• Title/Summary/Keyword: 개인 식별

Search Result 1,454, Processing Time 0.029 seconds

A Practical Approach Defeating Blackmailing XTR-version Identification protocol (XTR 버전의 개인식별 프로토콜을 이용해 블랙메일링을 막는 실질적인 방법)

  • 한동국;박혜영;박영호;김창한;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.55-66
    • /
    • 2002
  • Electronic cash system based on anonymous coins have been invented by David Chaum. However, von Solms and Naccache discovered that such anonymous coins also very well suited to support criminals in Blacoailing. In this paper, we suggest a method that a client informs a bank of the information about blackmailing attack by using Schnorr identification protocol of XTR version at the stage of identification, whenever he is blackmailed. In general, blackmailing is the most serious among the various drawbacks of electronic cash system. Especially, blackmiling to be done when the client is kidnapped brings a fatal result to electronic cash system. But if the Schnorr identification protocol of XTR version is used, we can efficiently defeat blackmailing without assumption required in the existing method to defeat blackmailing.

A study on Data Context-Based Risk Measurement Method for Pseudonymized Information Processing

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.53-63
    • /
    • 2022
  • Recently, as digital transformation due to the COVID-19 pandemic accelerates, data to improve individual quality of life is being used in large quantities, and more reinforced non-identification processing procedures are required to utilize the most valuable personal information among data. In Korea, procedures for de-identification measures are presented through amendments to laws and guidelines, but there is no methodology to measure the level of de-identification in the field due to ambiguous processing standards and subjective risk measurement methods. This paper compares and analyzes the current status of policy and guidelines related to de-identification measures proposed at home and abroad to derive complementary points, suggests a data context-based risk measurement method centered on pseudonymized information processing, and verifies its validity. As a result of verification through Delphi survey and focus group interview (FGI), it was confirmed that the need for the proposed methodology and the validity of the indicators were high.

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

Study of Multi-Resident Location Tracking Service Model Based on Context Information (상황정보 기반의 다중 거주자 위치 추적 서비스에 관한 연구)

  • Won, Jeong Chang;Man, Ko Kwang;Chong, Joo Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.141-150
    • /
    • 2014
  • In recent years, because of the development of ubiquitous technology in healthcare research is actively progress. Especially, healthcare service area is change to home for the elderly or patients from hospital. The technology to identify residents in a home is crucial for smart home application services. However, existing researches for resident identification have several problems. In this case, residents are needed to attach of various sensors on their body. Also relating private life, it is difficult to apply to resident's environment. In this paper, we used constraint-free sensor and unconscious sensor to solve these problems and we limited using of sensor and indoor environment in the way of working economical price systems. The way of multi-resident identification using only these limited sensors, we selected elements of personal identifications and suggested the methods in giving the weight to apply these elements to systems. And we designed the SABA mechanism to tract their location and identify the residents. It mechanism can distinguish residents through the sensors located each space and can finally identify them by using the records of their behaviors occurred before. And we applied the mechanism designed for applications to approve this location tracking system. We verified to the location tracking system performance according to the scenario.

A Study on Developing the Identification Code System for Korean Sci-Tech Journals for KSCI (KSCI 구축을 위한 국내 학술지 식별체계 연구)

  • 김선호;김태중
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.3
    • /
    • pp.57-77
    • /
    • 2003
  • The objective of the study is to develop the identification code of the Korean sci-tech journals for KSCI. To achieve the purpose, the study has researched and analyzed a variety of the major international and national serials or information objects identification code systems. And then, KOJIC(KOrean Journal Identification Code) has been developed. KOJIC is unique, unambiguous identifiers for titles of Korean journals in all subject areas. The concepts of KOJIC are simplicity, mnemonics, internationalization, and extensibility of its use. KOJIC is a six-character and alphanumeric code and has one check character.

  • PDF

YOLO-based Video Non-identification Tool Development (YOLO기반 영상 비식별화 도구 개발)

  • Shin, Hyeong-Hwan;Park, Sung-Wan;Park, Sang-Hyun;Oh, Chi-Min;Kim, Seungwon
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.875-877
    • /
    • 2021
  • 영상 매체의 발달과 영상 미디어의 쉬운 공유는 많은 이점을 가지고 왔다. 하지만 영상이 인터넷 상에서 쉽게 공유되면서 개인이 원치 않는 모습 및 정보가 자신도 모르게 공개되는 초상권 문제나 사생활 침해 문제가 발생하고 있다. 이를 막기 위해 영상의 인물을 비식별화 하고 있지만 수작업으로 진행되는 영상의 비식별화는 많은 시간과 비용이 들어간다. 이에 본 논문에서는 자동으로 영상의 인물을 탐지, 추적하여 비식별화 영상처리를 진행할 수 있는 YOLO 기반 비식별화 시스템을 제안한다.

Automatic Recognition Algorithm for Linearly Modulated Signals Under Non-coherent Asynchronous Condition (넌코히어런트 비동기하에서의 선형 변조신호 자동인식 알고리즘)

  • Sim, Kyuhong;Yoon, Wonsik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2409-2416
    • /
    • 2014
  • In this paper, an automatic recognition algorithm for linearly modulated signals like PSK, QAM under noncoherent asynchronous condition is proposed. Frequency, phase, and amplitude characteristics of digitally modulated signals are changed periodically. By using this characteristics, cyclic moments and higher order cumulants based features are utilized for the modulation recognition. Hierarchial decision tree method is used for high speed signal processing and totally 4 feature extraction parameters are used for modulation recognition. In the condition where the symbol number is 4,096, the recognition accuracy of the proposed algorithm is more than 95% at SNR 15dB. Also the proposed algorithm is effective to classify the signal which has carrier frequency and phase offset.

Change of Approval Rating of Candidates for 19th General Election affected by LBSNS Application based on Object Identification, ePosition (객체식별아이디 이포지션 기반의 LBSNS 앱이 19대 총선 후보 지지율의 변화에 미친 영향)

  • Lee, Sang-Zee;Jang, Dong-Heyok;Park, Sung-Woon;Cho, Won-Hee;Yi, Gi-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.171-179
    • /
    • 2013
  • During 19th general election the customized LBSNS(Location Based SNS) application for some candidates of the National Assembly planned and developed based on the object identification, ePosition, comprising the candidate's name have been applied for an election campaign. The approval rating change before and after 19th election campaign period for each candidate was quantitatively studied how it would be affected by the candidate custom LBSNS application. Only 3 out of 24 candidates in 6 local electorates in the Daejon Metropolitan City have adopted the customized LBSNS application and the rest 21 candidates have not, whose approval rating change before and after an election campaign has been analyzed comparatively candidate by candidate. The approval rating for 3 candidates adopting LBSNS application went up by 12.6%, 11.4%, 11.2% respectively, but those for the rest 21 candidates all changed within 3%.

User Authentication Method Using Smartphone and Smartwatch (스마트폰과 스마트워치를 활용한 사용자 인증 기법)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2109-2114
    • /
    • 2017
  • Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.

Personalization of Body Metric Data For Recommending Personal Goods (개인화된 신체치수 정보를 활용한 개인용품 추천 시스템)

  • Kyung, Jin-Hui;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.506-508
    • /
    • 2006
  • 대량의 물품이 생산되고 유통되는 현대 사회에서 개인에게 다양하고 편리한 서비스를 제공하기위해서 다방면에서 연구가 진행되고 있다. 상품을 구입 시에 사용자가 사용하는 스마트카드에 개인의 신체 치수 정보가 담겨있다면 그 사용자는 카드를 reader하는 기기에 접속하기만 하면 사용자가 필요로 하는 물품을 추천 받을 수 있을 것이다. 사람의 신체는 모든 부분을 식별할 수 있는 다양한 물리적 측정 기준을 가지고 있다. 이에 맞물려 스마트카드는 신체 식별정보 저장하기위한 적절한 저장장치이고, 관련된 컨텐츠와 자바 애플릿의 검색 및 업데이트가 용이하다는 장점이 있다. 이 논문의 연구 과제는 브라우저와 자바 임베디드 스마트카드사이의 접근 인터페이스를 설계하는 것이다.

  • PDF