Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.1.91

Implementation of anti-screen capture modules for privacy protection  

Lee, Jong-Hyeok (Department of Computer Engineering, Kyungsung University)
Abstract
According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.
Keywords
Prevent Screen Capture; Super-Classing; API; Clipboard; Function keys;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Y. Shin and T. K. Kwon, "A Study of HCI technologies for privacy", Review of KIISE Korea Institute of Information Science and Engineers, vol. 27, no. 12, pp. 68-77, Dec. 2009.
2 T. H. Hwang, Security incidents Dilemma. KT can not see a solution specifically, [Internet]. Available: http://search.etnews.com/etnews, 2012. 07. 31
3 J. J. Lee, MBC Information gathering program went out to financial transactions, and medical information, [Internet]. Available: http:// www.mediatoday.co.kr/news/MediaToday, 2012. 09. 24.
4 M. J. Back, Goes out personal privacy by App stomach, [Internet]. Available: http: //www.focus.co.kr
5 Y. I Cho, "Information Privacy and Intelligent Agency Technology," Review of Korean Institute of Information Technology, vol. 6, no. 1, pp. 29-35, Jan. 2008.
6 Y. H Shin and J. C. Ryou, "Study on adoption of suitable encryption scheme according to data properties on MySQL Database," Proc. of the KIISE Korea Computer Congress 2010, vol. 37, no. 1(D), pp. 77-80, Jan. 2010.
7 C. S. Ahn and J. G. Shon, "Design and Implementation of a Hooking Client for Document Security in File Sharing Environments based on SMB Protocol," Proc. of the KIISE Korea Computer Congress 2009, vol. 36, no. 1(D), pp. 61-65, Jan. 2009.
8 J. H. Park, N W. Jo, K. H. Lee and I. H. Choi, "Development of Personal Information Protection Systems in company," Review of KIISC Korea Institute of Information Security and Cryptology, vol. 18, no. 6, pp. 28-33, Jun. 2008.
9 D. R. Kim, K. C. Sim and M. S. Jeon, "Personal information protection system compared to the Privacy Act," Review of KIISC Korea Institute of Information Security and Cryptology, vol. 21, no. 6, pp. 16-23, Jun. 2011.
10 Y. N. Shin and M. G. Chun, "Personal Information Protection for Biometric Verification based TeleHealth Services," Korean Institute of Intelligent Systems, Vol. 20, No. 5, pp. 659-664, Oct. 2010.   과학기술학회마을   DOI   ScienceOn
11 NIST, "NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing," 2011. 01.
12 NIST, "NIST SP 800-145 The NIST Definition of Cloud Computing," 2011. 01.
13 NIST, "NIST SP 800-146 Cloud Computing Synopsis and Recommendations," 2011. 05.