• 제목/요약/키워드: Biometric systems

검색결과 198건 처리시간 0.033초

모바일 간편결제 서비스 이용 시 생체인증 사용의도에 관한 연구: 경험자와 비경험자 비교를 중심으로 (A Study on the Intention to Use Biometric Authentication When Using Mobile Easy Payment Service: Focusing on the Comparison of Experienced and Non-Experienced Persons)

  • 주재승;이원부
    • 경영정보학연구
    • /
    • 제23권4호
    • /
    • pp.1-22
    • /
    • 2021
  • 코로나19로 인한 언택트 환경 속에서 모바일 간편결제가 확산하고 있다. 모바일 결제 시 본인 인증을 위해 다양한 수단이 사용되고 있으며, 최근 생체정보의 활용이 증대되고 있다. 본 연구에서는 생체정보 사용에 영향을 주는 여러 가지 요인과 사용의도에 대한 상관 분석을 하였다. 요인별 변수를 성과기대, 노력기대, 사회적 영향 및 보안성으로 구분하고, 사용의도와의 연관성 파악을 위해 통합기술수용이론을 기반으로 실증분석을 하였다. 이를 위해 변수들을 단계적으로 투입하는 단계적 회귀분석을 총 4회 실시하였다. 분석결과, 통합기술수용이론에서 제시된 성과기대, 노력기대, 사회적 영향, 보안성 등이 모두 사용의도에 긍정적인 영향을 미치고 있으며, 또한 노력기대와 보안성은 생체인증 경험여부에 따라 사용의도에 조절효과가 있는 것으로 제시되었다. 이 연구를 통해 생체정보의 효과적 활용과 기술 발전에 도움이 되기를 기대한다.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Fingerprint Identification Based on Hierarchical Triangulation

  • Elmouhtadi, Meryam;El Fkihi, Sanaa;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.435-447
    • /
    • 2018
  • Fingerprint-based biometric identification is one of the most interesting automatic systems for identifying individuals. Owing to the poor sensing environment and poor quality of skin, biometrics remains a challenging problem. The main contribution of this paper is to propose a new approach to recognizing a person's fingerprint using the fingerprint's local characteristics. The proposed approach introduces the barycenter notion applied to triangles formed by the Delaunay triangulation once the extraction of minutiae is achieved. This ensures the exact location of similar triangles generated by the Delaunay triangulation in the recognition process. The results of an experiment conducted on a challenging public database (i.e., FVC2004) show significant improvement with regard to fingerprint identification compared to simple Delaunay triangulation, and the obtained results are very encouraging.

Multimodal System by Data Fusion and Synergetic Neural Network

  • Son, Byung-Jun;Lee, Yill-Byung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제5권2호
    • /
    • pp.157-163
    • /
    • 2005
  • In this paper, we present the multimodal system based on the fusion of two user-friendly biometric modalities: Iris and Face. In order to reach robust identification and verification we are going to combine two different biometric features. we specifically apply 2-D discrete wavelet transform to extract the feature sets of low dimensionality from iris and face. And then to obtain Reduced Joint Feature Vector(RJFV) from these feature sets, Direct Linear Discriminant Analysis (DLDA) is used in our multimodal system. In addition, the Synergetic Neural Network(SNN) is used to obtain matching score of the preprocessed data. This system can operate in two modes: to identify a particular person or to verify a person's claimed identity. Our results for both cases show that the proposed method leads to a reliable person authentication system.

비접촉식 지문방지 도어락 시스템 구현 (The Implementation of Non-contact Door-lock System for Preventing Fingerprint)

  • 김현옥;문광수;김승규;김두용;김기완
    • 반도체디스플레이기술학회지
    • /
    • 제13권4호
    • /
    • pp.77-81
    • /
    • 2014
  • There have been developed in authentication systems for information using biometric information approaches such as fingerprint, face, and iris. In general, a door-lock system is operated by touching keypads, which remains fingerprints on the keypads. Such door-lock systems do not protect personal information from others due to the exposure of fingerprints to keypads. In this paper, we propose the new door-lock system that does not leave fingerprints on the keypads. Without touching keypad the system works because the system accepts authentication information by using illuminance sensor and LED. The experiment shows that the implemented door-lock system works well under any circumstance.

3차원 기하학적 해싱을 이용한 퍼지볼트에서의 지문 정합 (A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault)

  • 이성주;문대성;김학재;이옥연;정용화
    • 정보보호학회논문지
    • /
    • 제18권1호
    • /
    • pp.11-21
    • /
    • 2008
  • 바이오정보를 이용한 사용자 인증은 일반적인 패스워드 기반 시스템에 비해 많은 장점을 가지고 있다. 또한, 바이오정보를 이용한 인증 시스템은 높은 보안성과 사용자의 편리성을 제공하기 위하여 암호학과 바이오정보 분야를 암호-바이오(crypto-biometric) 시스템으로 통합하여 연구되고 있다. 최근 퍼지볼트라 불리는 암호-바이오 시스템이 보고되고 있다. 이것은 사용자의 중요한 비밀키와 바이오정보를 통합하여 정당한 사용자만이 비밀키를 획득 할 수 있도록 안전하게 보관하는 방법이다. 하지만 기존 연구들에서는 바이오정보를 안전하게 보호하기 위해 추가되는 거짓 특징점의 개수가 제한되어 높은 보안성을 제공하지 못하는 문제가 있다. 본 논문에서는 3차원 기하학적 해쉬 테이블을 이용하여 보안성을 개선하고 추가적인 정보 없이 보호된 지문 템플릿에서 자동으로 지문 정렬을 수행하는 방법을 제안한다. 실험을 통하여 제안한 3차원 지문 퍼지볼트 기법이 추가적인 정보 없이 역변환이 불가능한 변환된 영역상에서 자동으로 지문 정렬을 수행가능하다는 것을 확인하였다.

웹상의 BioAPI에 기반한 서명 다중 인증 시스템 (A Multiple Signature Authentication System Based on BioAPI for WWW)

  • 윤성근;김성훈;전병환
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제31권9호
    • /
    • pp.1226-1232
    • /
    • 2004
  • 차세대 보안 시장을 이끌어갈 신기술로 생체 인증 기술이 부상하고 있으나, 기존 시스템들은 대부분 생체 특징에 따라 개별 단위의 인증 방식을 제공하고 있다. 최근에는 이러한 개별 시스템들을 통합할 수 있도록 표준화하기 위한 연구가 활발히 이루어지고 있다. 본 논문에서는 생체 인증 기술의 표준화를 위해서 BioAPI 협회에서 발표한 BioAPI 명세서를 따르면서, 필기 서명이라는 단일 생체측정에 대해 함수적, 매개변수적, 구조적 접근법의 서로 다른 세 가지 검증기를 적용한 웹기반 인증 시스템을 제안한다. 시스템은 클라이언트-서버 구조이고, 클라이언트와 서버는 각각 BioAPI 규격에 따라 크게 세 계층으로 구성된다. 제안한 웹기반 단일 생체측정의 다중 인중 시스템은 사용자의 인증 거부율이 다소 증가되더라도 별도의 여러 생체측정을 요구하지 않으면서도 인증의 신뢰도를 크게 향상시킬 수 있다. 즉 세가지 서명 검증기를 결합한 경우, 사용자의 인증 거부율(FRR)이 약 2.7배 증가하였지만 오류 승인률(FAR)은 4만분의 1로 감소하는 것으로 나타났다. 따라서 제안한 방법은 개방형 네트워크인 인터넷에서의 효과적인 신원확인 방법으로 활용될 수 있으며, 또한 다양한 생체측정을 이용하는 시스템으로 쉽게 확장될 수 있다.

Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm

  • Wang, Ning;Lu, Li;Gao, Ge;Wang, Fanglin;Li, Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2420-2433
    • /
    • 2014
  • Fusing the scores of multibiometrics is a very promising approach to improve the overall system's accuracy and the verification performance. In recent years, there are several approaches towards studying score level fusion of several biometric systems. However, most of them does not consider the genuine and imposter score distributions and result in a higher equal error rate usually. In this paper, a novel score level fusion approach of different biometric systems (dual iris, thermal and visible face traits) based on $Acz{\acute{e}}l$-Alsina triangular norm is proposed. It achieves higher identification performance as well as acquires a closer genuine distance and larger imposter distance. The experimental tests are conducted on a virtual multibiometrics database, which merges the challenging CASIA-Iris-Thousand database with noisy samples and the NVIE face database with visible and thermal face images. The rigorous results suggest that significant performance improvement can be achieved after the implementation of multibiometrics. The comparative experiments also ascertain that the proposed fusion approach outperforms the state-of-art verification performance.

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.