• Title/Summary/Keyword: vault

Search Result 214, Processing Time 0.026 seconds

Experimental study on the mechanical response and failure behavior of double-arch tunnels with cavities behind the liner

  • Zhang, Xu;Zhang, Chengping;Min, Bo;Xu, Youjun
    • Geomechanics and Engineering
    • /
    • v.20 no.5
    • /
    • pp.399-410
    • /
    • 2020
  • Cavities often develop behind the vault during the construction of double-arch tunnels, generally in the form of various defects. The study evaluates the impact of cavities behind the vault on the mechanical and failure behaviors of double-arch tunnels. Cavities of the same sizes are introduced at the vault and the shoulder close to the central wall of double-arch tunnels. Physical model tests are performed to investigate the liner stress variation, the earth pressure distribution and the process of progressive failure. Results reveal that the presence of cavities behind the liner causes the re-distribution of the earth pressure and induces stress concentration near the boundaries of cavities, which results in the bending moments in the liner inside the cavity to reverse sign from compression to tension. The liner near the invert becomes the weak region and stress concentration points are created in the outer fiber of the liner at the bottom of the sidewall and central wall. It is suggested that grouting into the foundation soils and backfilling injection should be carried out to ensure the tunnel safety. Changes in the location of cavities significantly impact the failure pattern of the liner close to the vault, e.g., cracks appear in the outer fiber of the liner inside the cavity when a cavity is located at the shoulder close to the central wall, which is different from the case that the cavity locates at the vault, whereas changes in the location of cavities have a little influence on the liner at the bottom of the double-arch tunnels.

A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone (퍼지볼트와 스테가노그래피를 이용한 스마트폰 지문 인증 시스템)

  • Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.419-426
    • /
    • 2015
  • This paper proposes a fingerprint verification system on a fuzzy vault with steganography for a smartphone. While biometric-based authentication can provide strong security, the biometric data must be handled carefully as it cannot be re-enrolled when it is revealed to other people. When the transformed data is used for authentication, the original biometric data can be protected. In this paper, we combine a fingerprint verification system with a fuzzy vault scheme to protect the fingerprint data of a smartphone user. In addition, the transformed data using a fuzzy vault scheme increases the security as it is concealed by the steganography scheme. The result of the experiment using fingerprint databases shows that the proposed scheme provides a high level of convenience and security for authentication of a smartphone having with a fingerprint sensor.

Real Fuzzy Vault for Protecting Face Template (얼굴인식 템플릿 보호를 위한 Real Fuzzy Vault)

  • Lee, Dae-Jong;Song, Chang-Kyu;Park, Sung-Moo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.2
    • /
    • pp.113-119
    • /
    • 2013
  • Face recognition techniques have been widely used for various areas including criminal identification due to their capability of easy implementing and user friendly interface. However, they have some drawbacks related to individual's privacy in case that his or her face information is divulged to illegal users. So, this paper proposed a novel method for protecting face template based on the real fuzzy vault. This proposed method has some advantages of regenerating a new face template when a registered face template is disclosed. Through implementing and testing the proposed method, we showed its validity and usefulness.

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Robust Fuzzy Fingerprint Vault System against Correlation Attack (상관관계 공격에 강인한 지문퍼지볼트 시스템)

  • Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.13-25
    • /
    • 2011
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. The fuzzy fingerprint vault system is one of the most popular solutions for protecting the fingerprint template stored in the database. Recently, however, this system is very susceptible to a correlation attack that finds the real minutiae using multiple fingerprint vaults enrolled for different applications. To solve this problem, we propose a robust fuzzy fingerprint vault system against the correlation attack. In this paper, we add chaff minutiae based on the relative information of minutiae such as direction, coordinate instead of adding randomly. Also, our proposed approach allow to add multiple chaff minutiae within tolerance box for enhanced security level. Experimental results show that the proposed approach can protect the correlation attack and achieve enhanced verification accuracy.

Development and Growth of the Normal Cranial Vault : An Embryologic Review

  • Jin, Sung-Won;Sim, Ki-Bum;Kim, Sang-Dae
    • Journal of Korean Neurosurgical Society
    • /
    • v.59 no.3
    • /
    • pp.192-196
    • /
    • 2016
  • Understanding the development of a skull deformity requires an understanding of the normal morphogenesis of the cranium. Craniosynostosis is the premature, pathologic ossification of one or more cranial sutures leading to skull deformities. A review of the English medical literature using textbooks and standard search engines was performed to gather information about the prenatal development and growth of the cranial vault of the neurocranium. A process of morphogenic sequencing begins during prenatal development and growth, continues postnatally, and contributes to the basis for the differential manner of growth of cranial vault bones. This improved knowledge might facilitate comprehension of the pathophysiology of craniosynostosis.

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2237-2253
    • /
    • 2017
  • For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Buckling of cylindrical shells under external pressure proposition of a new shape of self-stiffened shell

  • Araar, M.;Jullien, J.F.
    • Structural Engineering and Mechanics
    • /
    • v.4 no.4
    • /
    • pp.451-460
    • /
    • 1996
  • We propose a new shape of cylindrical shell formed by multiples vaults which gives a self-stiffening against buckling. By an experimental and numerical study of cylindrical shells with a repeated defect, on the circumferential direction made only of outside oriented wave-defects, we show that multiple vault cylindrical shells can have a good behaviour in buckling. An optimal behaviour is obtained by optimization of the vaults number, with conduces to a special multiple vault cylindrical shell named "ASTER shell".

Cases Analysis of Vault "Shirai-Kim Hee Hoon" Technique for Assessing Skill Completeness (도마 Shirai-Kim Hee Hoon 기술의 성공/실패 사례를 통한 융복합 완성도 평가)

  • Song, Joo-Ho;Kim, Dong-Min;Moon, Je-Heon
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.441-448
    • /
    • 2015
  • The purpose of the study was to perform a comparative analysis of the success and failure cases to increase the completeness of vault "Shirai-Kim Hee Hoon" technique. The subject of the study was "K" a male gymnast from Korean Artistic Gymnastic National team. The results obtained through the three-dimensional analysis during international as well as practice session are as follows: Firstly, excluding BC, the lead time in each PrF, HC and PoF phases were shorter during successful trials than in failure trials. Secondly, during successful trials, the horizontal and vertical velocity appeared to be higher during taking off, which contributed positively to the leaping motion in the horizontal direction. Thirdly, when compared with successful and failure trials, the body's angular rotation was highly maintained during the takeoff from the spring board followed by larger thigh angular displacement at the vault before actually attempting the backward rotation.