• Title/Summary/Keyword: fingerprint image

Search Result 240, Processing Time 0.043 seconds

Effective Palm Print Authentication Guideline Image with Smart Phone (스마트폰에서 효과적인 장문 인증 가이드라인 이미지)

  • Lee, SangHo;Kang, SungBea;Nyang, DaeHun;Lee, KungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.994-999
    • /
    • 2014
  • Nowadays we use biometrics such as face, fingerprint or palm print for registration and authentication with smart phone. When use camera function of smart phone, normally they overlay a specific image on camera preview as guideline and induce user to take picture uniformly. In this paper, use palm print for authentication factor with smart phone, we propose a new guideline and show the result about user experiment in terms of authentication success ratio.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.

Design of Invisible Watermarking for Biometric Image of Electronic ID Card (전자신분증용 바이오 영상을 위한 비인지 워터마킹 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Kim, Won-Gyum
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1555-1565
    • /
    • 2008
  • Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.

  • PDF

Enhanced Local Directional Pattern based video shot boundary detection and automatic synchronization for STB quality inspection (STB 품질검사를 위한 개선된 지역 방향 패턴 기반 비디오 샷 경계 검출 및 자동 동기화)

  • Cho, Youngtak;Chae, Oksam
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.8-15
    • /
    • 2019
  • Recently, the importance of pre-shipment quality inspection has been emphasized due to the increase of STB supply. In this paper, we propose a method to support automation of quality inspection through simultaneous multi-channel input of STB video signal. The proposed method extracts a fingerprint using the center scan line of the image after stable video shot boundary detection using CeLDP combining color information and LDP code and performs synchronization between input video channels. The proposed method shows stronger shot boundary detection performance than the conventional shot detection method. Through the experiments applied to the real environment, it is possible to secure reliability and real-time quality check for synchronization between multi-channel inputs required for STB quality inspection. Also, based on the proposed method, we intend to study a large-scale quality inspection method in the future and propose a more effective quality inspection system.

Evaluation of Error Rates in Fingerprint Recognition Based on Image Quality (지문 영상 품질에 따른 인식률 평가)

  • 이봉구;운지현;전성욱;김학일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.526-528
    • /
    • 2003
  • 지문 영상의 품질은 지문 인식의 성능에 큰 영향을 미친다. 그러므로 지문 영상의 품질을 명가하고 정의하는 과정이 선행되면 안정된 지문 인식 성능을 보장 받을 수 있다. 본 연구의 목적은 지문 영상 품질을 측정하는 알고리즘을 이용하여 정합 후 인증성공률을 높이는 것이다. 본 연구는 지문 영상의 품질을 측정하는 세가지 알고리즘을 구현하고 정량적으로 표현한 후 품질 정도에 따라 분류한 영상들을 이용하여 본인 대 본인 정합을 수행하였다. 그리고 알고리즘간의 특성을 비교하였으며 품질에 따른 정합 성능을 평가하였다. 실험 결과, 품질 평가 후의 정합 성능이 그렇지 않았을 때의 성능에 비해 5% 이상의 성능 향상을 보였다. 또한 좀 더 나은 성능 향상을 위해서는 융선의 지속성과 일관성을 판단할 수 있는 알고리즘 및 여러 품질 측정값들의 효율적인 조합의 연구가 필요하다.

  • PDF

A Syntactic and Semantic Approach to Fingerprints Classification (구문론과 의미론적 방법을 이용한 지문분류)

  • Choi, Young-Sik;Sin, Tae-Min;Lim, In-Sik;Park, Kyu-Tae
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1157-1159
    • /
    • 1987
  • A syntactic and semantic approach is used to make type classification based on feature points(whorl, delta, core) and the shape of flow line around feature points. The image is divided into 30 by 30 subregions which are represented in the average direction and 4-tuple direction component. Next the relaxation process with singularity detection and convergency checking is performed. A set of semantic languages is used to describe the major flow line around the extracted feature points. LR(1) parser and feature transfer function are used to recognize the coded flow patterns. The 72 fingerprint impressions is used to test the proposed approach and the rate of the classification is about 93 percentages.

  • PDF

Automatic Fingerprint Image Generation using Genetic Algorithm (유전자 알고리즘을 이용한 자동 지문영상 생성)

  • Cho, Ung-Keun;Hong, Jin-Hyuk;Cho, Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.470-474
    • /
    • 2006
  • 지문인식 시스템의 성능을 측정하기 위해 지문 데이터베이스가 필요하지만, 개인 사생활 문제나 데이터베이스를 구성하기 위한 제약조건 등으로 인해 실제 사용가능한 지문 데이터베이스는 많지 않다. 본 논문에서는 유전자 알고리즘을 이용하여 수집된 지문 영상으로부터 다양한 환경적 효과를 가진 지문 영상을 자동으로 생성해주는 방법을 제안한다. 제안하는 방법은 소량의 원본 영상으로부터 목표 환경의 지문을 생성하기 위한 필터 조합을 찾는다. 서로 다른 압력에서 수집된 지문을 대상으로 제안하는 방법을 적용하였으며, 생성된 지문 영상은 실제 환경에서 수집된 것과 비슷한 특성을 나타내었다. 제안하는 방법을 통해 실제로 다수의 지문을 수집하지 않고 각종 환경에서 시스템의 성능을 평가할 수 있다.

  • PDF

Fingerprint Image Enhancement based on Genetic Algorithms for Singularity Extraction (특이점 추출을 위한 유전자 알고리즘 기반 지문영상 개선)

  • Cho Ung-Keun;Hong Jin-Hyuk;Cho Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.847-849
    • /
    • 2005
  • 지문의 특이점은 인식이나 분류를 수행할 때 중요한 특징이다. 특이점 추출은 영상의 품질에 민감하기 때문에, 정확한 추출을 위해 영상의 품질을 향상시키는 것이 필요하다. 다양한 이미지 필터를 적절히 적용하면 개별필터를 적용하는 것에 비해 더 높은 품질을 얻을 수 있지만, 영상 필터가 다양할수록 성능이 좋은 필터 조합을 찾는 것이 어렵다. 본 논문에서는 유전자 알고리즘을 이용하여 특이점 추출율이 좋은 필터 조합을 찾는 방법을 제안한다. 진화에 의해 성능이 좋은 필터 조합을 자동으로 찾아주며, 전문가의 지식이 필요하지 않기 때문에 영상 개선의 여러 분야에 적용될 수 있다. 제안하는 방법을 NIST DB 4에 적용한 결과 기존의 영상 개선 방법보다 높은 성능을 획득하였다.

  • PDF

Direct Growth of Graphene on Boron Nitride/Copper by Chemical Vapor Deposition

  • Jin, Xiaozhan;Park, J.;Kim, W.;Hwang, Chanyong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.590-590
    • /
    • 2013
  • Direct growth of graphene using CVD method has been done on CVD grown boron nitride substrate. From the SEM image, we have shown that the size of grain of graphene could be clearly controlled by varying the amount of injected hydrocarbon. To convince the existence of graphene on boron nitride, XPS and Raman has been checked. Both B1s and N1s peaks in XPS spectra and the Raman peak around 1,370 $cm^{-1}$ demonstrated that boron nitride did remain after high temperature treatment during the graphene growth process. And along the graphene grain boundary, the Raman fingerprint of graphene was neatly appeared.

  • PDF