• Title/Summary/Keyword: Engineering Identities

Search Result 96, Processing Time 0.033 seconds

The biometric authentication technology, which makes overseas trip possible without passports (여권 없이도 외국 여행이 가능한 생체 측정 인증 기술)

  • Shim, Hyun Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.88-95
    • /
    • 2012
  • The passport is not only an officially proven document in order to identify the nationalities of travelers, but also request for protections of travelers. Since the overseas trips have been increased, the uses of forged or modulated passports are also now rapidly increasing. The forged or modulated passports are mainly used by international criminal organization or offenders, who are restricted by immigration control, in order to avoid under the radar and conceal their identities. The purpose of biometric authentication technology is to define one's unique identities through the comparative analysis one's unique finger prints, iris, sweat gland, blood vessel, palm pattern, vein distribution, voice, and etc. We have been studying about applicable and possibilities of the biometric authentication technology for overseas travel without passports. In hence, we have been also collected various of technical references of using biometric authentication, and have been analyzed what is the best biometric to be alternatively used instead of passports.

  • PDF

A Trust Management Model for PACS-Grid

  • Cho, Hyun-Sook;Lee, Bong-Hwan;Lee, Kyu-Won;Lee, Hyoung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.144-149
    • /
    • 2007
  • Grid technologies make it possible for IT resources to be shared across organizational and security domains. The traditional identity-based access control mechanisms are unscalable and difficult to manage. Thus, we propose the FAS (Federation Agent Server) model which is composed of three modules: Certificate Conversion Module (CCM), Role Decision Module (RDM), and Authorization Decision Module (ADM). The proposed FAS model is an extended Role-Based Access Control (RBAC) model which provides resource access capabilities based on roles assigned to the users. FAS can solve the problem of assigning multiple identities to a shared local name in grid-map file and mapping the remote entity's identity to a local name manually.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

Multi-Task Network for Person Reidentification (신원 확인을 위한 멀티 태스크 네트워크)

  • Cao, Zongjing;Lee, Hyo Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.472-474
    • /
    • 2019
  • Because of the difference in network structure and loss function, Verification and identification models have their respective advantages and limitations for person reidentification (re-ID). In this work, we propose a multi-task network simultaneously computes the identification loss and verification loss for person reidentification. Given a pair of images as network input, the multi-task network simultaneously outputs the identities of the two images and whether the images belong to the same identity. In experiments, we analyze the major factors affect the accuracy of person reidentification. To address the occlusion problem and improve the generalization ability of reID models, we use the Random Erasing Augmentation (REA) method to preprocess the images. The method can be easily applied to different pre-trained networks, such as ResNet and VGG. The experimental results on the Market1501 datasets show significant and consistent improvements over the state-of-the-art methods.

Human Action Recognition Based on An Improved Combined Feature Representation

  • Zhang, Ning;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.12
    • /
    • pp.1473-1480
    • /
    • 2018
  • The extraction and recognition of human motion characteristics need to combine biometrics to determine and judge human behavior in the movement and distinguish individual identities. The so-called biometric technology, the specific operation is the use of the body's inherent biological characteristics of individual identity authentication, the most noteworthy feature is the invariance and uniqueness. In the past, the behavior recognition technology based on the single characteristic was too restrictive, in this paper, we proposed a mixed feature which combined global silhouette feature and local optical flow feature, and this combined representation was used for human action recognition. And we will use the KTH database to train and test the recognition system. Experiments have been very desirable results.

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems

  • Lee, Poong-Up;Jeong, Jang-Keun;Saxena, Navrati;Shin, Ji-Tae
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.207-220
    • /
    • 2009
  • A large number of phone calls and data services will take place in indoor environments. In Long Term Evolution (LTE), femtocell, as a home base station for indoor coverage extension and wideband data service, has recently gained significant interests from operators and consumers. Since femtocell is frequently turned on and off by a personal owner, not by a network operator, one of the key issues is that femtocell should be identified autonomously without system information to support handover from macrocell to femtocell. In this paper, we propose a dynamic reservation scheme of Physical Cell Identities (PCI) for 3GPP LTE femtocell systems. There are several reserving types, and each type reserves a different number of PCIs for femtocell. The transition among the types depends on the deployed number of femtocells, or the number of PCI confusion events. Accordingly, flexible use of PCIs can decrease PCI confusion. This reduces searching time for femtocell, and it is helpful for the quick handover from macrocell to femtocell. Simulation results show that our proposed scheme reduces average delay for identifying detected cells, and increases network capacity within equal delay constraints.

First Report of the Virus Diseases in Victory Onion (Allium victorialis var. platyphyllum) (산마늘(Allium victorialis var. platyphyllum)에서 바이러스병의 최초보고)

  • Park, Seok-Jin;Nam, Moon;Kim, Jeong-Seon;Lee, Yeong-Hoon;Lee, Jae-Bong;Kim, Min-Kyeong;Lee, Jun-Seong;Choi, Hong-Soo;Kim, Jeong-Soo;Moon, Jae-Sun;Kim, Hong-Gi;Lee, Su-Heon
    • Research in Plant Disease
    • /
    • v.17 no.1
    • /
    • pp.66-74
    • /
    • 2011
  • In 2005, a survey was conducted to identify virus diseases on victory onion, Allium victorialis var. platyphyllum grown in Ulleung island located in the East Sea. A total of 61 samples were collected from victory onion in the neighborhood of Seonginbong. The identification of viruses from the samples were carried out by electron microscopy and RT-PCR using primers species specific to GCLV, LYSV, SLV, OYDV and genus specific to Allexivirus, respectively. From sixty-one samples, filamentous rod particles (600-900 nm) were detected from four victory onion samples in EM, three samples containing SLV and one sample containing both SLV and Allexivirus in RT-PCR analysis, respectively. Victory onions naturally infected by the viruses were asymptomatic apparently. The viruses detected by RT-PCR were further characterized by the nucleotide sequence analysis of the coat protein region. Three isolates of SLV showed approximately 99% identities in the nucleotide and amino acid sequences, suggesting that they were likely to be the same strain. On the other hand, they showed approximately 75.7~83.7% identities in the nucleotide and 89.2~97.0% in amino acid sequences compared with the previously reported SLV isolates in Allium. The CP gene of the Allexivirus showed approximately 99.2% nucleotide identities and 98.8% amino acid identities with Garlic virus A. However, there was relatively low homology ranging from 60.6% to 81.5% compared with other Allexiviruses (GarV-C, GarV-E, GarV-X, GMbMV, and Shal-X). These data suggested that two viruses, SLV and GarV-A identified from victory onion, are named SLV-Ulleungdo and GarV-A-Ulleungdo, respectively. This is the first report of viruses infecting victory onion.

Secure Private Key Revocation Scheme in Anonymous Cluster -Based MANETs

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.499-505
    • /
    • 2015
  • Security supports are a significant factor in the design of mobile ad hoc networks. In the dynamic topology where the node changes frequently, private key generation and revocation for newly joining and leaving nodes must be considered. In addition, the identities of individual nodes must be protected as well in mobile networks to avoid personal privacy concerns. This paper proposes ID-based private key revocation scheme and non-interactive key agreement scheme in anonymous MANETs. The proposed scheme provides the user privacy using pseudonyms and private key generation and revocation schemes with consideration of dynamic user changes. Therefore, our schemes can be applied in dynamic and privacy-preserving MANETs which are helpful to share multimedia data.

User-Friendly Personal Photo Browsing for Mobile Devices

  • Kim, Sang-Kyun;Lee, Jae-Won;Lee, Ryong;Hwang, Eui-Hyeon;Chung, Min-Gyo
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.432-440
    • /
    • 2008
  • In this paper, a user-friendly mobile photo album system and albuming functions to support it are introduced. Stand-alone implementation in a mobile device is considered. The main idea of user-friendly photo browsing for albuming functions is to enable users to organize and browse their photos along semantically meaningful axes of events, personal identities, and categories. Experimental results demonstrate that the proposed method would be sufficiently useful and efficient for browsing personal photos in mobile environment.

  • PDF