RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 무료
      • 기관 내 무료
      • 유료
      • SCISCIESCOPUS

        Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation

        Jin, Zhe,Teoh, Andrew Beng Jin,Goi, Bok-Min,Tay, Yong-Haur Elsevier 2016 Pattern recognition Vol.56 No.-

        <P><B>Abstract</B></P> <P>Despite fuzzy commitment (FC) is a theoretically sound biometric-key binding scheme, it relies on error correction code (ECC) completely to mitigate biometric intra-user variations. Accordingly, FC suffers from the security–performance tradeoff. That is, the larger key size/higher security always trades with poor key release success rate and vice versa. Additionally, the FC is highly susceptible to a number of security and privacy attacks. Furthermore, the best achievable accuracy performance of FC is constrained by the simple distance metrics such as Hamming distance to measure the dissimilarity of binary biometric features. This implies many efficient matching algorithms are to be abandoned. In this paper, we propose an ECC-free key binding scheme along with cancellable transforms for minutiae-based fingerprint biometrics. Apart from that, the minutiae information is favorably protected by a strong non-invertible cancellable transform, which is crucial to prevent a number of security and privacy attacks. The scheme is not limited to binary biometrics as demanded in FC but instead can be applied to various types of biometric features and hence a more effective matcher can be chosen. Experiments conducted on FVC2002 and FVC2004 show that the accuracy performance is comparable to state-of-the-arts. We further demonstrate that the proposed scheme is robust against several major security and privacy attacks.</P> <P><B>Highlights</B></P> <P> <UL> <LI> A new ECC-free biometric key binding scheme and the realization in fingerprint biometrics are proposed. </LI> <LI> A modified randomized GHE in constructing the cancellable transform is proposed. </LI> <LI> We performed several security and privacy analysis for the proposed scheme, like privacy attacks ARM and SKI. </LI> <LI> The proposed scheme can be applied to variety of biometric feature representations, not only binary string and matcher. </LI> </UL> </P>

      • Multi Unit Iris Biometric Encrypted Template Formation and Authentication

        Shoaib Amin Banday,Saba Mushtaq,A.H. Mir 보안공학연구지원센터(IJSIP) 2014 International Journal of Signal Processing, Image Vol.7 No.6

        Biometrics has been one the main security solutions in almost every type of infrastructure (whether critical or non-critical) ranging from the main doors at home, libraries to the critical infrastructures like banks and airports. Despite the forceful impetus on research on biometric security that has taken biometrics from one simple level to much higher levels of security, there are still some open challenges in this field of security that need to be filled. Among all those challenges and loopholes, the security of template is of the most important concern. The reason for this is that we don’t want any identity compromises. If a biometric template in the database of the system of a person is compromised that consequently would mean identity theft of that person. This paper proposes a novel method that uses two different biometric data from the same person for making a biometric template against each person. The two biometric modalities that have been used in our work are left and right iris using best features. The features and verification of the proposed system has been done using MATLAB.

      • SCISCIESCOPUS

        Cancellable iris template generation based on Indexing-First-One hashing

        Lai, Yen-Lung,Jin, Zhe,Jin Teoh, Andrew Beng,Goi, Bok-Min,Yap, Wun-She,Chai, Tong-Yuen,Rathgeb, Christian Elsevier 2017 Pattern Recognition Vol.64 No.-

        <P><B>Abstract</B></P> <P>Eye iris has been widely recognized as one of the strongest biometrics attributed to its high accuracy performance. However, templates in conventional iris recognition systems are unprotected and highly vulnerable to numerous security and privacy attacks. Despite a number of cancellable biometric schemes have been proposed but at the expense of substantially decreased accuracy performance. In this paper, we introduce a new cancellable iris scheme, coined as “Indexing-First-One” (IFO) hashing. IFO hashing is inspired from the Min-hashing that primarily used in text retrieval domain. However, IFO hashing has been further strengthened by two novel mechanisms, namely P-order Hadamard product and modulo threshold function. The IFO hashing scheme strikes the balance between accuracy performance and privacy/security protection. Comprehensive experiments on CASIA-v3 iris benchmark database and rigorous analysis demonstrate decent accuracy performance with respect to its original counterparts yet offer strong resilience against several major security and privacy attacks.</P> <P><B>Highlights</B></P> <P> <UL> <LI> A new scheme to generate cancellable iris template with Jacaard similarity matcher. </LI> <LI> Modification of Min-hashing to strengthen the privacy security in IFO. </LI> <LI> IFO provides strong security and privacy against SHA, MHA, ARM, PIA attacks. </LI> <LI> IFO can be applied to variety of biometric feature with binary representation. </LI> </UL> </P>

      • Face Recognition and Template Protection with Shielding Function

        Abayomi Jegede,Nur Izura Udzir,Azizol. Abdullah,Ramlan. Mahmod 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.12

        Biometric authentication is the use of unique human features to provide a secure, reliable and convenient access to an environment or a computer system. However, there are numerous security and privacy concerns associated with the use of biometrics as a means of authentication. Unprotected biometric data can be used by an impostor to impersonate legitimate uses, to violate their privacy and steal their identity. This paper proposes a simplified, secure and privacy-preserving authentication scheme for face biometric based on modified shielding function. The modified shielding function is a simplified version of the generic shielding function which does not require additional preprocessing steps of quantization and reliable bit selection. Rotation invariant neighbour-based local binary pattern (RINLBP) is used to extract fixed length binary features directly from pre-processed face images. RINLBP is simple to calculate and has good performance. It is also robust against changes in illumination and image rotation. Concatenated error correction technique is used to address errors due to noise and intra-class variation. The concatenated technique corrects errors both block and bit errors in contrast to the generic shielding function in which only bit level errors are corrected. Results of experiments based on 200 face images obtained from the CASIA near infrared face database show a false acceptance rate of 0.47% and a false rejection rate of 1.56%. Our scheme has a key length of 120 bits, which is higher than the minimum requirement of 50 bits for biometric keys. It also has a large key space and entropy which makes it less susceptible to guessing attack (Pr =0.008).

      • KCI등재

        Emergency Detection Method using Motion History Image for a Video-based Intelligent Security System

        Lee, Jun,Lee, Se-Jong,Park, Jeong-Sik,Seo, Yong-Ho The Institute of Internet 2012 Journal of Advanced Smart Convergence Vol.1 No.2

        This paper proposed a method that detects emergency situations in a video stream using MHI (Motion History Image) and template matching for a video-based intelligent security system. The proposed method creates a MHI of each human object through image processing technique such as background removing based on GMM (Gaussian Mixture Model), labeling and accumulating the foreground images, then the obtained MHI is compared with the existing MHI templates for detecting an emergency situation. To evaluate the proposed emergency detection method, a set of experiments on the dataset of video clips captured from a security camera has been conducted. And we successfully detected emergency situations using the proposed method. In addition, the implemented system also provides MMS (Multimedia Message Service) so that a security manager can deal with the emergency situation appropriately.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼