• Title/Summary/Keyword: 보안인식

Search Result 1,367, Processing Time 0.025 seconds

A Study on Median Filter using Directional Mask in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 방향성 마스크를 이용한 메디안 필터에 관한 연구)

  • Hong, Sang-Woo;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.230-236
    • /
    • 2015
  • In these digital times, the image signal processing is being used in various areas like vehicle recognition, security, and robotics. Generally, the image deterioration occurs by salt & pepper noise in the procedures of image transmission, storage, and processing. Methods to remove this noise are SMF, CWMF, and SWMF and these methods have few unsatisfactory noise reduction characteristics in salt & pepper noise environment. Therefore, in order to mitigate salt & pepper noise which is added in the image, this study suggested an algorithm which subdivides the masks in the image into four areas and processes using non-noise pixel numbers in each area. Additionally, in order to prove the excellence of the proposed algorithm, relevant performances were compared with existing methods using PSNR.

Effectiveness of Situational Crime Prevention Methods to Deter Shoplifting in the Private Security (상점절도 방지를 위한 상황적 경비기법의 효과성)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.7-30
    • /
    • 2011
  • Shoplifting causes serious losses to not only stores but also to consumers and society as a whole. There need to be effective society-wide measures to control shoplifting due to its characteristic of playing the role as a stepping stone to induce more serious crimes. However, there is a lack of research on shoplifting in Korea, especially the research analyzing situational factors to suggest effective alternative measures for shoplifting prevention. Therefore, the current study surveyed teenagers, the group known to be the most frequent shoplifters, to see their perception of effectiveness of the situational crime prevention methods used in stores. The result showed that the teenagers found only some of the prevention methods effective, including CCTV, Electronic Article Surveillance(EAS), minimization of blind areas, and watchful clerks. However, factors such as the number of doors and their accessibility and presence of security guards were not perceived to be very effective. Using the result of the survey, this study suggests ways to utilize situational crime prevention methods more effectively to deter shoplifting.

  • PDF

Landuse Mapping using KOMPSAT-2 Satellite Image in River Basin Flood Mitigation Planning (유역 홍수계획수립에서 KOMPSAT-2 영상을 이용한 토지이용도 제작)

  • Shin, Hyoung-Sub;Kim, Kyu-Ho;Jung, Sang-Hwa;Na, Sang-Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.635-635
    • /
    • 2012
  • 최근 공공분야 및 민간분야에서 고해상도 위성영상의 활용이 높아짐에 따라 이를 이용하여 수자원 분야의 치수계획 및 안전도 평가, 유역 홍수대응기술 분야에서의 다양한 활용이 비약적으로 증대되고 있는 실정이다. 고해상도 위성영상의 활용은 국지적 규모의 토지이용 변화 및 대기 상태의 모니터링을 위한 효과적인 기술로 인식되어 왔다. 우리나라의 KOMPSAT-2 위성은 GSD(Ground Sample Distance) 1m급의 전정색 영상과 4m급의 다중분광 영상을 동시에 제공하는 고해상도 위성이다. 그러나 다중분광센서의 복잡성과 보안성에 의해 영상이 제한적으로 제공되고 있어 KOMPSAT-2 위성영상을 이용한 다양한 연구가 미흡한 실정이다. 한편, 토지이용도의 제작은 다중분광 영상을 제공하는 위성영상을 이용하여 제작된다. 다중분광 영상이 제공하는 분광정보 및 공간정보 등으로 토지이용분류를 수행하거나 멀티센서 자료의 통합을 통한 토지이용분류 기법을 개발하여 제작하였다. 그러나 대부분 GSD 10m급 이상의 중 저해상도 위성영상을 이용하여 제작이 이루어져 수평위치 정확도 및 세부정보의 제공이 낮으며, 정보의 최신성이 결여되어 있다. 특히, 유역 치수안전도 평가를 위한 토지이용도 작성은 매우 중요한 부분을 차지하고 있으므로 이에 대한 연구가 필요하다. 이에 본 연구에서는 섬강유역을 대상으로 KOMPSAT-2 영상을 이용하여 유역 치수안전도 평가 및 치수계획 수립기술을 위한 토지이용도를 작성하고자 한다. 토지이용 분류방법은 감독분류와 무감독분류 방법을 조합하여 분류정확도를 개선시키는 하이브리드분류(hybrid classification) 방법을 이용하였으며, 분류기준의 선정은 환경부 토지이용분류 기준을 참고하여 1단위와 2단위 분류체계를 혼용하였다. 또한, 분류 후 후처리를 통하여 잡음을 제거하고 환경부의 토지이용도를 참조하여 육안판독으로 오분류된 지역을 보정하였다. 새롭게 작성된 토지이용도는 기존의 토지이용도와 비교 분석하여 토지이용변화 상황을 파악하고, 이를 통하여 KOMPSAT-2 영상의 토지이용도 개선 가능성을 검토하였다.

  • PDF

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

Internet of Things and Innovative Media Firms (사물인터넷과 미디어기업의 혁신)

  • Moon, Sanghyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.157-164
    • /
    • 2019
  • This research examines how IoT makes a significant contribution to the innovation of media firms. The media firms will be able to find new reveue sources and strengthen firms' competence through innovating product, process and business model. While IoT increases the experience of interactivity and immersion for consumption, it improves the way ads are exposed and its impact is measured, leading to revenue increase. For these benefits fulfilled, innovation friendly media eco-system must be established. It is the most critical that media firms should change skeptical attitude toward IoT's potential and actively invest it to employ IoT. The government should create regulatory framework to best utilize the innovative advantages of IoT.

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.

Efficient authenticate protocol for very Low-Cost RFID (저가형 RFID 시스템을 위한 효율적인 인증 프로토콜)

  • Choi Eun Young;Choi Dong Hee;Lim Jong In;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.59-71
    • /
    • 2005
  • A RFID (Radio Frequency Identification) system receives attention as the technology which can realize the ubiquitous computing environment. However, the feature of the RFID tags may bring about new threats to the security and privacy of individuals. Recently, Juels proposed the minimalist cryptography for very low-cost RFID tags, which is secure. but only under the impractical assumption such that an adversary is allowed to eavesdrop only the pre-defined number of sessions. In this paper, we propose a scheme to protect privacy for very low-cost RFID systems. The proposed protocol uses only bit-wise operations without my costly cryptographic function such as hashing, encryption which is secure which is secure against an adversary who is allowed to eavesdrop transmitted message in every session any impractical assumption. The proposed scheme also is more efficient since our scheme requires less datas as well as few number of computations than Juels's scheme.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

Impact of Fourth Industrial Revolution on Airport Management System: Moderator Effect of Convergence and Leadership (4차 산업혁명이 공항경영시스템에 미치는 영향 : 융합 및 리더십의 조절효과)

  • Lee, Yung-Kil;Baek, Jeong-Sun;Park, Sung-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.289-303
    • /
    • 2022
  • The purpose of this study verify to influence the effect of the 4th industrial revolution recognized by airport operators on the airport management system and the moderator effects of convergence and leadership between these influence relationships. Data collected through a survey of airport operators using simple random sampling at six international airports in Korea. Data analysis performed using Structural Equation Modeling. The research results found that the 4th industrial revolution had a positive effect on the airport management system. Also, moderator effects of convergence and leadership found significant statistically. In this paper, we asserts that it should be reconstructed the airport management system as a system suitable for the era of the 4th industrial revolution. This paper provide theoretical data and directions for empirical research to airport researchers, and implications for airport enterprise managers and airport policy planners. The findings of this study are particularly helpful for international airports that have adopted the technologies of the Fourth Industrial Revolution.