• Title/Summary/Keyword: biometric protection

Search Result 51, Processing Time 0.028 seconds

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.444-452
    • /
    • 2006
  • Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

  • PDF

Development of Fall Inducement System based on Pedestrian Biological Data for Fall Reproduction (낙상 재현을 위한 보행자 생체 정보 기반의 낙상 유도 시스템 개발)

  • Lee, Jong-il;Han, Jong-Boo;Koo, Jae Wan;Lee, Seokjae;Sohn, Dong-Seop;Seo, Kap-Ho
    • The Journal of Korea Robotics Society
    • /
    • v.15 no.3
    • /
    • pp.286-292
    • /
    • 2020
  • This paper is about a fall inducement system for guiding like a real fall. Reliable fall data can be used as an essential element in developing effective fall protection devices. We can get this data if the induced fall is very realistic. The proposed system analyzes gait characteristics and determines when to fall based on the pedestrian's biometric data. To estimate the fall inducement time, an active estimation algorithm was proposed using different biometric values for each pedestrian. The proposed algorithm is designed to response actively to the ratio of gait cycle and a stance period. To verify this system, an experimental environment was implemented using a multi-rail treadmill equipped with a ground reaction force measurement device. An experiment was conducted to induce falls to pedestrians using a fall inducement system. By comparing the experimental scene to the video of the actual fall, it has been confirmed that the proposed system can induce a reliable fall.

A Study on Biometric Template Protection Procedures (생체정보보호를 위한 연구)

  • Shin, Yong-Nyuo;Lee, Dong-Gun;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.913-916
    • /
    • 2005
  • 정부의 민원서비스등 다양한 용도로 개방 환경에 생체인식시스템이 구축될 수 있는 가능성이 많아졌다. 본 고에서는 생체인식시스템이 구축될 때 발생할 수 있는 취약점을 정의 해 보고 이를 해결하기 위한 기술적 가이드라인을 제시한다. 한번 유출된 생체정보에 대한 피해의 심각성이 크기 때문에, 가능한 모든 공격에 대해서 강인성(Robust)을 가져야 하는 반면에 생체정보 변형에 따른 복잡성은 성능에 현격한 저하가 없어야 한다.

  • PDF

Danger Situations Alert System based U-Healthcare (유헬스케어 기반의 위험상황 알림 시스템)

  • Park, Byungdon;Yu, Donggyun;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.193-198
    • /
    • 2017
  • Recently, as interest in health increases, various wearable devices such as smart watch and smart band which can measure user's biometric information are being studied. Conventional wearable devices service the measured biometric information in a form that provides simple monitoring, disease prevention, and exercise amount. However, the user is Lack to deal with the dangerous situation. In this paper, we propose a hazard notification system to address these problems. The biometric information measured by the acceleration sensor and the heart rate sensor is transmitted to the application through the Arduino in real time. It identifies the risk situation through sensor priority measurement and risk situation identification algorithm. If a dangerous situation occurs, a notification message is sent to the guardian indicating the current location of the user. Therefore, it can be expected that if a dangerous situation occurs to a user who needs protection, he can respond promptly.

Fuzzy Fingerprint Vault using Multiple Polynomials (다중 다항식을 이용한 지문 퍼지볼트)

  • Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.125-133
    • /
    • 2009
  • Security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non.invertible transformed version. Thus, even if the transformed version is compromised, its valid biometric data are securely remained. Fuzzy vault mechanism was proposed to provide cryptographic secure protection of critical data(e.g., encryption key) with the fingerprint data in a way that only the authorized user can access the critical data by providing the valid fingerprint. However, all the previous results cannot operate on the fingerprint image with a few minutiae, because they use fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use adaptive degree of polynomial considering the number of minutiae. Also, we apply multiple polynomials to operate the fingerprint with a few minutiae. Based on the experimental results, we confirm that the proposed approach can enhance the security level and verification accuracy.

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

Authentication Template Protection Using Function Encryption (함수암호를 이용한 인증정보 Template 보호 기술)

  • Park, Dong Hee;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1319-1326
    • /
    • 2019
  • Recently, biometrics and location information are being used for authentication in many devices. However, these information are stored as plaintext in safe device or, stored as ciphertext in authentication server it is used for authentication in plaintext by decrypting. Therefore, the leakage of authentication information as well as hacking can cause fatal privacy problems. In this paper, we propose a technique that can be authenticated without exposing authentication information to ciphertext using function encryption.

A Study on Acceptance Intentions to Use the Mobile Payment Service Based on Biometric Authentication: Focusing on ApplePay (생체 인증 기반 모바일 결제 서비스 수용의도 분석: 애플페이를 중심으로)

  • Kim, Kwanmo;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.123-133
    • /
    • 2020
  • The aim of this study is to scrutinize acceptance intentions of Korean users and influences of information security related factors on mobile payment services based on biometric authentication methods, like finger print authentication or face recognition authentication, by focusing on ApplePay. Unlike previous studies on user acceptance of mobile payment which lack considerations on information security related factors, this study employs the UTAUT with detailed information security factors to create a research model and PLS(Partial Least Squares) method to analyze the model. Based on the analysis, gaining trust on service through company's efforts on information protection, personal characteristics and trust on applied security technologies are important factors to Korean users along with social awareness and service infrastructures. The result of this study would be helpful to companies or organizations, which provide biometric-based mobile payment services, to understand needs of Korean consumers. Based on this study, further analysis is expected to find impacts of user experiences on same company's or competitors' products to acceptance intentions.

CHEST WALL THICKNESS MEASUREMENTS AND THE DOSIMETRIC IMPLICATIONS FOR MALE RADIATION WORKERS AT THE KAERI

  • Lee, Tae-Young;Lee, Jong-Il;Chang, Si-Young;Kim, Jong-Kyung
    • Journal of Radiation Protection and Research
    • /
    • v.26 no.3
    • /
    • pp.299-303
    • /
    • 2001
  • Using ultrasound techniques, the Korea Atomic Energy Research Institute has measured chest wall thicknesses of a group of male workers at the Korea Atomic Energy Research Institute. A site-specific biometric equation has been developed for these workers. Chest wall thickness is an important modifier on lung counting efficiency. These data have been put into the perspective of the ICRP recommended dose limits for occupationally exposed workers: 100 mSv in a 5-year period with a maximum of 50 mSv in anyone year. For measured chest wall thicknesses of 1.9 cm to 4.1 cm and a 30 min counting time, the achievable MDAs for natural uranium in the KAERI lung counter vary from 5.75 mg to 11.28 mg. These values are close to, or even exceed, the predicted amounts of natural uranium that will remain in the lung (absorption type M and S) after an intake equal to the Annual Limit on Intake corresponding to a committed dose of 20 mSv. This paper shows that the KAERI lung counter probably cannot detect an intake of Type S natural uranium in a worker with a chest wall thickness equal to the average value (2.7 cm) under routine counting conditions.

  • PDF