• Title/Summary/Keyword: Biometric system

Search Result 364, Processing Time 0.028 seconds

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Performance Evaluation of Multimodal Biometric System for Normalization Methods and Classifiers (균등화 및 분류기에 따른 다중 생체 인식 시스템의 성능 평가)

  • Go, Hyoun-Ju;Woo, Na-Young;Shin, Yong-Nyuo;Kim, Jae-Sung;Kim, Hak-Il;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.377-388
    • /
    • 2007
  • In this paper, we propose a multi-modal biometric system based on face, iris and fingerprint recognition system. To effectively aggregate two systems, we use statistical distribution models based on matching values for genuine and impostor, respectively. And then, We performed reveal fusion algorithms including weighted summation, Support Vector Machine(SVM), Fisher discriminant analysis, Bayesian classifier. From the various experiments, we found that the performance of multi-modal biometric system was influenced with the normalization methods and classifiers.

A Study on Conformance Testing Method to Verify the BioAPI Based System Module (BioAPl기반 시스템 모듈을 검증하기 위한 적합성시험 방법 연구)

  • Lee Yoo-Young;Kwon Young-Bin
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.759-768
    • /
    • 2004
  • Recently the biometric recognition technology is intensively studied and the standardization of the technology has been highly demanded for its commercialization. Currently many blometric recognition products are being developed based on the BioAPl(Biometric Application Program-ming Interface) specification. However, the reliable testing tools (or scenarios) to evaluate performance and conformance of the products are not shown yet. In this paper, a conformance testing method is presented, which verifies a biometric recognition system to meet the requirements of the BioAPl standard. Two different testing procedures are used in the proposed method. The first procedure evaluates that each functions offered in the BioAPl specification are correctly implemented and that the functions are actually used in the system. Through the Procedure, a BSP(Biometric Service Provider) system is executed on the framework of the BioAPl functions. It requires selection of parameters and prece-dent functions that should be executed first. The second procedure evaluates the abilities of module management, handling operations and ver-ification process by the analysis of the test cases. It tests the correctness of the system operation when a testing scenario is given. The proposed testing method is applied on a fingerprint verification BSP using the sample BSP provided by the BioAPl consortium. The experimental results shows the benefits of the proposed testing method.

Biometric Features and Responsible Person Information Hiding by Watermarking Technique (워터마킹 기법을 이용한 생체정보와 취급자 정보의 은닉)

  • Lee, Wook-Jae;Lee, Dae-Jong;Park, Jin-Il;Cho, Jae-Hoon;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.75-82
    • /
    • 2009
  • This paper propose a method to hide not only biometric features in the biometric image such as face and fingerprint for protecting them from unauthorized entity but also information of responsible person expressed as binary image which can be used to identify the responsibility of divulgence. For this, we investigate the recognition rates and bit error rates of extracted responsible person information watermark for the cases of using face and fingerprint images as cover images for fingerprint and face recognition which are the most popular biometric techniques. From these experiments, we confirm that the proposed method can be used for various application requiring to protect personal biometric information

Analysis on Dominant Factor for Gait Recognition (걸음걸이 인식을 위한 지배 요소 분석)

  • 박한훈;박종일
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.321-324
    • /
    • 2003
  • This paper presents a novel system that analyzes and recognizes a gait based on shape context on silhouette images. The main functions of the system consist of three steps: First, the system extracts the silhouette images from galt image sequence by performing a simple pre-processing and acquires the AGM(Averaged Gait Map) by averaging them. Next. it computes the cross-correlation between the AGMs. Finally, it classifies the AGMs based on the cross-correlation using nearest neighborhood classification. The proposed system uses two cues to classify a gait: One corresponds to biometric shape cue such as body height width. and body-part proportions. The other corresponds to gait cue such as stride length and amount of arm swing. Perceptionally, the biometric cues are sailent on the double support (both legs spread and touching the ground) while the gait cues on the midstance. Through a variety of experiments, it is proved that the property of a gait is mainly influenced by gait cues than biometric cues.

  • PDF

An Implementation of User Identification System Using Hrbrid Biomitic Distances (복합 생체 척도 거리를 이용한 사용자 인증시스템의 구현)

  • 주동현;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper we proposed the user identification system using hybrid biometric information and non-contact IC card to improve the accuracy of the system. The hybrid biometric information consists of the face image, the iris image, and the 4-digit voice password of user. And the non-contact IC card provides the base information of user If the distance between the sample hybrid biometric Information corresponding to the base information of user and the measured biometric information is less than the given threshold value, the identification is accepted. Otherwise it is rejected. Through the result of experimentation, this paper shows that the proposed method has better identification rate than the conventional identification method.

  • PDF

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement

  • An, Younghwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • Recently, many biometrics-based user authentication schemes for telecare medicine information systems (TMIS) have been proposed to improve the security problems in user authentication system. In 2014, Mishra et al. proposed an improvement of Awasthi-Srivastava's biometric based authentication for TMIS which is secure against the various attacks and provide mutual authentication, efficient password change. In this paper, we discuss the security of Mishra et al.'s authentication scheme, and we have shown that Mishra et al.'s authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to remove these security problems of Mishra et al.'s authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved biometric based authentication scheme is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack and provides mutual authentication between the user and the telecare system.

Human Iris Recognition using Wavelet Transform and Neural Network

  • Cho, Seong-Won;Kim, Jae-Min;Won, Jung-Woo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.178-186
    • /
    • 2003
  • Recently, many researchers have been interested in biometric systems such as fingerprint, handwriting, key-stroke patterns and human iris. From the viewpoint of reliability and robustness, iris recognition is the most attractive biometric system. Moreover, the iris recognition system is a comfortable biometric system, since the video image of an eye can be taken at a distance. In this paper, we discuss human iris recognition, which is based on accurate iris localization, robust feature extraction, and Neural Network classification. The iris region is accurately localized in the eye image using a multiresolution active snake model. For the feature representation, the localized iris image is decomposed using wavelet transform based on dyadic Haar wavelet. Experimental results show the usefulness of wavelet transform in comparison to conventional Gabor transform. In addition, we present a new method for setting initial weight vectors in competitive learning. The proposed initialization method yields better accuracy than the conventional method.