Skip to main content

and
  1. Chapter

    Performance Analysis of Smart Card-Based Fingerprint Recognition for Secure User Authentication

    In the modern electronic world, authentication of a person is an important task in many areas of day-to-day life. Using a biometrics to authenticate a person’s identity has several advantages over the present ...

    Youn-Hee Gil, Yongwha Chung, Dosung Ahn, Jihyun Moon, Hakil Kim in Towards the E-Society (2001)

  2. No Access

    Chapter and Conference Paper

    Face Recognition Using Support Vector Machines with the Feature Set Extracted by Genetic Algorithms

    Face recognition problem is challenging because face images can vary considerably in terms of facial expressions, 3D orientation, lighting conditions, hair styles, and so on. This paper proposes a method of fa...

    Kyunghee Lee, Yongwha Chung, Hyeran Byun in Audio- and Video-Based Biometric Person Au… (2001)

  3. No Access

    Chapter and Conference Paper

    Fingerprint Verification System Involving Smart Card

    The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...

    Younhee Gil, Daesung Moon, Sungbum Pan in Information Security and Cryptology — ICIS… (2003)

  4. No Access

    Chapter and Conference Paper

    Fingerprint-Based Authentication for USB Token Systems

    In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...

    Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan in Information Security Applications (2004)

  5. No Access

    Chapter and Conference Paper

    A Hardware Implementation for Fingerprint Retrieval

    Recently, fingerprint has been received considerable attentions as a user authentication technique using biometrics. Fingerprint retrieval, which retrieves a candidate list of fingerprints having similar featu...

    Yongwha Chung, Kichul Kim, Min Kim in Knowledge-Based Intelligent Information an… (2005)

  6. No Access

    Chapter and Conference Paper

    A Secure Fingerprint Authentication System on an Untrusted Computing Environment

    In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...

    Yongwha Chung, Daesung Moon, Taehae Kim in Trust, Privacy, and Security in Digital Bu… (2005)

  7. No Access

    Chapter and Conference Paper

    Hiding Biometric Data for Secure Transmission

    In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects o...

    Yongwha Chung, Daesung Moon, Kiyoung Moon in Knowledge-Based Intelligent Information an… (2005)

  8. No Access

    Chapter and Conference Paper

    Secure Remote Fingerprint Verification Using Dual Watermarks

    As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. ...

    Taehae Kim, Yongwha Chung, Seunghwan Jung in Digital Rights Management. Technologies, I… (2006)

  9. No Access

    Chapter and Conference Paper

    Capacity Planning for Scalable Fingerprint Authentication

    As the fingerprint authentication technique becomes widely used at close range such as for the door lock, it will be applied for the remote user authentication as the next step. For large-scale remote user aut...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Knowledge-Based Intelligent Information an… (2006)

  10. No Access

    Chapter and Conference Paper

    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

    Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Information Security Applications (2007)

  11. No Access

    Chapter and Conference Paper

    A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication

    To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...

    Sung Bum Pan, Daesung Moon, Kichul Kim in Computational Intelligence and Security (2007)

  12. No Access

    Chapter and Conference Paper

    Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault

    Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by h...

    Sungju Lee, Daesung Moon, Yongwha Chung in Knowledge-Based Intelligent Information an… (2007)

  13. No Access

    Chapter and Conference Paper

    Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

    Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Information Security Applications (2007)

  14. No Access

    Book and Conference Proceedings

    Information Security Applications

    11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

    Yongwha Chung, Moti Yung in Lecture Notes in Computer Science (2011)