• Title/Summary/Keyword: multiple fingerprint recognition

Search Result 14, Processing Time 0.028 seconds

Development of a Fingerprint Recognition System for Various Fingerprint Image (다양한 지문 영상에 강인한 지문인식 시스템 개발)

  • 이응봉;전성욱;유춘우;김학일
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.10-19
    • /
    • 2003
  • As the technical demand for biometrics is increasing, users expect that fingerprint recognition systems are operable with various fingerprint readers. However, current commercial off-the-shelf fingerprint recognition systems are no interoperable due to the lack of standardization in application program interfaces for fingerprint readers. A cross-matching fingerprint recognition system is a person authentication system based on fingerprints and utilizing different types of fingerprint readers. It should be able to overcome variations in fingerprint images acquired by different readers, such as the size, resolution, contrast of images. The purpose of this research is to develop across-matching fingerprint recognition system for fingerprint research of different sensing mechanism. The fingerprint readers tested in this study are optical, semiconductor and thermal sensor modules, and the prpoposed cross-matching system utilizes both a minutiae-based similarity and a ridge count-based similarity in matching fingerprint images acquired by different sensors.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Template Fusion for Fingerprint Recognition (지문 등록을 위한 템플릿 융합 알고리즘)

  • 류춘우;문지현;김학일
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.51-64
    • /
    • 2004
  • This paper proposes an algerian of generating a tuner-template from multiple fingerprint impressions using a data fusion technique for fingerprint enrollment. The super-template is considered as a single fingerprint template which contains most likely true minutiae based on multiple fingerprint images. The proposed algorithm creates the super template by utilizing a recursive Bayesian estimation method (RBEM), which assumes a sequential fingerprint input model and estimates the credibility of the minutiae in previous input templates froma current input template. Consequently. the RBEM assigns a higher credibility to commonly detectable minutiae from several input templates and a lower credibility to rarely found minutiae from other input templates. Likewise, the RBEM is able to estimate a credibility of the minutia type (ridge ending or bifurcation). Preliminary experiments demonstrate that, as the number of fingerfrint images increases, the performance of recognition can be improved while maintaining the processing time and the size of memory storage for tile super-template almost constant.

Fingerprint Images Registration Method by Recursive Ridge Mapping (점진적 융선 정합을 통한 지문 영상 정렬 방법)

  • Choi, Kyoung-Taek;Choi, Hee-Seung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1007-1010
    • /
    • 2005
  • This paper presents a fingerprint image registration method. In the fingerprint system, the insufficiency of mutual information between a template and a query fingerprint is one of major factors to deteriorate recognition performance. To overcome this problem, we need to register multiple impressions and integrate their information. Our method matches the ridges from multiple impressions recursively and then registers the impressions to minimize the registration error calculated from the Distance map. Our method use regularized TPS model as the transformation model to compensate for the plastic deformation. We compare our method with 3 prior arts (ICP, Distance Map, Ross's method). Our registration error and its' variance is the smallest and also the average registration error is below 3 pixels.

  • PDF

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

Volume Holographic Fingerprint Recognition System for Personal Identification (개인 인증을 위한 체적 홀로그래픽 지문인식 시스템)

  • 이승현
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.256-263
    • /
    • 1998
  • In this paper, we propose a volume holographic fingerprint recognition system based on optical correlator for personal identification. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the security verification system.

  • PDF

Interactive System using Multiple Signal Processing (다중신호처리를 이용한 인터렉티브 시스템)

  • Kim, Sung-Ill;Yang, Hyo-Sik;Shin, Wee-Jae;Park, Nam-Chun;Oh, Se-Jin
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.282-285
    • /
    • 2005
  • This paper discusses the interactive system for smart home environments. In order to realize this, the main emphasis of the paper lies on the description of the multiple signal processing on the basis of the technologies such as fingerprint recognition, video signal processing, speech recognition and synthesis. For essential modules of the interactive system, we adopted the motion detector based on the changes of brightness in pixels as well as the fingerprint identification for adapting home environments to the inhabitants. In addition, the real-time speech recognizer based on the HM-Net(Hidden Markov Network) and the speech synthesis were incorporated into the overall system for interaction between user and system. In experimental evaluation, the results showed that the proposed system was easy to use because the system was able to give special services for specific users in smart home environments, even though the performance of the speech recognizer was not better than the simulation results owing to the noisy environments.

  • PDF

Volume holographic correlator for fingerprint recognition (지문 인식을 위한 체적 홀로그래픽 광상관기)

  • 이승현;김은수
    • Korean Journal of Optics and Photonics
    • /
    • v.9 no.6
    • /
    • pp.385-389
    • /
    • 1998
  • In this paper, we propose an optical correlator system using volume holograms for database of matched filters. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the fingerprint recognition.

  • PDF

Iris Recognition Using a Modified CPN (CPN을 이용한 홍채 인식)

  • Hong, Jin-Il;Yang, Woo-Suk
    • Journal of IKEEE
    • /
    • v.6 no.1 s.10
    • /
    • pp.10-20
    • /
    • 2002
  • The purpose of this work is to develop a system fer rapid and automatic identification of persons, with high reliability and confidence levels. The iris of the eye is used as an optical fingerprint, having a highly detailed pattern that is unique for each individual and stable over many years. Image analysis algorithms find the iris in a image, and encode its texture into an iris code. Iris texture is extracted from the image at multiple scales of analysis by wavelet transformation. The features of many different parts of the iris are projected onto the space-frequency space. They are used to determine an abstract iris code which is similar to 2D barcode. Pattern recognition is achieved by using modified CPN.

  • PDF

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.