• 제목/요약/키워드: solution verification

검색결과 438건 처리시간 0.026초

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • 제28권3호
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Solution verification procedures for modeling and simulation of fully coupled porous media: static and dynamic behavior

  • Tasiopoulou, Panagiota;Taiebat, Mahdi;Tafazzoli, Nima;Jeremic, Boris
    • Coupled systems mechanics
    • /
    • 제4권1호
    • /
    • pp.67-98
    • /
    • 2015
  • Numerical prediction of dynamic behavior of fully coupled saturated porous media is of great importance in many engineering problems. Specifically, static and dynamic response of soils - porous media with pores filled with fluid, such as air, water, etc. - can only be modeled properly using fully coupled approaches. Modeling and simulation of static and dynamic behavior of soils require significant Verification and Validation (V&V) procedures in order to build credibility and increase confidence in numerical results. By definition, Verification is essentially a mathematics issue and it provides evidence that the model is solved correctly, while Validation, being a physics issue, provides evidence that the right model is solved. This paper focuses on Verification procedure for fully coupled modeling and simulation of porous media. Therefore, a complete Solution Verification suite has been developed consisting of analytical solutions for both static and dynamic problems of porous media, in time domain. Verification for fully coupled modeling and simulation of porous media has been performed through comparison of the numerical solutions with the analytical ones. Modeling and simulation is based on the so called, u-p-U formulation. Of particular interest are numerical dispersion effects which determine the level of numerical accuracy. These effects are investigated in detail, in an effort to suggest a compromise between numerical error and computational cost.

Enhancing Document Security with Computer Generated Hologram Encryption: Comprehensive Solution for Mobile Verification and Offline Decryption

  • Leehwan Hwang;Seunghyun Lee;Jongsung Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.169-175
    • /
    • 2024
  • In this paper, we introduce a novel approach to enhance document security by integrating Computer Generated Hologram(CGH) encryption technology with a system for document encryption, printing, and subsequent verification using a smartphone application. The proposed system enables the encryption of documents using CGH technology and their printing on the edges of the document, simplifying document verification and validation through a smartphone application. Furthermore, the system leverages high-resolution smartphone cameras to perform online verification of the original document and supports offline document decryption, ensuring tamper detection even in environments without internet connectivity. This research contributes to the development of a comprehensive and versatile solution for document security and integrity, with applications in various domains.

안드로이드 간편결제 애플리케이션 보안 솔루션 결과값 변조를 통한 검증기능 우회 방법에 대한 연구 (A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution)

  • 유재욱;한미정;김규헌;장준영;진호용;지한별;신정훈;김경곤
    • 정보보호학회논문지
    • /
    • 제28권4호
    • /
    • pp.827-838
    • /
    • 2018
  • 2014년도부터 금융권의 규제가 완화됨으로써 간단한 인증만으로 대금을 결제 할 수 있는 모바일 간편결제 시장이 확대되어 다양한 간편결제 서비스가 등장하고 있다. 모바일 간편결제 애플리케이션의 보안 위협을 막기 위해 여러 검증 기능을 가진 보안 솔루션들이 애플리케이션에 적용되었지만, 보안 솔루션의 적용 구조상 취약점은 여전히 발생할 수 있다. 본 논문에서는 간편결제 애플리케이션과 보안 솔루션을 프로세스 관점에서 분석하여, 검증 결과 값을 변조하는 것만으로도 각 보안 기능의 상세 분석 없이도 보안 솔루션의 검증 기능을 쉽게 우회 할 수 있음을 실제 간편결제 애플리케이션들을 대상으로 한 실험을 통해 증명한다. 그리고 본 논문에서 제시한 우회 방법의 대응방안을 세 가지 시점으로 나누어 제시함으로써 국내 간편결제 서비스의 보안성을 향상시킬 수 있도록 기여한다.

선형 부착성 점탄성 접촉모형의 DEM 적용 및 해석적 방법을 이용한 검증 (Implementation and Verification of Linear Cohesive Viscoelastic Contact Model for Discrete Element Method)

  • 윤태영;유평준
    • 한국도로학회논문집
    • /
    • 제17권4호
    • /
    • pp.25-31
    • /
    • 2015
  • PURPOSES: Implementation and verification of the simple linear cohesive viscoelastic contact model that can be used to simulate dynamic behavior of sticky aggregates. METHODS: The differential equations were derived and the initial conditions were determined to simulate a free falling ball with a sticky surface from a ground. To describe this behavior, a combination of linear contact model and a cohesive contact model was used. The general solution for the differential equation was used to verify the implemented linear cohesive viscoelastic API model in the DEM. Sensitivity analysis was also performed using the derived analytical solutions for several combinations of damping coefficients and cohesive coefficients. RESULTS : The numerical solution obtained using the DEM showed good agreement with the analytical solution for two extreme conditions. It was observed that the linear cohesive model can be successfully implemented with a linear spring in the DEM API for dynamic analysis of the aggregates. CONCLUSIONS: It can be concluded that the derived closed form solutions are applicable for the analysis of the rebounding behavior of sticky particles, and for verification of the implemented API model in the DEM. The assumption of underdamped condition for the viscous behavior of the particles seems to be reasonable. Several factors have to be additionally identified in order to develop an enhanced contact model for an asphalt mixture.

철도종합안전기술개발사업의 성과물 검증 프로세스 구축 (Construction of verification process for the railway total safety technology development project)

  • 윤혁진;한순우;김상암;최경진;조연옥
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2007년도 춘계학술대회 논문집
    • /
    • pp.1187-1192
    • /
    • 2007
  • Recently, many organizations such as, including government, railroad operational, railroad facilities managemental and research authorities have made a lot of efforts to identify and prevent hazards from leading to accidents and solve them all over the railroad industry. Railroad total safety technology development project conducted as one of national R&D projects has established business formation structure based on system engineering as an effort to define and give a solution to facing problems in the field of railroad. This paper is building procedures to verify the outcomes derived from this project. The verification process is the one for verifying the outcome produced in the final stage of the project or during the project. It makes sure that the system is satisfying the system requirements through verification of the outcomes produced after conducting the project for verification. We've made verification plan for technically reasonable verification using verification process developed through this research, and established master verification plan in the level of 15 detailed projects for interim and final outcomes produced.

  • PDF

열차제어시스템 바이탈 소프트웨어를 위한 정형기법 적용 방안 분석 (The Analysis of Formal Methods for Applying to Vital S/W in Train Control Systems)

  • 조현정;황종규;윤용기
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2007년도 춘계학술대회 논문집
    • /
    • pp.1000-1007
    • /
    • 2007
  • Recently, many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased assurance for such applications. Earlier error of overlooked requirement specification can be detected using formal specification method. Also the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In the comparison of other formal specification methods, we choose the Z formal language for applying to the train control system. Using Z is able to realize higher correctness in the requirement specification, and we propose the Statemate of the best solution in formal verification tools for the system modeling and verification. The Statemate makes it possible to prove thoroughly the system execution from the simple graphical modeling of the complicated train control system. Then we can expect that the model-based formal method combining Z with Statemate will be utilized widely for the railway systems due to various strong points.

  • PDF

IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구 (A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure)

  • 황송이;김정녀
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.617-635
    • /
    • 2021
  • 네트워크에 연결된 사물인터넷(Internet of Things, IoT) 기기는 보안 솔루션이 적용되지 않아 ICT(Information & Communications Technology) 인프라의 심각한 보안 위협으로 전락했다. 더군다나 IoT 기기의 특성상 자원제약이 많아 기존의 보안 솔루션을 적용하기 어렵다. 그 결과 사물인터넷 기기는 사이버 공격자의 공격 대상이 됐으며, 실제로도 사물인터넷 기기를 대상으로 한 악성코드 공격이 해마다 꾸준히 증가하고 있다. 이에 IoT 인프라를 보호하기 위해 여러 보안 솔루션이 개발되고 있지만, 기능이 검증되지 않은 보안 솔루션을 실제 환경에 적용하기엔 큰 위험이 따른다. 따라서 보안 솔루션의 기능과 성능을 검증할 검증 도구도 필요하다. 보안 솔루션이 다양한 보안 위협에 대응하는 방법도 다양하므로, 각 보안 솔루션의 특징을 기반으로 한 최적의 검증 도구가 필요하다. 본 논문에서는 IoT 인프라에 빠른 속도로 악성코드를 전파하는 악성코드 고속 확산 도구를 제안한다. 또한, IoT 인프라에서 확산하는 공격을 빠르게 탐지하고 차단하는 보안 솔루션의 기능과 성능을 검증하기 위해 개발된 악성코드 고속 확산 도구를 이용한다.

An Adaptive Utterance Verification Framework Using Minimum Verification Error Training

  • Shin, Sung-Hwan;Jung, Ho-Young;Juang, Biing-Hwang
    • ETRI Journal
    • /
    • 제33권3호
    • /
    • pp.423-433
    • /
    • 2011
  • This paper introduces an adaptive and integrated utterance verification (UV) framework using minimum verification error (MVE) training as a new set of solutions suitable for real applications. UV is traditionally considered an add-on procedure to automatic speech recognition (ASR) and thus treated separately from the ASR system model design. This traditional two-stage approach often fails to cope with a wide range of variations, such as a new speaker or a new environment which is not matched with the original speaker population or the original acoustic environment that the ASR system is trained on. In this paper, we propose an integrated solution to enhance the overall UV system performance in such real applications. The integration is accomplished by adapting and merging the target model for UV with the acoustic model for ASR based on the common MVE principle at each iteration in the recognition stage. The proposed iterative procedure for UV model adaptation also involves revision of the data segmentation and the decoded hypotheses. Under this new framework, remarkable enhancement in not only recognition performance, but also verification performance has been obtained.

SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증 (Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment)

  • 이용환;얀워너;야노스스테파노비치
    • 인터넷정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.139-149
    • /
    • 2009
  • 본 논문에서는 데이터 보호 규정에 관련된 요구사항들이나 규칙들이 소프트웨어에 잘 표현되어 있는지를 검증하기 위하여 도메인 고유의 언어인 DSML(Domain Specific Modeling Language)을 사용해 정책을 정규화 혹은 계산적 표현에 관련된 솔루션을 제시하고 있다. 모든 정책들은 공식적으로 프롤로그( Prolog) 언어 기반으로 표현된 후 DSML에 통합되며 정책검증은 요구사항 준수가 언제 평가되어야 하는지에 따라 정적 정책검증과 동적 정책검증의 두가지 정책이 존재한다.

  • PDF