• Title/Summary/Keyword: image-based authentication

Search Result 139, Processing Time 0.04 seconds

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

Vulnerability Analysis of Image-based Authentication: Based on GetCursorPos function (이미지 기반 인증 취약점 분석: GetCursorPos 함수를 중점으로)

  • An, Youngho;Oh, Insu;Lee, Kyungroul;Yim, Kangbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.121-122
    • /
    • 2017
  • 컴퓨터의 주변 장치 중 하나인 마우스는 모니터의 2차원 평면에서 움직임을 인식하여 커서를 움직이는 입력 장치이며, 응용 프로그램을 편리하게 사용하고 다양한 편집을 가능하게 한다. 기존의 아이디/비밀번호 기반 인증 방법에서는 키보드 데이터가 노출되는 취약점이 존재하여 이미지 기반의 마우스 입력을 이용한 새로운 인증 방법이 등장하였지만, 이미지 기반 인증의 취약점 분석 및 실증에 대한 연구는 미비한 실정이다. 따라서 본 논문에서는 마이크로소프트 운영체제에서 제공하는 마우스 위치 추출 API인 GetCursorPos() 함수를 이용하여 마우스 데이터의 노출 가능성을 검증함으로써 취약점을 분석한다.

  • PDF

Incremental-based Digital Signature with Neighbouring Block Similarity Measure for Video Authentication

  • Kultangwattana, Wilaiporn;Chotikakamthorn, Nopporn
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1412-1415
    • /
    • 2002
  • This paper describes a digital signature-based method for original and updated video authentication. The method uses multiple digital signatures in dealing with video data undergoing multiple change/updating. In addition, a feature based on neighbouring block similarity measure is applied to deal with certain image/video modification. The proposed method can cope with wide range of image/video tampering. It is suitable for practical use of video data, where updating may be performed by more than one legal parties. Experimental results are included with concluding remarks.

  • PDF

Vulnerability Analysis of Mouse Data in Image-based Authentication: Based on Random Mouse Generation sites (이미지 기반 인증에서의 마우스 데이터 취약점 분석: 랜덤 마우스 데이터 생성 사이트를 기반으로)

  • Jung, Wontae;Lee, Kyungroul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.115-116
    • /
    • 2022
  • 비밀번호 인증 기술에서 키보드로부터 입력되는 데이터가 노출되는 문제점으로 인하여, 이미지 기반 인증 기술이 등장하였다. 이 기술은 주로 가상 키보드를 출력하고, 특정 위치에 클릭된 마우스 정보를 비밀번호로 활용한다. 마우스 데이터의 안전성 향상을 위하여 임의의 마우스 위치를 생성하는 랜덤 마우스 데이터 생성 기술이 등장하였지만, 해당 기술의 안전성 분석에 대한 연구가 미비한 실정이다. 따라서 본 논문에서는 GetCursorPos() 함수를 활용한 공격 기술과 WM_INPUT 메시지를 활용한 공격 기술을 기반으로 랜덤 마우스 데이터 생성 기술이 적용된 사이트에서의 마우스 데이터 취약점을 분석한다.

  • PDF

Translation- and Rotation-Invariant Fingerprint Authentication Based on Gabor Features (Gabor 특징에 기반한 이동 및 회전 불변 지문인증)

  • 김종화;조상현;성효경;최홍문
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.901-904
    • /
    • 2000
  • A direct authentication from gray-scale image, instead of the conventional multi-step preprocessing, is proposed using Gabor filter-based features from the gray-scale fingerprint around core point. The core point is located as a reference point for the translation invariant matching. And its principal symmetry axis is detected for the rotation invariant matching from its neighboring region centered at the core point. And then fingerprint is divided into non-overlapping blocks with respect to the core point and features are directly extracted form the blocked gray level fingerprint using Gabor filter. The proposed fingerprint authentication is based on the Euclidean distance between the corresponding Gabor features of the input and the template fingerprints. Experiments are conducted on 300${\times}$300 fingerprints obtained from a CMOS sensor with 500 dpi resolution, and the proposed method could lower the False Reject Rate(FRR) to 18.2% under False Acceptance Rate(FAR) of 0%.

  • PDF

Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security (모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템)

  • Hong, Kyungho;Jung, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.319-326
    • /
    • 2014
  • According to the increasing mobile security users who have experienced authentication failure by forgetting passwords, user names, or a response to a knowledge-based question have preference for biological information such as hand geometry, fingerprints, voice in personal identification and authentication. Therefore biometric verification of personal identification and authentication for mobile security provides assurance to both the customer and the seller in the internet. Our study focuses on human hand biometric information recognition system for personal identification and personal Authentication, including its shape, palm features and the lengths and widths of the fingers taken from mobile phone photographs such as iPhone4 and galaxy s2. Our hand biometric information recognition system consists of six steps processing: image acquisition, preprocessing, removing noises, extracting standard hand feature extraction, individual feature pattern extraction, hand biometric information recognition for personal identification and authentication from input images. The validity of the proposed system from mobile phone image is demonstrated through 93.5% of the sucessful recognition rate for 250 experimental data of hand shape images and palm information images from 50 subjects.

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

IoT based Authentication System Implementation on Raspberry Pi (라즈베리파이에서 사물인터넷 기반의 인증 시스템 구현)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.31-38
    • /
    • 2017
  • With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.

Design of StraaS(streaming as a service) based on Cloud Computing (클라우드 컴퓨팅 기반 스트리밍 서비스(StraaS)의 설계)

  • Cha, Byung-Rae;Sim, Su-Jeong;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.330-339
    • /
    • 2012
  • In this paper, we define and design the Streaming as a Service (StraaS) to support streaming service based on cloud computing. And we describe the various function and security to StraaS service. Specially, we introduce KS-MMA(Key-generation System for Multilateral Matching Authentication) and SIES(Searchable Image Encryption System) as security function for streaming service and cloud computing.