Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Fingerprint Verification System Involving Smart Card

    The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...

    Younhee Gil, Daesung Moon, Sungbum Pan in Information Security and Cryptology — ICIS… (2003)

  2. No Access

    Chapter and Conference Paper

    Fingerprint-Based Authentication for USB Token Systems

    In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...

    Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan in Information Security Applications (2004)

  3. No Access

    Chapter and Conference Paper

    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

    Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Information Security Applications (2007)

  4. No Access

    Chapter and Conference Paper

    A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication

    To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...

    Sung Bum Pan, Daesung Moon, Kichul Kim in Computational Intelligence and Security (2007)

  5. No Access

    Chapter and Conference Paper

    Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

    Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Information Security Applications (2007)

  6. No Access

    Book and Conference Proceedings

    Information Security Applications

    11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

    Yongwha Chung, Moti Yung in Lecture Notes in Computer Science (2011)