scispace - formally typeset
Search or ask a question
Author

Okkyung Choi

Bio: Okkyung Choi is an academic researcher from Sejong University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 3, co-authored 5 publications receiving 39 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This work presents a computationally efficient hybrid face recognition method that employs dual-stage holistic and local feature-based recognition algorithms, and obtains better recognition results under illumination variations not only in terms of computation time but also interms of the recognition rate.
Abstract: With the rapid development of computers and the increasing, mass use of high-tech mobile devices, vision-based face recognition has advanced significantly. However, it is hard to conclude that the performance of computers surpasses that of humans, as humans have generally exhibited better performance in challenging situations involving occlusion or variations. Motivated by the recognition method of humans who utilize both holistic and local features, we present a computationally efficient hybrid face recognition method that employs dual-stage holistic and local feature-based recognition algorithms. In the first coarse recognition stage, the proposed algorithm utilizes Principal Component Analysis (PCA) to identify a test image. The recognition ends at this stage if the confidence level of the result turns out to be reliable. Otherwise, the algorithm uses this result for filtering out top candidate images with a high degree of similarity, and passes them to the next fine recognition stage where Gabor filte...

37 citations

Book ChapterDOI
01 Jan 2014
TL;DR: This paper proposes security solutions using PUK module not only technical vulnerability but also physical accident such as a robbery and loss case for safe social media services and proposes NFC payment authentication protocol based on USIM certificate.
Abstract: Robots are becoming more sophisticated and they are performing a lot of work instead of humans. For the natural communication between humans and robots, a real-time technology is needed that they can perform a payment service as an individual characteristic. In this paper, we propose security solutions using PUK module not only technical vulnerability but also physical accident such as a robbery and loss case for safe social media services. In addition, we propose NFC payment authentication protocol based on USIM certificate that includes a streamlined payment and authentication step. Lastly, to prove validity and safety of the proposed system, the experimental test of safety was confirmed and provided the results.

4 citations

Journal ArticleDOI
TL;DR: This study proposes a detection method for tag-ranking manipulation to solve the problem of the existing methods which cannot guarantee the reliability of tagging.
Abstract: With smartphone distribution becoming common and robotic applications on the rise, social tagging services for various applications including robotic domains have advanced significantly. Though social tagging plays an important role when users are finding the exact information through web search, reliability and semantic relation between web contents and tags are not considered. Spams are making ill use of this aspect and put irrelevant tags deliberately on contents and induce users to advertise contents when they click items of search results. Therefore, this study proposes a detection method for tag-ranking manipulation to solve the problem of the existing methods which cannot guarantee the reliability of tagging. Similarity is measured for ranking the grade of registered tag on the contents, and weighted values of each tag are measured by means of synonym relevance, frequency, and semantic distances between tags. Lastly, experimental evaluation results are provided and its efficiency and accuracy are verified through them.

3 citations

Proceedings ArticleDOI
01 Dec 2013
TL;DR: This work constructed the video image database sets which are photographed by both color image and depth image in order to evaluate the performance of the environment recognition of a robot.
Abstract: It is needed to evaluate how well the robot recognizes its environments while it is moving along the path to perform intended tasks. In general, the behavioral patterns of robot when it encounters sudden obstacles in a given environment may depend upon the obstacle avoidance algorithms that are programmed into the robot. In order to evaluate the performance of the environment recognition, we constructed the video image database sets which are photographed by both color image and depth image. We showed that the proposed performance evaluation method could be utilized effectively in evaluating the recognition performance of a robot.

3 citations

Journal ArticleDOI
TL;DR: A secure NFC-based authentication protocol is proposed that provides printer authorization method and document access control in accordance with user's authority and to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results.
Abstract: With the rapid growth of internet technologies, there have been many recent innovations in printing methods and mobile printing service has become important part of our daily life. In this paper, we design and implement a secure mobile printing service using NFC tag to protect our personal information from the technical vulnerability and physical accident such as a robbery. To protect the personal information, the user has to scan the NFC information at the NFC reader using recognition robot to confirm the authentication. In addition, we propose a secure NFC-based authentication protocol that provides printer authorization method and document access control in accordance with user's authority. Lastly, to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results.

1 citations


Cited by
More filters
Journal ArticleDOI
07 Jan 2020-Sensors
TL;DR: This survey is to review some well-known techniques for each approach and to give the taxonomy of their categories and a solid discussion is given about future directions in terms of techniques to be used for face recognition.
Abstract: Over the past few decades, interest in theories and algorithms for face recognition has been growing rapidly. Video surveillance, criminal identification, building access control, and unmanned and autonomous vehicles are just a few examples of concrete applications that are gaining attraction among industries. Various techniques are being developed including local, holistic, and hybrid approaches, which provide a face image description using only a few face image features or the whole facial features. The main contribution of this survey is to review some well-known techniques for each approach and to give the taxonomy of their categories. In the paper, a detailed comparison between these techniques is exposed by listing the advantages and the disadvantages of their schemes in terms of robustness, accuracy, complexity, and discrimination. One interesting feature mentioned in the paper is about the database used for face recognition. An overview of the most commonly used databases, including those of supervised and unsupervised learning, is given. Numerical results of the most interesting techniques are given along with the context of experiments and challenges handled by these techniques. Finally, a solid discussion is given in the paper about future directions in terms of techniques to be used for face recognition.

257 citations

Journal ArticleDOI
Tianpeng Feng1, Lian Zou1, Jia Yan1, Wenxuan Shi1, Yifeng Liu1, Cien Fan1, Dexiang Deng1 
TL;DR: A hardware accelerated algorithm based on a small-scale over-completed dictionary (SSOCD) via sparse coding (SC) method, which is realized on a parallel hardware platform (TMS320C6678) and shows that the proposed algorithm can run with high parallel efficiency and meets the real-time requirements of industrial inspection.
Abstract: An auto fabric defect detection system via computer vision is used to replace manual inspection. In this paper, we propose a hardware accelerated algorithm based on a small-scale over-completed dictionary (SSOCD) via sparse coding (SC) method, which is realized on a parallel hardware platform (TMS320C6678). In order to reduce computation, the image patches projections in the training SSOCD are taken as features and the proposed features are more robust, and exhibit obvious advantages in detection results and computational cost. Furthermore, we introduce detection ratio and false ratio in order to measure the performance and reliability of the hardware accelerated algorithm. The experiments show that the proposed algorithm can run with high parallel efficiency and that the detection speed meets the real-time requirements of industrial inspection.

128 citations

Journal ArticleDOI
TL;DR: Several applications of a face recognition system such as video surveillance, Access Control, and Pervasive Computing has been discussed and a detailed overview of some important existing methods used to dealing the issues of face recognition have been presented.
Abstract: Face recognition has gained a significant position among most commonly used applications of image processing furthermore availability of viable technologies in this field have contributed a great deal to it. In spite of rapid progress in this field it still has to overcome various challenges like Aging, Partial Occlusion, and Facial Expressions etc affecting the performance of the system, are covered in first part of the survey. This part also highlights the most commonly used databases, available as a standard for face recognition tests. AT & T, AR Database, FERET, ORL and Yale Database have been outlined here. While in the second part of this survey a detailed overview of some important existing methods which are used to dealing the issues of face recognition have been presented. Said methods include Eigenface, Neural Network (NN), Support Vector Machine (SVM), Gabor Wavelet and Hidden Markov Model (HMM). While in last part of the survey several applications of a face recognition system such as video surveillance, Access Control, and Pervasive Computing has been discussed.

82 citations

Journal ArticleDOI
TL;DR: The benefits of, as well as the challenges to the use of face recognition as a biometric tool are exposed, and a detailed survey of some well-known methods by expressing each method’s principle is provided.
Abstract: Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as hand geometry, the most efficient and more widely-used one is face recognition. This is because it is inexpensive, non-intrusive and natural. Therefore, researchers have developed dozens of face recognition techniques over the last few years. These techniques can generally be divided into three categories, based on the face data processing methodology. There are methods that use the entire face as input data for the proposed recognition system, methods that do not consider the whole face, but only some features or areas of the face and methods that use global and local face characteristics simultaneously. In this paper, we present an overview of some well-known methods in each of these categories. First, we expose the benefits of, as well as the challenges to the use of face recognition as a biometric tool. Then, we present a detailed survey of the well-known methods by expressing each method’s principle. After that, a comparison between the three categories of face recognition techniques is provided. Furthermore, the databases used in face recognition are mentioned, and some results of the applications of these methods on face recognition databases are presented. Finally, we highlight some new promising research directions that have recently appeared.

76 citations

Journal ArticleDOI
TL;DR: The aim of this research is to provide comprehensive literature review over face recognition along with its applications and some of the major findings are given in conclusion.
Abstract: With the rapid growth in multimedia contents, among such content face recognition has got much attention especially in past few years. Face as an object consists of distinct features for detection; therefore, it remains most challenging research area for scholars in the field of computer vision and image processing. In this survey paper, we have tried to address most endeavoring face features such as pose invariance, aging, illuminations and partial occlusion. They are considered to be indispensable factors in face recognition system when realized over facial images. This paper also studies state of the art face detection techniques, approaches, viz. Eigen face, Artificial Neural Networks (ANN), Support Vector Machines (SVM), Principal Component Analysis (PCA), Independent Component Analysis (ICA), Gabor Wavelets, Elastic Bunch Graph Matching, 3D morphable Model and Hidden Markov Models. In addition to the aforementioned works, we have mentioned different testing face databases which include AT & T (ORL), AR, FERET, LFW, YTF, and Yale, respectively for results analysis. However, aim of this research is to provide comprehensive literature review over face recognition along with its applications. And after in depth discussion, some of the major findings are given in conclusion.

45 citations