• Title/Summary/Keyword: touch location

Search Result 57, Processing Time 0.028 seconds

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

A Fast Algorithm for Korean Text Extraction and Segmentation from Subway Signboard Images Utilizing Smartphone Sensors

  • Milevskiy, Igor;Ha, Jin-Young
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.161-166
    • /
    • 2011
  • We present a fast algorithm for Korean text extraction and segmentation from subway signboards using smart phone sensors in order to minimize computational time and memory usage. The algorithm can be used as preprocessing steps for optical character recognition (OCR): binarization, text location, and segmentation. An image of a signboard captured by smart phone camera while holding smart phone by an arbitrary angle is rotated by the detected angle, as if the image was taken by holding a smart phone horizontally. Binarization is only performed once on the subset of connected components instead of the whole image area, resulting in a large reduction in computational time. Text location is guided by user's marker-line placed over the region of interest in binarized image via smart phone touch screen. Then, text segmentation utilizes the data of connected components received in the binarization step, and cuts the string into individual images for designated characters. The resulting data could be used as OCR input, hence solving the most difficult part of OCR on text area included in natural scene images. The experimental results showed that the binarization algorithm of our method is 3.5 and 3.7 times faster than Niblack and Sauvola adaptive-thresholding algorithms, respectively. In addition, our method achieved better quality than other methods.

Gaze Detection in Head Mounted Camera environment (Head Mounted Camera 환경에서 응시위치 추적)

  • 이철한;이정준;김재희
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.25-28
    • /
    • 2000
  • Gaze detection is to find out the position on a monitor screen where a user is looking at, using the computer vision processing. This System can help the handicapped to use a computer, substitute a touch screen which is expensive, and navigate the virtual reality. There are basically two main types of the study of gaze detection. The first is to find out the location by face movement, and the second is by eye movement. In the gaze detection by eye movement, we find out the position with special devices, or the methode of image processing. In this paper, we detect not the iris but the pupil from the image captured by Head-Mounted Camera with infra-red light, and accurately locate the position where a user looking at by A(fine Transform.

  • PDF

Development of Vehicle Oriented Black Box System Based on U-Healthcare and Human-Free Guard Functions

  • Lee, Dong-Myung
    • Journal of Engineering Education Research
    • /
    • v.13 no.5
    • /
    • pp.36-40
    • /
    • 2010
  • The vehicle oriented block box system based on the u-healthcare and the human-free guard functions is developed in this paper. We also suggested the design philosophies, ideas, and analyzed the performance of the suggested system. The developed vehicle oriented black box system has some characteristics such as; 1) detects the dangerous situation by ultrasonic sensor in advance, and stores the situation information of the neighborhood of the vehicle to the imbedded SD memory card if the dangerous situation may be occurred in the parked vehicle; 2) detects the present location and speed information of the vehicle by GPS receiver and 3-axes acceleration sensor, and stores the information to the SD memory card periodically if the vehicle is running; 3) measures the dioxide carbon in the vehicle inside using $CO_2$ sensor, and forces the ventilation motor of the vehicle to operate and maintains the driver's health if the measured level is more than standard health requirements; 4) provides the stored vehicle's operating information to the driver by GUI (Graphical User Interface) based touch LCD monitor.

  • PDF

Evaluation on the Noise Influence and Reduction due to the Change of Military Aircraft Flight Path (군용항공기의 운항 경로 변경에 따른 소음영향 및 저감 평가)

  • Lee, Jin-Young;Lee, Chan;Kil, Hyun-Gwon
    • Journal of Environmental Impact Assessment
    • /
    • v.18 no.3
    • /
    • pp.143-150
    • /
    • 2009
  • The present study investigates the effects of the flight paths of military aircraft on noise map and its WECPNL(Weighted Equivalent Continuous Perceived Noise Level) distribution. Aircraft noise modeling and simulation have been performed on a Korean military air base by means of INM(Integrated Noise Model) with the input data of airfield location, aircraft specifications, flight paths and aircraft's operation schedules. The result of noise modelling has been verified in comparison with the result of measured noise level. The flight path of military aircraft, as the key parameter of the present study, was modeled by combining takeoff, overfly, approach and touch-and-go modes. The present INM simulations have been conducted for various flight path cases with different takeoff, approach modes and overfly modes. The simulation results showed that the change of flight path can remarkably affect the noise influence region and the WECPNL distribution around the airfield.

Grounding Grid Design Considering the Dangerous Voltage of Multi-layered Model in the Constrained Sites (제한된 부지 다층 대지구조에서 위험전압을 고려한 접지설계)

  • Son, Seok-Geum
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.3
    • /
    • pp.139-144
    • /
    • 2013
  • In Korea, where most of the sites are narrow in space and their earth resistivity is relatively high, the spaces between grounding conductors are likely to be designed narrow in order to lower ground resistance and dangerous voltage below to the permitted safety values. In addition, ground nets are in the shape of square or rectangle depending on the location and size of the facilities and ground contact area, and inner conductors are laid out in grids like the pattern of nets. Nevertheless, with the existing designs, the marginal voltage for safety gets higher as the area is extended further outside, in comparison with that of inner mesh grounding, thus causing much difficulty maintaining them equipotential, and there exist limits in the burial, grounding grid design considering the dangerous voltage of muti-layered model in the constrained sites, was studied.

User-interface Considerations for the Main Button Layout of the Tactical Computer for Korea Army (한국군 전술컴퓨터의 인간공학적 메인버튼 설계)

  • Baek, Seung-Chang;Jung, Eui-S.;Park, Sung-Joon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.28 no.4
    • /
    • pp.147-154
    • /
    • 2009
  • The tactical computer is currently being developed and installed in armored vehicles and tanks for reinforcement. With the tactical computer, Korea Army will be able to grasp the deployment status of our forces, enemy, and obstacles under varying situations. Furthermore, it makes the exchange of command and tactical intelligence possible. Recent studies showed that the task performance is greatly affected by the user interface. The U.S. Army is now conducting user-centered evaluation tests based on C2 (Command & Control) to develop tactical intelligence machinery and tools. This study aims to classify and regroup subordinate menu functions according to the user-centered task performance for the Korea Army's tactical computer. Also, the research suggests an ergonomically sound layout and size of main touch buttons by considering human factors guidelines for button design. To achieve this goal, eight hierarchical subordinate menu functions are initially drawn through clustering analysis and then each group of menu functions was renamed. Based on the suggested menu structure, new location and size of the buttons were tested in terms of response time, number of error, and subjective preference by comparing them to existing ones. The result showed that the best performance was obtained when the number of buttons or functions was eight to conduct tactical missions. Also, the improved button size and location were suggested through the experiment. It was found in addition that the location and size of the buttons had interactions regarding the user's preference.

The Implementation of a User Location and Preference-based Appointed Place Recommendation Mobile Application (사용자의 위치와 선호도에 기반한 약속 장소 추천 모바일 애플리케이션 구현)

  • Bae, Hyeji;Song, Jina;Lee, Yujin;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.6
    • /
    • pp.403-411
    • /
    • 2015
  • Nowadays, in the so-called 'smart era', people are likely to feel more comfortable in on-line meetings than in off-line meetings. However, on-line meetings are often considered unimportant and it is difficult for participants to share their feelings. This paper suggests a mobile application that can revitalize off-line meetings to address these problems. Wecok Application, which suggests the best meeting place by applying users' preferences and their locations, provides a function-oriented user interface and simple touch flow. Wecok consists of a client/server software, and currently supports only three users simultaneously. It enables exchange of off-line and on-line communication by expanding meetings from on-line to off-line. By using Wecok, users can easily decide on an off-line meeting place.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

MissingFound: An Assistant System for Finding Missing Companions via Mobile Crowdsourcing

  • Liu, Weiqing;Li, Jing;Zhou, Zhiqiang;He, Jiling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4766-4786
    • /
    • 2016
  • Looking for missing companions who are out of touch in public places might suffer a long and painful process. With the help of mobile crowdsourcing, the missing person's location may be reported in a short time. In this paper, we propose MissingFound, an assistant system that applies mobile crowdsourcing for finding missing companions. Discovering valuable users who have chances to see the missing person is the most important task of MissingFound but also a big challenge with the requirements of saving battery and protecting users' location privacy. A customized metric is designed to measure the probability of seeing, according to users' movement traces represented by WiFi RSSI fingerprints. Since WiFi RSSI fingerprints provide no knowledge of users' physical locations, the computation of probability is too complex for practical use. By parallelizing the original sequential algorithms under MapReduce framework, the selecting process can be accomplished within a few minutes for 10 thousand users with records of several days. Experimental evaluation with 23 volunteers shows that MissingFound can select out the potential witnesses in reality and achieves a high accuracy (76.75% on average). We believe that MissingFound can help not only find missing companions, but other public services (e.g., controlling communicable diseases).