• Title/Summary/Keyword: Presentation Attack

Search Result 18, Processing Time 0.027 seconds

Presentation Attacks in Palmprint Recognition Systems

  • Sun, Yue;Wang, Changkun
    • Journal of Multimedia Information System
    • /
    • v.9 no.2
    • /
    • pp.103-112
    • /
    • 2022
  • Background: A presentation attack places the printed image or displayed video at the front of the sensor to deceive the biometric recognition system. Usually, presentation attackers steal a genuine user's biometric image and use it for presentation attack. In recent years, reconstruction attack and adversarial attack can generate high-quality fake images, and have high attack success rates. However, their attack rates degrade remarkably after image shooting. Methods: In order to comprehensively analyze the threat of presentation attack to palmprint recognition system, this paper makes six palmprint presentation attack datasets. The datasets were tested on texture coding-based recognition methods and deep learning-based recognition methods. Results and conclusion: The experimental results show that the presentation attack caused by the leakage of the original image has a high success rate and a great threat; while the success rates of reconstruction attack and adversarial attack decrease significantly.

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

Multi-modal Authentication Using Score Fusion of ECG and Fingerprints

  • Kwon, Young-Bin;Kim, Jason
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.132-146
    • /
    • 2020
  • Biometric technologies have become widely available in many different fields. However, biometric technologies using existing physical features such as fingerprints, facial features, irises, and veins must consider forgery and alterations targeting them through fraudulent physical characteristics such as fake fingerprints. Thus, a trend toward next-generation biometric technologies using behavioral biometrics of a living person, such as bio-signals and walking characteristics, has emerged. Accordingly, in this study, we developed a bio-signal authentication algorithm using electrocardiogram (ECG) signals, which are the most uniquely identifiable form of bio-signal available. When using ECG signals with our system, the personal identification and authentication accuracy are approximately 90% during a state of rest. When using fingerprints alone, the equal error rate (EER) is 0.243%; however, when fusing the scores of both the ECG signal and fingerprints, the EER decreases to 0.113% on average. In addition, as a function of detecting a presentation attack on a mobile phone, a method for rejecting a transaction when a fake fingerprint is applied was successfully implemented.

Factors Influencing the Hospital Presentation Time of Stroke Patients (뇌졸중 환자의 병원 내원시간에 영향을 미치는 요인)

  • Lee, Sang Hyun;Lee, Young Whee;Kim, Hwa Soon;Lim, Ji Young
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.2
    • /
    • pp.167-177
    • /
    • 2007
  • Purpose: This cross-sectional survey research was undertaken to identify the factors influencing time from onset to hospital arrival of stroke patients and to provide basic information for the development of intervention programs for stroke patients. Methods: The data were collected using a convenient sampling method from three hospitals in Inchon. The subjects were 78 patients who were diagnosed as stroke by doctor and they voluntarily participated in the study. Results: On the average, subjects arrived at the hospitals by 16.72 hours after the onset of stroke events with the range from 0.17 hours to 72 hours. Thirty-four(43.6%) subjects arrived within 3 hours which can maximize treatment effects. There was significant difference in hospital presentation time according to the level of knowledge(${\chi}^2=18.629$, p=.0003). A negative correlation was found between the hospital presentation time and self-efficacy (r= -.320, p=.004). Stepwise multiple regression analysis revealed that the most powerful predictor was self-efficacy. Self-efficacy, the level of knowledge and physical symptoms were significant factors and accounted for 21.7% of the variance of hospital presentation time in stroke patients. Conclusion: According to the results, self-efficacy is a useful concept for reducing the hospital presentation time from onset of attack in stroke patients. Therefore, nurses should consider educational programs which include not only a knowledge of stroke and recurrence prevention but also the concept of self-efficacy.

  • PDF

A Case Report of a Chronic Migraine Patient Who Did Not Respond to Triptan (트립탄 계열 약물에 반응하지 않는 만성 편두통 환자 치험 1례)

  • Kim, Cheol-hyun;Moon, Yeon-ju;Chu, Hong-min;Yang, Mu-hack
    • The Journal of Internal Korean Medicine
    • /
    • v.39 no.2
    • /
    • pp.154-158
    • /
    • 2018
  • Introduction: This case report assessed the effects of Korean medicine treatments on a chronic migraine patient who did not respond to triptan. Case Presentation: The patient received Korean medicine treatments, such as acupuncture, moxibustion, cupping, and herbal medication, during a hospitalization period. The effects of treatments were assessed with the Numerical Rating Scale (NRS) and migraine attack frequency. The intensity and attack frequency of migraines were significantly reduced after the complete treatment. Conclusions: For migraines, Korean medicine such as acupuncture and herbal medication could be an alternative to conventional therapy.

The meaning of Mental Disorder in Chinese Medicine (중의정지병증적내함해석(中医情志病证的内涵解析))

  • Lu, Ming-Yuan
    • Journal of Korean Medical classics
    • /
    • v.22 no.4
    • /
    • pp.39-42
    • /
    • 2009
  • Jeongji(情志) in Chinese medicine refers to a series of psychological activity which is expressed as hui(喜), no(怒), wu(優), sa(思), bi(悲), gong(恐), gyeong(驚), together with emotion, sentiment, and cognition, which are manifested as responses of the human body to environmental changes both inside and outside. Sa(思) is a major cognitive activity, and the other six emotions are main emotional activities. The emphasis on the interrelationship between cognition, sentiment, and emotional activity is a unique characteristic of the Jeongji(情志) concept in China. Jeongji[Mental] disorder refers to a series of diseases that has a close link between the attack, clinical presentation and emotional stimulation. The attack is deeply affected by emotional stimulation, with which physical symptoms are either present or absent. However, emotional changes are clear most of the time, their effect on disease development noticeable as well. To sum up, Jeongji[Mental] disorder is related to a wide range of medical problems in fields such as internal, surgical, gynecology, pediatrics, and various psychiatric disorders, not to mention contemporary psychological disorders, neurosis, and all kinds of mental illnesses of today. Moreover, the mental and physical disorders of today all share a common pathogenesis, clinical manifestation and treatment discipline. All the more reason for deeper professional research.

  • PDF

A Study about Flow Characteristic on Delta wing with/without LEX by PIV (PIV에 의한 델타형 날개에서의 LEX 부착여부에 따른 유동특성에 관한 연구)

  • LEE Hyun;KIM Beom-Seok;SOHN Myong-Hwan;LEE Young-Ho
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.771-774
    • /
    • 2002
  • Highly sweep leading edge extensions(LEX) applied to delta wings have greatly improved the subsonic maneuverability of contemporary fighters. In this study, systematic approach by PIV experimental method within a circulating water channel was adopted to study the fundamental characteristics of induced vortex generation, development and its breakdown appearing on a delta wing model with or without LEX in terms of four angles of attack($15^{\circ},\;20^{\circ},\;25^{\circ},\;30^{\circ}$) and six measuring sections of chord length($30{\%},\;40{\%},\;50{\%},\;60{\%},\;70{\%},\;80{\%}$). Sideslip effect in case of the LEX was also studied for two sideslip(yaw) angles($5^{\circ},\;10^{\circ}$) at one angle of attack(20). Distribution of time-averaged velocity vectors and vorticity over the delta wing model were compared along the chord length direction. Quantitative comparison of the maximum vorticity featuring the induced pressure distribution were also conducted to clarify the significance of the LEX existence. Animation presentation in velocity distribution was also implemented to reveal the effect of LEX with wing vortex interaction.

  • PDF

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

Laparoscopic cholecystectomy for acute cholecystitis: Any time is a good time

  • Hamza Wani;Sadananda Meher;Uppalapati Srinivasulu;Laxmi Narayanan Mohanty;Madhusudan Modi;Mohammad Ibrarullah
    • Annals of Hepato-Biliary-Pancreatic Surgery
    • /
    • v.27 no.3
    • /
    • pp.271-276
    • /
    • 2023
  • Backgrounds/Aims: Laparoscopic cholecystectomy within one week of acute cholecystitis is considered safe and advantageous. Surgery beyond first week is reserved for non-resolving attack or complications. To compare clinical outcomes of patients undergoing laparoscopic cholecystectomy in the first week and between two to six weeks of an attack of acute cholecystitis. Methods: In an analysis of a prospectively maintained database, all patients who underwent laparoscopic cholecystectomy for acute cholecystitis were divided into two groups: group A, operated within one week; and group B, operated between two to six weeks of an attack. Main variables studied were mean operative time, conversion to open cholecystectomy, morbidity profile, and duration of hospital stay. Results: A total of 116 patients (74 in group A and 42 in group B) were included. Mean interval between onset of symptoms & surgery was five days (range, 1-7 days) in group A and 12 days (range, 8-20 days) in group B. Operative time and incidence of subtotal cholecystectomy were higher in group B (statistically not significant). Mean postoperative stay was 2 days in group A and 3 days in group B. Laparoscopy was converted to open cholecystectomy in two patients in each group. There was no incidence of biliary injury. One patient in group B died during the postoperative period due to continued sepsis and multiorgan failure. Conclusions: In tertiary care setting, with adequate surgical expertise, laparoscopic cholecystectomy can be safely performed in patients with acute cholecystitis irrespective of the time of presentation.

Perspectives on EFL Teachers' Responding to Students' Writing at the Semantic Level

  • Chang, Kyung-Suk
    • English Language & Literature Teaching
    • /
    • no.3
    • /
    • pp.185-201
    • /
    • 1997
  • This study explores perspectives on responding to EFL students' compositions at the semantic level. In the last three decades, there has been a shift from product-oriented approach to process-oriented one to teaching writing. The shift has led to the criticism of the traditional view on teacher response. The traditional view has been under attack for its overemphasis upon form and ineffectiveness on improving student writing skill. It is also noted that research into students' reactions to the traditional teacher response has been inconclusive. The process-oriented approach, on the other hand, draws its attention to meaning and the logical development of thought as well as linguistic matters. In this context, the present study discusses what EFL teachers need to take into account in providing the semantic-level feedback on students' compositions. Firstly, teacher response to student writing is on-going; teacher feedback involves teacher intervention in the drafting process, the revision process, and the presentation of product. Secondly, in the writing conferences, the teacher provides students an opportunity to talk about writing, assistance and advice on the content/meaning of the written text, helping them expand and clarify thinking about audience(reader) and purpose.

  • PDF