• Title/Summary/Keyword: Fingerprint Identification System

Search Result 118, Processing Time 0.027 seconds

Iris Recognition Using a Modified CPN (CPN을 이용한 홍채 인식)

  • Hong, Jin-Il;Yang, Woo-Suk
    • Journal of IKEEE
    • /
    • v.6 no.1 s.10
    • /
    • pp.10-20
    • /
    • 2002
  • The purpose of this work is to develop a system fer rapid and automatic identification of persons, with high reliability and confidence levels. The iris of the eye is used as an optical fingerprint, having a highly detailed pattern that is unique for each individual and stable over many years. Image analysis algorithms find the iris in a image, and encode its texture into an iris code. Iris texture is extracted from the image at multiple scales of analysis by wavelet transformation. The features of many different parts of the iris are projected onto the space-frequency space. They are used to determine an abstract iris code which is similar to 2D barcode. Pattern recognition is achieved by using modified CPN.

  • PDF

DNA Fingerprinting Analysis of the Genus Phytophthora in Korea

  • Park, Dong-Suk;Kang, Hee-Wan;Lee, Mi-Hee;Park, Young-Jin;Lee, Byoung-Moo;Hahn, Jang-Ho;Go, Seung-Joo
    • Mycobiology
    • /
    • v.31 no.4
    • /
    • pp.235-247
    • /
    • 2003
  • In order to investigate biodiversity and establish identification system for Phytophthora spp. in Korea, a variety of band pattern was produced by using the URP(universal rice primer). The fingerprint patterns of Phytophthora spp. showed many common and variable fragments according to their isolates in distinct genotypes. In particular, P. drechsleri was classified into four distinct types(I to IV). P. drechsleri(KACC 40498 and KACC 40499) and P. cryptogea(KACC 40413) appeared to have almost equal bands despite their being different species. Ninety isolates of Phytophthora spp. were clustered into 13 groups based on UPGMA(unweighted pair group method with arithmetic means) analysis. These DNA fingerprinting data would be helpful for inter- and intra-species identification of Phytophthora species.

Multi-modal Authentication Using Score Fusion of ECG and Fingerprints

  • Kwon, Young-Bin;Kim, Jason
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.132-146
    • /
    • 2020
  • Biometric technologies have become widely available in many different fields. However, biometric technologies using existing physical features such as fingerprints, facial features, irises, and veins must consider forgery and alterations targeting them through fraudulent physical characteristics such as fake fingerprints. Thus, a trend toward next-generation biometric technologies using behavioral biometrics of a living person, such as bio-signals and walking characteristics, has emerged. Accordingly, in this study, we developed a bio-signal authentication algorithm using electrocardiogram (ECG) signals, which are the most uniquely identifiable form of bio-signal available. When using ECG signals with our system, the personal identification and authentication accuracy are approximately 90% during a state of rest. When using fingerprints alone, the equal error rate (EER) is 0.243%; however, when fusing the scores of both the ECG signal and fingerprints, the EER decreases to 0.113% on average. In addition, as a function of detecting a presentation attack on a mobile phone, a method for rejecting a transaction when a fake fingerprint is applied was successfully implemented.

Design and Implementation of Fingerprint Identification for Embedded System (임베디드 시스템을 위한 지문 기반 개인인증의 설계 및 구현)

  • Kim, Won-Il;Ha, Hong-Joon;Lee, Chang-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.921-924
    • /
    • 2005
  • 지문인식 방법은 사람이 갖는 유일한 정보인 지문을 이용하여 문자 기반 인증 방법이 갖는 문제점을 해결할 수 있는 생체 인식 사용자 인증 방법이다. 많은 인식 방법들이 연구, 개발되었고 신뢰할 수 있는 인증 방법을 제공하기 위한 시도로 각종 방법들이 제안되고 또한 사용되고 있는데, 기존의 지문 인식 방법은 산술 연산과 수학적 접근을 주류로 하고 있기 때문에 부동 소수점 연산 프로세서(FPU)가 필요하다는 단점을 가지고 있다. 임베디드 시스템에서는 부동 소수점 연산 프로세서가 지원이 되지 않아 기존의 알고리즘들을 임베디드 시스템에 그대로 적용하기에는 문제가 있다. 따라서 본 논문에서는 이러한 단점을 극복하기 위해 기본적인 이미지 처리 및 특징점 추출 후, 수학적 연산을 최대한 배제한 알고리즘을 적용하여 인증을 수행하는 지문인식 방법을 제안한다.

  • PDF

Two-level Classification for Large-scale Fingerprint Identification System (대규모 지문식별시스템을 위한 2단계 분류)

  • 민준기;윤은경;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.730-732
    • /
    • 2004
  • 지문인식시스템은 크게 지문의 특징 추출단계, 입력지문과 유사한 후보지문을 찾는 검색단계, 마지막으로 입력지문과 후보지문들 간의 동일성을 판단하는 검증단계의 세 부분으로 나뉠 수 있다. 그리고 대규모 지문 데이터베이스를 기반으로 인식시스템을 구축하는 경우, 지문인식의 정확성과 더불어 신속성도 함께 고려해야 한다. 본 논문에서는 지문인식시스템의 전체 성능 향상을 위해 분류 단계에서의 개선방안으로 유전자알고리즘 기반의 특징 선택과 이의 조합을 다중분류기로 구축하는 2단계분류방법을 제안한다. NIST 데이터베이스 4에 대하여 실험한 결과 기존연구의 결과에 필적하는 분류율을 나타냈으며, 유전자알고리즘을 통해 적합한 방향성 조합을 제시할 수 있었다.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF

APPLICATION OF WIFI-BASED INDOOR LOCATION MONITORING SYSTEM FOR LABOR TRACKING IN CONSTRUCTION SITE - A CASE STUDY in Guangzhou MTR

  • Sunkyu Woo;Seongsu Jeong;Esmond Mok;Linyuan Xia;Muwook Pyeon;Joon Heo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.869-875
    • /
    • 2009
  • Safety is a big issue in the construction sites. For safe and secure management, tracking locations of construction resources such as labors, materials, machineries, vehicles and so on is important. The materials, machineries and vehicles could be controlled by computer, whereas the movement of labors does not have fixed pattern. So, the location and movement of labors need to be monitored continuously for safety. In general, Global Positioning System(GPS) is an opt solution to obtain the location information in outside environments. But it cannot be used for indoor locations as it requires a clear Line-Of-Sight(LOS) to satellites Therefore, indoor location monitoring system could be a convenient alternative for environments such as tunnel and indoor building construction sites. This paper presents a case study to investigate feasibility of Wi-Fi based indoor location monitoring system in construction site. The system is developed by using fingerprint map of gathering Received Signal Strength Indication(RSSI) from each Access Point(AP). The signal information is gathered by Radio Frequency Identification (RFID) tags, which are attached on a helmet of labors to track their locations, and is sent to server computer. Experiments were conducted in a shield tunnel construction site at Guangzhou, China. This study consists of three phases as follows: First, we have a tracking test in entrance area of tunnel construction site. This experiment was performed to find the effective geometry of APs installation. The geometry of APs installation was changed for finding effective locations, and the experiment was performed using one and more tags. Second, APs were separated into two groups, and they were connected with LAN cable in tunnel construction site. The purpose of this experiment was to check the validity of group separating strategy. One group was installed around the entrance and the other one was installed inside the tunnel. Finally, we installed the system inner area of tunnel, boring machine area, and checked the performance with varying conditions (the presence of obstacles such as train, worker, and so on). Accuracy of this study was calculated from the data, which was collected at some known points. Experimental results showed that WiFi-based indoor location system has a level of accuracy of a few meters in tunnel construction site. From the results, it is inferred that the location tracking system can track the approximate location of labors in the construction site. It is able to alert the labors when they are closer to dangerous zones like poisonous region or cave-in..

  • PDF