• Title/Summary/Keyword: Verification technique

Search Result 905, Processing Time 0.035 seconds

On-line Signature Verification Based on the Structural Analysis (구조적 분석에 의한 온라인 서명 검증)

  • 이진호;김성훈김재희
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.1293-1296
    • /
    • 1998
  • This paper presents a new signature verification technique that not only maximally allows variations in signatures of each person, but also discriminates effectively forgeries from true signatures. The signature verification system is designed to detect unstable portions in signatures of same person, and to give large weight on the portion that is difficult to imitate and plays an important role in signature verification. In registration mode, the system extracts subpatterns from training samples and analizes their consistency and singularity by calculating the variance and complexity of this portion. In verification mode, the system verifies a input signature by comparing corresponding subpatterns with the weights of reference subpatterns.

  • PDF

A Technique of Calculating a Weighted Euclidean Distance with a Personalized Feature Set in Parametric Signature Verification (매개변수적 서명 검증에서 개인화된 특징 집합의 가중치 유클리드 거리 산출 기법)

  • Kim, Seong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.137-146
    • /
    • 2005
  • In parametric approach to a signature verification, it generally uses so many redundant features unsuitable for each individual signature that it causes harm, instead. This paper proposes a method of determining personalized weights of a feature set in signature verification with parametric approach by identifying the characteristics of each feature. For an individual signature, we define a degree of how difficult it is for any other person to forge the one's (called 'DFD' as the Degree of Forgery Difficulty). According to the statistical characteristics and the intuitional characteristics of each feature, the standard features are classified into four types. Four types of DFD functions are defined and applied into the distance calculation as a personalized weight factor. Using this method, the error rate of signature verification is reduced and the variation of the performance is less sensitive to the changes of decision threshold.

  • PDF

Text-Independent Speaker Verification Using Variational Gaussian Mixture Model

  • Moattar, Mohammad Hossein;Homayounpour, Mohammad Mehdi
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.914-923
    • /
    • 2011
  • This paper concerns robust and reliable speaker model training for text-independent speaker verification. The baseline speaker modeling approach is the Gaussian mixture model (GMM). In text-independent speaker verification, the amount of speech data may be different for speakers. However, we still wish the modeling approach to perform equally well for all speakers. Besides, the modeling technique must be least vulnerable against unseen data. A traditional approach for GMM training is expectation maximization (EM) method, which is known for its overfitting problem and its weakness in handling insufficient training data. To tackle these problems, variational approximation is proposed. Variational approaches are known to be robust against overtraining and data insufficiency. We evaluated the proposed approach on two different databases, namely KING and TFarsdat. The experiments show that the proposed approach improves the performance on TFarsdat and KING databases by 0.56% and 4.81%, respectively. Also, the experiments show that the variationally optimized GMM is more robust against noise and the verification error rate in noisy environments for TFarsdat dataset decreases by 1.52%.

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment (인프라 클라우딩(Infra Clouding) 환경에서 자가조직 저장매체의 보안을 위한 3자간 협상 프로토콜 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1303-1310
    • /
    • 2011
  • This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.

The Comparative Analysis Study and Usability Assessment of Fat Suppressed 3D FSPGR T1 Technique and Fat Suppressed Isotropic 3D FSE T1 Technique when Examining MRI of Patient with Triangular Fibrocartilage Complex (TFCC) Tear (삼각 섬유성 연골(TFCC) 손상 환자의 자기공명영상 검사 시 Fat Suppressed 3D FSPGR T1 강조 기법에 대한 Fat Suppressed Isotropic 3D FSE T1 강조 기법의 비교 분석 및 유용성에 관한 평가)

  • Kang, Sung-Jin;Cho, Yong-Keun;Lee, Sung-Soo
    • Journal of the Korean Magnetics Society
    • /
    • v.26 no.3
    • /
    • pp.105-114
    • /
    • 2016
  • In this study, For assessment of triangular fibrocartilage complex (TFCC) injury, we acquired images by fat suppressed 3D fast spoiled gradient recalled T1 and fat suppressed Isotropic 3D fast spin echo T1 techniques. For quantitative evaluation, measured signal to noise ratio and contrast to noise ratio and verified statistical significance between two imaging techniques by Mann-Whitney U verification. And for qualitative evaluation, marked 4-grade scoring (0: non diagnostic, 1: poor, 2: adequate, 3: good) on shape of TFCC, artifacts by partial volumes, description of the lesions by two radiologist, verified coincidence between 2 observer using Kappa-value verification. We used 3.0 Tesla MR equipment and 8-channel RF coil for imaging acquisition. As quantitative evaluation results, signal to noise ratio and contrast to noise ratio value of Isotropic 3D fast spin echo T1 technique is higher in every image sections, also between two imaging techniques by Mann-Whitney U verification was statistically significant (p < 0.05). As qualitative results, observer 1, 2 marked a higher grade on Isotropic 3D FSE T1 technique, coincidence verification of evaluation results between two observers by Kappa-value verification was statistically significant (p < 0.05). As a result, during MRI examination on TFCC injury, fat suppressed Isotropic 3D fast spin echo T1 technique is considered offering more useful information about abnormal lesion of TFCC.

Hardware/Software Co-verification with Integrated Verification (집적검증 기법을 채용한 하드웨어/소프트웨어 동시검증)

  • Lee, Young-Soo;Yang, Se-Yang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.261-267
    • /
    • 2002
  • In SOC(System On a Chip) designs, reducing time and cast for design verification is the most critical to improve the design productivity. this is mainly because the designs require co-verifying HW together with SW, which results in the increase of verification complexity drastically. In this paper, to cope with the verification crisis in SOC designs, we propose a new verification methodology, so called integrated co-verification, which lightly combine both co-simulation and co-emulation in unified and seamless way. We have applied our integrated co-verification to ARM/AMBA platform-based co-verification environment with a commercial co-verification tool, Seamless CVE, and a physical prototyping board. The experiments has shown clear advantage of the proposed technique over conventional ones.

SDL-OPNET Model Conversion Technique for the Development of Communication Protocols with an Integrated Model Design Approach (통합 모델 설계 방식 기반 통신 프로토콜 개발을 위한 SDL-OPNET 모델 변환 기법)

  • Kim, Jae-Woo;Kim, Tae-Hyong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2010
  • Although both functional verification and performance evaluation are necessary for the development of effective and reliable communication systems, they have been often performed independently; by functional modeling with formal language tools and by performance modeling with professional network performance evaluation tools, respectively. Separate and repeated modeling of one system, however, would often result in cost increase and inconsistency between the models. This paper proposes an integrated model design approach in order to overcome this problem that evaluates the performance of a communication protocol designed in SDL with SDL-OPNET model conversion. The proposed technique generates OPNET skeleton code from Tau-generated C code of the SDL model by analyzing the relations between SDL and OPNET models. IEEE 802.2 LLC protocol was used as an example of model conversion to show the applicability and effectiveness of the proposed technique.

A Study on the Analytic Technique Combination and Evaluation of Development Process for Software Safety (S/W 안전성을 위한 분석기법 조합과 개발 프로세스 평가에 대한 연구)

  • Lee, Young-Soo;Ahn, Jin;Ha, Seung-Tea;Cho, Woo-Sik;Han, Chan-Hee
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1468-1476
    • /
    • 2006
  • The goal of this thesis is to support safety and reliability characteristics of software intensive critical systems. The verification method developed is innovative from current state of the art in what concerns the verification viewpoint adopted: focusing on software faults, and not, like many other approaches purely on fulfilling functional requirements. As a first step and based on a number of well defined criteria a comparison was made of available literature in the area of static non formal non probabilistic software fault removal techniques. But, None of the techniques evaluated fulfilled all criteria set in isolation. Therefore a new technique was developed based on a combination of two existing techniques: the FMEA and FTA. These two techniques complement each other very well. It is possible to integrate both techniques with commonly used techniques at system level. The resulting new technique can be shown to combine nearly all aspects of existing fault removal techniques.

  • PDF

Verification Test of Failover Recovery Technique based on Software-Defined RAID (Software-Defined RAID 기반 장애복구 기법과 실증 테스트)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.69-77
    • /
    • 2016
  • This paper proposes a software defined storaging method to converge the network virtualization technique and the RAID of distributed storage environment. The proposed method designs software based storage which it apply a flexible control and maintenance of storages. In addition, the method overcomes the restricted of physical storage capacity and cut costs of data recovery. The proposed failover recovery technique based on Software-Defined RAID has been tested the substantial verification and the performance using public AWS and Google Storage.

CodeAnt : Code Slicing Tool for Effective Software Verification (CodeAnt : 소프트웨어 검증 효율 향상을 위한 코드 슬라이싱 도구)

  • Park, Mingyu;Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Safety critical systems require exhaustive verification of safety properties, because even a single corner-case fault can cause a critical safety failure. However, existing verification approaches are too costly in terms of time and computational resource required, making it hard to be applied in practice. In this paper, we implemented a tool for minimizing the size of the verification target w.r.t. verification properties to check, based on program slicing technique[1]. The efficacy of program slicing using our tool is demonstrated in a case study with a verification target Trampoline[3], which is an open source automotive operating system compliant with OSEK/VDX[2]. Experiments have shown enhanced performance in verification, with a 71% reduction in the size of the code.