• Title/Summary/Keyword: biometric protection

Search Result 51, Processing Time 0.022 seconds

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

Technology Trends of the Biometric Template Protection Techniques (생체정보 보호 연구 동향)

  • Pan, S.B.;Lee, K.H.;Ahn, D.S.;Chung, Y.H.;Lee, N.I.
    • Electronics and Telecommunications Trends
    • /
    • v.18 no.5 s.83
    • /
    • pp.37-51
    • /
    • 2003
  • 21세기를 맞이하면서 정보통신 기술의 발전과 인터넷 이용 확산 등으로 사용자 인증이 중요한 문제로 대두되고 있다. 패스워드 또는 PIN을 이용한 사용자 인증 방법이 현재까지 널리 쓰이고 있으나 타인에게 노출되거나 잊어버리는 등의 문제점이 있다. 이러한 문제를 해결하기 위하여 개인의 고유한 생체정보를 이용한 주요 정보 보호 및 사용자 인증 등의 연구가 활발히 진행되고 있다. 그러나, 이러한 생체인식 기술을 대규모 응용에 적용하기 위해서는 생체정보의 안전한 저장/전송/처리 등 생체정보 보호에 대한 연구가 필수적이다. 본 고에서는 이러한 생체정보 보호와 관련된 연구 동향을 소개한다.

A Survey on Face-based Cryptographic Key Generation

  • Dang, Thao;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.39-50
    • /
    • 2020
  • Derivation cryptographic keys from human biometrics opens a new promising research area when it can be used efficiently for not only verification or recognition tasks, but also symmetric-key based applications. Among existing biometric traits, face is considered as the most popular biometrics since facial features are informative and discriminative. In this paper, we present a comprehensive survey of Face-based key generation (FKGS). First, we summarize the trend of FKGS researches and sum up the methods which play important roles in the proposed key generation systems. Then we present the evaluation and the general performance analysis; from that, we give a discussion about the advantages and disadvantages of surveyed studies to clarify the fundamental requirements and the main challenges when implementing FKGS in practice. Finally, an outlook on future prospects is given.

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

JTC1 SC27 바이오 정보보호 국제표준화 동향

  • Moon, Ji-Hyun
    • Review of KIISC
    • /
    • v.18 no.4
    • /
    • pp.5-12
    • /
    • 2008
  • ISO/IEC JTC1 SC27은 IT 정보보호 및 보안에 관한 국제표준 제정 활동을 하는 국제기구이다. SC27은 다섯 개의 WG으로 구성되어 있는데, 이들 중 WG3와 WG5에서 총 3건의 바이오인식 관련 정보보호 표준화 작업을 수행하고 있다. 19792 바이오인식 보안 평가(Security Evaluation of Biometrics), 24761 바이오인식 인증 컨텍스트(Authentication Context for Biometrics), 24745 바이오 템플릿 보호(Biometric Template Protection)의 세 건이 바로 그것이다. 바이오인식 관련 전문가들의 활동이 적은 SC27에서 바이오인식 기술에 관한 국제표준화가 함께 진행될 수 있었다는 점은 놀라운 일이며, SC37 바이오인식 관련 국제표준 전문가들의 많은 관심을 통해 SC27에서의 바이오인식 관련 국제표준화 활동이 조속한 결실을 맺을 수 있도록 함께 노력해 나가야 할 시점에 있다 하겠다. 본 고에서는 바이오인식 기술의 관점에서의 SC27 국제표준화 활동 내용을 소개하고 현재까지의 진행상황과 앞으로의 일정 및 추진 방향 등을 분석, 정리하여, 관련 전문가들로 하여금 SC27에서의 바이오인식 관련 표준화 활동에 보다 많은 관심을 가질 수 있도록 하는 계기를 마련하고자 한다.

Analysis on the Possibility of Electronic Surveillance Society in the Intelligence Information age

  • Chung, Choong-Sik
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.11-17
    • /
    • 2018
  • In the smart intelligence information society, there is a possibility that the social dysfunction such as the personal information protection issue and the risk to the electronic surveillance society may be highlighted. In this paper, we refer to various categories and classify electronic surveillance into audio surveillance, visual surveillance, location surveillance, biometric information surveillance, and data surveillance. In order to respond to new electronic surveillance in the intelligent information society, it requires a change of perception that is different from that of the past. This starts with the importance of digital privacy and results in the right to self-determination of personal information. Therefore, in order to preemptively respond to the dysfunctions that may arise in the intelligent information society, it is necessary to further raise the awareness of the civil society to protect information human rights.

Concealment of iris features based on artificial noises

  • Jiao, Wenming;Zhang, Heng;Zang, Qiyan;Xu, Weiwei;Zhang, Shuaiwei;Zhang, Jian;Li, Hongran
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.599-607
    • /
    • 2019
  • Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the security of iris recognition and verification, this study applies the Gaussian and Laplacian mechanisms and to hide iris features by differentiating privacy. The efficiency of the algorithm and evaluation of the image quality by the image hashing algorithm are selected as indicators to evaluate these mechanisms. The experimental results indicate that the security of an iris image can be significantly improved using differential privacy protection.

Wearable Sensing Device Design for Biological Monitoring (생체정보 모니터링을 위한 웨어러블 센싱 디바이스 디자인)

  • Lee, Jee Hyun;Lee, Eun Ji;Kim, Ji Eun;Kim, Yoolee;Cho, Sinwon
    • Journal of the Korean Society of Costume
    • /
    • v.65 no.1
    • /
    • pp.118-135
    • /
    • 2015
  • In recent years, smart clothing had been developed in order to better detect and monitor physical movement of the patient, so that such activities such as location identification and biometric recognition could be done. However, most of the sensing devices of smart clothing were limited to smart sensing sports clothing and the designs did not consider the physical characteristics and the behavior of the wearer. Therefore, this study aimed to create an open protection system by developing a wearable sensing device for health monitoring and location information. For this purpose, this study developed eleven types of wearable sensing design that could be commercially sold and worn by people who needed their biological information to be constantly monitored. The study conducted four tests in order to develop three types of sensing devices for various sensing wears. The purpose of this study was to expand the user rang of smart sensing wears, and provide a foundation for the development of distinctive wearable sensing devices reflecting the user. Furthermore, contribute to the design for the person subject to protection.

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.