• Title/Summary/Keyword: vault

Search Result 215, Processing Time 0.028 seconds

A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault (3차원 기하학적 해싱을 이용한 퍼지볼트에서의 지문 정합)

  • Lee, Sung-Ju;Moon, Dae-Sung;Kim, Hak-Jae;Yi, Ok-Yeon;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.11-21
    • /
    • 2008
  • Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, the previous results had some limitation of the provided security due to the limited numbers of chaff data fer hiding real fingerprint data. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vault can perform the fingerprint verification securely even with more chaff data included.

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.

Fuzzy Fingerprint Vault using Multiple Polynomials (다중 다항식을 이용한 지문 퍼지볼트)

  • Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.125-133
    • /
    • 2009
  • Security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non.invertible transformed version. Thus, even if the transformed version is compromised, its valid biometric data are securely remained. Fuzzy vault mechanism was proposed to provide cryptographic secure protection of critical data(e.g., encryption key) with the fingerprint data in a way that only the authorized user can access the critical data by providing the valid fingerprint. However, all the previous results cannot operate on the fingerprint image with a few minutiae, because they use fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use adaptive degree of polynomial considering the number of minutiae. Also, we apply multiple polynomials to operate the fingerprint with a few minutiae. Based on the experimental results, we confirm that the proposed approach can enhance the security level and verification accuracy.

Somatosensory evoked potentials are abnormal with plagiocephaly

  • Harma, Maiju;Lauronen, Leena;Leikola, Junnu;Hukki, Jyri;Saarikko, Anne
    • Archives of Craniofacial Surgery
    • /
    • v.23 no.2
    • /
    • pp.59-63
    • /
    • 2022
  • Background: Deformational plagiocephaly is usually managed conservatively, as it tends to improve over time and with the use of conservative measures. However, before the year 2017 we operated on patients with severe plagiocephaly and neurological symptoms at the Helsinki Cleft Palate and Craniofacial Center. Methods: Of the 20 infants with severe deformational plagiocephaly and neurological symptoms referred to us between 2014 and 2016, 10 underwent cranioplasty open reshaping of the posterior cranial vault. The parents of the last 10 patients were given information on the natural history of the condition and the patients were followed up with an outpatient protocol. The aim of this study was to gain information on the brain electrophysiology and recovery of patients after total cranial vault reconstruction by measuring the electroencephalogram (EEG) somatosensory evoked potentials (SEP; median nerve). Results: Of the 10 participants in the operation arm, six had abnormal SEP at least on the affected cerebral hemisphere and all SEPs were recorded as normal when controlled postoperatively. In the follow-up arm, eight out of 10 participants had abnormal SEP at the age of approximately 24 months, and all had normalized SEPs at control visits. Conclusion: Our data suggest that cranioplasty open reshaping of the posterior cranial vault did not affect abnormal SEP-EEG recordings. We have abandoned the operations in deformational plagiocephaly patients due to findings suggesting that expanding cranioplasty is not beneficial for brain function in this patient group.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Analysis of stability control and the adapted ways for building tunnel anchors and a down-passing tunnel

  • Xiaohan Zhou;Xinrong Liu;Yu Xiao;Ninghui Liang;Yangyang Yang;Yafeng Han;Zhongping Yang
    • Geomechanics and Engineering
    • /
    • v.35 no.4
    • /
    • pp.395-409
    • /
    • 2023
  • Long-span suspension bridges have tunnel anchor systems to maintain stable cables. More investigations are required to determine how closely tunnel excavation beneath the tunnel anchor impacts the stability of the tunnel anchor. In order to investigate the impact of the adjacent tunnel's excavation on the stability of the tunnel anchor, a large-span suspension bridge tunnel anchor is utilised as an example in a three-dimensional numerical simulation approach. In order to explore the deformation control mechanism, orthogonal tests are employed to pinpoint the major impacting elements. The construction of an advanced pipe shed, strengthening the primary support. Moreover, according to the findings the grouting reinforcement of the surrounding rock, have a significant control effect on the settlement of the tunnel vault and plug body. However, reducing the lag distance of the secondary lining does not have such big influence. The greatest way to control tunnel vault settling is to use the grout reinforcement, which increases the bearing capacity and strength of the surrounding rock. This greatly minimizes the size of the tunnel excavation disturbance area. Advanced pipe shed can not only increase the surrounding rock's bearing capacity at the pipe shed, but can also prevent the tunnel vault from connecting with the disturbance area at the bottom of the anchorage tunnel, reduce the range of shear failure area outside the anchorage tunnel, and have the best impact on the plug body's settlement control.

Seed Morphological Characteristics and Dormancy type of Eranthis stellata Maxim., Korea Rare Plant. (희귀식물 너도바람꽃(Eranthis stellata Maxim.) 종자의 형태특성 및 휴면유형 분석)

  • Inhwan Chae;Geon Hui Ryu;Se-kyu Song;Jin-Woo Kim;Gi Ho Kang;Hayan Lee
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2020.08a
    • /
    • pp.20-20
    • /
    • 2020
  • Eranthis stellata Maxim. is a perennial plant that grows around the valley. E. stellata is concerned about the decline in natural habitats due to climate change in KOREA, continues to be observed and protected as an endangered species (Least Concrned, LC). Nevertheless, studies on the characteristics of the seeds of E. stellata are insufficient. So, this study analyzed the morphological characteristics and dormancy types of seeds. Seeds of E. stellata was collected in April at Gyeongsangbuk-do Arboretum and kept at 5 ℃ until using. To investigate the morphology of seeds, an optical microscope and a scanning electron microscope (SEM) were used. GA3 treated or untreated seeds (4 replicates of 25 seeds each) were observed germination and embryo growth for 1 month at 5 ℃ and 25/15 ℃ (12h day/12h night). The seed surface of E. stellata, light brown, was observed as a common characteristic of Eranthis genus, reticulate. The short axis of seeds was 1.11~1.77mm (average 1.44mm), and the long axis was 1.27~1.91mm (average 1.63mm), which was investigated in a slightly round shape (subglose). While no germination was observed at all conditions, Embryo growth was observed at 5 ℃ both in the control group and with GA3treated groups. Thus, seeds of E. stellata are classified as morphological physiological dormancy (MDP), which requires embryonic development and dormant break at the same time. These results can be useful information for determining morphological physiological seed dormancy and germination, and will be an important basic data for seed propagation of E. stellata as a resource.

  • PDF

Safety Assessment of Near Surface Disposal Facility for Low- and Intermediate-Level Radioactive Waste (LILW) through Multiphase-Fluid Simulations Based on Various Scenarios (다양한 시나리오 기반 유체거동 수치모사를 통한 중·저준위 방사성 폐기물 표층처분시설 안전성 평가)

  • Jeong, Jina;Kown, Mijin;Park, Eungyu
    • Economic and Environmental Geology
    • /
    • v.51 no.2
    • /
    • pp.131-147
    • /
    • 2018
  • In the present study, the safety of the near surface disposal facility for low- and intermediate-level radioactive waste (LILW) is examined based on the fluid-flow simulation model. The effects of the structural design and hydrological properties of the disposal system are quantitatively evaluated by estimating the flux of infiltrated water at the boundary of the structure. Additionally, the safety margins of the disposal system, especially for the cover layer and vault, are determined by applying the various scenarios with consideration of possible facility designs and precipitation conditions. The overall results suggest that the disposal system used in this study is sufficiently suitable for the safe operation of the facility. In addition, it is confirmed that the soundness of both the cover layer and the vault have great impact on the safety of the facility. Especially, as shown in the vault degradation scenario, capability of the concrete barrier of the vault make more positive contribution on the safe operation of the facility compared to that of the cover layer.

Measurement of soft tissue thickness on posterior palatal area by using computerized tomography in Korean population (전산화단층촬영법을 통한 한국인의 구개 저작 점막 두께에 대한 연구)

  • Song, Ji-Eun;Chae, Gyung-Joon;Jung, Ui-Won;Kim, Chang-Sung;Choi, Seong-Ho;Cho, Kyoo-Sung;Kim, Chong-Kwan;Chai, Jung-Kiu
    • Journal of Periodontal and Implant Science
    • /
    • v.37 no.1
    • /
    • pp.103-113
    • /
    • 2007
  • The purpose of this study was to measure the thickness of masticatory mucosa in the hard palate as a donor site for mucogingival surgery by using computerized tomography(CT), Thickness measurements were performed in 84 adult patients who took CT on maxilla for implant surgery and 24 standard measurement points were defined in the hard palate according to the gingival margin and mid palatal suture. Radiographic measurements were utilized after calibration for standardization. Data were analyzed to determine the differences in mucosal thickness by gender, age, tooth positions and depth of palatal vault. The results of this study were as follows: 1. Mean thickness of palatal masticatory mucosa was $3.93{\pm}0.6mm$ and females had significantly thinner mean masticatory mucosa($3.76{\pm}0.56mm$) than males($4.04{\pm}0.6mm$)(p<0.05). 2. The thickness of palatal masticatory mucosa increased by aging. 3. Depending on position, masticatory mucosa thickness increased from canine to premeolar, but decreased at the first molar, and increased again in the second molar region(p<0.0001). 4. No significant difference in mean thickness of palatal masticatory mucosa were indentified between low palatal vault group and high palatal vault group(p>0.05). The results suggest that canine and premolar area appears to be the most appropriate donor site for soft tissue grafting procedure. The measurement of the thickness of palatal masticatory mucosa by using computerized tomography can offer useful information clinically but further studies in as-sessing the validity and reliability of the method using computerized tomography is needed.