Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daesung Moon is active.

Publication


Featured researches published by Daesung Moon.


information security and cryptology | 2005

Automatic alignment of fingerprint features for fuzzy fingerprint vault

Yongwha Chung; Daesung Moon; Sungju Lee; Seunghwan Jung; Taehae Kim; Dosung Ahn

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.


computational intelligence and security | 2005

Performance evaluation of watermarking techniques for secure multimodal biometric systems

Daesung Moon; Taehae Kim; Seunghwan Jung; Yongwha Chung; Kiyoung Moon; Dosung Ahn; Sang-Kyoon Kim

In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on user verification and watermark detection accuracies quantitatively. To evaluate the performance of watermarking for multimodal biometric systems, we first consider possible two scenarios – embedding facial features into a fingerprint image and embedding fingerprint features into a facial image. Additionally, to evaluate the performance of dual watermarking for secure biometric systems, we consider another two scenarios – with/without considering the characteristics of the fingerprint in embedding the dual watermark. Based on the experimental results, we confirm that embedding fingerprint features into a facial image can provide superior performance in terms of the user verification accuracy. Also, the dual watermarking with considering the characteristics of the fingerprint in embedding the dual watermark can provide superior performance in terms of the watermark detection accuracy.


IEEE Transactions on Consumer Electronics | 2003

An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card

Sung Bum Pan; Daesung Moon; Youn-Hee Gil; Dosung Ahn; Yongwha Chung

We propose an ultra-low memory fingerprint matching algorithm and implement it on a 32-bit smart card. We first evaluated both the number of instructions executed and memory requirement of each step of a typical fingerprint matching algorithm. Then, we developed a memory-efficient algorithm for the most memory-consuming step (alignment) by doing more computations under the restriction of the real-time requirement. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 62 and can be executed in real-time on a 32-bit smart card.


digital rights management | 2005

Secure remote fingerprint verification using dual watermarks

Taehae Kim; Yongwha Chung; Seunghwan Jung; Daesung Moon

As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. In this paper, we propose a dual watermarking technique to protect fingerprint images in transmission/storage. As the proposed dual watermarking technique provides both robustness and fragileness with the embedded watermarks, it can guarantee the integrity of the fingerprint image transmitted and/or stored. In particular, when the embedding locations for fragile watermarks are selected, we consider the ridge information of the fingerprint images to avoid possible interference between the robust watermark detection and fingerprint verification systems. Based on experimental results, we confirm that our dual watermarking technique can detect the robust watermark accurately and avoid any significant degradation in the accuracy of fingerprint verification.


international conference on knowledge based and intelligent information and engineering systems | 2005

Hiding biometric data for secure transmission

Yongwha Chung; Daesung Moon; Kiyoung Moon; Sung Bum Pan

In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the Scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarked image.


international conference on adaptive and natural computing algorithms | 2007

Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table

Sungju Lee; Daesung Moon; Seunghwan Jung; Yongwha Chung

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication architectures known as crypto-biometricsystems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vaultcan perform the fingerprint verification securely even with one thousand chaff data included.


international conference on computational science and its applications | 2007

Fingerprint template protection using fuzzy vault

Daesung Moon; Sungju Lee; Seunghwan Jung; Yongwha Chung; Miae Park; Okyeon Yi

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect fingerprint templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.


international conference on machine learning and cybernetics | 2008

Implementation of automatic fuzzy fingerprint vault

Daesung Moon; Sungju Lee; Yongwha Chung; Sung Bum Pan; Kiyoung Moon

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we implement the fuzzy fingerprint vault system combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. However, all the previous results assumed that fingerprint features were pre-aligned. To solve this problem, we perform the automatic alignment of fingerprint features by using the geometric hashing technique. Also, we implement a new RS decoding algorithm based on the Extended Euclidean algorithm proposed by Gao. Based on the experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and perform fingerprint verification with the protected template in real-time.


The Journal of Supercomputing | 2016

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

Saurabh Singh; Pradip Kumar Sharma; Seo Yeon Moon; Daesung Moon; Jong Hyuk Park

Recently in the connected digital world, targeted attack has become one of the most serious threats to conventional computing systems. Advanced persistent threat (APT) is currently one of the most important threats considering the information security concept. APT persistently collects data from a specific target by exploiting vulnerabilities using diverse attack techniques. Many researchers have contributed to find approaches and solutions to fight against network intrusion and malicious software. However, only a few of these solutions are particularly focused on APT. In this paper, we introduce a structured study on semantic-aware work to find potential contributions that analyze and detect APT in details. We propose modeling phase that discusses the typical steps in APT attacks to collect the desired information by attackers. Our research explores social network and web infrastructure exploitation as well as communication protocols and much more for future networks and communications. The paper also includes some recent Zero-day attacks, use case scenarios and cyber trends in southeastern countries. To overcome these challenges and attacks, we introduce a detailed comprehensive literature evaluation scheme that classifies and provides countermeasures of APT attack behavior. Furthermore, we discuss future research direction of APT defense framework of next-generation threat life cycle.


signal-image technology and internet-based systems | 2012

Biometrics Information Protection Using Fuzzy Vault Scheme

Ki Young Moon; Daesung Moon; Jang-Hee Yoo; Hyun-Suk Cho

Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic construction, called fuzzy vault, has recently been proposed. The fuzzy vault aims to secure critical data with the biometric template in a way that only the authorized user can access the secret by providing the valid biometric. In this paper, we propose three solutions for fuzzy fingerprint vault. First is more efficient fuzzy fingerprint vault with automatic alignment. Second solution can be resistant to correlation attack. Third is fuzzy fingerprint vault for OTP (One Time Template).

Collaboration


Dive into the Daesung Moon's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kiyoung Moon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ikkyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Woo-Yong Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge