Daesung Moon
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Daesung Moon.
information security and cryptology | 2005
Yongwha Chung; Daesung Moon; Sungju Lee; Seunghwan Jung; Taehae Kim; Dosung Ahn
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.
computational intelligence and security | 2005
Daesung Moon; Taehae Kim; Seunghwan Jung; Yongwha Chung; Kiyoung Moon; Dosung Ahn; Sang-Kyoon Kim
In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on user verification and watermark detection accuracies quantitatively. To evaluate the performance of watermarking for multimodal biometric systems, we first consider possible two scenarios – embedding facial features into a fingerprint image and embedding fingerprint features into a facial image. Additionally, to evaluate the performance of dual watermarking for secure biometric systems, we consider another two scenarios – with/without considering the characteristics of the fingerprint in embedding the dual watermark. Based on the experimental results, we confirm that embedding fingerprint features into a facial image can provide superior performance in terms of the user verification accuracy. Also, the dual watermarking with considering the characteristics of the fingerprint in embedding the dual watermark can provide superior performance in terms of the watermark detection accuracy.
IEEE Transactions on Consumer Electronics | 2003
Sung Bum Pan; Daesung Moon; Youn-Hee Gil; Dosung Ahn; Yongwha Chung
We propose an ultra-low memory fingerprint matching algorithm and implement it on a 32-bit smart card. We first evaluated both the number of instructions executed and memory requirement of each step of a typical fingerprint matching algorithm. Then, we developed a memory-efficient algorithm for the most memory-consuming step (alignment) by doing more computations under the restriction of the real-time requirement. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 62 and can be executed in real-time on a 32-bit smart card.
digital rights management | 2005
Taehae Kim; Yongwha Chung; Seunghwan Jung; Daesung Moon
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. In this paper, we propose a dual watermarking technique to protect fingerprint images in transmission/storage. As the proposed dual watermarking technique provides both robustness and fragileness with the embedded watermarks, it can guarantee the integrity of the fingerprint image transmitted and/or stored. In particular, when the embedding locations for fragile watermarks are selected, we consider the ridge information of the fingerprint images to avoid possible interference between the robust watermark detection and fingerprint verification systems. Based on experimental results, we confirm that our dual watermarking technique can detect the robust watermark accurately and avoid any significant degradation in the accuracy of fingerprint verification.
international conference on knowledge based and intelligent information and engineering systems | 2005
Yongwha Chung; Daesung Moon; Kiyoung Moon; Sung Bum Pan
In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the Scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarked image.
international conference on adaptive and natural computing algorithms | 2007
Sungju Lee; Daesung Moon; Seunghwan Jung; Yongwha Chung
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication architectures known as crypto-biometricsystems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vaultcan perform the fingerprint verification securely even with one thousand chaff data included.
international conference on computational science and its applications | 2007
Daesung Moon; Sungju Lee; Seunghwan Jung; Yongwha Chung; Miae Park; Okyeon Yi
Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect fingerprint templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.
international conference on machine learning and cybernetics | 2008
Daesung Moon; Sungju Lee; Yongwha Chung; Sung Bum Pan; Kiyoung Moon
Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we implement the fuzzy fingerprint vault system combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. However, all the previous results assumed that fingerprint features were pre-aligned. To solve this problem, we perform the automatic alignment of fingerprint features by using the geometric hashing technique. Also, we implement a new RS decoding algorithm based on the Extended Euclidean algorithm proposed by Gao. Based on the experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and perform fingerprint verification with the protected template in real-time.
The Journal of Supercomputing | 2016
Saurabh Singh; Pradip Kumar Sharma; Seo Yeon Moon; Daesung Moon; Jong Hyuk Park
Recently in the connected digital world, targeted attack has become one of the most serious threats to conventional computing systems. Advanced persistent threat (APT) is currently one of the most important threats considering the information security concept. APT persistently collects data from a specific target by exploiting vulnerabilities using diverse attack techniques. Many researchers have contributed to find approaches and solutions to fight against network intrusion and malicious software. However, only a few of these solutions are particularly focused on APT. In this paper, we introduce a structured study on semantic-aware work to find potential contributions that analyze and detect APT in details. We propose modeling phase that discusses the typical steps in APT attacks to collect the desired information by attackers. Our research explores social network and web infrastructure exploitation as well as communication protocols and much more for future networks and communications. The paper also includes some recent Zero-day attacks, use case scenarios and cyber trends in southeastern countries. To overcome these challenges and attacks, we introduce a detailed comprehensive literature evaluation scheme that classifies and provides countermeasures of APT attack behavior. Furthermore, we discuss future research direction of APT defense framework of next-generation threat life cycle.
signal-image technology and internet-based systems | 2012
Ki Young Moon; Daesung Moon; Jang-Hee Yoo; Hyun-Suk Cho
Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic construction, called fuzzy vault, has recently been proposed. The fuzzy vault aims to secure critical data with the biometric template in a way that only the authorized user can access the secret by providing the valid biometric. In this paper, we propose three solutions for fuzzy fingerprint vault. First is more efficient fuzzy fingerprint vault with automatic alignment. Second solution can be resistant to correlation attack. Third is fuzzy fingerprint vault for OTP (One Time Template).