• Title/Summary/Keyword: Identity Information Recognition

Search Result 109, Processing Time 0.031 seconds

Security Enhancement of Lightweight User Authentication Scheme Using Smartcard (스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.209-215
    • /
    • 2020
  • The environment of the Internet provides an efficient communication of the things which are connected. While internet and online service provide us many valuable benefits, online services offered and accessed remotely through internet also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication on client-server environment. In 2016, Ahmed et al. proposed an efficient lightweight remote user authentication protocol. However, Kang et al. show that it's scheme still unstable and inefficient. It cannot resist offline identity guessing attack and cannot provide session key confirmation property. Moreover, there is some risk of biometric information's recognition error. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since we only use hash function and XOR operation.

The Actual Condition and Role Recognition of Fashion Sales Related Persons in Women's Ready-to-Wear Shop (여자 기성복 매장의 패션 판매종사자의 실태와 역할인식)

  • Ku, Yang-Suk;Lee, Jung-Hye
    • Korean Journal of Human Ecology
    • /
    • v.5 no.1
    • /
    • pp.43-53
    • /
    • 1996
  • The purpose of this study was to investigate the actual condition of fashion sales related persons and analyze their different role recognition in women's Ready-To-Wear shops. A questionnaire was administered to 378 fashion sales related persons in department stores and individual shops. Data were analyzed by using crosstabs, $X^2$, t-test, Scheffe's test and ANOVA by using of SPSS PC program. The results of this study were as follows: 1. In the role of fashion salespersons, managers participated highly in the merchandise buying plan, actual merchandise buying and advertisement, and shopmasters participated in the management of salespersons and keeping good relation with customers and display. 2. There was significant difference according to the existence of shopmasters in sales promotion. Shops with shopmasters had regular sales and filed up customer cards. 3. Shopmasters and salespersons attached importance to fashion information, market information, sales result information, and managers attached importance to customer information, enterprise environment information in utilizing of informations. Managers considered customer survey very important but shopmasters and salespersons did not. Shopmasters, managers, and salespersons all attached importance to customers' preference survey as customers' information source. 4. There were significant differences in lifestyle survey, buying method survey, preference survey, street fashion survey, brand identity survey and advertizement effect survey of customers by the different roles of fashion salespersons. 5. There were significant differences in the degree of merchandise knowledge, service and after service in sales service recognition by the different roles of fashion salespersons.

  • PDF

Recording Support System for Off-Line Conference using Face and Speaker Recognition (얼굴 인식 및 화자 정보를 이용한 오프라인 회의 기록 지원 시스템)

  • Son, Yun-Sik;Jung, Jin-Woo;Park, Han-Mu;Kye, Seung-Chul;Yoon, Jong-Hyuk;Jung, Nak-Chun;Oh, Se-Man
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.66-71
    • /
    • 2008
  • Recent multimedia technology has supported various application services based on the development of effective movie compression and network techniques. On-line video conference system is a typical example that use theses two technologies effectively. On-line video conference system can be characterized into an effective conferencing method for long-distanced on-line conference members. But, unfortunately, off-line conference with face-to-face meeting is more frequent than on-line conference and their support systems have not been sufficiently considered. In this paper, we propose a recording support system for off-Line conference using face and speaker recognition. This system finds the speaker in the conference by using three microphones and three webcam cameras. And analysis is done with face region information that gathered by currently active webcam camera, and recognizes the identity of face. Finally, the system tracks speaker and records conference with extract speaker information.

A palm information-based identity recognition deep learning model using a multi-channel image (멀티 채널 이미지를 이용한 손바닥 정보 기반 신원 인식 딥러닝 모델)

  • Kim, Beomjun;Kim, Inki;Gwak, Jeonghwan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.93-96
    • /
    • 2022
  • 본 논문에서는 카메라 센서만을 이용하여 손바닥 사진을 촬영하고 추출된 데이터들을 합성하여 멀티 채널 이미지를 생성 및 분류 모델에 입력하여 신원을 확인하는 딥러닝 모델을 제안한다. 이 모델은 손바닥 사진이 입력되면 손바닥 및 손금 세그멘테이션을 이용하여 마스크 이미지를 추출하고 단일 채널로 구성된 이미지들을 멀티 채널 이미지로 합성/재구성하여 신원을 분류하는 딥러닝 모델이다. 이는 카메라 센서 외 다른 센서가 필요 없다는 장점을 가지고 있으며, 비접촉 신원 인식 시스템에 적용할 수 있다.

  • PDF

Influencing Factors of Satisfaction of Clinical Practice in Nursing Students in the Convergence Era (융복합시대 간호대학생의 임상실습만족도에 미치는 영향 요인)

  • Lee, Mira;Jeon, Hyensook
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.55-64
    • /
    • 2019
  • The purpose of this study was to investigate levels of self-efficacy, nurse image, vocational identity, and clinical practice satisfaction, to examine relationships among them, and finally to investigate predictors affecting of clinical practice satisfaction in nursing students. The participants were 227 nursing students in D city who were surveyed in September 2018 using self-report questionnaires. Self-efficacy, nurse image, vocational identity, and clinical practice satisfaction were related positively among variables. In the multiple regression analysis, self-efficacy, nurse image, vocational identity, health condition, relationship with practical colleague and 'satisfaction of nursing students in patient's recognition of nursing students' were influential factors significantly associated with the clinical practice satisfaction. Those factors explained 17.9% of the clinical practice satisfaction of nursing students. The most important factors were 'satisfaction of nursing students in patient's recognition of nursing students' and nurse image. In order to improve clinical practice satisfaction of nursing students, whole nurses should consider helping nursing students and patients to build up positive nurse image.

Study on The Confidence Level of PCA-based Face Recognition Under Variable illumination Condition (조명 변화 환경에서 PCA 기반 얼굴인식 알고리즘의 신뢰도에 대한 연구)

  • Cho, Hyun-Jong;Kang, Min-Koo;Moon, Seung-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.19-26
    • /
    • 2009
  • This paper studies on the recognition rate change with respect to illumination variance and the confidence level of PCA(Principal Component Analysis) based face recognition by measuring the cumulative match score of CMC(Cumulative Match Characteristic). We studied on the confidence level of the algorithm under illumination changes and selection of training images not only by testing multiple training images per person with illumination variance and single training image and but also by changing the illumination conditions of testing images. The experiment shows that the recognition rate drops for multiple training image case compared to single training image case. We, however, confirmed the confidence level of the algorithm under illumination variance by the fact that the training image which corresponds to the identity of testing image belongs to upper similarity lists regardless of illumination changes and the number of training images.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Action Unit Based Facial Features for Subject-independent Facial Expression Recognition (인물에 독립적인 표정인식을 위한 Action Unit 기반 얼굴특징에 관한 연구)

  • Lee, Seung Ho;Kim, Hyung-Il;Park, Sung Yeong;Ro, Yong Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.881-883
    • /
    • 2015
  • 실제적인 표정인식 응용에서는 테스트 시 등장하는 인물이 트레이닝 데이터에 존재하지 않는 경우가 빈번하여 성능 저하가 발생한다. 본 논문에서는 인물에 독립적인(subject-independent) 표정인식을 위한 얼굴특징을 제안한다. 제안방법은 인물에 공통적인 얼굴 근육 움직임(Action Unit(AU))에 기반한 기하학 정보를 표정 특징으로 사용한다. 따라서 인물의 고유 아이덴티티(identity)의 영향은 감소되고 표정과 관련된 정보는 강조된다. 인물에 독립적인 표정인식 실험결과, 86%의 높은 표정인식률과 테스트 비디오 시퀀스 당 3.5ms(Matlab 기준)의 매우 빠른 분류속도를 달성하였다.

The Role of Social Capital and Identity in Knowledge Contribution in Virtual Communities: An Empirical Investigation (가상 커뮤니티에서 사회적 자본과 정체성이 지식기여에 미치는 역할: 실증적 분석)

  • Shin, Ho Kyoung;Kim, Kyung Kyu;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • A challenge in fostering virtual communities is the continuous supply of knowledge, namely members' willingness to contribute knowledge to their communities. Previous research argues that giving away knowledge eventually causes the possessors of that knowledge to lose their unique value to others, benefiting all except the contributor. Furthermore, communication within virtual communities involves a large number of participants with different social backgrounds and perspectives. The establishment of mutual understanding to comprehend conversations and foster knowledge contribution in virtual communities is inevitably more difficult than face-to-face communication in a small group. In spite of these arguments, evidence suggests that individuals in virtual communities do engage in social behaviors such as knowledge contribution. It is important to understand why individuals provide their valuable knowledge to other community members without a guarantee of returns. In virtual communities, knowledge is inherently rooted in individual members' experiences and expertise. This personal nature of knowledge requires social interactions between virtual community members for knowledge transfer. This study employs the social capital theory in order to account for interpersonal relationship factors and identity theory for individual and group factors that may affect knowledge contribution. First, social capital is the relationship capital which is embedded within the relationships among the participants in a network and available for use when it is needed. Social capital is a productive resource, facilitating individuals' actions for attainment. Nahapiet and Ghoshal (1997) identify three dimensions of social capital and explain theoretically how these dimensions affect the exchange of knowledge. Thus, social capital would be relevant to knowledge contribution in virtual communities. Second, existing research has addressed the importance of identity in facilitating knowledge contribution in a virtual context. Identity in virtual communities has been described as playing a vital role in the establishment of personal reputations and in the recognition of others. For instance, reputation systems that rate participants in terms of the quality of their contributions provide a readily available inventory of experts to knowledge seekers. Despite the growing interest in identities, however, there is little empirical research about how identities in the communities influence knowledge contribution. Therefore, the goal of this study is to better understand knowledge contribution by examining the roles of social capital and identity in virtual communities. Based on a theoretical framework of social capital and identity theory, we develop and test a theoretical model and evaluate our hypotheses. Specifically, we propose three variables such as cohesiveness, reciprocity, and commitment, referring to the social capital theory, as antecedents of knowledge contribution in virtual communities. We further posit that members with a strong identity (self-presentation and group identification) contribute more knowledge to virtual communities. We conducted a field study in order to validate our research model. We collected data from 192 members of virtual communities and used the PLS method to analyse the data. The tests of the measurement model confirm that our data set has appropriate discriminant and convergent validity. The results of testing the structural model show that cohesion, reciprocity, and self-presentation significantly influence knowledge contribution, while commitment and group identification do not significantly influence knowledge contribution. Our findings on cohesion and reciprocity are consistent with the previous literature. Contrary to our expectations, commitment did not significantly affect knowledge contribution in virtual communities. This result may be due to the fact that knowledge contribution was voluntary in the virtual communities in our sample. Another plausible explanation for this result may be the self-selection bias for the survey respondents, who are more likely to contribute their knowledge to virtual communities. The relationship between self-presentation and knowledge contribution was found to be significant in virtual communities, supporting the results of prior literature. Group identification did not significantly affect knowledge contribution in this study, inconsistent with the wealth of research that identifies group identification as an important factor for knowledge sharing. This conflicting result calls for future research that examines the role of group identification in knowledge contribution in virtual communities. This study makes a contribution to theory development in the area of knowledge management in general and virtual communities in particular. For practice, the results of this study identify the circumstances under which individual factors would be effective for motivating knowledge contribution to virtual communities.

  • PDF

Design of Access Security System in conjunction with SNS Service based on the Physical Computing (피지컬 컴퓨팅 기반에서의 SNS 서비스를 연계한 출입 보안 시스템 설계)

  • Kim, Heewan;Jung, Gillyoung
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.93-101
    • /
    • 2015
  • Today, various access security technology appeared in this society as a result of the informatization and automation. Most building, floor, or door security certification system for the office units are installed, but there are many inconvenient matters. In order to minimises this, we used the face recognition function via the camera, and various sensors. In this paper, I designed the access security system through physical computing which Arduino offered, facial recognition program, and Twitter. Check that the personal information stored in the individual RFID tag is matched to the personal information stored on the existing server. Face recognition program input the face using a camera, and allow to confirm the identity. The system's abnormal or when the unauthenticated person is to penetrate, the system transmits the Twitter status message to the manager. It was designed continuously to monitor the status in real time in this way.