• Title/Summary/Keyword: Hand Biometric Information

Search Result 11, Processing Time 0.023 seconds

Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security (모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템)

  • Hong, Kyungho;Jung, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.319-326
    • /
    • 2014
  • According to the increasing mobile security users who have experienced authentication failure by forgetting passwords, user names, or a response to a knowledge-based question have preference for biological information such as hand geometry, fingerprints, voice in personal identification and authentication. Therefore biometric verification of personal identification and authentication for mobile security provides assurance to both the customer and the seller in the internet. Our study focuses on human hand biometric information recognition system for personal identification and personal Authentication, including its shape, palm features and the lengths and widths of the fingers taken from mobile phone photographs such as iPhone4 and galaxy s2. Our hand biometric information recognition system consists of six steps processing: image acquisition, preprocessing, removing noises, extracting standard hand feature extraction, individual feature pattern extraction, hand biometric information recognition for personal identification and authentication from input images. The validity of the proposed system from mobile phone image is demonstrated through 93.5% of the sucessful recognition rate for 250 experimental data of hand shape images and palm information images from 50 subjects.

Security Analysis of a Biometric-Based User Authentication Scheme (Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization

  • Benziane, Sarah Hachemi;Benyettou, Abdelkader
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.268-284
    • /
    • 2017
  • The dorsal hand vein biometric system developed has a main objective and specific targets; to get an electronic signature using a secure signature device. In this paper, we present our signature device with its different aims; respectively: The extraction of the dorsal veins from the images that were acquired through an infrared device. For each identification, we need the representation of the veins in the form of shape descriptors, which are invariant to translation, rotation and scaling; this extracted descriptor vector is the input of the matching step. The optimization decision system settings match the choice of threshold that allows accepting/rejecting a person, and selection of the most relevant descriptors, to minimize both FAR and FRR errors. The final decision for identification based descriptors selected by the PSO hybrid binary give a FAR =0% and FRR=0% as results.

PC-based Hand-Geometry Verification System

  • Kim Young-Tak;Kim Soo-Jong;Lee Chang-Gyu;Kim Gwan-Hyung;Kang Sung-In;Lee Jae-Hyun;Tack Han-Ho;Lee Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.3
    • /
    • pp.247-254
    • /
    • 2006
  • Biometrics are getting more and more attention in recent years for security and other concerns. So far, only fingerprint recognition has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry can be used for biometric verification and identification because of its acquisition convenience and good performance for verification and identification performance. It could also be a good candidate for online checks. Therefore, this paper proposes a Hand-Geometry recognition system based on geometrical features of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. This paper proposes thirty relevant features for a Hand-Geometry recognition system. This system presents verification results based on hand measurements of 20 individuals. The verification process has been tested on a size of $320{\times}240$ image, and result of the verification process have hit rate of 95% and FAR of 0.020.

Boundary Stitching Algorithm for Fusion of Vein Pattern (정맥패턴 융합을 위한 Boundary Stitching Algorithm)

  • Lim, Young-Kyu;Jang, Kyung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.521-524
    • /
    • 2005
  • This paper proposes a fusion algorithm which merges multiple vein pattern images into a single image, larger than those images. As a preprocessing step of template matching, during the verification of biometric data such as fingerprint image, vein pattern image of hand, etc., the fusion technique is used to make reference image larger than the candidate images in order to enhance the matching performance. In this paper, a new algorithm, called BSA (Boundary Stitching Algorithm) is proposed, in which the boundary rectilinear parts extracted from the candidate images are stitched to the reference image in order to enlarge its matching space. By applying BSA to practical vein pattern verification system, its verification rate was increased by about 10%.

  • PDF

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Extraction of Vein Patterns using Hierachical Slicing Algorithm (계층적 슬라이싱 알고리즘을 사용한 정맥 패턴 검출)

  • Choi, Won-Seok;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.861-864
    • /
    • 2009
  • Recently, the biometric recognition technology of veins in different parts of hand is very active. In this paper the image hierarchical slicing provides a way to detect vein patterns. The scanned vein image will be sliced into various thicknesses. We first get the average brightness values of the sliced image and then convert them into curvature where we can detect candidates of the vein. The candidates of the vein are used to do a further analysis. We search all of the vein candidates and analyze them to get the real vein pattern in the overlapping extraction. We propose this novel algorithm to detect the vein pattern from the original image.

  • PDF

Biometric analysis hand parameters in young adults for prosthetic hand and ergonomic product applications

  • Gkionoul Nteli Chatzioglou;Yelda Pinar;Figen Govsa
    • Anatomy and Cell Biology
    • /
    • v.57 no.2
    • /
    • pp.172-182
    • /
    • 2024
  • This study aimed to evaluate the superficial anatomy, kinesiology, and functions of the hand to reveal its morphometry and apply the findings in various fields such as prosthetic hand and protective hand support product design. We examined 51 young adults (32 females, 19 males) aged between 18-30. Hand photographs were taken, and measurements were conducted using ImageJ software. Pearson correlation analysis was performed to determine the relationship between personal information and the parameters. The results of the measurements showed the average lengths of finger segments: thumb (49.5±5.5 mm), index finger (63.9±4.1 mm), middle finger (70.7±5.2 mm), ring finger (65.5±4.8 mm), and little finger (53.3±4.3 mm). Both females and males, the left index finger was measured longer than the right index finger. The right ring finger was found to be longer than the left in both sexes. Additionally, length differences between fingers in extended and maximally adducted positions were determined: thumb-index finger (56.1±6.2 mm), index-middle finger (10.7±4.1 mm), middle-ring finger (10.8±1.4 mm), and ring-little finger (25.6±2.7 mm). Other findings included the average radial natural angle (56.4°±10.5°), ulnar natural angle (23.4°±7.1°), radial deviation angle (65.2°±8.2°), ulnar deviation angle (51.2°±9.6°), and grasping/gripping angle (49.1°±5.8°). The average angles between fingers in maximum abduction positions were also measured: thumb-index finger (53.4°±6.5°), index-middle finger (17.2°±2.6°), middle-ring finger (14.3°±2.3°), and ring-little finger (32.1°±7.0°). The study examined the variability in the positioning of proximal interphalangeal joints during maximum metacarpophalangeal and proximal interphalangeal flexion, coinciding with maximum distal interphalangeal extension movements. The focal points of our observations were the asymmetrical and symmetrical arches formed by these joints. This study provides valuable hand parameters in young adults, which can be utilized in various applications such as prosthetic design, ergonomic product development, and hand-related research. The results highlight the significance of considering individual factors when assessing hand morphology and function.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

Software development for the visualization of brain fiber tract by using 24-bit color coding in diffusion tensor image

  • Oh, Jung-Su;Song, In-Chan;Ik hwan Cho;Kim, Jong-Hyo;Chang, Kee-Hyun;Park, Kwang-Suk
    • Proceedings of the KSMRM Conference
    • /
    • 2002.11a
    • /
    • pp.133-133
    • /
    • 2002
  • Purpose: The purpose of paper is to implement software to visualize brain fiber tract using a 24-bit color coding scheme and to test its feasibility. Materials and Methods: MR imaging was performed on GE 1.5 T Signa scanner. For diffusion tensor image, we used a single shot spin-echo EPI sequence with 7 non-colinear pulsed-field gradient directions: (x, y, z):(1,1,0),(-1,1,0),(1,0,1),(-1,0,1),(0,1,1),(0,1,-1) and without diffusion gradient. B-factor was 500 sec/$\textrm{mm}^2$. Acquisition parameters are as follows: TUTE=10000ms/99ms, FOV=240mm, matrix=128${\times}$128, slice thickness/gap=6mm/0mm, total slice number=30. Subjects consisted of 10 normal young volunteers (age:21∼26 yrs, 5 men, 5 women). All DTI images were smoothed with Gaussian kernel with the FWHM of 2 pixels. Color coding schemes for visualization of directional information was as follows. HSV(Hue, Saturation, Value) color system is appropriate for assigning RGB(Red, Green, and Blue) value for every different directions because of its volumetric directional expression. Each of HSV are assigned due to (r,$\theta$,${\Phi}$) in spherical coordinate. HSV calculated by this way can be transformed into RGB color system by general HSV to RGB conversion formula. Symmetry schemes: It is natural to code the antipodal direction to be same color(antipodal symmetry). So even with no symmetry scheme, the antipodal symmetry must be included. With no symmetry scheme, we can assign every different colors for every different orientation.(H =${\Phi}$, S=2$\theta$/$\pi$, V=λw, where λw is anisotropy). But that may assign very discontinuous color even between adjacent yokels. On the other hand, Full symmetry or absolute value scheme includes symmetry for 180$^{\circ}$ rotation about xy-plane of color coordinate (rotational symmetry) and for both hemisphere (mirror symmetry). In absolute value scheme, each of RGB value can be expressed as follows. R=λw|Vx|, G=λw|Vy|, B=λw|Vz|, where (Vx, Vy, Vz) is eigenvector corresponding to the largest eigenvalue of diffusion tensor. With applying full symmetry or absolute value scheme, we can get more continuous color coding at the expense of coding same color for symmetric direction. For better visualization of fiber tract directions, Gamma and brightness correction had done. All of these implementations were done on the IDL 5.4 platform.

  • PDF