• Title/Summary/Keyword: biometric identification

Search Result 140, Processing Time 0.031 seconds

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Fingerprint Identification System Using Ridge Direction Extraction by Index Table (Index table에 의한 융선의 방향성 추출을 이용한 지문 인식 시스템)

  • Lee, Jee-Won;Ahn, Do-Rang;Lee, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.180-182
    • /
    • 2005
  • Fingerprint-based identification is known to be used for a very long time. Owing to their uniqueness and immutability, fingerprints are today the most widely used biometric features. Therefore, recognition using fingerprints is one of the safest methods as a way of personal identification. But fingerprint identification system has a critical weakness. Since the fingerprint identification time dramatically increase when we compare the unknown fingerprint's minutiae with fingerprint database's minutiae. In this paper, a ridge orientation extraction method using Index table is proposed to solve the problem. The goal of fast direction image extraction is to reduce the identification time and to improve the clarity of ridge and valley structures of input fingerprint image.

  • PDF

Identification via Retinal Vessels Combining LBP and HOG

  • Ali Noori;Esmaeil Kheirkhah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.187-192
    • /
    • 2023
  • With development of information technology and necessity for high security, using different identification methods has become very important. Each biometric feature has its own advantages and disadvantages and choosing each of them depends on our usage. Retinal scanning is a bio scale method for identification. The retina is composed of vessels and optical disk. The vessels distribution pattern is one the remarkable retinal identification methods. In this paper, a new approach is presented for identification via retinal images using LBP and hog methods. In the proposed method, it will be tried to separate the retinal vessels accurately via machine vision techniques which will have good sustainability in rotation and size change. HOG-based or LBP-based methods or their combination can be used for separation and also HSV color space can be used too. Having extracted the features, the similarity criteria can be used for identification. The implementation of proposed method and its comparison with one of the newly-presented methods in this area shows better performance of the proposed method.

Biometrics Based on Multi-View Features of Teeth Using Principal Component Analysis (주성분분석을 이용한 치아의 다면 특징 기반 생체식별)

  • Chang, Chan-Wuk;Kim, Myung-Su;Shin, Young-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2007
  • We present a new biometric identification system based on multi-view features of teeth using principal components analysis(PCA). The multi-view features of teeth consist of the frontal view, the left side view and the right side view. In this paper, we try to stan the foundations of a dental biometrics for secure access in real life environment. We took the pictures of the three views teeth in the experimental environment designed specially and 42 principal components as the features for individual identification were developed. The classification for individual identification based on the nearest neighbor(NN) algorithm is created with the distance between the multi-view teeth and the multi-view teeth rotated. The identification performance after rotating two degree of test data is 95.2% on the left side view teeth and 91.3% on the right side view teeth as the average values.

  • PDF

A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor (광학식 지문센서에서의 위조 지문 검출 방법)

  • Lee, Ji-Sun;Kim, Jae-Hwan;Chae, Jin-Seok;Lee, Byoung-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.492-503
    • /
    • 2008
  • With the recent development and increasing importance of personal identification systems, biometric technologies with less risk of loss or unauthorized use are being popularized rapidly. In particular, because of their high identification rate and convenience, fingerprint identification systems are being used much more commonly than other biometric systems such as iris recognition, face recognition and vein pattern recognition. However, a fingerprint identification system has the problem that artificially forged finger-prints can be used as input data. Thus, in order to solve this problem, the present study proposed a method for detecting forged fingerprints by measuring the degree of attenuation when the light from an optical fingerprint sensor passes through the finger and analyzing changes in the transmission of light over stages at fixed intervals. In order to prove improvement in the performance of the proposed system, we conducted an experiment that compared the system with an existing multi-sensor recognition system that measures also the temperature of fingerprint. According to the results of the experiment, the proposed system improved the forged fingerprint detection rate by around 32.6% and this suggests the possibility of solving the security problem in fingerprint identification systems.

  • PDF

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

The User Identification System Using Walking Pattern over the ubiFloor

  • Yun, Jae-Seok;Lee, Seung-Hun;Woo, Woon-Tack;Ryu, Je-Ha
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1046-1050
    • /
    • 2003
  • In general, conventional user identification systems require users to carry a TAG or badge or to remember ID and password. Though biometric identification systems may relieve these problems, they are susceptible to environmental noise to some degree. We propose a natural user identification system, ubiFloor, exploiting user's walking pattern to identify the user. The system identifies a user, while tracking the user's location, with a set of simple ON/OFF switch sensors or equipments. Experimental results show that the proposed system can recognize the registered users at the rate of 92%. Future improvement in recognition rate may be achieved by combining other sensors such as camera, microphone, etc.

  • PDF

Development of Signal Detection Methods for ECG (Electrocardiogram) based u-Healthcare Systems (심전도기반 u-Healthcare 시스템을 위한 파형추출 방법)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.18-26
    • /
    • 2009
  • In this paper, we proposed multipurpose signal detection methods for ECG (electrocardiogram) based u-healthcare systems. For ECG based u-healthcare system, QRS signal extraction for cardiovascular disease diagnosis is essential. Also, for security and convenience reasons, it is desirable if u-healthcare system support biometric identification directly from user's bio-signal such as ECG for this case. For this, from Lead II signal, we developed QRS signal detection method and also, we developed signal extraction method for biometric identification using Lead II signal which is relatively robust from signal alteration by aging and diseases. For QRS signal detection capability from Lead II signal, ECG signals from MIT-BIH database are used and it showed 99.36% of accuracy and 99.68% of sensitivity. Also, to show the performance of signal extraction capability for biometric diagnosis purpose, Lead III signals are measured after drinking, smoking, or exercise to consider various monitoring conditions and it showed 99.92% of accuracy and 99.97% of sensitivity.