• Title/Summary/Keyword: 디지털 인증

Search Result 651, Processing Time 0.035 seconds

Digital Watermark Generation Algorithm Embedding Hangul Text (한글 텍스트가 내장된 디지털 워터마크 생성 알고리즘)

  • Cho, Dae-Jea;Kim, Hyun-ki
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.485-490
    • /
    • 2003
  • In this paper, we propose the possibility of introducing chaotic sequences into digital watermarking systems as potential substitutes to commonly used pseudo noise sequences. Chaotic sequences have several good properties including the availability of a great number of them, the ease of their generation, as well as their sensitive dependence on their initial conditions. And the quantization does not destroy the good property. So this paper proposes a method that transforms Hangul text to chaotic sequence. And we presents how the Hangul text is expressed by an implied data and the implied data is regenerated into the original text. In this paper, we use this implied Hangul text for watermarking.

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.

Multiple Access Capability of Digital IoT Doorlock System for Smart Building (스마트빌딩용 디지털 IoT 도어락 시스템의 다중접속 능력)

  • Lee, Sun-Yui;Sun, Young-Ghyu;Sim, Issac;Hwang, Yu-Min;Yoon, Sung-Hoon;Cha, Jae-Sang;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.99-105
    • /
    • 2018
  • This paper proposes multiple access method for smart doorlock system using VLC(Visible Light Communication) with color grid modulation method. The proposed method is to connect multiple visible light signals using color grid modulation method in order to recognize and authenticate multiple users accessing doorlock. In order to enable visible light multiple access with existing infrastructure, the symbol energy interval of signal should be maximized. Thus, performance of system in VLC channel is measured by modulating symbols based on the proposed method. We confirm the actual channel test results of the modulated signal to implement doorlock system that recognizes the number of multiple access users.

A Study on the Practical Methodology of Engineering Education through the Making of Smart Mirror (스마트 거울의 제작을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Seo, Myeong-Deok;Kwon, Ji-Young;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.9-15
    • /
    • 2018
  • A digital signage is constructed using a speech recognition based API, and VRSM (Voice Recognition Smart Mirror) that obtains information such as weather, map, exercise information, schedule, and image by user's voice command so as to be different from other commercialized products is proposed. This course provides an effective method of engineering education through the process of being evaluated as the result of independent graduation certification system, and also it had been the opportunity to design and produce works for 3 semesters by 2 students one group in the majors. Through the comprehensive capstone design, it has experienced engineering approach and creative thinking opportunity. We have won the best academic prize by participating in the academic conferences of the institute about the interim result, and obtained the results of the prize contest in other academic conferences. The improvement in practical skills obtained through this process proved to be beneficial for self-confidence and job-seeking opportunities through actual employment.

Improvement of AACS Security Framework with Access Control to Personal Contents (개인 콘텐츠 접근제어 기능을 갖는 개선된 AACS 보안 Framework)

  • Kim, Dae-Youb
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.167-174
    • /
    • 2008
  • As both a digital camera and a digital camcorder are popularized in recent years, UCC created by general users is also popularized. Unfortunately, according to that, the lack of privacy is also increasing more and more. The UCC is saved on the recordable media(Media) like DVD and deposited personally as well as distributed through Internet portal service. If you use Internet portal service to put up your contents, you can partially prevent the violation of privacy using security technologies such as authentication and illegal copy protection offered by internet portal service providers. Media also has technologies to control illegal copy. However, it is difficult to protect your privacy if your Media having personal contents is stolen or lost. Therefore, it is necessary to develope an additional security mechanism to guarantee privacy protection when you use Media. In this paper, we describe AACS framework for Media Security and propose improved AACS framework to control the access to personal contents saved on Media.

A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System (IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델)

  • Seo, Ki-Taek;Kim, Tae-Hun;Kim, Jung-Je;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2010
  • The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.

A Comparative Study on the Curriculum of Graduate Schools of Archival Sciences in Korea and the Foreign Countries (국내외 기록관리학 대학원 교육과정에 관한 비교 연구)

  • Lee, Yun-Jung;Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.567-591
    • /
    • 2021
  • This study examined the curriculum of 23 graduate schools of archival sciences in the United States, Canada, the United Kingdom, and Australia and 25 graduate schools of archival sciences in Korea, and compared core knowledge categories. The average number of courses in Korea and other countries was similar, but each university in other countries set required courses, and few in Korea. As a result of comparison by knowledge category, all knowledge categories in North America were opened as individual courses, while the UK and Australia did not open knowledge categories of outreach, instruction, advocacy, and knowledge categories of professionalism separately. In Korea, the category of outreach, instruction, advocacy, the knowledge category of professionalism, and the knowledge category of information technology have not been established separately, while courses related to history and administration are subdivided. In order to reform the archival science education in Korea, the knowledge categories for archival professionals should be prepared and the guidelines and certification standards for the education should be established.

Architectural Product and Formwork Manufacture using 3D Printing - Applicability Verification Through Manufacturing Factor Prediction and Experimentation - (3D 프린팅을 통한 거푸집 제조 및 건축 상품 구현 - 제조인자예측과 실험을 통한 적용가능성 검증 -)

  • Park, Jinsu;Kim, kyung taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.1
    • /
    • pp.113-117
    • /
    • 2022
  • Additive manufacturing (AM, also known as 3D printing) technology is digitalized technology, making it easy to predict and manage quality and also, have design freedom ability. With these advantages, AM technology is applied to various industries. In particular, a method of manufacturing buildings and infrastructure with AM technology is being proposed to the construction industry. However, the application of AM technology is restricted due to problems such as insufficient history and quality of technology, lack of construction management methods, and certification of manufacturing products. Therefore, the manufacture of architectural products is implemented with indirect AM technology. In particular, it manufactures formwork using AM and injecting building materials to implement the architectural product. In this study, hybrid type material extrusion AM is used to manufacture large-sized formwork and implement building products. Moreover, we identify factors that can predict productivity and economic feasibility in the additive manufacturing process. As a result, design optimization results are proposed to reduce the production cost and time of architecture buildings.

A Study on the Establishment of Edutech-based Vocational Education and Training Model (에듀테크 기반 평생직업능력개발 선도사업 모델 수립방안 연구)

  • Rim, Kyung-hwa;Shin, Jung-min;Kim, Ju-ri
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.425-437
    • /
    • 2022
  • In this study, the role and function of Edutech, as well as the application and expectations in the field of future vocational competency development, were gathered to define Edutech as a comprehensive working definition. Based on this redefinition of Edutech, this study analyzes Edutech technology trends and examines the level of actual technology applied to education and vocational training based on written interviews with experts, and finds out significant implications from the point of view of vocational training. Finally we propose an Edutech-based Vocational Education and Training Model.

A Study on Mobile Robot for Posture Control of Flexible Structures Using PI Algorithm

  • Kang, Jin-Gu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.9-14
    • /
    • 2022
  • In this study, we propose a method for moving a device such as a flexible air sculpture while stably maintaining the user's desired posture. To accomplish this, a robot system with a structure of a mobile robot capable of running according to a given trajectory was studied by applying the PI algorithm and horizontal maintenance posture control using IMU. The air sculptures used in this study often use thin strings in a fixed posture. Another method is to put a load on the center of gravity to maintain the posture, and it is a system with flexibility because it uses air pressure. It is expected that these structures can achieve various results by combining flexible structures and mobile robots through the convergence process of digital sensor technology. In this study, posture control was performed by fusion of the driving technology of AGV(Automatic Guided Vehicle),, a field of robot, and technologies applying various sensors. For verification, the given performance evaluation was performed through an accredited certification test, and its validity was verified through an experiment.