• 제목/요약/키워드: Hand Biometric Information

검색결과 10건 처리시간 0.041초

모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템 (Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security)

  • 홍경호;정은화
    • 디지털융복합연구
    • /
    • 제12권4호
    • /
    • pp.319-326
    • /
    • 2014
  • 모바일 보안의 증가에 따라, 지식에 근거한 사용자 이름, 패스워드 방식의 개인 인증에 대한 실패를 경험한 사용자들은 개인 식별과 인증에서 손 형상, 지문 인식, 목소리와 같은 생체 정보를 사용하는 것을 더욱 선호하게 되었다. 그러므로 모바일 보안을 위해 개인 식별과 인증에서 생체 인증을 사용하는 것은 인터넷 상에서 고객과 판매자들 모두에게 신뢰성을 준다. 본 연구는 개인 식별과 인증을 위해 iphone4와 galaxy s2의 모바일 폰 영상으로부터 손형상, 손 바닥 특징, 손가락 길이와 너비 등의 손 생체 정보를 인식하는 시스템을 개발한다. 본 연구의 손 생체 정보인식 시스템은 영상 획득, 전처리, 잡음 제거, 표준 특징패턴 추출, 개별 특징패턴 추출 그리고 손 생체 정보 인식의 6가지 단계로 구성한다. 실험에서 사용한 입력 데이터는 50명의 실험자의 손 형상 영상과 손 바닥 영상으로 구성한 250장의 데이터에 대한 평균 인식률은 93.5%이다.

Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석 (Security Analysis of a Biometric-Based User Authentication Scheme)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization

  • Benziane, Sarah Hachemi;Benyettou, Abdelkader
    • Journal of Information Processing Systems
    • /
    • 제13권2호
    • /
    • pp.268-284
    • /
    • 2017
  • The dorsal hand vein biometric system developed has a main objective and specific targets; to get an electronic signature using a secure signature device. In this paper, we present our signature device with its different aims; respectively: The extraction of the dorsal veins from the images that were acquired through an infrared device. For each identification, we need the representation of the veins in the form of shape descriptors, which are invariant to translation, rotation and scaling; this extracted descriptor vector is the input of the matching step. The optimization decision system settings match the choice of threshold that allows accepting/rejecting a person, and selection of the most relevant descriptors, to minimize both FAR and FRR errors. The final decision for identification based descriptors selected by the PSO hybrid binary give a FAR =0% and FRR=0% as results.

PC-based Hand-Geometry Verification System

  • Kim Young-Tak;Kim Soo-Jong;Lee Chang-Gyu;Kim Gwan-Hyung;Kang Sung-In;Lee Jae-Hyun;Tack Han-Ho;Lee Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제6권3호
    • /
    • pp.247-254
    • /
    • 2006
  • Biometrics are getting more and more attention in recent years for security and other concerns. So far, only fingerprint recognition has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry can be used for biometric verification and identification because of its acquisition convenience and good performance for verification and identification performance. It could also be a good candidate for online checks. Therefore, this paper proposes a Hand-Geometry recognition system based on geometrical features of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. This paper proposes thirty relevant features for a Hand-Geometry recognition system. This system presents verification results based on hand measurements of 20 individuals. The verification process has been tested on a size of $320{\times}240$ image, and result of the verification process have hit rate of 95% and FAR of 0.020.

정맥패턴 융합을 위한 Boundary Stitching Algorithm (Boundary Stitching Algorithm for Fusion of Vein Pattern)

  • 임영규;장경식
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.521-524
    • /
    • 2005
  • This paper proposes a fusion algorithm which merges multiple vein pattern images into a single image, larger than those images. As a preprocessing step of template matching, during the verification of biometric data such as fingerprint image, vein pattern image of hand, etc., the fusion technique is used to make reference image larger than the candidate images in order to enhance the matching performance. In this paper, a new algorithm, called BSA (Boundary Stitching Algorithm) is proposed, in which the boundary rectilinear parts extracted from the candidate images are stitched to the reference image in order to enlarge its matching space. By applying BSA to practical vein pattern verification system, its verification rate was increased by about 10%.

  • PDF

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

계층적 슬라이싱 알고리즘을 사용한 정맥 패턴 검출 (Extraction of Vein Patterns using Hierachical Slicing Algorithm)

  • 최원석;장경식
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.861-864
    • /
    • 2009
  • 최근에는 손의 다양한 부위에서 정맥을 인식하기 위한 생체인식 기술이 활발히 진행 중이다. 본 논문에서는 정맥 패턴을 검출하기 위한 계층적 슬라이싱 방법을 제안한다. 스캔한 정맥 이미지를 다양한 두께 값으로 슬라이싱한다. 슬라이스된 이미지에서 평균 밝기값을 구하고 이를 곡률 값으로 변환하여 정맥 후보 구역을 검출한다. 이 정맥 후보 지역을 재검색하여 중복 검출된 지점을 분석하여 실제의 정맥 패턴을 찾아낸다. 이를 통해 원래 이미지에서 정맥 패턴을 검출하는 새로운 알고리즘을 제안한다.

  • PDF

개인 인증을 위한 생체인식시스템 사례 및 분류 (Biometrics for Person Authentication: A Survey)

  • 안큐 아가와;어비짙 판디야;노영욱;김광백
    • 지능정보연구
    • /
    • 제11권1호
    • /
    • pp.1-15
    • /
    • 2005
  • 어떤 조직에서 사용자 접근이나 e-Commerce 또는 다른 보안 응용에서 사용하기 위해 보안이 뛰어난 인증 방법을 찾을 때 생체인식시스템이 최근에 보다 많은 주목을 받고 있다. 생체인식시스템은 개인 인식에서 전통적인 방법보다 뛰어난 보안성과 편리성을 제공한다. 생체인식시스템은 어떤 응용 분야에서는 기존의 기술을 대체하거나 보조하고, 다른 응용 분야에서는 사용할 수 있는 유일한 접근방법이 되고 있다. 본 논문에서는 지문, 손 모양, 얼굴, 귀, 홍채, 서명과 필적을 포함한 여러 생체인식 방법들을 조사하고 비교하였다. 이들 방법들은 특정 응용 분야에서 매우 적합하다. 본 논문에서는 특정 응용 분야에 적합한 생체 인식 방법들을 찾아서 분류하였으며, 어떤 방법은 다른 방법에 비해 침입하기가 어려운 것으로 나타났다.

  • PDF

Software development for the visualization of brain fiber tract by using 24-bit color coding in diffusion tensor image

  • Oh, Jung-Su;Song, In-Chan;Ik hwan Cho;Kim, Jong-Hyo;Chang, Kee-Hyun;Park, Kwang-Suk
    • 대한자기공명의과학회:학술대회논문집
    • /
    • 대한자기공명의과학회 2002년도 제7차 학술대회 초록집
    • /
    • pp.133-133
    • /
    • 2002
  • Purpose: The purpose of paper is to implement software to visualize brain fiber tract using a 24-bit color coding scheme and to test its feasibility. Materials and Methods: MR imaging was performed on GE 1.5 T Signa scanner. For diffusion tensor image, we used a single shot spin-echo EPI sequence with 7 non-colinear pulsed-field gradient directions: (x, y, z):(1,1,0),(-1,1,0),(1,0,1),(-1,0,1),(0,1,1),(0,1,-1) and without diffusion gradient. B-factor was 500 sec/$\textrm{mm}^2$. Acquisition parameters are as follows: TUTE=10000ms/99ms, FOV=240mm, matrix=128${\times}$128, slice thickness/gap=6mm/0mm, total slice number=30. Subjects consisted of 10 normal young volunteers (age:21∼26 yrs, 5 men, 5 women). All DTI images were smoothed with Gaussian kernel with the FWHM of 2 pixels. Color coding schemes for visualization of directional information was as follows. HSV(Hue, Saturation, Value) color system is appropriate for assigning RGB(Red, Green, and Blue) value for every different directions because of its volumetric directional expression. Each of HSV are assigned due to (r,$\theta$,${\Phi}$) in spherical coordinate. HSV calculated by this way can be transformed into RGB color system by general HSV to RGB conversion formula. Symmetry schemes: It is natural to code the antipodal direction to be same color(antipodal symmetry). So even with no symmetry scheme, the antipodal symmetry must be included. With no symmetry scheme, we can assign every different colors for every different orientation.(H =${\Phi}$, S=2$\theta$/$\pi$, V=λw, where λw is anisotropy). But that may assign very discontinuous color even between adjacent yokels. On the other hand, Full symmetry or absolute value scheme includes symmetry for 180$^{\circ}$ rotation about xy-plane of color coordinate (rotational symmetry) and for both hemisphere (mirror symmetry). In absolute value scheme, each of RGB value can be expressed as follows. R=λw|Vx|, G=λw|Vy|, B=λw|Vz|, where (Vx, Vy, Vz) is eigenvector corresponding to the largest eigenvalue of diffusion tensor. With applying full symmetry or absolute value scheme, we can get more continuous color coding at the expense of coding same color for symmetric direction. For better visualization of fiber tract directions, Gamma and brightness correction had done. All of these implementations were done on the IDL 5.4 platform.

  • PDF

다중 지문 시퀀스를 이용한 스마트폰 보안 (Smartphone Security Using Fingerprint Password)

  • 배경율
    • 지능정보연구
    • /
    • 제19권3호
    • /
    • pp.45-55
    • /
    • 2013
  • 최근 모바일 디바이스와 휴대기기의 발달로 원격접속이 늘어남에 따라 보안의 중요성도 점차 증가되었다. 그러나 기존 패스워드나 패턴과 같은 보안 프로그램은 지나치게 단순할 뿐 아니라 다른 사용자가 쉽게 취득하여 악용할 수 있다는 단점이 있다. 생체인식을 활용한 보안 시스템은 보안성이 강화 되었지만 위조 및 변조가 가능하기 때문에 완전한 해결책을 제시하지 못한다. 본 논문에서는 이러한 문제점을 해결하기 위해 지문인식과 패스워드를 결합하여 보안성을 향상시킬 수 있는 방안을 연구하였다. 제안한 시스템은 하나의 지문이 아니라 다수의 지문을 이용하는 방법으로, 사용자가 패스워드를 입력할 때 여러 지문 중에서 정확한 지문의 순서를 제공하도록 한다. 오늘날 스마트폰은 패스워드나 패턴, 지문을 이용할 수 있지만 패스워드의 강도가 낮거나 패턴이 쉽게 노출되는 등의 문제가 있다. 반면에 제안한 시스템은 다양한 지문의 이용과 패스워드의 연계, 또는 다른 생체인식 시스템과 연결함으로써 매우 강력한 보안장치가 될 수 있다.