• Title/Summary/Keyword: Key Point

Search Result 1,845, Processing Time 0.032 seconds

Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication

  • Arrahmah, Annisa Istiqomah;Gondokaryono, Yudi Satria;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.3 no.2
    • /
    • pp.13-20
    • /
    • 2016
  • Biometric authentication for account-based mobile payment continues to gain attention because of improvements on sensors that can collect biometric information. We propose an enhanced method for mobile payment security based on biometric authentication. In this mobile payment system, the communication between the user and the relying party is based on public key infrastructure. This method secures both the key and the biometric template in the user side using fuzzy vault biometric cryptosystems, which is based on non-random chaff point generator. In this paper, we consider an important process for the common fuzzy vault system, that is, the feature extraction method. We evaluate various feature extraction methods to enhance the accurate performance of the system.

A Simple Fingerprint Fuzzy Vault for FIDO

  • Cho, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5674-5691
    • /
    • 2016
  • Fast IDentity Online(FIDO) supports biometric authentications in an online environment without transmitting biometric templates over the network. For a given FIDO client, the "Fuzzy Vault" securely stores biometric templates, houses additional biometric templates, and unlocks private keys via biometrics. The Fuzzy Vault has been extensively researched and some vulnerabilities have been discovered, such as brute force, correlation, and key inversions attacks. In this paper, we propose a simple fingerprint Fuzzy Vault for FIDO clients. By using the FIDO feature, a simple minutiae alignment, and point-to-point matching, our Fuzzy Vault provides a secure algorithm to combat a variety of attacks, such as brute force, correlation, and key inversions. Using a case study, we verified our Fuzzy Vault by using a publicly available fingerprint database. The results of our experiments show that the Genuine Acceptance Rate and the False Acceptance Rate range from 48.89% to 80% and from 0.02% to 0%, respectively. In addition, our Fuzzy Vault, compared to existing similar technologies, needed fewer attempts.

Crowd escape event detection based on Direction-Collectiveness Model

  • Wang, Mengdi;Chang, Faliang;Zhang, Youmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4355-4374
    • /
    • 2018
  • Crowd escape event detection has become one of the hottest problems in intelligent surveillance filed. When the 'escape event' occurs, pedestrians will escape in a disordered way with different velocities and directions. Based on these characteristics, this paper proposes a Direction-Collectiveness Model to detect escape event in crowd scenes. First, we extract a set of trajectories from video sequences by using generalized Kanade-Lucas-Tomasi key point tracker (gKLT). Second, a Direction-Collectiveness Model is built based on the randomness of velocity and orientation calculated from the trajectories to express the movement of the crowd. This model can describe the movement of the crowd adequately. To obtain a generalized crowd escape event detector, we adopt an adaptive threshold according to the Direction-Collectiveness index. Experiments conducted on two widely used datasets demonstrate that the proposed model can detect the escape events more effectively from dense crowd.

Multivariate adaptive regression splines model for reliability assessment of serviceability limit state of twin caverns

  • Zhang, Wengang;Goh, Anthony T.C.
    • Geomechanics and Engineering
    • /
    • v.7 no.4
    • /
    • pp.431-458
    • /
    • 2014
  • Construction of a new cavern close to an existing cavern will result in a modification of the state of stresses in a zone around the existing cavern as interaction between the twin caverns takes place. Extensive plane strain finite difference analyses were carried out to examine the deformations induced by excavation of underground twin caverns. From the numerical results, a fairly simple nonparametric regression algorithm known as multivariate adaptive regression splines (MARS) has been used to relate the maximum key point displacement and the percent strain to various parameters including the rock quality, the cavern geometry and the in situ stress. Probabilistic assessments on the serviceability limit state of twin caverns can be performed using the First-order reliability spreadsheet method (FORM) based on the built MARS model. Parametric studies indicate that the probability of failure $P_f$ increases as the coefficient of variation of Q increases, and $P_f$ decreases with the widening of the pillar.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF

Remark on the Security of Password Schemes (패스워드 인증 키교환 프로토콜의 안전성에 관한 고찰)

  • 이희정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.161-168
    • /
    • 2003
  • We discuss the security of two famous password authenticated key exchange protocols, EKE2 and PAK. We introduce ′insider assisted attack′ Based on this assumption we point out weakness of the security of EKE2 and PAK protocols. More precisely, when the legitimate user wants to find other user′s password, called "insider-assisted attacker", the attacker can find out many ephemeral secrets of the server and then after monitoring on line other legitimate user and snatching some messages, he can guess a valid password of the user using the previous information. Of course for this kind of attack there are some constraints. Here we present a full description of the attack and point out that on the formal model, one should be very careful in describing the adversary′s behavior.

Development of Risk Assessment Indicators for Industrial Logistics Safety Management (산업 물류 프로세스의 리스크 평가지표 개발)

  • Cho, Jae-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.1-8
    • /
    • 2020
  • In general, companies operate systematically in response to financial risks such as exchange rates and liquidity, while they are vulnerable to risks in the manufacturing and sales processes. In particular, logistics refers to the activities for planning, managing and implementing efficient flows from the starting point of goods and products to the point of consumption, The purpose of this study was to develop key risks and key risk management indicators (KRIs) for risks that undermine logistics efficiency so that logistics risks can be effectively prevented and managed. As a result, 40 risk management indicators (KRIs) were developed in a total of six categories in the logistics sector, and the definition, calculation method and early warning grade of each KRI were presented so that companies could prevent risks in advance in logistics activities and contribute to enhancing efficiency of their work.

Improving Mycoplasma ovipneumoniae culture medium by a comparative transcriptome method

  • Wang, Xiaohui;Zhang, Wenguang;Hao, Yongqing
    • Journal of Veterinary Science
    • /
    • v.21 no.2
    • /
    • pp.30.1-30.11
    • /
    • 2020
  • Mycoplasma ovipneumoniae (Mo) is difficult to culture, resulting in many difficulties in related research and application. Since nucleotide metabolism is a basic metabolism affects growth, this study conducted a "point-to-point" comparison of the corresponding growth phases between the Mo NM151 strain and the Mycoplasma mycoides subsp. capri (Mmc) PG3 strain. The results showed that the largest difference in nucleotide metabolism was found in the stationary phase. Nucleotide synthesis in PG3 was mostly de novo, while nucleotide synthesis in NM151 was primarily based on salvage synthesis. Compared with PG3, the missing reactions of NM151 referred to the synthesis of deoxythymine monophosphate. We proposed and validated a culture medium with added serine to fill this gap and prolong the stationary phase of NM151. This solved the problem of the fast death of Mo, which is significant for related research and application.

Dataset Construction of Taekwondo Beginner AI (태권도 초심자를 위한 AI의 DataSet 구축)

  • Cho, Kyu Cheol;Kim, Ju Yeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.249-252
    • /
    • 2022
  • 세계 태권도 연맹은 국제 축구 연맹의 가입국과 동일한 수의 가입국을 보유할 만큼 태권도는 점점 더 세계적으로 나아가고 있다. 하지만 태권도의 교육방법은 예전과 다르지 않다. 도장의 관장이나 사범이 직접 자세를 눈으로 보고 판단하여 지도해야 한다. 본 연구는 기술이 발전하고 변화함에 따라 태권도를 조금 더 다양하고 흥미롭게 배울 수 있는 방법을 개발하고자 진행하였다. 본 논문에서는 피사체 모델을 촬영하여 이미지를 추출하고 이미지에서 사람의 관절 KeyPoint를 라벨링 한 후 이를 바탕으로 COCO 형식의 DataSet을 만들어낸다. 이후 이 DataSet을 기계에 학습을 시킨다면 초심자를 위한 교육용 태권도 AI가 만들어질 수 있다. 또한, 기계학습 이후 이 AI를 실제 교육현장에 적용하여 교육과정에 직접 사용할 수 있으며 이 AI를 바탕으로 교육용 게임 개발 등 다양한 방면으로 활용할 수 있을 것이라고 기대한다.

  • PDF

The global standard realizing process of the Tire Production Facility and Process Line

  • Suzuki, Takeshi
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.28-29
    • /
    • 2015
  • The tire production facility is a large-scale construction with the complexity of a manufacturing process. The process utilities should be wide-ranging as an effective arrangement of them is highly important. All the necessary information should be clarified together with the manufacturer at the basic planning stage, and this design should be developed to comply with the local culture and regulations. It is important to carry out more advanced engineering in terms of process, cost and quality, even if it is difficult to standardize due to the cultural and geographical conditions and regulations. The key point is to reflect all the given conditions and make a clear design during the design stage, to eliminate the problems after the construction has begun. Another key point is the delivery system, which must be totally managed from the initial design stage until the construction stage by proven companies. Flexibility, quick action, and single responsibility will be the fundamental features in all the steps of the project.

  • PDF