• Title/Summary/Keyword: signature

Search Result 2,061, Processing Time 0.03 seconds

Performance Improvement of Fake Discrimination using Time Information in CNN-based Signature Recognition (CNN 기반 서명인식에서 시간정보를 이용한 위조판별 성능 향상)

  • Choi, Seouing-Ho;Jung, Sung Hoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.205-212
    • /
    • 2018
  • In this paper, we propose a method for more accurate fake discrimination using time information in CNN-based signature recognition. To easily use the time information and not to be influenced by the speed of signature writing, we acquire the signature as a movie and divide the total time of the signature into equal numbers of equally spaced intervals to obtain each image and synthesize them to create signature data. In order to compare the method using the proposed signature image and the method using only the last signature image, various signature recognition methods based on CNN have been experimented in this paper. As a result of experiment with 25 signature data, we found that the method using time information improves performance in fake discrimination compared to the existing method at all experiments.

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Dongcheul;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1284-1297
    • /
    • 2019
  • The network environment is presently becoming very increased. Accordingly, the study of traffic classification for network management is becoming difficult. Automatic signature extraction system is a hot topic in the field of traffic classification research. However, existing automatic payload signature generation systems suffer problems such as semi-automatic system, generating of disposable signatures, generating of false-positive signatures and signatures are not kept up to date. Therefore, we provide a fully automatic signature update system that automatically performs all the processes, such as traffic collection, signature generation, signature management and signature verification. The step of traffic collection automatically collects ground-truth traffic through the traffic measurement agent (TMA) and traffic management server (TMS). The step of signature management removes unnecessary signatures. The step of signature generation generates new signatures. Finally, the step of signature verification removes the false-positive signatures. The proposed system can solve the problems of existing systems. The result of this system to a campus network showed that, in the case of four applications, high recall values and low false-positive rates can be maintained.

High Performance Signature Generation by Quality Evaluation of Payload Signature (페이로드 시그니쳐 품질 평가를 통한 고효율 응용 시그니쳐 탐색)

  • Lee, Sung-Ho;Kim, Jong-Hyun;Goo, Young-Hoon;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1301-1308
    • /
    • 2016
  • Internet traffic identification is an essential preliminary step for stable service provision and efficient network management. The payload signature-based-classification is considered as a reliable method for Internet traffic identification. But its performance is highly dependent on the number and the structure of signatures. If the numbers and structural complexity of signatures are not proper, the performance of payload signature-based-classification easily deteriorates. Therefore, in order to improve the performance of the identification system, it is necessary to regulate the numbers of the signature. In this paper, we propose a novel signature quality evaluation method to decide which signature is highly efficient for Internet traffic identification. We newly define the signature quality evaluation criteria and find the highly efficient signature through the method. Quality evaluation is performed in three different perspectives and the weight of each signature is computed through those perspectives values. And we construct the signature map(S-MAP) to find the highly efficient signature. The proposed method achieved an approximately fourfold increased efficiency in application traffic identification.

Study on Effectiveness of Ocean Meteorological Variables through Sensitivity Analysis of Ship Infrared Signature (함정 적외선신호 민감도 해석을 통한 기상변수 영향에 관한 연구)

  • Cho, Yong-Jin;Jung, Ho-Seok
    • Journal of Ocean Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.36-42
    • /
    • 2013
  • According to a study on improving ship survivability, an IR signature represents the contrast radiance intensity between the radiation signature from a ship and the background signature. It was found from applying stealth techniques to the process of ship development that the IR signature is remarkably sensitive and dependent on the environment. In this study, marine climate data for the sea near the Korean Peninsula were collected, and the marine meteorological environment in Korean waters was defined. Based on this data, a study on the sensitivity of the IR signature of target objects was performed using analytical methods. The results of the research indicated that clouds have important effects on the infrared signature, but the velocity of the wind and the humidity have only slight effects on the IR signature. In addition, the air and seawater temperatures had hardly any effect on the IR signature, but it is judged that additional study is needed.

The Undeniable Digital Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents (디지털 콘텐츠 공동 저작권 보호에 적합한 부인봉쇄 디지털 다중서명 기법)

  • Yun Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.55-63
    • /
    • 2005
  • In undeniable digital signature scheme, the signature can not be verified without the signer's cooperation. The undeniable signature scheme can be used to computerize many applications which can not be done by a conventional digital signature scheme. In this study, we propose the undeniable digital multi-signature scheme which requires many signers and designated verifier The multi-signature can be verified only in cooperation with all signers. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. We also propose copyright protection method of co-authored digital contents as an application of the proposed scheme.

  • PDF

Secure ID-based Strong Designated Verifier Signature Scheme Against Key-compromise Attack (키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법)

  • Lee, Ji-Seon;Chang, Jik-Hyun;Lee, Dong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.59-66
    • /
    • 2009
  • A strong designated verifier signature scheme is a special type of signature scheme which provides signer anonymity by enabling the specified recipient, called a designated verifier, to simulate a signature which is indistinguishable from the signer's signature. It has many applications such as software distribution or electronic voting. In this paper, we consider two important security properties of strong designated verifier signature scheme - source hiding and security against key-compromise attack. We show that the two properties cannot be achieved at the same time. Finally, we present a new ID-based strong designated verifier signature scheme which is secure against key-compromise attack.

Effective Detection Method of Unstable Acoustic Signature Generated from Ship Radiated Noise

  • Yoon, Jong-Rak;Ro, Yong-Ju
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.1E
    • /
    • pp.25-30
    • /
    • 2001
  • The unstable signature that is defined as frequency change with respect to the time or frequency modulation, is caused by the external loading variation in specific machinery component and Doppler shift etc. In this study, we analyze the generation mechanism of the unstable signature and apply the Extended Kalman filter (EKF) algorithm for its detection. The performance of Extended Kalman Filter is examined for numerical and measured signals and the results show its validity for unstable signature detection.

  • PDF

A Study on an Advanced Evaluation Method for Dynamic Signature Verification System

  • Kim, Jin-Whan;Cho, Jae-Hyun;Kim, Kwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.140-144
    • /
    • 2010
  • This paper is a research on an evaluating method for the dynamic signature verification system. It is described about various factors such as error rate, the size of signature verification engine, the size of the characteristic vectors of a signature, the ability to distinguish similar signatures, the processing speed of signature verification and so on. This study identifies factors to consider in evaluating signature verification systems comprehensively and objectively without an officially approved signature database, examines the meaning of each of the factors, and proposes criteria for evaluating and analyzing the factors.

A Robust On-line Signature Verification System

  • Ryu, Sang-Yeun;Lee, Dae-Jong;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.27-31
    • /
    • 2003
  • This paper proposes a robust on-line signature verification system based on a new segmentation method and fusion scheme. The proposed segmentation method resolves the problem of segment-to-segment comparison where the variation between reference signature and input signature causes the errors in the location and the number of segments. In addition, the fusion scheme is adopted, which discriminates genuineness by calculating each feature vector's fuzzy membership degree yielded from the proposed segmentation method. Experimental results show that the proposed signature verification system has lower False Reject Rate(FRR) for genuine signature and False Accept Rate(FAR) for forgery signature.