• Title/Summary/Keyword: Biometrics system

Search Result 231, Processing Time 0.025 seconds

System Specification-based Design and Verification of Mobile Patient Monitoring System (이동 환자 상시 모니터링 시스템의 시스템 명세 기법 기반 설계와 검증)

  • Choi, Eun-Jung;Kim, Myuhng-Joo
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.161-167
    • /
    • 2010
  • To realize the U-healthcare system, the mobile patient monitoring system is of the essence. In this monitoring system, a patient's real-time data on biometrics and location must be transferred to predeterminate destination server ceaselessly. As the number of mobile patients increases steadily or mobile patients are moving into some specific area, the load balancing solution to real-time data congestion problem is needed. In this paper, we propose a new mobile patient monitoring system with Torus topology where three layers are connected hierarchically and the intermediate layer takes charge of priority-based load balancing. For the formalized design and verification of proposed system, we describe the overall structure with connectivity among its components and implement major components in pseudo-code by adopting a system specification-based approach. This approach makes the design and verification of our mobile patient monitoring system more flexible and accurate.

User Authentication Scheme based on Security-enhanced Biometric Information for C/S System (C/S 시스템에 적합한 보안성이 강화된 생체정보 기반의 사용자 인증 스킴)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.43-53
    • /
    • 2015
  • Password-based authentication schemes for server-client system are convenient to use, but vulnerable to dictionary attack or brute-force attack. To solve this vulnerability, Cryptographic secret key is used for security, but difficult to memorize. So, for the first time, Das proposed a biometric-based authentication scheme to solve various problems but it has various vulnerabilities. Afterwards, Jiping et al. improved Das's scheme, but some vulnerabilities remain. In this paper, we analyze the cryptanalysis of Jiping et al.'s authentication scheme and then propose improved biometric based user authentication scheme to resolve the analyzed problem. Moreover, we conduct a security analysis for the proposed scheme and make a comparison between the proposed scheme and other biometric based user authentications.

Authentication Scheme using Biometrics in Intelligent Vehicle Network (지능형 자동차 내부 네트워크에서 생체인증을 이용한 인증기법)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2013
  • Studies on the intelligent vehicles that are fused with IT and intelligent vehicle technologies are currently under active discussion. And many new service models for them are being developed. As intelligent vehicles are being actively developed, a variety of wireless services are support. As such intelligent vehicles use wireless network, they are exposed to the diverse sources of security risk. This paper aims to examine the factors to threaten intelligent vehicle, which are usually intruded through network system and propose the security solution using biometric authentication technique. The proposed security system employs biometric authentication technique model that can distinguish the physical characteristics of user.

A Double-Sided Fingerprint Sensing Method (양면 지문 입력 방법)

  • Shim, Jae-Chang;Kim, Seong-Young;Choi, Mi-Soon;Kim, Ik-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.323-330
    • /
    • 2008
  • In this paper, we propose a new fingerprint sensing method that can reduce orientation error. General fingerprint input methods need finger to be put on the surface of a sensor. It can cause of rotation problem and it affects the recognition result significantly. This improved input method can minimize the rotation of a finger by holding double-sided sensor with both thumb and index finger at the same time. Whenever fingerprint is impressed, it has nearly the same orientation because sensors are located between two fingers. As a result, we can get a better performance in fingerprint recognition system, but it may need more hardware cost.

  • PDF

Design of OTP based on Mobile Device using Voice Characteristic Parameter (음성 특징 파라메터를 이용한 모바일 기반의 OTP 설계)

  • Cha, Byung-Rae;Kim, Nam-Ho;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.512-520
    • /
    • 2010
  • As the applications based on Mobile and Ubiquitous becoming more extensive, the communication security issues of those applications are appearing to be the most important concern. Therefore, every part of the system should be thoroughly designed and mutually coordinated in order to support overall security of the system. In this paper. we propose new technique which uses the voice features in order to generate Mobile One Time Passwords(OTPs). Voice is considered to be one of the powerful personal authentication factors of biometrics and it can be used for generating variable passwords for one time use. Also we performed a simulation of homomorphic variability of voice feature points using dendrogram and distribution of voice feature points for proposed password generation method.

A Fast Iris Feature Extraction Method For Embedded System (Embedded 시스템을 위한 고속의 홍채특징 추출 방법)

  • Choi, Chang-Soo;Min, Man-Gi;Jun, Byoung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.128-134
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, using iris information is used in many fields such as access control and information security. But Perform complex operations to extract features of the iris. because High-end hardware for real-time iris recognition is required. This paper is appropriate for the embedded environment using local gradient histogram embedded system using iris feature extraction methods have implement. Experimental results show that the performance of proposed method is comparable to existing methods using Gabor transform noticeably improves recognition performance and it is noted that the processing time of the local gradient histogram transform is much faster than that of the existing method and rotation was also a strong attribute.

Improving Customer Information Management System by Using Blockchain and Biometric Authentication (블록체인과 바이오메트릭 인증 기술을 이용한 고객 정보 관리 시스템의 개선 방안)

  • Na, YunSeok;Cho, Sangrae;Kim, Soo-hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.1021-1030
    • /
    • 2018
  • Nowadays, the ubiquitous environment that can utilize the computer everywhere is being formed. As the environment changes, services develop and manage systems and databases that can manage customer information to provide better services to customers through Information Technology. The system that most services maintain is a way of putting and managing customer information on the server. In this paper, we first find the problem in terms of security and convenience. After that, we propose a solution that improves the problem through blockchain technology and biometric authentication.

An Ensemble Fingerprint Classification System Using Changes of Gradient of Ridge (융선 기울기의 변화량을 이용한 앙상블 지문분류 시스템)

  • Yoon, Kyung-Bae;Park, Chang-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.5
    • /
    • pp.545-551
    • /
    • 2003
  • Henry System which is a traditional fingerprint classification model is difficult to apply to a modem Automatic Fingerprint Identification System (AFIS). To tackle this problem, this study is to apply algorithm for an An Ensemble Fingerprint Classroom System using changes of gradient of ridge in order to improve precise joining speed of a large volume of database. The existing classification system, Henry System, is useful in a captured fingerprint image of core point and delta point using paper and ink. However, the Henry System is unapplicable in modem Automatic Fingerprint Identification System (AFIS) because of problems such as size of input sensor and way of input. This study is to suggest an Ensemble Fingerprint Classroom System which can classify 5 basic patterns of Henry System in uncaptured delta image using changes of gradient of ridge. The proposed fingerprint classification technique will make an improvement of precise joining speed by reducing data volume.

Speaker Verification System Using Continuants and Multilayer Perceptrons (지속음 및 다층신경망을 이용한 화자증명 시스템)

  • Lee, Tae-Seung;Park, Sung-Won;Hwang, Byong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.1015-1020
    • /
    • 2003
  • Among the techniques to protect private information by adopting biometrics, speaker verification is expected to be widely used due to advantages in convenient usage and implementation cost. Speaker verification should achieve a high degree of the reliability in the verification score, the flexibility in speech text usage, and the efficiency in verification system complexity. Continuants have excellent speaker-discriminant power and the modest number of phonemes in the category, and multilayer perceptrons (MLPs) have superior recognition ability and fast operation speed. In consequence, the two provide viable ways for speaker verification system to obtain the above properties. This paper implements a system to which continuants and MLPs are applied, and evaluates the system using a Korean speech database. The results of the experiment prove that continuants and MLPs enable the system to acquire the three properties.

  • PDF

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.