• Title/Summary/Keyword: verifier

Search Result 126, Processing Time 0.028 seconds

Confidence Measure for Utterance Verification in Noisy Environments (잡음 환경에서의 인식 거부 성능 향상을 위한 신뢰 척도)

  • Park, Jeong-Sik;Oh, Yung-Hwan
    • Proceedings of the KSPS conference
    • /
    • 2006.11a
    • /
    • pp.3-6
    • /
    • 2006
  • This paper proposes a confidence measure employed for utterance verification in noisy environments. Most of conventional approaches estimate the proper threshold of confidence measure and apply the value to utterance rejection in recognition process. As such, their performance may degrade for noisy speech since the threshold can be changed in noisy environments. This paper presents further robust confidence measure based on the multi-pass confidence measure. The isolated word recognition based experimental results demonstrate that the proposed method outperforms conventional approaches as utterance verifier.

  • PDF

Formal Verification of I-Link Bus for CCA Board (CCA 보드를 위한 I-Link 버스의 정형 검증)

  • 남원홍;성창훈;최진영;기안도;한우종
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.45-47
    • /
    • 2000
  • 본 연구는 심볼릭 모델 체커 중의 하나인 SMV(Symbolic Model Verifier)를 이용하여 한국전자통신연구원(ETRI)에서 개발한 CCA(Cache Coherent Agent) 보드를 위한 I-Link Bus(Inside Bus)의 몇 가지 특성(property)들을 검증하여 I-Link Bus의 요구사항(requirement)이 만족됨을 보인다. 이 검증에서는 I-Link Bus의 모델을 SMV 입력 언어로 명세하며, 검증할 특성들을 시제 논리(temporal logic)를 이용하여 나타낸다. 검증을 통해서 I-Link Bus와 PIF(Processor Interface), DC(Directory Controller), RC(Remote access cache Controller)모듈들이 중재기 우선 순위, send 우선 순위, 중재 요청 신호의 관리, liveness등의 특성들을 만족한다라는 것을 검증하였다.

  • PDF

A Password-Authenticated Key Distribution Method Using Threshold PKC (Threshold PKC를 이용한 패스워드 기반 키분배 방식)

  • 이영숙;이영교;원동호
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.3
    • /
    • pp.53-60
    • /
    • 2004
  • In this paper we present user authentication and key distribution using threshold PKC(Public Key Cryptosystem), which is secure against the dictionary attack. The n servers hold a t-out-of-n sharing of the dealer's secret key. When the server authenticate a user, at least f of them cooperate they can reconstruct password verifier.

  • PDF

A Strong Designated Verifiable DL Based Signcryption Scheme

  • Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.567-574
    • /
    • 2012
  • This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it using his own secret key. The scheme is secure, as an adversary can not verify the signature even if the secret key of the signer is compromised or leaked. The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP). The security analysis of the scheme has been done and it is proved that, the proposed scheme can withstand an adaptive chosen ciphertext attack. This scheme can be very useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.

Formal Verification of FBO specification using VIS Verifier (VIS 검증기를 이용한 FBD 명세의 정형검증)

  • ;Shin, Mo-Bum;You, Jun-Beom;Cha, Sung-Deok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.427-429
    • /
    • 2005
  • 원자력 발전소의 제어 시스템은 safety-critical 소프트웨어로서 안정성이 중요시되는 시스템이다. 최근 기존의 시스템이 PLC 기반의 디지털 제어장치로 대체되면서 이에 사용되는 소프트웨어의 안정성과 품질을 보장하기 위한 정형검증 기법이 요구되고 있다. 특히 PLC 프로그램의 설계에 사용되는 FBD의 모델체킹을 통한 정형검증에 대한 연구는 미비한 수준이다. VIS 검증기는 위의 요구에 부합하는 도구로서 이를 사용하면 여러 종류의 정형 검증이 가능하다. 본 논문에서는 VIS를 이용한 FBD의 검증을 위해서 FBD를 Verilog로 변환 하는 기법을 제안한다. 제안하는 방법의 효율성을 검증하기 위해서 현재 KNICS 사업단에서 개발중인 APR-1400용 원자로 보호 시스템의 운전정지회로를 예로 사용하였다.

  • PDF

Number Plate Detection with a 2-step Neural Network Approach for Mobile Devices (차량 번호판 검출을 위한 2단계 합성곱 신경망 접근법)

  • Gerber, Christian;Chung, Mokdong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.879-881
    • /
    • 2014
  • A method is proposed to achieve improved number plate detection for mobile devices by applying a two-step convolutional neural network (CNN) approach. Supervised CNN-verified car detection is processed first. In the second step, we apply the detected car regions to the second CNN-verifier for number plate detection. Since mobile devices are limited in computing power, we propose a fast method to detect number plates. We expect to use in the field of intelligent transportation systems (ITS).

On Location Security Solutions in Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1053-1056
    • /
    • 2012
  • Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) because important decisions are made based on accurate and sound location information. Vehicles exchange their whereabouts in the form of scheduled beacon messages with their neighbors. These messages contain location, speed, time, and lane information etc. In this paper we aim at the location security in VANET and emphasize on the confidentiality and integrity of location information in case of Nonline-of-Sight (NLoS). For location confidentiality we propose a geolock-based mechanism whereas for location integrity we leverage cooperation among neighbors. In case of NLoS, the verifier vehicle asks its one-hop neighbors in an efficient way to verify the claimed location of the node on his behalf. On the basis of trust values and weightage assigned to neighbors, it is decided whether the verification is sound.

A Distributed Signcryption for User Anonymity (사용자 익명성을 위한 Distributed Signcryption)

  • 곽동진;하재철;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.169-176
    • /
    • 2003
  • Distributed signcryption was specially designed for distributing a signcrypted message to a designated group. Since a verifier of this signcryption should how the signer's public key in advance, it cannot provide the signer's anonymity. This study adds anonymity and non-repudiation by trusted party to the distributed signcryption with almost the same computational load. We also analyze security and computational loads of the proposed scheme. In addition, we extend our scheme to an efficient group signcryption.

Design of Behavior Conformance Verifier for Component Interface (컴포넌트 인터페이스의 행위 호환성을 검증하는 도구 설계)

  • Kim, Ho-Jun;Lee, Woo-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.324-326
    • /
    • 2008
  • 컴포넌트 기반 개발(Component Based Development, CBD)은 높은 품질의 소프트웨어를 신속하고 효과적으로 개발할 수 있는 방법으로써 각광 받아 왔다. 하지만 CBD를 이용한 기존의 소프트웨어 개발은 컴포넌트의 행위를 배제하고 컴포넌트 인터페이스만 참조하여 컴포넌트를 설계함으로써, 컴포넌트의 구체적인 행위에 대한 파악과 컴포넌트 간 인터페이스 호환성 보장이 불가능하였다. 이에 따라 컴포넌트 설계 단계에서 컴포넌트의 행위를 상태머신으로 표현하고, 표현된 상태머신을 통해 컴포넌트의 행위 호환성을 보장할 필요가 있다. 이 연구에서는 상태머신으로 표현된 컴포넌트의 행위를 관찰 일치(observation equivalence)와 호출 일관성(invocation consistency)의 개념을 이용하여 행위 호환성을 검증하는 방법을 제공하고, 동적으로 이를 수행하는 도구를 설계한다.

Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN

  • Yang, Ju-Cheng;Park, Dong-Sun
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.6
    • /
    • pp.800-808
    • /
    • 2008
  • A fingerprint verification system based on a set of invariant moment features and a nonlinear Back Propagation Neural Network(BPNN) verifier is proposed. An image-based method with invariant moment features for fingerprint verification is used to overcome the demerits of traditional minutiae-based methods and other image-based methods. The proposed system contains two stages: an off-line stage for template processing and an on-line stage for testing with input fingerprints. The system preprocesses fingerprints and reliably detects a unique reference point to determine a Region-of-Interest(ROI). A total of four sets of seven invariant moment features are extracted from four partitioned sub-images of an ROI. Matching between the feature vectors of a test fingerprint and those of a template fingerprint in the database is evaluated by a nonlinear BPNN and its performance is compared with other methods in terms of absolute distance as a similarity measure. The experimental results show that the proposed method with BPNN matching has a higher matching accuracy, while the method with absolute distance has a faster matching speed. Comparison results with other famous methods also show that the proposed method outperforms them in verification accuracy.