• Title/Summary/Keyword: Resident Registration

Search Result 98, Processing Time 0.021 seconds

ART1-based Fuzzy Supervised Learning Algorithm (ART-1 기반 퍼지 지도 학습 알고리즘)

  • Kim Kwang-Baek;Cho Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.883-889
    • /
    • 2005
  • Error backpropagation algorithm of multilayer perceptron may result in local-minima because of the insufficient nodes in the hidden layer, inadequate momentum set-up, and initial weights. In this paper, we proposed the ART-1 based fuzzy supervised learning algorithm which is composed of ART-1 and fuzzy single layer supervised learning algorithm. The Proposed fuzzy supervised learning algorithm using self-generation method applied not only ART-1 to creation of nodes from the input layer to the hidden layer, but also the winer-take-all method, modifying stored patterns according to specific patterns. to adjustment of weights. We have applied the proposed learning method to the problem of recognizing a resident registration number in resident cards. Our experimental result showed that the possibility of local-minima was decreased and the teaming speed and the paralysis were improved more than the conventional error backpropagation algorithm.

The Biometric Authentication Scheme Capable of Multilevel Security Control (보안레벨 조절이 가능한 바이오메트릭 인증 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A fingerprint is unique to each person and can be represented as a digital form. As the fingerprint is the part of human body, fingerprint recognition is much more easy to use and secure rather than using password or resident card for user authentication. In addition, as the newly released smart phones have built-in camera and fingerprint sensors, the demand for biometric authentication is increasing rapidly. But, the drawback is that the fingerprint can be counterfeited easily and if it's exposed to the hacker, it cannot be reused. Thus, the original fingerprint template should be transformed for registration and authentication purposes. Existing transformation functions use passcode to transform the original template to the cancelable form. Additional module is needed to input the passcode, so it requires more cost and lowers the usability. In this paper, we propose biometric authentication scheme that is economic and easy to use. The proposed scheme is consisted of cancelable biometric template creation, registration and user authentication protocols, and can control several security levels by configuring the number of fingerprints and scan times. We also analyzed that our scheme is secure against the brute-force attack and the active attacks.

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

A New Fingerprinting Method Using Safranine O for Adhesive Tapes and Non-Porous Papers

  • Kim, Young-Sam;Oh, In-Sun;Yoon, Kwang-Sang;Kim, Young-Joo;Eom, Yong-Bin
    • Biomedical Science Letters
    • /
    • v.16 no.3
    • /
    • pp.197-200
    • /
    • 2010
  • All citizens over 17 year old living in Korea have to be fingerprinted to obtain a certificate of resident registration. For this reason, human identification through fingerprints has been used actively in crime scene investigation. The fingerprint is so unique that it is one of the most certain ways to identify oneself and it can differentiate between genetically identical twins. Fingerprints gained in crime scene indicate a direction of criminal investigation in conjecturing a suspect. Fingerprints help a reunion of family got scattered for a long time and make it possible to get a personal identification for missing person who met with natural calamity. We developed a new fingerprinting method using safranine O, so as to develop fingerprints on the adhesive tapes and non-porous papers in various physical environments. Results were compared to the preexisting fingerprinting method, the minutiae numbers of fingerprints were greatly increased in our newly developed safranine O fingerprinting method. This newly developed safranine O method showed a quantity and quality comparable to the preexisting fingerprinting method routinely used in these days. In our hands, the safranine O fingerprinting method is another easy and obvious choice when the forensic case sample is available for fingerprints on the adhesive tapes and non-porous papers.

Content-based Face Retrieval System using Wavelet and Neural Network (Wavelet과 신경망을 이용한 내용기반 얼굴 검색 시스템)

  • 강영미;정성환
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.3
    • /
    • pp.265-274
    • /
    • 2001
  • In this paper, we propose a content-based face retrieval system which can retrieve a face based on a facial feature region. Instead of using keyword such as a resident registration number or name for a query, the our system uses a facial image as a visual query. That is, we recognize a face based on a specific feature region including eyes, nose, and mouth. For this, we extract the feature region using the color information based on HSI color model and the edge information from wavelet transformed image, and then recognize the feature region using neural network. The proposed system is implemented on client/server environment based on Oracle DBMS for a large facial image database. In the experiment with 150 various facial images, the proposed method showed about 88.3% recognition rate.

  • PDF

An Innovative Fingerprinting Procedure for Human Identification

  • Kim, Young-Sam;Yoon, Kwang-Sang;Eom, Yong-Bin;Seo, Joong-Seok;Kim, Jong-Bae
    • Biomedical Science Letters
    • /
    • v.15 no.3
    • /
    • pp.187-197
    • /
    • 2009
  • Fingerprinting is a frontier technique that is the most frequently applied for human identification throughout the world. All citizens over 17 year old living in the Republic of Korea must be fingerprinted to obtain a certificate of resident registration. In Korea, for this reason, human identification through fingerprints has been far better developed and used efficiently both in crime scene investigation and in confirmation of an unidentified body. Scientific approaches have been made to accurately extract the metamorphosed fingerprints in various environments. Because most of the studies on fingerprinting have been accomplished with biometric techniques, researches on restoration of human dermal tissue and taking custody data after collecting fingerprints have been comparatively undermined. In this study, a newly innovative method for fingerprint extraction was developed using the polyester film with print powders and the high temperature-moisturizing method. Compared to the conventional fingerprinting method of paper with ink, minutiae numbers of fingerprints were greatly increased in polyester film with print powders after restoration of fingertips by high temperature-moisturization. This newly developed procedure would be an efficient fingerprinting technique which could be utilized in scientific investigation and in personal identification in the future. Furthermore, the new method for restoration and extraction of fingerprints are easy and inexpensive to practice for a number of human identification.

  • PDF

Personal Information Protection System for Web Service (인터넷 웹에서의 개인정보보호 시스템 구현)

  • Hwang, Ho-Young;Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.261-266
    • /
    • 2011
  • Recently, Internet web services including bulletin board of companies, public intuitions, or governments became the main ways of personal information leakage. However, it is hard to succeed to detect personal information and protect it from leakage manually by system administrators, because the number of web boards and attached files is so huge. Therefore, automatic scanning and filtering methods are needed to protect personal information like resident registration numbers from unexpected exposure. To do this, we developed a novel and advanced web security system for automatic personal information scanning and filtering.

Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection (개인정보보호를 위한 ELIS의 자치법규서식 개선방안)

  • Choi, Chul-Jae;Lee, Young-Sik;Lee, Tae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1017-1024
    • /
    • 2016
  • In this paper, we have figured out status and demand about personal information in local laws and regulations of the four major city out of the municipality 18 institutions of Gangwon Province. To take advantage of the autonomous regulations Information System(ELIS), and research and analysis in the autonomy regulations of local governments to object to the attachment format. To object to the Attachment to the request of the resident registration number notation is a super key. There is a disclosure resistance sense of personal information, and research analysis of the smart phone number and home phone number. We have proposed the urgent development of automatic search engine of PIMS compliance with personal information.

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.