• Title/Summary/Keyword: Finger Print

Search Result 69, Processing Time 0.026 seconds

Fingerprint Template Protection using Fuzzy Vault

  • Moon Dae-Sung;Lee Sung-Ju;Jung Seung-Hwan;Chung Yong-Wha;Moon Ki-Young
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.123-132
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect finger-print templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.

  • PDF

Reference statements using the fingerprint watermarking simplify system (지문 워터마킹을 활용한 진술조서 간소화 시스템)

  • Kim, Hee-Chul;Jeong, Yang-Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.93-98
    • /
    • 2016
  • A large number of victims or witnesses to incidents and accidents should visit a police station and fill the decree stated. Stated decree workaround discomfort and hygienic problems in unnecessary step process using the fingerprint after you modify the modified portion when due modify the request as of the import or typos recognized that modifications and police in the. Stated decree in the investigation phase when creating KICS and electronic Resources investigation into the identity of the one-touch fingerprint reader linked with the introduction table system and thinning, which can simplify the day of the procedure.

IoT based Authentication System Implementation on Raspberry Pi (라즈베리파이에서 사물인터넷 기반의 인증 시스템 구현)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.31-38
    • /
    • 2017
  • With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.

Gravure off-set printing method for the high-efficiency multicrystalline-silicon solar cell (Gravure off-set 인쇄법을 적용한 고효율 다결정 실리콘 태양전지)

  • Kim, Dong-Ju;Kim, Jung-Mo;Bae, So-Ik;Jun, Tae-Hyun;Song, Ha-Chul
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.04a
    • /
    • pp.293-298
    • /
    • 2011
  • The most widely used method to form an electrode in industrial solar cells are screen printing. Screen printing is characterized by a relatively simple and well-known production sequence with high throughput rates. However the method is difficult to implement a fine line width of high-efficiency solar cells can not be made. The open circuit voltage(Voc) and the short circuit current density(Jsc) and fill factor(FF) need to be further improved to increase the efficiency of silicon solar cells. In this study, gravure offset printing method using the multicrystalline-silicon solar cells were fabricated. Gravure off-set printing method which can print the fine line width of finger electrode can have the ability reduce the shaded area and increase the Jsc. Moreover it can make a high aspect ratio thereby series resistance is reduced and FF is increased. Approximately $50{\mu}m$ line width with $35{\mu}m$ height was achieved. The efficiency of gravure off set was 0.7% higher compare to that of scree printing method.

  • PDF

물리적 기상증착법을 이용한 내지문(Anti-Finger Print) 코팅 최적 공정 및 박막특성분석

  • Kim, Wang-Ryeol;Kim, Hyeon-Seung;Jeong, U-Chang;Gwon, Min-Cheol
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.489-489
    • /
    • 2013
  • AF 코팅은 유리나 플라스틱과 같은 기재 표면을 특수 처리하여 지문과 같은 오염물질의 부착방지와 오염물질이 부착되더라도 쉽게 제거 가능하도록 하는 기술이다. 전자, 자동차, 건축, 섬유, 철강분야 등에 활용 가능한 중요기술로 박막의 발수 발유 기능을 부여하는 표면처리 기술이고, 코팅방법에는 진공증착, 스핀코팅, 딥코팅, 플로우 코팅, 스프레이 코팅 등이 있으며, 경화 방법이나 접촉각 등의 특성이 반영된다. 터치패널 등의 지문부착방지 기술은 불소계와 비불소계 재료로 구분할 수 있지만 지문을 쉽게 지울 수 있고, 오염 방지 기능과 내구성이 있으며, 우수한 광학특성을 유지하는 것이 과제라 할 수 있다. 그리고 항균성을 부여하는 기술도 개발되고 있다. 이런 터치패널의 강화유리에 AF 코팅한 제품은 핸드폰 글래스에 처음 적용하면서부터 실생활에 도입이 시작되고 있다. 이러한 AF 코팅을 스퍼터링 법을 이용하여 증착 시켰다. 기존에는 E-beam을 이용한 증착 방식이 주를 이루었지만, 스퍼터링 법을 이용함으로써 박막의 균일화 및 대량생산이 가능해졌다. 따라서 이 연구에서는 기존의 E-beam 방식과 sputtering 공정 중 ion source에 의한 전처리의 유무에 따른 박막의 특성을 비교하였다. 내부식성, 내마모성 시험을 거친 후, 접촉각을 측정하여 알아보았으며, 박막의 건전성 및 균일성은 FE-SEM을 이용하여 관찰하였다. 실험용 장비가 아닌 실제 생산장비인 직경 1,400 파이의 장비를 이용하여 증착하였으며 염수분무 및 내마모 시험 후, 기존 접촉각의 ${\pm}5^{\circ}$ 내외임을 확인 할 수 있었고, 박막의 건전성 또한 뛰어남을 알 수 있었다.

  • PDF

The tap-scan method for damage detection of bridge structures

  • Xiang, Zhihai;Dai, Xiaowei;Zhang, Yao;Lu, Qiuhai
    • Interaction and multiscale mechanics
    • /
    • v.3 no.2
    • /
    • pp.173-191
    • /
    • 2010
  • Damage detection plays a very important role to the maintenance of bridge structures. Traditional damage detection methods are usually based on structural dynamic properties, which are acquired from pre-installed sensors on the bridge. This is not only time-consuming and costly, but also suffers from poor sensitivity to damage if only natural frequencies and mode shapes are concerned in a noisy environment. Recently, the idea of using the dynamic responses of a passing vehicle shows a convenient and economical way for damage detection of bridge structures. Inspired by this new idea and the well-established tap test in the field of non-destructive testing, this paper proposes a new method for obtaining the damage information through the acceleration of a passing vehicle enhanced by a tapping device. Since no finger-print is required of the intact structure, this method can be easily implemented in practice. The logistics of this method is illustrated by a vehicle-bridge interaction model, along with the sensitivity analysis presented in detail. The validity of the method is proved by some numerical examples, and remarks are given concerning the potential implementation of the method as well as the directions for future research.

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

A Design and Implementation of Positioning System Using Characteristics of Outdoor Environments and Weak Signal Strength (저준위 신호세기와 실외 환경 특징을 활용한 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2411-2418
    • /
    • 2011
  • The most typically utilized positioning method in the existing indoor WPS that is a positioning method utilizing distributed wireless network is the finger print. Its positioning is carried out by calculating the difference between the AP information map and WiFi AP signal collected. However, there are problems like low accuracy and high cost when the existing method and the radio map formation are applied to outdoors. In this paper, the characteristics of the existing WPS are surveyed and their problems are examined. In addition, we propose a new WPS using weak signal and a method to construct radio map in order to solve the above problems. And then, the results of experimental test will be analyzed.

Characteristics of the Palm Prints and Palm Creases According to Sasang Constitutional Types (사상체질 유형에 따른 손바닥문, 손금의 특징)

  • Chung, Min-Suk;Kim, Yi-Suk;Park, Seong-Sik
    • Korean Journal of Oriental Medicine
    • /
    • v.5 no.1
    • /
    • pp.101-110
    • /
    • 1999
  • In Sasang constitutional medicine, the classification of Sasang constitutional types (Tae-Yang, Tae-Eum, So-Yang, and So-Eum) is important for the treatment. There are some problems with the methods used for classifying Sasang constitutional types; old methods such as pulse-palpation are not considered objective and recent methods such as immunohematology are considered expensive, painful and time-consuming. To overcome these problems, a body measurement and finger prints analysis were performed. The purpose of this study was to determine whether the palm prints and the palm creases could be helpful in classifying Sasang constitutional types. Thus, we looked for characteristics of the palm prints and the palm creases according to Sasang constitutional types. Before analyzing the palm prints and palm creases, 760 Korean (465 males, 295 females) were surveyed using two kinds of questionnaires for classifying Sasang constitutional types. As there were no Tae-Yang individuals, we were only able to identify the characteristics of the palm prints and the palm creases for Tae-Eum (288 persons), So-Yang (193 persons), and So-Eum (279 persons) individuals. In this study, the terminal points of D, closed crease, and open crease seemed to be helpful in classifying Tae-Eum and So-Eum individuals. Terminal point 11 and closed crease were frequent in Tae-Eum individuals; whereas, terminal point 7 and open crease were frequent in So-Eum individuals. Therefore, the palm prints and the palm creases seem to contribute to the classification of Sasang constitutional types.

  • PDF

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF