• 제목/요약/키워드: Quality Authentication

검색결과 133건 처리시간 0.022초

사용자 인증시스템의 인증결과 예측을 위한 바이오정보의 품질평가기법 (A Quality Assessment Method of Biometrics for Estimating Authentication Result in User Authentication System)

  • 김애영;이상호
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제16권2호
    • /
    • pp.242-246
    • /
    • 2010
  • 본 논문에서는 사용자 인증시스템에서 인식결과에 대한 예측이 가능한 품질평가모델을 설계하고 분석한다. 제안하는 품질평가기법은 다중고유얼굴 정보에 T-검정과 같은 소표본 분석법을 적용하여 CIMR(Confidence Interval Matching Ratio)이라는 품질 값이 결과로 나타나도록 설계하였으며, 이 CIMR 기반의 품질평가기법을 이용하여 서로 다른 바이오정보간의 차별성이 잘 나타나는지 향후 보편화될 멀티바이오정보 환경을 고려하여 실험하였다. 또한 획득한 바이오정보의 인증결과에 대한 예측가능성 실험은 T-검정기반의 CIMR에 내포되어있는 평균 $\bar{X}$ 와 분산 $s^2$을 이용하였으며, 사용자인증 결과에 대한 예측은 최대 88%정도의 정확도를 보인다.

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

T-TIME: A Password Scheme Based on Touch Signal Generation Time Difference

  • Yang, Gi-Chul
    • 한국정보기술학회 영문논문지
    • /
    • 제8권2호
    • /
    • pp.41-46
    • /
    • 2018
  • As evidenced through rapidly growing digital devices and information, digital authentication is becoming ever more critical, especially considering the complex and prevalent digital accounts we are using every day. Also, digital authentication is apt to consistent digital security application. In this sense, digital security quality and usability can be enhanced by developing a mechanism for efficient digital authentication. In this paper, a mechanism of efficient digital authentication called T-TIME is introduced in order to alleviate issues dealing with secure and user friendly authentication across ever- growing digital devices and information. Touch Signal generation time difference is utilized for T-TIME as a mediation mechanism that enhances the security quality by confusing others unlike other graphical password mechanisms which are using spatial information. Hence, digital authentication by using T-TIME can be a good way of enhancing security quality and usability.

병원건축의 친환경 성능 향상을 위한 국내외 친환경 건축물 평가항목의 비교 연구 (A Comparative Study of a Domestic and Foreign Green Architecture Evaluation Items for a Green Performance Enhancement of Hospital Architecture)

  • 이호성
    • 한국실내디자인학회논문집
    • /
    • 제18권1호
    • /
    • pp.99-107
    • /
    • 2009
  • In order to prepare future green hospital architecture authentication system, this study is a comparative year report to Korean, the United States, Japanese, British, Canadian and Australian green building authentication systems. Also, the United States and Australian Green hospital authentication systems were examined, and the authentication items of hospitals were compared with those of civil architecture. Though the examination and analysis, the portion of indoor environmental quality section commonly shows the average of 20.7 percent in all 6 countries. Especially, IAQ(Indoor Air Quality) among inside IEQ(Indoor Environment Quality) is overwhelmingly much treated in Korea, the U.S.A, Canada and Australia. In Japan, heat, light and sound are the important factors for authentication evaluation, while in the U.K light are more emphasized for the authentication. 'LEED for Healthcare' as a hospital evaluation authentication system subdivided currently most. The system includes the detailed and extensive evaluation items ranging from hospital management, traffic, emission, water resources utilization to integrated design and furnishing. These overseas systems should be carefully investigated, researched and analyzed for an appropriate improvement of domestic green hospital authentication system. Also the current evaluation method of IEQ section of Korean GBCC needs to be modified. That's why the method puts too much importance on IAQ in IEQ section.

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘 (Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking)

  • 여동규;이해연
    • 정보처리학회논문지B
    • /
    • 제18B권6호
    • /
    • pp.355-364
    • /
    • 2011
  • 위변조되지 않은 고신뢰성의 영상이 요구되는 서비스에서 무결성을 인증하기위하여 가역 워터마킹 기법이 유용하게 적용될 수 있다. 콘텐츠의 인증을 위한 기존의 연구들은 워터마크의 제거후에 원본 복원이 불가능한 것이 많다. 가역 워터마킹 기법은 디지털 콘텐츠에 지각적 투명성을 유지하며 워터마크를 삽입한 후, 이를 아무런 손상없이 원본 상태로 복원할 수 있는 메시지 은닉 수단으로서 높은 품질과 높은 삽입용량이 요구되는 분야에서 다양하게 이용되어질 수 있다. 본 논문에서는 차이값 히스토그램 기반의 가역 워터마킹을 이용하여 영상의 위변조된 영역을 탐지하는 블록단위 인증 알고리즘을 제안한다. 먼저, 영상의 각 블록에 대하여 DCT 계수에 기반하여 영상의 특징값을 추출하고, 사용자의 정보와 결합하여 영상 인증 코드를 생성한다. 생성된 인증코드는 가역 워터마킹을 통하여 콘텐츠 자체에 직접 삽입한다. 이와 같은 영상의 인증을 위해서는 추출된 인증코드와 새로 생성된 인증코드의 비교를 수행한다. 다양한 영상들에 대하여 비교 분석한 실험 결과에 따르면 제안한 알고리즘은 완전한 가역성과 함께 낮은 왜곡을 유지하면서도 97% 이상의 높은 인증률을 얻을 수 있었다.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델 (A Secure Authentication Model Using Two Passwords in Client Server Systems)

  • 이재우
    • 한국산학기술학회논문지
    • /
    • 제12권3호
    • /
    • pp.1350-1355
    • /
    • 2011
  • 클라이언트 서버 환경하에서 정당한 클라이언트를 인증하고 시스템 자원들을 보호하는 일은 매우 중요한 이슈 중에 하나이다. 즉, 인가받지 않은 사용자들에 의해 시스템이 보안 공격을 막아내기 위해서는 사용자의 아이디와 패스워드로는 불충분하다. 본 논문에서는 클라이언트 인증키와 서버 인증키를 사용하는 안전한 데이터베이스 인증모델을 제안하였다. 제안모델은 2개의 인증키를 사용하여 보안성을 높이고자 하였는데, 클라이언트와 서버간 데이타베이스 트랜잭션을 처리할 때 서로의 인증 패스워드를 관리하여 사용자의 별도의 입력 작업 없이 사용자 패스워드에 더하여 인증패스워드를 사용함으로써 시스템의 보안성을 높여줄 수 있는 안전한 인증모델을 제시하고자 하였다.