Browse > Article
http://dx.doi.org/10.15207/JKCS.2019.10.3.007

Optical Character Recognition based Security Document Image File Management System  

Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College)
Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
Publication Information
Journal of the Korea Convergence Society / v.10, no.3, 2019 , pp. 7-14 More about this Journal
Abstract
With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.
Keywords
File Sharing System; Document Security; Information Security; Security technology; Smart Device;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure, Journal of Korean Institute of Information Technology, 10(6), 133-143.
2 K. S. Sung, D. Y. Oh, J. J. Kim, W. S. Na & H. S. Oh. (2008). Study on the Efficiency System Design for Minimize the Information Leak of the E-Document Store Service, The Journal of The Korean Institute of Communication Sciences, 33(10), 350-358.
3 B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150.   DOI
4 S. U. Kang & Y. S. Choi. (2014). Design of Open Collaboration Solution's Server for Smart Work. Journal of the Institute of Electronics and Information Engineers, 51(7). 133-141.   DOI
5 J. S. Kim & K. S. Han. (2016). The key technology factors of Smart work and the situations in Korea and overseas. The Korea Contents Association Review 14(1), 14-20.   DOI
6 S. E. Yoo & S. Y. Lee. (2013). An Analysis on Types of Smart Workplace and its Planning Strategies. Journal of Korea Design Knowledge, 25, 279-288.   DOI
7 S. H. Lee, H. J. Jun & T. S. Kim. (2018). A Study on Cyber Security Risk Management for Diffusion of Korean Smart Factories. The Journal of Korean Institute of Communications and Information Sciences, 43(10). 1741-1750.   DOI
8 B. I. Kang & S. J. Kim. (2014). Study on Security Grade Classification of Financial Company Documents, Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1319-1328.   DOI
9 S. H. Paik, S. K. Kim & H. B. Park. (2010). Design and Implementation of Network Access Control for Security of Company Network, The Institute of Electronics Engineers of Korea - Telecommunications, 47(12), 90-96.
10 W. R. Jeon, J. Y. Kim, Y. S. Lee & D. H. Won. (2011). Analysis of Threats and Countermeasures on Mobile Smartphone, Journal of the Korea Society of Computer and Information, 16(2), 153-163.   DOI
11 Y. J. Lee, Y. H. Jang & S. C. Park (2016). Design and Implementation of App Control System for Improving the Security of the Mobile Application, Journal of The Korea Contents Association, 16(2), 243-250.   DOI
12 J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
13 C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
14 Google. (2018). Firebase Documentation. Firebase(Online). https://firebase.google.com/docs
15 Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online). https://cordova.apache.org/docs/en/latest