• Title/Summary/Keyword: Signature Recognition

Search Result 83, Processing Time 0.026 seconds

A measurement of Cardio thoracic ratio by Digital Image processing (디지털 영상처리기법에 의한 심흉곽 계수측정)

  • Yoo, Dong-Joo;Kim, Hong-Ho;Huh, Wong;Hong, Seung-Hong
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1989 no.05
    • /
    • pp.23-26
    • /
    • 1989
  • This paper describes the automatic recognition technique for heart enlargement diagnosis with the chest X-ray films enhanced by digital image processing. The technique measures a maximum transverse of the daiphragm and a maximum transverse of the heart by means of direction signature algorithms, then calculates the desired ratio of these two measured values. This is often refered to a cadiothoracic ratio which gives as useful clue for heart enlargement symptom. The experiment results in this paper show presented method is more efficient than the manual diagnosis method of the symptom.

  • PDF

Object Cataloging Using Heterogeneous Local Features for Image Retrieval

  • Islam, Mohammad Khairul;Jahan, Farah;Baek, Joong Hwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4534-4555
    • /
    • 2015
  • We propose a robust object cataloging method using multiple locally distinct heterogeneous features for aiding image retrieval. Due to challenges such as variations in object size, orientation, illumination etc. object recognition is extraordinarily challenging problem. In these circumstances, we adapt local interest point detection method which locates prototypical local components in object imageries. In each local component, we exploit heterogeneous features such as gradient-weighted orientation histogram, sum of wavelet responses, histograms using different color spaces etc. and combine these features together to describe each component divergently. A global signature is formed by adapting the concept of bag of feature model which counts frequencies of its local components with respect to words in a dictionary. The proposed method demonstrates its excellence in classifying objects in various complex backgrounds. Our proposed local feature shows classification accuracy of 98% while SURF,SIFT, BRISK and FREAK get 81%, 88%, 84% and 87% respectively.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.

Multimodal Biometric Using a Hierarchical Fusion of a Person's Face, Voice, and Online Signature

  • Elmir, Youssef;Elberrichi, Zakaria;Adjoudj, Reda
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.555-567
    • /
    • 2014
  • Biometric performance improvement is a challenging task. In this paper, a hierarchical strategy fusion based on multimodal biometric system is presented. This strategy relies on a combination of several biometric traits using a multi-level biometric fusion hierarchy. The multi-level biometric fusion includes a pre-classification fusion with optimal feature selection and a post-classification fusion that is based on the similarity of the maximum of matching scores. The proposed solution enhances biometric recognition performances based on suitable feature selection and reduction, such as principal component analysis (PCA) and linear discriminant analysis (LDA), as much as not all of the feature vectors components support the performance improvement degree.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

The Effects of Luxury Brand Marketing Mix on the Formation of Customer Equity - Focusing on Luxury Brand's Product Consumers in 20~40's - (럭셔리 브랜드 마케팅 믹스가 고객자산 형성에 미치는 영향 - 20~40대 럭셔리 브랜드 제품 소비자를 중심으로 -)

  • Hwang, Yookyung
    • Fashion & Textile Research Journal
    • /
    • v.15 no.1
    • /
    • pp.103-115
    • /
    • 2013
  • This study identifies how the luxury brand marketing mix affects customer equity drivers and suggests intangible equity management strategies so that companies can make long-term profits through luxury brands based on empirical studies of Korean luxury consumers. The results of the study are as follows: First, this study classified the properties that use 8 key factors (product integrity, heritage, exclusivity, premium image, environment and consumption experience, premium price, luxury communication strategy, and brand signature). Second, it shows that product integrity and luxury communication strategy have a positive effect on all customer equity drivers, that brand signature has a positive effect on value equity and brand equity, and that premium price has a negative effect on relation equity. It is important to provide products and services equipped with high quality and luxurious designs based on excellent craftsmanship in order to establish brand equity and value equity. Brand identity needs to be maintained and unique brand signatures need to be developed based on the long history of luxury brands against a traditional backdrop. A diversified communication strategy improves brand recognition while playing a part in facilitating brand association and brand image. In order to improve relationship equity, actions such as a loyalty program to strengthen brand loyalty, need to be taken as well as measures to maintain and enhance customer trust through a reasonable price strategy.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

A Study on the Adoption of Electronic Contract Service (전자계약서비스의 문제점과 해결방안)

  • Choi, Seok-Beom;Kim, Tae-Hwan;Kim, In-Kyung;Kim, Jae-Hak;Park, Sun-Young;Yoon, Young-Rim
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.34
    • /
    • pp.157-185
    • /
    • 2007
  • The purpose of this thesis is to contribute to the activation of e-contract service for one stop e-trade by analyzing the problems and its solutions in e-contract service at home and abroad. In order to achieve the purpose of this thesis, case studies are done on e-contract service providers such as CECTRUST service of NTT DATA in Japan and HanCM.com of Haansoft in Korea and user companies such as Taisei Corporation using CECTRUST service and Hyundai Card using HanCM.com. The problems in the e-contract service are the lack of e-contract service providers, rare publicity of e-contract service, limited use of e-contract service at only home, higher pricing for e-contract service, short time management of e-contract documents by service providers, no application of newly developed security technology to e-contract service, unsatisfaction of requirements of e-contract service provider as trusted third party, absence of lower pricing e-contract service by service provider, authorizing key error in electronic signature under recognized authentication system in case of fail in renewal of digital certificate and reproduction of digital certificate. The solutions of these problems are the upbringing of e-contract service providers, broad publicity of e-contract service, development of e-contract service on a global basis, establishment of lower pricing for e-contract service, long time management of e-contract documents by service providers, application of newly developed security technology such as bio technology to e-contract service, satisfaction of requirements of e-contract service provider as trusted third party by designation of recognized e-document repository, development of lower e-contract service by way of application service provider(ASP), introduction of time stamping of e-contract document and signature key value. The limitation of this thesis is that the problems and its solutions could not meet with the broad recognition as they are conferred by intuition because of few e-contract service provider.

  • PDF

A pictorial review of signature patterns living in musculoskeletal ultrasonography

  • Kim, Su Young;Cheon, Ji Hyun;Seo, Won Jun;Yang, Geun Young;Choi, Yun Mi;Kim, Kyung Hoon
    • The Korean Journal of Pain
    • /
    • v.29 no.4
    • /
    • pp.217-228
    • /
    • 2016
  • The musculoskeletal system is mainly composed of the bones, muscles, tendons, and ligaments, in addition to nerves and blood vessels. The greatest difficulty in an ultrasonographic freeze-frame created by the examiner is recognition of the targeted structures without indicators, since an elephant's trunk may not be easily distinguished from its leg. It is not difficult to find descriptive ultrasonographic terms used for educational purposes, which help in distinguishing features of these structures either in a normal or abnormal anatomic condition. However, the terms sometimes create confusion when describing common objects, for example, in Western countries, pears have a triangular shape, but in Asia they are round. Skilled experts in musculoskeletal ultrasound have tried to express certain distinguishing features of anatomic landmarks using terms taken from everyday objects which may be reminiscent of that particular feature. This pictorial review introduces known signature patterns of distinguishing features in musculoskeletal ultrasound in a normal or abnormal condition, and may stir the beginners' interest to play a treasure-hunt game among unfamiliar images within a boundless ocean.

Development of an Intelligent Ultrasonic Signature Classification Software for Discrimination of Flaws in Weldments (용접 결함 종류 판별을 위한 지능형 초음파 신호 분류 소프트웨어의 개발)

  • Kim, H.J.;Song, S.J.;Jeong, H.D.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.17 no.4
    • /
    • pp.248-261
    • /
    • 1997
  • Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress in the research on this methodology, it has not been widely used in many practical ultrasonic inspections of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments based on their ultrasonic signals using various tools in artificial intelligence such as neural networks. This software shows the excellent performance in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks. This performance demonstrates the high possibility of this software as a practical tool for ultrasonic flaw classification in weldments.

  • PDF