• Title/Summary/Keyword: Personal Identification System

Search Result 208, Processing Time 0.032 seconds

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

A Personal Identification Algorithm Utilizing Finger Crease Pattern (손가락 마디지문 패턴을 이용한 개인식별 알고리즘)

  • Chang, Seok-Won;Jung, Hee-Cheol;Choi, Hwan-Soo
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.2891-2894
    • /
    • 1999
  • This paper proposes an alternative personal identification algorithm using finger crease pattern which is assumed to overcome the disadvantages of the existing biometrics system. We used a CED camera with LED lighting as the input device. The original images were treated by employing a lowpass and highpass Jilter to get the reinforced finger boundaries and finger crease patterns, thereby threshold is applied. We tracked the boundaries of the finger and extracted the Images of the index, middle, and ring finger, thereafter applied noise reduction operation. In the last step, we performed the verifications of a person by matching one dimensional profiles of finger crease patterns. This algorithm shows the possibility of an alternative biometrics identification system to the current ones. Lastly, the comparative evaluation on our system and the other algorithm is presented.

  • PDF

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN (아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Im, Hyuk;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.159-179
    • /
    • 2015
  • In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

User Identification System Based on Iris Information Using a Mouse (홍채 정보 기반 마우스를 활용한 사용자 인증 시스템)

  • Kim Sin-Hong;Rho Kwang-Hyun;Moon Soon-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.143-150
    • /
    • 2006
  • Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.

  • PDF

Volume Holographic Fingerprint Recognition System for Personal Identification (개인 인증을 위한 체적 홀로그래픽 지문인식 시스템)

  • 이승현
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.256-263
    • /
    • 1998
  • In this paper, we propose a volume holographic fingerprint recognition system based on optical correlator for personal identification. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the security verification system.

  • PDF

A Study on the Improvement of PIV Performance (PIV의 성능개선에 관한 연구)

  • 이영호;김춘식;최장운
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.18 no.3
    • /
    • pp.34-42
    • /
    • 1994
  • The present study is aimed to improve the PIV performance by suggesting a two-frame particle identification technique and by introducing estimation method of wall pressure distribution from the velocity data. Adopted image processing system consists of one commercial image board slit into a personal computer, 2-D sheet light generator, flow picture recording apparatus and related particle identification software. A revised particle tracking method essential to PIV performance is obtained by particle centroid correlation pairing (CCP) and its effectiveness is ascertained by comparison with multi-frame identification.

  • PDF

Fingerprint Identification System Using Ridge Direction Extraction by Index Table (Index table에 의한 융선의 방향성 추출을 이용한 지문 인식 시스템)

  • Lee, Jee-Won;Ahn, Do-Rang;Lee, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.180-182
    • /
    • 2005
  • Fingerprint-based identification is known to be used for a very long time. Owing to their uniqueness and immutability, fingerprints are today the most widely used biometric features. Therefore, recognition using fingerprints is one of the safest methods as a way of personal identification. But fingerprint identification system has a critical weakness. Since the fingerprint identification time dramatically increase when we compare the unknown fingerprint's minutiae with fingerprint database's minutiae. In this paper, a ridge orientation extraction method using Index table is proposed to solve the problem. The goal of fast direction image extraction is to reduce the identification time and to improve the clarity of ridge and valley structures of input fingerprint image.

  • PDF

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.