RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Content Addressable Memory Approach to Logic Processing in Artificial Intelligence

        Kim, Jaihie,Pao, Yoh-Han 연세대학교 대학원 1987 延世論叢 Vol.23 No.1

        인공지능등에서 Symbol list를 처리하는데 있어서 기본적으로 중요한 과정중의 하나는 pattern matching이고, 이러한 matching활동의 이유로 저장된 내용인 content에 의한 addressing이 필요하다. 이전의 여러 연구에 따르면 content addressable memory가 pattern matching업무에 상당히 유용한 것으로 알려져 있다. 이 논문에서는 이러한 hardware content addressable memory구조와 sambol처리를 위한 data 구조 및 처리 범주를 제시하고, first order logic의 경우에 대한 응용을 연구하였다.

      • Fingerprint Matching Incorporating Ridge Features With Minutiae

        Heeseung Choi,Kyoungtaek Choi,Jaihie Kim IEEE 2011 IEEE transactions on information forensics and sec Vol.6 No.2

        <P>This paper introduces a novel fingerprint matching algorithm using both ridge features and the conventional minutiae feature to increase the recognition performance against nonlinear deformation in fingerprints. The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction, and ridge type. These ridge features have some advantages in that they can represent the topology information in entire ridge patterns existing between two minutiae and are not changed by nonlinear deformation of the finger. For extracting ridge features, we also define the ridge-based coordinate system in a skeletonized image. With the proposed ridge features and conventional minutiae features (minutiae type, orientation, and position), we propose a novel matching scheme using a breadth-first search to detect the matched minutiae pairs incrementally. Following that, the maximum score is computed and used as the final matching score of two fingerprints. Experiments were conducted for the FVC2002 and FVC2004 databases to compare the proposed method with the conventional minutiae-based method. The proposed method achieved higher matching scores. Thus, we conclude that the proposed ridge feature gives additional information for fingerprint matching with little increment in template size and can be used in conjunction with existing minutiae features to increase the accuracy and robustness of fingerprint recognition systems.</P>

      • KCI등재

        보조정보에 기반한 가변 얼굴템플릿의 이진화 방법의 연구

        이형구(Hyunggu Lee),김재희(Jaihie Kim) 大韓電子工學會 2010 電子工學會論文誌-SP (Signal processing) Vol.47 No.1

        가변생체인식 방법 (Cancelable Biometrics)은 생체정보의 도난이나 도용으로부터 강인하며 재생성 가능한 생체템플릿을 제공하는 높은 보안성을 갖는 생체 인식방법이다. 본 논문은 가변얼굴인식 방법의 하나로써 얼굴생체템플릿을 나머지에 기반하여 이진화하는 방법을 제안한다. 이진화를 위한 입력 값으로, 우리의 기존 연구 결과로서의 가변얼굴템플릿을 이용하였다. 이 가변얼굴템플릿은 상이한 두 개의 형상 기반의 얼굴특징추출 방법 (Appearance based face recognition)을 이용하여 두 개의 얼굴특징벡터를 추출하고, 추출된 두 개의 얼굴특징벡터를 재배열 후 합하여 얻어진다. 우리의 기존방법으로 얻어진 얼굴특징벡터는 실수 값을 갖기 때문에 저장 시 기존의 암호화 방법과의 접목이 힘들며 원래의 생체정보 노출에 대한 잠정적인 위협이 될 수 있다. 본 논문의 나머지에 기반한 이진화 방법은 우리의 기존 가변얼굴템플릿에서 부분정보인 나머지를 이용하여 이진비트열을 생성하므로 향상된 보안성을 제공한다. 또한 본 논문의 이진화 기법은 합해진 특징벡터의 통계적인 특징으로부터 정의된 보조정보 (Helper data)를 이용하여 높은 인식 성능을 갖는다. 제안방법은 보조정보가 노출된 경우에서도 이진화된 가변얼굴템플릿이 원 얼굴특징벡터보다 향상된 인식성능을 보장한다. 제안하는 방법은 the extended YALEB face database를 이용하여 성능과 보안성에 대하여 평가 하였다. Cancelable biometrics is a robust and secure biometric recognition method using revocable biometric template in order to prevent possible compromisation of the original biometric data. In this paper, we present a new cancelable bits extraction method for the facial data. We use our previous cancelable feature template for the bits extraction. The adopted cancelable template is generated from two different original face feature vectors extracted from two different appearance-based approaches. Each element of feature vectors is re-ordered, and the scrambled features are added. With the added feature, biometric bits string is extracted using helper data based method. In this technique, helper data is generated using statistical property of the added feature vector, which can be easily replaced with straightforward revocation. Because, the helper data only utilizes partial information of the added feature, our proposed method is a more secure method than our previous one. The proposed method utilizes the helper data to reduce feature variance within the same individual and increase the distinctiveness of bit strings of different individuals for good recognition performance. For a security evaluation of our proposed method, a scenario in which the system is compromised by an adversary is also considered. In our experiments, we analyze the proposed method with respect to performance and security using the extended YALEB face database.

      • Error Correction Codes for Biometric Cryptosystem

        Andrew Beng Jin Teoh,Jaihie Kim 한국통신학회 2015 정보와 통신 Vol.32 No.6

        In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

      • Iris Template Protection Method Robust to Stolen Token Case

        Youn Joo Lee,Jaihie Kim 대한전자공학회 2008 ITC-CSCC :International Technical Conference on Ci Vol.2008 No.7

        Biometric authentication systems have been used in many security systems such as access contol, computer login, e-commers, and so on. However, biometric authentication systems have a critical problem. The problem is that if they are compromized once, biometric templates are permanantly compromized because biometric charicteristics cannot be changed. In order to solve this problem, the concept of cancelable biometrics was introduced. Cancelable biometrics method based on random projection is one of the various methods to produce revocable biometric templates. This method can easily reissue transformed biometric templates repeatedly and makes biometric features more distinquishable since original biometric signal is projected on random space that was derived from a user’s token that embody the userspecific psuedorandom number (PRN). However, random projection method has a major limitation. In stolen-token senario, the recognition performance remains as single biometrics performance. This paper presents a biometric templates protection method based on random projection, which is robust to stolen-token case. We used multiple random projection (MRP) to produce cancelable biometric templates and extracted regualarized eigenfeatures in order to improve the recognition performance in the stolen token scenario. Experimental results showed that the performance of the proposed method was not greatly degraded in the stolen token scenario.

      • Equal Error Rate Minimization for Biometrics Fusion

        Kar-Ann Toh,Jaihie Kim,Sangyoun Lee 대한전자공학회 2008 ICEIC:International Conference on Electronics, Inf Vol.1 No.1

        This paper presents a formulation for minimizing the equal error rate (EER) in multimodal biometrics fusion. By utilizing a linear parametric model and a constrained optimization framework, the solution to the EER minimization problem can be translated into a tuning task for the Lagrange multiplier. The formulation is experimented on a fusion task, combining the scores of an infrared face system and that of a visual face system. Our preliminary result shows stability of fusion which is very encouraging.

      • Aliveness detection of fingerprints with Image Quality Analysis

        Heeseung Choi,Kyungtaek Choi,Jaihie Kim 대한전자공학회 2008 ICEIC:International Conference on Electronics, Inf Vol.1 No.1

        Fake finger submission to the sensor is a major problem in fingerprint recognition systems. In this paper, we introduce a novel aliveness detection method with image quality analysis. For convenience and usefulness of field application, multiple static features are considered to detect ‘live’ and ‘fake’ fingerprint images. Power spectrum, directional contrast and ridge thickness of image are analyzed. Our static features can reflect the physiological and statistical characteristics of live and fake fingerprint. Aliveness score of each feature is calculated and fused in feature level through polynomial SVM (Support Vector Machine) classifier. In our data set, proposed method has approximately 0.49% EER (Equal Error Rate) at best only using a single image. Our approach will provide a faster and useful technique for aliveness check for field applications.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼