• Title/Summary/Keyword: 도난시

Search Result 92, Processing Time 0.025 seconds

Generation of Changeable Face Template by Combining Independent Component Analysis Coefficients (독립성분 분석 계수의 합성에 의한 가변 얼굴 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chel-Han;Choi, Jeung-Yoon;Kim, Jai--Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.16-23
    • /
    • 2007
  • Changeable biometrics has been developed as a solution to problem of enhancing security and privacy. The idea is to transform a biometric signal or feature into a new one for the purposes of enrollment and matching. In this paper, we propose a changeable biometric system that can be applied to appearance based face recognition system. In the first step when using feature extraction, ICA(Independent Component Analysis) coefficient vectors extracted from an input face image are replaced randomly using their mean and variation. The transformed vectors by replacement are scrambled randomly and a new transformed face coefficient vector (transformed template) is generated by combination of the two transformed vectors. When this transformed template is compromised, it is replaced with new random numbers and a new scrambling rule. Because e transformed template is generated by e addition of two vectors, e original ICA coefficients could not be easily recovered from the transformed coefficients.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment (원격 저장소 환경에서 다중 키워드를 이용한 효율적인 검색 가능한 대칭키 암호 시스템)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.199-206
    • /
    • 2011
  • Removable Storage provides the excellent portability with light weight and small size which fits in one's hand, many users have recently turned attention to the high-capacity products. However, due to the easy of portability for Removable Storage, Removable Storage are frequently lost and stolen and then many problems have been occurred such as the leaking of private information to the public. The advent of remote storage services where data is stored throughout the network, has allowed an increasing number of users to access data. The main data of many users is stored together on remote storage, but this has the problem of disclosure by an unethical administrator or attacker. To solve this problem, the encryption of data stored on the server has become necessary, and a searchable encryption system is needed for efficient retrieval of encrypted data. However, the existing searchable encryption system has the problem of low efficiency of document insert/delete operations and multi-keyword search. In this paper, an efficient searchable encryption system is proposed.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

Position Tracking Method in Construction field using IT Technology (IT기술을 이용한 건설현장 내 위치관제 기법)

  • Kim, Hyun-soo;Do, Seoung-bok;Choi, Hyun-young;Jang, Young-gu;Jeon, Heung-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.475-478
    • /
    • 2014
  • This paper proposed the position tracking and recognition method of workers and cars in construction field. The reason why the position of workers and cars has to be tracked is to prevent the safety accident, emergency rescue, and theft of building materials by unauthorized people and car, etc. To realize the tracking, it needs to adopt the Information Telecommunication technology to the construction field as an integrated support system. In this paper, we proposed the continuous positioning tracking algorithm for workers and moving cars using the selected wireless communication network. And we proposed the virtual gateway method to detect the entrance status of moving workers and cars. All of these proposed methods are evaluated in real construction field using the prototype of support system made by ourselves.

  • PDF

Implementation of Illegal Entry Detection System using Sensor Node and Image Processing (센서 노드와 영상처리 기법을 이용한 불법 침입 감지 시스템 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, we design and implement an illegal entry detection system which efficiently can detect illegal intruders applying image processing technique on the perceived value of the infrared sensor and acquired image from two-way wireless camera(DRC) for prevention of damage caused by theft and the ratio of security in the security of the square such as livestock, agricultural products, and logistics warehouse. At first, the proposed system acquires the image from wireless camera when infrared sensor detect the location of illegal intruders. and then, the system process to determine movement by applying image process technique with acquired image. Finally, we send the detected and analyzed the results and the final image to security company and mobile device of owner.

  • PDF

Implementation of Vehicle Location Identification and Image Verification System in Port (항만내 차량 위치인식 및 영상 확인 시스템 구현)

  • Lee, Ki-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2009
  • As the ubiquitous environment is created, the latest ports introduce U-Port services in managing ports generally and embody container's location identification system, port terminal management system, and advanced information exchange system etc. In particular, the location identification system for freight cars and containers provide in real time the information on the location and condition for them, and enables them to cope with an efficient vehicle operation management and its related problems immediately. However, such a system is insufficient in effectively handling with the troubles in a large-scale port including freight car's disorderly driving, parking, stop, theft, damage, accident, trespassing and controlling. In order to solve these problems, this study structures the vehicle positioning system and the image verification system unsing high resolution image compression and AVE/H.264 store and transmission technology, able to mark and identify the vehicle location on the digital map while a freight car has stayed in a port since the entry of an automatic gate, or able to identify the place of accident through image remotely.

Presbyopic Addition of Using Method of Cross Cylinder (크로스실린더 검사법을 이용한 노안의 근용 가입도)

  • Ryu, Geun-Chang
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.12 no.3
    • /
    • pp.71-75
    • /
    • 2007
  • This research was conducted from 1 March 2005 to 28 February 2007. We collected data from optician stores around Kwang-Ju city, 208 people aged 40 to 80 years using the cross cylinder method to find out age and gender dependence of near addition. 1. Age dependence of Refractive error shows 5% of emmetropia 34% of myopia and 43% of hyperopia. These results reveal that rate of hyperopia is higher than emmetropia and myopia. Mixed Astigmatism rate was 18%. 2. Near addition required to correct Presbyopia is analyzed as functions of gender and ages. In case of man: 40-44 (+0.75D), 45-49(+1.25D), 50-54(+1.41D), 55-59(+1.92D), 60-64(+2.35D), 65-69(+1.97D), 70(+3.12D), In case of woman: 40-44 (+1.08D), 45-49 (+1.38D), 50-54 (+1.67D), 55-59(+2.05D), 60-64 (+2.50D), 65-69 (+2.57D), $70{\leq}(+3.18D)$. Result shows it's Adding power higher than man. 3. Age dependence of Axis of Astigmatism. In case of horizontal astigmatism 61.2%, vertical 2.8% and rest else for 36%. Setting point from Binocular vision tells that average adding power of 40-44 (+0.75D) or (+1.00D), 45-49 (+1.25D) or (+1.50D), 50-54 (+1.50D), 55-59 (+2.00D), 60-64 (+2.50D), 65-69 (+2.50D) or (+2.75D), over $70{\leq}(+3.00D)$ or (+3.25D) of average adding power.

  • PDF

A Study for the Change and Distribution of Far Sighted and Near Sighted Astigmatism Power according to Age (연령에 따른 원·근거리 난시의 굴절력 변화에 대한 연구)

  • Joo, Seok-Hee;Park, Seong-Jong
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.12 no.2
    • /
    • pp.25-36
    • /
    • 2007
  • We researched the change of astigmatism power when the fixation point moved from far distance to near distance. Astigmatism power was measured by using both eyes open-view auto-refractometer. We divided the ages between 5 and 67 years old into 12 groups with 1,598 healthy eyes(male-698 eyes and female-900 eyes) without eyes problems and experiences of eyes operations. The mean power in far astigmatism showed that with-the-rule of the total astigmatism: -0.79D, with-the-rule of the corneal astigmatism: -1.07D and against-the-rule of the residual astigmatism : -0.79D were found most respectively. The correlation between cornea astigmatism and total astigmatism was y=0.7493 x + 0.5661 r=0.6510, residual astigmatism and total astigmatism was y=0.248 x - 0.5926 r=0.2598 and corneal astigmatism and residual astigmatism was y=-0.4439 x - 0.1813 r=-0.5551 in the far distance. The mean power in near astigmatism showed that with-the-rule of total astigmatism : -0.92D, with-the-rule of corneal astigmatism : -1.12D, against-the-rule of residual astigmatism : -0.87D were found most respectively. In the near distance, The correlation between corneal astigmatism and total astigmatism was y=0.6872 x + 0.5934 r=0.6204, residual astigmatism and total astigmatism was y=0.303 x - 0.6066 r=0.3165, corneal astigmatism and residual astigmatism was y=-0.46 x - 0.0626 r=-0.5322. When the fixation point moved far distance to near distance, the differences of power according to the type of astigmatism were total astigmatism: $-0.07D{\pm}0.44D$, corneal astigmatism: $-0.04D{\pm}0.54D$ residual astigmatism:$0.01D{\pm}0.53D$. Most of astigmatism refractive power was increased except for oblique-the -astigmatism. When the fixation point moved far distance to near distance, the change of astigmatism refractive power showed total astigmatism: 540 eyes(33.7%), corneal astigmatism: 638 eyes(39.9%), residual: 841 eyes(52.6%).

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF