Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Secure Remote Fingerprint Verification Using Dual Watermarks

    As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. ...

    Taehae Kim, Yongwha Chung, Seunghwan Jung in Digital Rights Management. Technologies, I… (2006)

  2. No Access

    Chapter and Conference Paper

    Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems

    In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on...

    Daesung Moon, Taehae Kim, SeungHwan Jung in Computational Intelligence and Security (2005)

  3. No Access

    Chapter and Conference Paper

    Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model

    In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on t...

    Yongwha Chung, Daesung Moon, Taehae Kim in Parallel and Distributed Computing: Applic… (2005)

  4. No Access

    Chapter and Conference Paper

    Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as cryp...

    Yongwha Chung, Daesung Moon, Sungju Lee in Information Security and Cryptology (2005)

  5. No Access

    Chapter and Conference Paper

    A Secure Fingerprint Authentication System on an Untrusted Computing Environment

    In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...

    Yongwha Chung, Daesung Moon, Taehae Kim in Trust, Privacy, and Security in Digital Bu… (2005)