the bioinformation. Also, the public expressed the particular concern for the health data including the body information and showed overwhelming consent for the necessity of more stringent regulation compared with other personal information. In regards to the medical information gathered from medical institutions, nearly 80% of the survey respondents did not agree on providing the information to commercial enterprises, and even 60% of them disagreed on using it for academic and statistical research. This result well demonstrates that thorough management of the bioinformation is required for its utilization.

A Study on Biometric Template Protection Procedures (생체정보보호를 위한 연구)

  • Shin, Yong-Nyuo;Lee, Dong-Gun;Choi, Jin-Young
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.913-916
    • /
    • 2005
  • 정부의 민원서비스등 다양한 용도로 개방 환경에 생체인식시스템이 구축될 수 있는 가능성이 많아졌다. 본 고에서는 생체인식시스템이 구축될 때 발생할 수 있는 취약점을 정의 해 보고 이를 해결하기 위한 기술적 가이드라인을 제시한다. 한번 유출된 생체정보에 대한 피해의 심각성이 크기 때문에, 가능한 모든 공격에 대해서 강인성(Robust)을 가져야 하는 반면에 생체정보 변형에 따른 복잡성은 성능에 현격한 저하가 없어야 한다.

  • PDF

Requirement for Secure Biometric System Design on Smartphones. (스마트폰 상의 안전한 바이오인식 시스템 설계를 위한 요구사항)

  • Im, Jong-Hyuk;Lee, Mun-Kyu
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.870-871
    • /
    • 2015
  • 빠르게 발전하는 스마트폰 기술 발전에 의해 스마트폰은 민감한 개인 정보를 다루는 경우가 많아졌다. 바이오인식 기술은 이를 안전하게 보호하기 위한 수단으로써 여러 제품에 도입되고 있으나 설계 단계에서 보안이 고려되지 않을 경우 취약점이 발생할 수 있는 잠재적 가능성이 존재한다. 본 논문에서는 스마트폰 바이오인식 시스템 설계 시에 주의해야 할 점을 분석하고, 이를 해결하기 위해 시스템에 요구되는 요구사항들을 정리한다.

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm

  • Wang, Ning;Lu, Li;Gao, Ge;Wang, Fanglin;Li, Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2420-2433
    • /
    • 2014
  • Fusing the scores of multibiometrics is a very promising approach to improve the overall system's accuracy and the verification performance. In recent years, there are several approaches towards studying score level fusion of several biometric systems. However, most of them does not consider the genuine and imposter score distributions and result in a higher equal error rate usually. In this paper, a novel score level fusion approach of different biometric systems (dual iris, thermal and visible face traits) based on $Acz{\acute{e}}l$-Alsina triangular norm is proposed. It achieves higher identification performance as well as acquires a closer genuine distance and larger imposter distance. The experimental tests are conducted on a virtual multibiometrics database, which merges the challenging CASIA-Iris-Thousand database with noisy samples and the NVIE face database with visible and thermal face images. The rigorous results suggest that significant performance improvement can be achieved after the implementation of multibiometrics. The comparative experiments also ascertain that the proposed fusion approach outperforms the state-of-art verification performance.

Face Recognition using Emotional Face Images and Fuzzy Fisherface (감정이 있는 얼굴영상과 퍼지 Fisherface를 이용한 얼굴인식)

  • Koh, Hyun-Joo;Chun, Myung-Geun;Paliwal, K.K.
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.1
    • /
    • pp.94-98
    • /
    • 2009
  • In this paper, we deal with a face recognition method for the emotional face images. Since the face recognition is one of the most natural and straightforward biometric methods, there have been various research works. However, most of them are focused on the expressionless face images and have had a very difficult problem if we consider the facial expression. In real situations, however, it is required to consider the emotional face images. Here, three basic human emotions such as happiness, sadness, and anger are investigated for the face recognition. And, this situation requires a robust face recognition algorithm then we use a fuzzy Fisher's Linear Discriminant (FLD) algorithm with the wavelet transform. The fuzzy Fisherface is a statistical method that maximizes the ratio of between-scatter matrix and within-scatter matrix and also handles the fuzzy class information. The experimental results obtained for the CBNU face databases reveal that the approach presented in this paper yields better recognition performance in comparison with the results obtained by other recognition methods.

Implementation of ISO/IEEE 11073-10404 Monitoring System Based on U-Health Service (유헬스 서비스 기반의 ISO/IEEE 11073-10404 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.625-632
    • /
    • 2014
  • The u-health service is using portable device such as smart device and it consists of small computing device. The u-health service carry out same performance with desktop computer. We designed message structure based on Bluetooth HDP. This message structure is used to transmit patient's biometric data on the smart device of medical team, patient and family over the mobile network environment. ISO/IEEE 11073 PHD standard was defined based on the method of communication between the agent and the manager. And We are confirmed the reliable transmission of biometric data at the smart device by implementing the android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

RowAMD Distance: A Novel 2DPCA-Based Distance Computation with Texture-Based Technique for Face Recognition

  • Al-Arashi, Waled Hussein;Shing, Chai Wuh;Suandi, Shahrel Azmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5474-5490
    • /
    • 2017
  • Although two-dimensional principal component analysis (2DPCA) has been shown to be successful in face recognition system, it is still very sensitive to illumination variations. To reduce the effect of these variations, texture-based techniques are used due to their robustness to these variations. In this paper, we explore several texture-based techniques and determine the most appropriate one to be used with 2DPCA-based techniques for face recognition. We also propose a new distance metric computation in 2DPCA called Row Assembled Matrix Distance (RowAMD). Experiments on Yale Face Database, Extended Yale Face Database B, AR Database and LFW Database reveal that the proposed RowAMD distance computation method outperforms other conventional distance metrics when Local Line Binary Pattern (LLBP) and Multi-scale Block Local Binary Pattern (MB-LBP) are used for face authentication and face identification, respectively. In addition to this, the results also demonstrate the robustness of the proposed RowAMD with several texture-based techniques.