• Title/Summary/Keyword: image-based authentication

Search Result 139, Processing Time 0.022 seconds

2D Face Image Recognition and Authentication Based on Data Fusion (데이터 퓨전을 이용한 얼굴영상 인식 및 인증에 관한 연구)

  • 박성원;권지웅;최진영
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.302-306
    • /
    • 2001
  • Because face Images have many variations(expression, illumination, orientation of face, etc), there has been no popular method which has high recognition rate. To solve this difficulty, data fusion that fuses various information has been studied. But previous research for data fusion fused additional biological informationUingerplint, voice, del with face image. In this paper, cooperative results from several face image recognition modules are fused without using additional biological information. To fuse results from individual face image recognition modules, we use re-defined mass function based on Dempster-Shafer s fusion theory.Experimental results from fusing several face recognition modules are presented, to show that proposed fusion model has better performance than single face recognition module without using additional biological information.

  • PDF

Unauthorized person tracking system in video using CNN-LSTM based location positioning

  • Park, Chan;Kim, Hyungju;Moon, Nammee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.77-84
    • /
    • 2021
  • In this paper, we propose a system that uses image data and beacon data to classify authorized and unauthorized perosn who are allowed to enter a group facility. The image data collected through the IP camera uses YOLOv4 to extract a person object, and collects beacon signal data (UUID, RSSI) through an application to compose a fingerprinting-based radio map. Beacon extracts user location data after CNN-LSTM-based learning in order to improve location accuracy by supplementing signal instability. As a result of this paper, it showed an accuracy of 93.47%. In the future, it can be expected to fusion with the access authentication process such as QR code that has been used due to the COVID-19, track people who haven't through the authentication process.

DCI Based Watermarking for Image Verification and Authentication (인증과 무결성을 위한 DCT 기반 워터마킹)

  • 이혜란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.506-509
    • /
    • 2001
  • 본 논문에서는 디지털 영상의 변조를 확인함과 동시에 변조의 위치를 확인하는 DCT 기반의 fragile watermarking을 제안한다. 디지털 영상의 인증과 무결성을 위해 기존의 Wong이 사용한 해쉬 함수와 비대칭키 암호 알고리즘을 사용하며, 영상에 DCT 변환을 함으로서 영상의 모든 픽셀에 워터마크를 삽입하지 않고서도 변조의 유무를 확인하는 것이 가능하다. 본 논문에서는 DCT 계수 중 일부 저주파 계수의 하위 비트에 워터마크를 삽입하여 워터마크의 비가시성과 연성을 만족하며 변조의 유무와 위치를 확인한 수 있게 된다.

  • PDF

Watermarking Algorithm for 1-bit Image Authentication using Edges (Edge를 이용한 1-bit 영상의 원본 증명용 워터마킹 알고리즘)

  • 박용정;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.105-108
    • /
    • 2002
  • This paper proposes a new watermarking algorithm to embed data in 1-bit images using edges for protecting illegal copies or modifications. This method is based on edge detection to decide the most invisible region. This paper also introduces a new shuffling method which embeds data in each blocks uniformly and finds Positions under the limited attacks. In experiment, we compare the proposed shuffling method with M. Wu's method.

  • PDF

Authentication System based on Image Synthesis (이미지 합성을 이용한 인증 시스템)

  • 박봉주;김수희;차재필
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.646-648
    • /
    • 2003
  • 본 연구는 이미지 합성을 이용하여 서버가 사용자를 인증하기 위한 알고리즘을 개발하고 이들을 구현하여 그 성능을 평가하고 분석한다. 서버는 사용자가 소지하는 사용자카드를 랜덤하게 점을 찍어 생성하고, 각 사용자에게 배포된 사용자카드의 정보를 유지.관리한다. 한 사용자로부터 인증요청이 들어오면, 서버는 그 사용자의 사용자카드 정보를 기반으로 서버카드를 실시간에 생성하여 사용자에게 송신한다. 서버카드는 인증마다 다르게 생성되므로 원타임 패스워드 챌린지(challenge) 역할을 한다. 사용자는 본인이 소유하고 있는 사용자카드와 서버로부터 송신된 서버카드를 겹쳤을 때 생성되는 이미지를 판독하여 인증을 수행한다. 보안성을 높이면서 이미지 판독을 효율적으로 하기 위해 다양한 기법을 제시하고 구현을 통하여 실용성을 진단한다.

  • PDF

Binary Image Watermarking Based on Grouping Feature Regions (특수런을 이용한 특징영역 분리에 의한 이진영상 워터마킹)

  • 이정환;박세현;노석호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.177-180
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First, a binary image is grouped into feature regions which have geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied to some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

  • PDF

A Steganography for the Medical Images using Block Similarity (블록 유사도를 이용한 의료영상 스테가노그라피)

  • Moon, Il-Nam;Lee, Sin-Joo;Lee, Kwang-Man
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.952-958
    • /
    • 2009
  • Recently, due to problems in terms of illegal copying of medical image and the right ownership and authentication of data, it is necessary for us to study about those problems. In this study, we propose steganography with a method of the hiding information of high-resolution in digital medical image. The proposed algorithm is one of the way that inserts secret information by protecting ROI area which is regarded as and important feature of high-resolution digital medical image. As a result, the proposed method made it possible to insert secret information of massive storage and didn't affect the imperceptibility in medical image quality based on capacity and PSNR showed the all image quality of about 33.33dB.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Digital Image Watermarking Technique Using HVS and Adaptive Scale Factor Based on the Wavelet Transform (웨이블릿 변환 기반에서의 HVS 특성 및 적응 스케일 계수를 이용한 디지털 영상 워터마킹 기법)

  • 김희정;이응주;문광석;권기룡
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.861-869
    • /
    • 2003
  • The rapid growth of multimedia network systems has caused overflowing illegal copies of digital contents. Among digital contents, watermarking technique can be used to protect ownership about the image. Copyright protection involves the authentication of image ownership and the identification of illegal copies of image. In this paper, a new digital watermarking technique using HVS and adaptive scale factor based on the wavelet transform is proposed to use the binary image watermark. The original image is decomposed by 3-level wavelet transform. It is embedded to baseband and high frequency band. The embedding in the baseband is considered robustness, the embedding in the high frequency band is concerned about HVS and invisibility. The watermarking of a visually recognizable binary image used the HVS and random permutation to protect the copyright. From the experimental results, we confirm that the proposed technique is strong to various attacks such as joint photographic experts ground(JPEG) compression, cropping, collusion, and inversion of lines.

  • PDF

A Flexible Model-Based Face Region Detection Method (유연한 모델 기반의 얼굴 영역 검출 방법)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.251-256
    • /
    • 2021
  • Unlike general cameras, a high-speed camera capable of capturing a large number of frames per second can enable the advancement of some image processing technologies that have been limited so far. This paper proposes a method of removing undesirable noise from an high-speed input color image, and then detecting a human face from the noise-free image. In this paper, noise pixels included in the ultrafast input image are first removed by applying a bidirectional filter. Then, using RetinaFace, a region representing the person's personal information is robustly detected from the image where noise was removed. The experimental results show that the described algorithm removes noise from the input image and then robustly detects a human face using the generated model. The model-based face-detection method presented in this paper is expected to be used as basic technology for many practical application fields related to image processing and pattern recognition, such as indoor and outdoor building monitoring, door opening and closing management, and mobile biometric authentication.