• 제목/요약/키워드: Identification Information

검색결과 4,763건 처리시간 0.031초

개인신원정보 보호를 위한 광 보호 시스템 (Optical security system for protection of personal identification information)

  • 윤종수;도양회
    • 한국광학회지
    • /
    • 제14권4호
    • /
    • pp.383-391
    • /
    • 2003
  • 개인의 신원정보 보호를 위하여 새로운 광 정보보호 시스템을 제안하였다. 개인 신원정보의 확인과 인증을 위하여 얼굴영상과 개인식별번호로 구성된 신원정보를 사용하였다. 영상 암호화는 4-f 광상관기의 입력과 푸리에영역에서 랜덤위상패턴을 사용하는 위상암호화 기술을 사용하였다. 그렇지만 암호화된 영상을 복원하는 과정에서 개인의 신원정보가 유출될 가능성이 있다. 이에 대처하기 위하여 신원확인 과정에서 영상을 복원하지 않고 암호화된 영상을 그대로 사용하였다. 암호화된 개인식별번호는 제안된 MMACE_p 필터를 사용하여 분류ㆍ인식하였고, 개인정보의 인증은 OWMF를 사용하여 얼굴영상의 상관치를 구하여 확인하였다. 제안된 MMACE_p 필터는 10개의 암호화된 숫자를 한꺼번에 인식할 수 있도록 4개의 MACE_p필터를 다중화하여 합성하였고, OWMF는 얼굴영상의 분리인식 능력과 SNR을 향상시킬 수 있도록 하였다. 컴퓨터 시뮤레이션을 통하여 제안된 정보보호기술이 개인신원정보 보호에 적용될 수 있음을 보였다.

인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 - (Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data -)

  • 이현주;이승엽;전병훈
    • Journal of Platform Technology
    • /
    • 제11권3호
    • /
    • pp.56-67
    • /
    • 2023
  • 최근 데이터 기반 산업계의 오랜 숙원이었던 개인정보 비식별화가 2020년 8월 데이터3법[1]이 개정되어 명시화 되었다. 4차 산업시대의 원유[2]라 불리는 데이터를 산업 분야에서 활성화할 수 있는 기틀이 되었다. 하지만, 일각에서는 비식별개인정보(personally non-identifiable information)가 정보주체의 기본권 침해를 우려하고 있는 실정이다[3]. 이에 개인정보 비식별화 자동화 도구인 Batch De-Identification Tool을 개발 연구를 수행하였다. 본 연구에서는 첫 번째로, 학습용 데이터 구축을 위해 사람 얼굴(눈, 코, 입) 및 다양한 해상도의 자동차 번호판 등을 라벨링하는 이미지 라벨링 도구를 개발하였다. 두 번째로, 객체 인식 모델을 학습하여 객체 인식 모듈을 실행함으로써 개인정보 비식별화를 수행할 수 있도록 하였다. 본 연구의 결과로 개발된 개인정보 비식별화 자동화 도구는 온라인 서비스를 통해 개인정보 침해 요소를 사전에 제거할 수 있는 가능성을 보여주었다. 이러한 결과는 데이터 기반 산업계에서 개인정보 보호와 활용의 균형을 유지하면서도 데이터의 가치를 극대화할 수 있는 가능성을 제시하고 있다

  • PDF

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

Personal Identification Using Teeth Images

  • Kim Tae-Woo;Cho Tae-Kyung;Park Byoung-Soo;Lee Myung-Wook
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.435-437
    • /
    • 2004
  • This paper presents a personal identification method using teeth images. The method uses images for teeth expressions of anterior and posterior occlusion state and LDA-based technique. Teeth images give merits for recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, personal identification for 12 people was successful. It was shown that our method can contribute to multi-modal authentication systems.

  • PDF

Dimension Analysis of Chaotic Time Series Using Self Generating Neuro Fuzzy Model

  • Katayama, Ryu;Kuwata, Kaihei;Kajitani, Yuji;Watanabe, Masahide;Nishida, Yukiteru
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1993년도 Fifth International Fuzzy Systems Association World Congress 93
    • /
    • pp.857-860
    • /
    • 1993
  • In this paper, we apply the self generating neuro fuzzy model (SGNFM) to the dimension analysis of the chaotic time series. Firstly, we formulate a nonlinear time series identification problem with nonlinear autoregressive (NARMAX) model. Secondly, we propose an identification algorithm using SGNFM. We apply this method to the estimation of embedding dimension for chaotic time series, since the embedding dimension plays an essential role for the identification and the prediction of chaotic time series. In this estimation method, identification problems with gradually increasing embedding dimension are solved, and the identified result is used for computing correlation coefficients between the predicted time series and the observed one. We apply this method to the dimension estimation of a chaotic pulsation in a finger's capillary vessels.

  • PDF

금융회사의 고유식별정보 암호화 규제·감독에 대한 실효성 확보 방안 (Effective measures for the regulation and supervision of encryption of unique identification information of financial companies)

  • 이승윤;김인석
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.3-9
    • /
    • 2018
  • 본 연구의 목적은 금융기관 대상 고유식별정보 암호화 규제 및 감독에 대한 효과적인 대응방법을 제시하고, 현재의 문제점 그리고 앞으로 나아가야 할 방향을 제시하는 것이다. 금융기관에서는 법규준수를 위하여 다수의 개인정보처리시스템 중 DB시스템을 중심으로 대응하고 있어 그 외 다수의 어플리케이션시스템 내 고유식별정보를 포함하고 있는 데이터 파일의 경우 암호화 등 추가적인 조치가 필요한 것으로 조사되었다. 본 연구에서는 제도적, 관리적, 기술적 실효성 확보 방안을 결론에서 제시 하였다.

  • PDF

Adaptive Modulation Method using Non-Line-of-Sight Identification Algorithm in LDR-UWB Systems

  • 마림천;황재호;최낙현;김재명
    • 한국통신학회논문지
    • /
    • 제33권12A호
    • /
    • pp.1177-1184
    • /
    • 2008
  • Non-line-of-sight (NLOS) propagation can severely weaken the accuracy of ranging and localization in wireless location systems. NLOS bias mitigation techniques have recently been proposed to relieve the NLOS effects, but positively rely on the capability to accurately distinguish between LOS and NLOS propagation scenarios. This paper proposes an energy-capture-based NLOS identification method for LDR-UWB systems, based on the analysis of the characteristics of the channel impulse response (CIR). With this proposed energy capture method, the probability of successfully identifying NLOS is much improved than the existing methods, such as the kurtosis method, the strongest path compare method, etc. This NLOS identification method can be employed in adaptive modulation scheme to decrease bit error ratio (BER) level for certain signal-to-noise ratio (SNR). The BER performance with the adaptive modulation can be significantly enhanced by selecting proper modulation method with the knowledge of channel information from the proposed NLOS identification method.

얼굴 인증을 이용한 무인 접수 로봇 개발 (Unattended Reception Robot using Face Identification)

  • 박세현;류정탁;문병현;차경애
    • 한국산업정보학회논문지
    • /
    • 제19권5호
    • /
    • pp.33-37
    • /
    • 2014
  • 다양한 개인 정보의 활용으로 신뢰할 수 있는 인증 수단이 요구되고 있다. 개인 얼굴의 특징을 이용하는 얼굴 인증 기술은 특징점 추출이 용이하여 많이 활용되고 있다. 본 논문에서는 무인 접수를 위한 얼굴인증 로봇을 구현하였다. 구현된 로봇은 사용자 인증을 위해 얼굴인식방법을 이용한여 개인 인증을 하고 있다. 얼굴인증 시스템을 무인접수로봇에 적용하여 유용함을 보였다.

아이핀 기반 본인확인서비스의 안전성 강화 방안 (Safety Improvement Methods of Personal Identification Services using the i-Pin)

  • 김종배
    • 한국IT서비스학회지
    • /
    • 제16권2호
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Development of Semantic Risk Breakdown Structure to Support Risk Identification for Bridge Projects

  • Isah, Muritala Adebayo;Jeon, Byung-Ju;Yang, Liu;Kim, Byung-Soo
    • 국제학술발표논문집
    • /
    • The 9th International Conference on Construction Engineering and Project Management
    • /
    • pp.245-252
    • /
    • 2022
  • Risk identification for bridge projects is a knowledge-based and labor-intensive task involving several procedures and stakeholders. Presently, risk information of bridge projects is unstructured and stored in different sources and formats, hindering knowledge sharing, reuse, and automation of the risk identification process. Consequently, there is a need to develop structured and formalized risk information for bridge projects to aid effective risk identification and automation of the risk management processes to ensure project success. This study proposes a semantic risk breakdown structure (SRBS) to support risk identification for bridge projects. SRBS is a searchable hierarchical risk breakdown structure (RBS) developed with python programming language based on a semantic modeling approach. The proposed SRBS for risk identification of bridge projects consists of a 4-level tree structure with 11 categories of risks and 116 potential risks associated with bridge projects. The contributions of this paper are threefold. Firstly, this study fills the gap in knowledge by presenting a formalized risk breakdown structure that could enhance the risk identification of bridge projects. Secondly, the proposed SRBS can assist in the creation of a risk database to support the automation of the risk identification process for bridge projects to reduce manual efforts. Lastly, the proposed SRBS can be used as a risk ontology that could aid the development of an artificial intelligence-based integrated risk management system for construction projects.

  • PDF