Implement of Complex Personal Authentication System applying Biometrics Pattern Algorithm
Dai Hwan Lim,Dept. Computer Engineering Seokyeong Univ, GoQba technology corp
Ki Hun Nam,Dept. Computer Engineering Seokyeong Univ, GoQba technology corp
Jin Young Park,Dept. Computer Engineering Seokyeong Univ, GoQba technology corp
We propose a complex personal authentication system that enhances user convenience and security to meet the increasing demand for authentication in IOT, wearable devices, mobile services and non-face environments. This system is a complex personal authentication system that can perform authentication processing in real time by combining a biometric authentication method (face, line of sight, fingerprint) and PIN authentication method, which are highly discriminating and difficult to forge and falsify. We also introduced an artificial intelligence processor (Machine Learning) to learn biometric information of the user and increase the accuracy of authentication. This has resulted in a complex personal authentication system that is enhanced against a single authentication algorithm. In future, we intend to develop a more robust and convenient personal authentication system by incorporating deep learning based intelligent system into this system.
Biometrics, Complex authentication, IoT, PIN, Intelligence processor.
 J. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence”, IEEE Trans. On Pattern Analysis and Machine Intelligence, (1993), vol.no.11. pp.1148-1161. [DOI: 10.1109/34.244676](CrossRef)(Google Scholar)
 Biometrics Consortium: http://www.biometrics.org.
 A. Jain, R. Bolle and S. Pankanti, “Biometrics Personal Identification in Networked”, Society, Kluwer Academic Publisher, (1999)
 D. Reisfeld, H. Wolfson and Y. Yeshrun, “Detection of Interest Points Using Symmetry”, Proceedings of 3rd ICCV, (1990). [DOI: 10.1109/ICCV.1990.139494](CrossRef)(Google Scholar)
 J. Daugman, “How iris recognition works”, IEEE Transactions on Circuits and Systems for Video technology, (2004), vol.14, no.1. pp.21-30 [DOI: 10.1016/B978-0-12-374457-9.00025-1](CrossRef)(Google Scholar)
 Thomas F. Quatieri, “Discrete Time Speech Signal Processing Principles and Practice”, Prentice Hall, (2001).
 Nam-Ho Kim, “Voice-based OTP Generation Techniques for Mobile Banking”, Journal of KIIT, vol.11, no.5, pp.113-119, (2013)