• Title/Summary/Keyword: Fingerprint scheme

Search Result 78, Processing Time 0.026 seconds

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

Efficient 1:N Matching Scheme for Fingerprint Identification (지문 인식을 위한 효율적인 1:N 매칭 방법)

  • Jung, Soon-Won
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.173-179
    • /
    • 2008
  • This paper proposes an efficient 1:N matching scheme for fingerprint identification. Usually, in the minutiae-based matching scheme, fingerprint matching score could be calculated by analyzing geometrical similarity between minutiae from two fingerprints. To calculate the geometrical similarity between them, it is necessary to fingerprint align a fingerprint data with the other one. The final matching score is obtained by bidirectional matching in the common fingerprint matching scheme, because the similarity between two fingerprints varies with the result of alignments. The reliability of matching score by the bidirectional matching is better than by the unidirectional matching, but it takes two times comparing with unidirectional matching. To solve the problem, this paper proposes an efficient 1:N fingerprint matching scheme based on the distribution of bidirectional matching scores for the large fingerprints database. The experimental result shows the usefulness of the proposed scheme.

A Method to Construct a Cut-off Fingerprint Map to Improve Accuracy in Indoor Positioning Scheme (실내 위치 추정 방식에서 정확도를 향상시키기 위해 컷-오프 핑거프린트 지도를 구성하는 방식)

  • Kim, Dongjun;Son, Jooyoung
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1330-1337
    • /
    • 2017
  • In off-line phase of the preliminary Cut-off indoor positioning scheme, which is one of the indoor positioning scheme using the fingerprint, relative ranks of peak RSSIs received from beacons at each reference point are stored in the fingerprint map. In some reference points, signals of multiple beacons may be received. In this case, the relative ranks may be different when constructing fingerprint and when receiving signals in real-time. To solve this problem, we propose a method to utilize only up to five beacons with high ranking when constructing a fingerprint and when receiving signals in real-time and comparing them with stored information of a fingerprint. Experiments were conducted on the estimation probabilities and the average error when using this method. Those are compared with the previous methods. Experimental results show that the estimation probabilities and the average error are improved by removing only the remaining five beacons at each reference point of the fingerprint.

Location Estimation Method Employing Fingerprinting Scheme based on K-Nearest Neighbor Algorithm under WLAN Environment of Ship (선박의 WLAN 환경에서 K-최근접 이웃 알고리즘 기반 Fingerprinting 방식을 적용한 위치 추정 방법)

  • Kim, Beom-Mu;Jeong, Min A;Lee, Seong Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2530-2536
    • /
    • 2014
  • Many studies have been made on location estimation under indoor environments which GPS signals do not reach, and, as a result, a variety of estimation methods have been proposed. In this paper, we deeply consider a problem of location estimation in a ship with a multi-story structure, and investigate a location estimation method using the fingerprint scheme based on the K-Nearest Neighbor algorithm. A reliable DB is constructed by measuring 100 received signals at each of 39 RPs in order to employ the fingerprint scheme, and, based on the DB, a simulation to estimate the location of a randomly-positioned terminal is performed. The simulation result confirms that the performance of location estimation by the fingerprint scheme is quite satisfactory.

Conjoined Audio Fingerprint based on Interhash and Intra hash Algorithms

  • Kim, Dae-Jin;Choi, Hong-Sub
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.1-6
    • /
    • 2015
  • In practice, the most important performance parameters for music information retrieval (MIR) service are robustness of fingerprint in real noise environments and recognition accuracy when the obtained query clips are matched with the an entry in the database. To satisfy these conditions, we proposed a conjoined fingerprint algorithm for use in massive MIR service. The conjoined fingerprint scheme uses interhash and intrahash algorithms to produce a robust fingerprint scheme in real noise environments. Because the interhash and intrahash algorithms are masked in the predominant pitch estimation, a compact fingerprint can be produced through their relationship. Experimental performance comparison results showed that our algorithms were superior to existing algorithms, i.e., the sub-mask and Philips algorithms, in real noise environments.

Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle

  • Moon, Sangmi;Kim, Hyeonsung;You, Young-Hwan;Kim, Cheol Hong;Hwang, Intae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1929-1943
    • /
    • 2021
  • Millimeter wave (mmWave) communication based on the wide bandwidth of >28 GHz is one of the key technologies for cellular-connected unmanned aerial vehicles (UAVs). The selection of mmWave beams in such cellular-connected UAVs is challenging and critical, especially when downlink transmissions toward aerial user equipment (UE) suffer from poor signal-to-interference-plus-noise ratio (SINR) more often than their terrestrial counterparts. This study proposed a coordinated mmWave beam selection scheme using fingerprint for cellular-connected UAV. The scheme comprises fingerprint database configuration and coordinated beam selection. In the fingerprint database configuration, the best beam index from the serving cell and interference beam indexes from neighboring cells are stored. In the coordinated beam selection, the best and interference beams are determined using the fingerprint database information instead of performing an exhaustive search, and the coordinated beam transmission improves the SINR for aerial UEs. System-level simulations assess the UAV effect based on the third-generation partnership project-new radio mmWave and UAV channel models. Simulation results show that the proposed scheme can reduce the overhead of exhaustive search and improve the SINR and spectral efficiency.

The Biometric Authentication Scheme Capable of Multilevel Security Control (보안레벨 조절이 가능한 바이오메트릭 인증 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A fingerprint is unique to each person and can be represented as a digital form. As the fingerprint is the part of human body, fingerprint recognition is much more easy to use and secure rather than using password or resident card for user authentication. In addition, as the newly released smart phones have built-in camera and fingerprint sensors, the demand for biometric authentication is increasing rapidly. But, the drawback is that the fingerprint can be counterfeited easily and if it's exposed to the hacker, it cannot be reused. Thus, the original fingerprint template should be transformed for registration and authentication purposes. Existing transformation functions use passcode to transform the original template to the cancelable form. Additional module is needed to input the passcode, so it requires more cost and lowers the usability. In this paper, we propose biometric authentication scheme that is economic and easy to use. The proposed scheme is consisted of cancelable biometric template creation, registration and user authentication protocols, and can control several security levels by configuring the number of fingerprints and scan times. We also analyzed that our scheme is secure against the brute-force attack and the active attacks.

A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone (퍼지볼트와 스테가노그래피를 이용한 스마트폰 지문 인증 시스템)

  • Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.419-426
    • /
    • 2015
  • This paper proposes a fingerprint verification system on a fuzzy vault with steganography for a smartphone. While biometric-based authentication can provide strong security, the biometric data must be handled carefully as it cannot be re-enrolled when it is revealed to other people. When the transformed data is used for authentication, the original biometric data can be protected. In this paper, we combine a fingerprint verification system with a fuzzy vault scheme to protect the fingerprint data of a smartphone user. In addition, the transformed data using a fuzzy vault scheme increases the security as it is concealed by the steganography scheme. The result of the experiment using fingerprint databases shows that the proposed scheme provides a high level of convenience and security for authentication of a smartphone having with a fingerprint sensor.

Thinning Processor for 160 X 192 Pixel Array Fingerprint Recognition

  • Jung, Seung-Min
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.570-574
    • /
    • 2010
  • A thinning algorithm changes a binary fingerprint image to one pixel width. A thinning stage occupies 40% cycle of 32-bit RISC microprocessor system for a fingerprint identification algorithm. Hardware block processing is more effective than software one in speed, because a thinning algorithm is iteration of simple instructions. This paper describes an effective hardware scheme for thinning stage processing using the Verilog-HDL in $160\times192$ Pixel Array. The ZS algorithm was applied for a thinning stage. The hardware scheme was designed and simulated in RTL. The logic was also synthesized by XST in FPGA environment. Experimental results show the performance of the proposed scheme.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.