• Title/Summary/Keyword: biometrics system

Search Result 231, Processing Time 0.025 seconds

Fuzzy Vault System based on Iris for Protecting Cryptographic Key (암호 키의 보안을 위한 홍채 기반의 퍼지볼트 시스템)

  • Lee, Youn-Joo;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.241-242
    • /
    • 2007
  • In this paper, we propose a fuzzy vault system using iris data. The fuzzy vault, proposed by Juels and Sudan, has been used to protect cryptographic key with biometric information. In order to combine the fuzzy vault scheme with iris data, we used iris features extracted by ICA method and clustering technique. From our experimental results, we proved that the propose fuzzy vault system is robust to sensed environmental change.

  • PDF

Implementation for the Biometric User Identification System Based on Smart Card (SMART CARD 기반 생체인식 사용자 인증시스템의 구현)

  • 주동현;고기영;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.25-31
    • /
    • 2004
  • This paper is research about the improvement of recognition rate of the biometrics user identification system using the data previously stored in the non contact Ic smart card. The proposed system identifies the user by analyzing the iris pattern his or her us. First, after extracting the area of the iris from the image of the iris of an eye which is taken by CCD camera, and then we save PCA Coefficient using GHA(Generalized Hebbian Algorithm) into the Smart Card. When we confirmed the users, we compared the imformation of the biometrics of users with that of smart card. In case two kinds of information was the same, we classified the data by using SVM(Support Vector Machine). The Experimental result showed that this system outperformed the previous developed system.

  • PDF

A Study on Multibiometrics derived from Calling Activity Context using Smartphone for Implicit User Authentication System

  • Negara, Ali Fahmi Perwira;Yeom, Jaekeun;Choi, Deokjai
    • International Journal of Contents
    • /
    • v.9 no.2
    • /
    • pp.14-21
    • /
    • 2013
  • Current smartphone authentication systems are deemed inconvenient and difficult for users on remembering their password as well as privacy issues on stolen or forged biometrics. New authentication system is demanded to be implicit to users with very minimum user involvement being. This idea aims towards a future model of authentication system for smartphones users without users realizing them being authenticated. We use the most frequent activity that users carry out with their smartphone, which is the calling activity. We derive two basics related interactions that are first factor being arm's flex (AF) action to pick a phone to be near ones' ears and then once getting near ear using second factor from ear shape image. Here, we combine behavior biometrics from AF in first factor and physical biometrics from ear image in second factor. Our study shows our dual-factor authentication system does not require explicit user interaction thereby improving convenience and alleviating burden from users from persistent necessity to remember password. These findings will augment development of novel implicit authentication system being transparent, easier, and unobtrusive for users.

The Design and Implementation of a Performance Evaluation Tool for the Face Recognition System (얼굴인식시스템 성능평가 도구의 설계 및 구현)

  • Shin, Woo-Chang
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.161-175
    • /
    • 2007
  • Face recognition technology has lately attracted considerable attention because of its non-intrusiveness, usability and applicability. Related companies insist that their commercial products show the recognition rates more than 95% according to their self-testing. But, the rates cannot be admitted as official recognition rates. So, performance evaluation methods and tools are necessary to objectively measure the accuracy and performance of face recognition systems. In this paper, I propose a reference model for biometrics recognition evaluation tools, and implement an evaluation tool for the face recognition system based on the proposed reference model.

Renewable Iris Authentication Algorithm in Mobile System

  • Lee Kwang Je;Lee Soon Seok;Kim Sin Hong;Cho Do Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.592-595
    • /
    • 2004
  • Recently the numbers of patent about the technology for mobile payment with Ie or bluetooth-chip are being increased more and more. The reasons of patent increment for mobile payment are advancement of wireless internet technology and rising of customer's request for it. The customer wants to be able to pay for purchase, tax and aid with own mobile phone. So every mobile service provider applies for patents about that competitively. And in the near future the biometrics is generalized in the mobile payment system. Especially the payment service of iris recognition is significant technique in this area for the future prospect. The biometrics of iris is an accurate authentication method because it has about 250 distinguish parameters to the finger print's 30. The biometrics of iris can recognize and identify a person for 2 seconds. But the image of iris is changed by transformation of body in the life. And the existing iris authentication system has problem that can be miss-recognized. In this paper, we propose the new method that reduces miss-recognizing rate with Renewable Iris Authentication Algorithm(RIAA) in mobile system.

  • PDF

A Study of Vein Identification System using 2D-Gabor Filter for the Vessel USN Entrance/Exit Management (선박USN 출입관리를 위한 2차원 Gabor 필터를 이용한 정맥 인식 방법에 관한 연구)

  • Choi, Myeong-Soo;Lee, Seong-Ro;Sin, Sang-Woo;Jang, Kyung-Sik;Jung, Min-A
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1190-1196
    • /
    • 2007
  • In this paper, we propose the biometrics system using hand vein pattern. This system is for management about person's entrance/exit in vessel USN. we select the biometrics method using hand vein pattern as adoptable method to vessel USN environment. Our experimental results show that preprocessing using two dimensional gabor filter achieves performance improvements over high pass filtering. Also, we compared our method with measured FAR(False Acceptance Rate) and FRR(False Rejection Rate) using pattern matching, the results show low error rate over high pass filtering. As a result, we verify the adoptability of biometrics system using hand vein pattern in management of person's entrance/exit in vessel.

Design of Biometrics System Using ECG Lead III Signals (심전도 신호의 리드 III 파형을 이용한 바이오인식)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.43-50
    • /
    • 2011
  • Currently, conventional security methods including IC card or password type method are quickly switched into biometric security systems in various applications and the electrocardiogram (ECG) has been considered as one of novel biometrics way. However, conventional ECG based biometrics used lead II signal which conventionally used for formulaic signal to heart disease diagnosis and it is not suitable for biometrics since it is rather difficult to find consistent features for heart disease patents. To overcome this problem, we developed new biometrics system using ECG lead III signals. For wave extraction, signal peak points are extracted through AAV algorithm. For feature selection, extracted waves are categorized into one of four wave types and total twenty two features including number of vertices, wave shapes, amplitude information and interval information are extracted based on their wave types. Experimental results for thirty-six people showed 100% specificity, 95.59% sensitivity and 99.17% of overall identification accuracy.

Encryption of Biometrics data for Security Improvement in the User Authentication System (사용자 인증 시스템의 보안성 향상을 위한 생체인식 데이터의 암호화)

  • Park, Woo-Geun
    • Journal of IKEEE
    • /
    • v.9 no.1 s.16
    • /
    • pp.31-39
    • /
    • 2005
  • This paper presented new biometrics data transfer model, and use MD5 (Message Digest5) and RSA (Ron Rivest, Adi Shamir, Len Adleman) algorithm to improve biometrics data's security. So, did so that can run user authentication more safely. That is, do so that may input fingerprint among biometrics through client, and transmit processed fingerprint to server. When fingerprint information is transmitted, it uses MD5 algorithm to solve problem that get seized unlawful living body information from outside and information does Digest. And did to pass through process that transmit again this by RSA method. Also, experimented general text data and living body data that is not encoded, transmission speed and security of living body data that encoding and transmit each comparison. By running user authentication through such improved method, is expected to be applied in several. fields by method to simplify certification procedure and is little more correct and stable.

  • PDF

A study of using quality for Radial Basis Function based score-level fusion in multimodal biometrics (RBF 기반 유사도 단계 융합 다중 생체 인식에서의 품질 활용 방안 연구)

  • Choi, Hyun-Soek;Shin, Mi-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.192-200
    • /
    • 2008
  • Multimodal biometrics is a method for personal authentication and verification using more than two types of biometrics data. RBF based score-level fusion uses pattern recognition algorithm for multimodal biometrics, seeking the optimal decision boundary to classify score feature vectors each of which consists of matching scores obtained from several unimodal biometrics system for each sample. In this case, all matching scores are assumed to have the same reliability. However, in recent research it is reported that the quality of input sample affects the result of biometrics. Currently the matching scores having low reliability caused by low quality of samples are not currently considered for pattern recognition modelling in multimodal biometrics. To solve this problem, in this paper, we proposed the RBF based score-level fusion approach which employs quality information of input biometrics data to adjust decision boundary. As a result the proposed method with Qualify information showed better recognition performance than both the unimodal biometrics and the usual RBF based score-level fusion without using quality information.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.