• Title/Summary/Keyword: Group Authentication

Search Result 207, Processing Time 0.032 seconds

RowAMD Distance: A Novel 2DPCA-Based Distance Computation with Texture-Based Technique for Face Recognition

  • Al-Arashi, Waled Hussein;Shing, Chai Wuh;Suandi, Shahrel Azmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5474-5490
    • /
    • 2017
  • Although two-dimensional principal component analysis (2DPCA) has been shown to be successful in face recognition system, it is still very sensitive to illumination variations. To reduce the effect of these variations, texture-based techniques are used due to their robustness to these variations. In this paper, we explore several texture-based techniques and determine the most appropriate one to be used with 2DPCA-based techniques for face recognition. We also propose a new distance metric computation in 2DPCA called Row Assembled Matrix Distance (RowAMD). Experiments on Yale Face Database, Extended Yale Face Database B, AR Database and LFW Database reveal that the proposed RowAMD distance computation method outperforms other conventional distance metrics when Local Line Binary Pattern (LLBP) and Multi-scale Block Local Binary Pattern (MB-LBP) are used for face authentication and face identification, respectively. In addition to this, the results also demonstrate the robustness of the proposed RowAMD with several texture-based techniques.

Research Trend of Biometrics (생체인식기술의 연구동향)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.824-827
    • /
    • 2005
  • The need to be able to identify other individual human beings is fundamental to the security and has been true since the beginning of human history. Physical or behavioral characteristics (finger-scan, face-scan, voice, palm, iris, retina, signature, human DNA, keystroke, vain, gait etc.) of a person are used to authenticate the person. The biometric technologies allow for a greater reliability of authentication as compared with password systems for physical access, network security, e-commerce, and so on. In this paper, we describe various technologies, market analysis, multi-modal system, standardization, privacy issue and future prospect of biometrics.

  • PDF

An Improvement of PCC Scheme by using Information Dispersal Algorithm (정보 분산 알고리즘을 이용한 PCC 기법의 개선)

  • Hyun Sangweon;Park Yongsu;Cho Yookun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.11
    • /
    • pp.617-625
    • /
    • 2004
  • We propose an efficient stream authentication scheme that is an improvement of PCC scheme by using information dispersal algorithm. The drawback of PCC scheme is that received packets for each group are verifiable only if the signature packet of the group is successfully received. The proposed scheme processes the signature packet by introducing some amount of redundancy and splitting the result into pieces, which are then transmitted. The receiver is able to reconstruct the signature packet if the number of the received pieces is larger than the threshold. It is shown that under the same communication overhead verification probability of the proposed scheme is higher than that of SAIDA. Moreover, its computational cost is lower than that of SAIDA.

Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility (보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현)

  • Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

A Key Distribution Scheme for IGMPv3 Authentication (IGMPv3 인증을 위한 키 분배기법)

  • Kang Hyun-Sun;Kim Min-Kyoung;Park Chang-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.995-998
    • /
    • 2006
  • IGMP(Internet Group Management Protocol)는 멀티캐스트 그룹의 멤버쉽 관리를 위한 프로토콜로서, 임의의 호스트가 멀티캐스트 라우터에게 특정한 멀티캐스트 통신의 수신을 요청할 경우에 사용된다. 본 논문에서는 이와 같은 IGMP 메시지를 이용한 정당하지 않은 호스트의 DoS 공격 등으로부터 멀티캐스트 분배트리의 보호를 위한 수신자 접근제어 기법을 제안한다. 또한 제안기법은 수신자 접근제어 기능뿐만 아니라, 실제 다양한 상업적인 멀티캐스트 서비스에도 적용될 수 있는 비즈니스 모델을 기반으로 하며 과금과 관련하여 활용이 가능하다.

  • PDF

LVQ network for a face image recognition of the 3D (3D 얼굴 영상 인식을 위한 LVQ 네트워크)

  • 김영렬;박진성;임성진;이용구;엄기환
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.151-154
    • /
    • 2003
  • In this paper, we propose a method to recognize a face image of the 3D using the LVQ network. LVQ network of the proposed method, We used the front view of a face image to get to a coded light to a training data, can group a face image including the side of various angle. For an usefulness authentication of this algorithm, Various experiment which classifies a face image of the angle was the low.

  • PDF

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A study on an Efficient Kerberos Authentication based on X.509 (X.509 공개키 기반구조에서 Kerberos 인증에 관한 연구)

  • Kim, Cheol-Hyun;Kim, Young-Ja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1177-1180
    • /
    • 2002
  • 본 논문에서는 IETF CAT Working Group에서 발표한 PKINIT기반의 인증서비스를 향상시킨 Kerberos 인증 메커니즘을 제안한다. PKINIT기반의 X.509, DS/DNS를 적용하여 영역간의 서비스를 제공하는 인증과 키 교환방식으로 DNS를 통해 외부영역의 위치를 탐색하고 X.509 디렉토리 인증 시스템을 적용, 영역간 인증은 DNS 서버로부터 공개키를 획득하여 다른 영역을 인증하도록 하였다. 영역간 인증과 키 교환은 Kerberos의 관용키 암호방식을 사용하고 세션 연결은 X.509 공개키 방식에 기반을 두고 있다. 효율적인 TGT(티켓승인 티켓) 교환과 통신상의 Overload를 감소시키는 효과와 인증절차의 간소화를 가지는 Kerberos시스템을 설계하였다.

  • PDF