• Title/Summary/Keyword: Biometrics Information

Search Result 380, Processing Time 0.028 seconds

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

Periocular Recognition Using uMLBP and Attribute Features

  • Ali, Zahid;Park, Unsang;Nang, Jongho;Park, Jeong-Seon;Hong, Taehwa;Park, Sungjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6133-6151
    • /
    • 2017
  • The field of periocular biometrics has gained wide attention as an alternative or supplemental means to conventional biometric traits such as the iris or the face. Periocular biometrics provide intermediate resolution between the iris and the face, which enables it to support both. We have developed a periocular recognition system by using uniform Multiscale Local Binary Pattern (uMLBP) and attribute features. The proposed system has been evaluated in terms of major factors that need to be considered on a mobile platform (e.g., distance and facial pose) to assess the feasibility of the use of periocular biometrics on mobile devices. Experimental results showed 98.7% of rank-1 identification accuracy on a subset of the Face Recognition Grand Challenge (FRGC) database, which is the best performance among similar studies.

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

Development of Real-Time Verification System by Features Extraction of Multimodal Biometrics Using Hybrid Method (조합기법을 이용한 다중생체신호의 특징추출에 의한 실시간 인증시스템 개발)

  • Cho, Yong-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.9 no.4
    • /
    • pp.263-268
    • /
    • 2006
  • This paper presents a real-time verification system by extracting a features of multimodal biometrics using hybrid method, which is combined the moment balance and the independent component analysis(ICA). The moment balance is applied to reduce the computation loads by extracting the validity signal due to exclude the needless backgrounds of multimodal biometrics. ICA is also applied to increase the verification performance by removing the overlapping signals due to extract the statistically independent basis of signals. Multimodal biometrics are used both the faces and the fingerprints which are acquired by Web camera and acquisition device, respectively. The proposed system has been applied to the fusion problems of 48 faces and 48 fingerprints(24 persons * 2 scenes) of 320*240 pixels, respectively. The experimental results show that the proposed system has a superior verification performances(speed, rate).

  • PDF

Non-intrusive 3D Face Data Acquisition System (비 강압적 3차원 얼굴 데이터 획득 시스템 연구)

  • Kim, Joong-Rock;Yu, Sun-Jin;Lim, Kyung-Min;Kim, Soo-Yeon;Lee, Sang-Youn
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.929-930
    • /
    • 2008
  • To develop reliable 3D face recognition system, many researchers also have focused on 3D face data acquisition system. Previous many 3D face acquisition systems use visible patterns to solve corresponding problem, and this pattern made anyone who wants to be verified uncomfortable. In this paper, we propose a new invisible infrared line-laser pattern for 3D face data acquisition.

  • PDF

Empirical study on liveness detection of fingerprint

  • Jin Chang-Long;Huan Nguyen van;Kim Ha-Kil
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.241-245
    • /
    • 2006
  • Recent studies show that fingerprint recognition technology is confronted with spoofing of artificial fingers. In order to overcome this problem, the fingerprint recognition system needs to distinguish a fake finger from a live finger. This paper examines existing software-based approaches for fingerprint liveness detection through experiments. Implemented and tested in this paper are the approaches based on deformation, wavelet, and perspiration. These approaches will be analyzed and compared based on experimental results.

  • PDF

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

Design of Biometrics System Using ECG Lead III Signals (심전도 신호의 리드 III 파형을 이용한 바이오인식)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.43-50
    • /
    • 2011
  • Currently, conventional security methods including IC card or password type method are quickly switched into biometric security systems in various applications and the electrocardiogram (ECG) has been considered as one of novel biometrics way. However, conventional ECG based biometrics used lead II signal which conventionally used for formulaic signal to heart disease diagnosis and it is not suitable for biometrics since it is rather difficult to find consistent features for heart disease patents. To overcome this problem, we developed new biometrics system using ECG lead III signals. For wave extraction, signal peak points are extracted through AAV algorithm. For feature selection, extracted waves are categorized into one of four wave types and total twenty two features including number of vertices, wave shapes, amplitude information and interval information are extracted based on their wave types. Experimental results for thirty-six people showed 100% specificity, 95.59% sensitivity and 99.17% of overall identification accuracy.

Fingerprint Images Registration Method by Recursive Ridge Mapping (점진적 융선 정합을 통한 지문 영상 정렬 방법)

  • Choi, Kyoung-Taek;Choi, Hee-Seung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1007-1010
    • /
    • 2005
  • This paper presents a fingerprint image registration method. In the fingerprint system, the insufficiency of mutual information between a template and a query fingerprint is one of major factors to deteriorate recognition performance. To overcome this problem, we need to register multiple impressions and integrate their information. Our method matches the ridges from multiple impressions recursively and then registers the impressions to minimize the registration error calculated from the Distance map. Our method use regularized TPS model as the transformation model to compensate for the plastic deformation. We compare our method with 3 prior arts (ICP, Distance Map, Ross's method). Our registration error and its' variance is the smallest and also the average registration error is below 3 pixels.

  • PDF

Research on the efficient illumination method in iris recognition at a distance (원거리 홍채 인식에서 효율적 조명 조사방법에 관한 연구)

  • Jo, Hyun-Su;Bae, Kwang-Hyuk;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.969-970
    • /
    • 2008
  • This paper proposes illumination-efficient iris image capturing method. face capture method for extraction of iris pattern with one high resolution camera needs a large scale near infrared illumination. we replace high-resolution camera with co-optic-axial combination between wide view camera and narrow view camera. because this method needs small scale illumination that illuminate only narrow camera viewing angle, we can capture iris pattern image with small scale near infrared illumination.

  • PDF