• Title/Summary/Keyword: 보안인식

Search Result 1,361, Processing Time 0.032 seconds

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Empirical Analyses of the Factors Influencing on the Intention to Use Smart Home Services (스마트 홈 서비스 이용의도에 대한 영향요인에 관한 실증적 분석)

  • Lee, Il-Gu;Kim, Sang-Hoon
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.55-76
    • /
    • 2019
  • This study conducted empirical analyses to investigate the factors affecting the intention to use smart home services. Based on the previous relevant studies, the characteristics of smart home service were found to influence on the intention to use smart home service, and four variables(ubiquitous connectivity, reliability, context awareness, and security) concerning the service characteristics could be derived. And referring to the technology acceptance model(TAM), the updated TAM, IS success model, and the theory of reasoned action(TRA), three variables such as perceived ease of use, perceived usefulness and subjective norm were also likely to affect the intention to use smart home service, and the user innovativeness was inferred to play a role of moderating variable. In order to examine the research model and the hypotheses which could describe the relationship of the above mentioned variables, this study surveyed 447 people who were currently using or would use the smart home services, and then tested the hypotheses for 436 valid responses. The results of hypotheses testing showed that reliability, context awareness, and security have a significant effect on perceived usefulness and on perceived ease of use. However, it was found that ubiquitous connectivity significantly affected perceived usefulness but did not affect perceived ease of use. And perceived ease of use, perceived usefulness and subjective norm had significant effect on the intention to use smart home services. Also, user innovativeness as moderating variable was found to significantly influence on the magnitude of the relationship between ubiquitous connectivity and perceived usefulness and on that between reliability and perceived ease of use. This can be interpreted as the findings implying that innovative smart home-service users are likely to feel the smart home-services more useful than ordinary users when the degree of ubiquitous connectivity is higher, and are likely to perceive the use of smart home-services to be easier than ordinary ones when the degree of reliability is higher.

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

A Study on Korea Coast Guard Intelligence Centered on legal and Institutional comparison to other organizations, domestic and international (해양경비안전본부 정보활동의 법적·제도적 측면의 문제점 분석 및 개선방안 연구)

  • Soon, Gil-Tae
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.85-116
    • /
    • 2015
  • Found in 23 Dec 1953 to cope with illegal fishing of foreign ships and coastal guard duty, Korea Coast Guard was re-organized as an office under Ministry of Public Safety since the outbreak of sinking of passenger ship "Sewolho". In the course of re-organization, intelligence and investigation duty were transferred to Police Department except "Cases happened on the sea". But the definition of intelligence duty is vague and there are lots of disputes over the jurisdiction and range of activities. With this situation in consideration, the object of this study is to analyse legal and institutional characteristic of KCG Intelligence, to compare them to that of Police Department, foreign agencies like Japan Coast Guard and US Coast Guard, to expose the limit and to suggest solution. To summarize the conclusion, firstly, in the legal side, there is no legal basis on intelligence in [The Government Organization Act], no regulation for mission, weak basis in application act. Secondly, in the institutional side, stated in the minor chapter of [The Government Organization Act], 'the cases happened on sea' is a quite vague definition, while guard, safety, maritime pollution duty falls under 'on the sea' category, intelligence fell to 'Cases happened on the sea' causing coast guard duty and intelligence have different range. In addition, reduced organization and it's manpower led to ineffective intelligence activities. In the case of Police Department, there is definite lines on 'administration concerning public security' in [The Government Organization Act], specified the range of intelligence activities as 'collect, make and distribute information concerning public security' which made the range of main duty and intelligence identical. Japanese and US coast guards also have intelligence branch and performing activities appropriate for the main missions of the organizations. To have superiority in the regional sea, neighboring countries Japan and China are strengthening on maritime power, China has launched new coast guard bureau, Japan has given the coast guard officers to have police authority in the regional islands, and to support the objectives, specialized intelligence is organized and under development. To secure maritime sovereignty and enhance mission capability in maritime safety duty, it is strongly recommended that the KCG intelligence should have concrete legal basis, strengthen the organization and mission, reinforce manpower, and ensure specialized training administrative system.

  • PDF

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

An Exploratory Study of REID Benefits for Apparel Retailing (의류소매업에서의 RFID 이점에 대한 탐색적 연구)

  • Kim, Hae-Jung;Kim, Eun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1697-1707
    • /
    • 2006
  • Relentless advances in information technology are constantly transforming market dynamics of the retail industry. RFID is an emerging innovative technology that can reduce labor costs, improve inventory control and increase sales by effective business processes. Apparel retailers need to recognize the benefits of RFID and identify critical success factors. By focusing on apparel retailers, this study attempts (1) to identify the reality of RFID associated with benefits; and (2) to prospect the implementation of RFID in apparel retailing. We conducted a focus group interview with selected six panels who were experts of retail industry in the United States to obtain data regarding RFID attributes. Content analysis was used to generate related excerpts and classify 31 attributes of RFID benefits from the meaningful 173 responses. For experience of RFID, retailers were familiar with RFID technology and expressed the belief that RFID basically would support an existing retail system for speed to markets. However, retailers addressed the level of experience with RFID technology that they were still in the early adoption stage among few innovative companies. The content analysis identified five dimensions of RFID benefits for apparel retailing: Visibility and Velocity, Revenue Enhancement, Customer Service, Security, and Employee Productivity. This result lends support to the belief that RFID has a significant potential to streamline supply chain management, store operation and customer service for apparel retailing. This study provides intellectual and managerial implications far practitioners and researchers by postulating the effective use of RFID in the apparel retail industry.

A Study on the Perception of Research Data Managers to Establish a Korea Research Data Commons System (국가연구데이터커먼즈 체계 수립을 위한 연구데이터 관리자들의 인식에 관한 연구)

  • Seong-Eun Park;Mikyoung Lee;Minhee Cho;Sa-Kwang Song;Dasol Kim;Hyung-Jun Yim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.465-486
    • /
    • 2024
  • The purpose of this study is to identify the current status of infrastructure and services for analyzing research data for research data managers at government-funded research institutions under the National Research Council for Science and Technology (NST) who will actually use the Korea Research Data Commons (KRDC), which is being developed by the Korea Institute of Science and Technology Information (KISTI) and to investigate the perceptions of research data managers related to the establishment of KRDC system. For the study, we conducted a survey targeting 24 government-funded research institutes, excluding KISTI, and interviewed research data managers from 9 of the 15 institutions surveyed who agreed to follow-up interviews. As a result of the survey, most institutions were providing related services, and their willingness to introduce an integrated analysis framework for the use of research data and provide a system for using externally released analysis software was also high. Meanwhile, when we investigated the external disclosure status of each institution's analysis services through follow-up interviews, only a minimal number of institutions were disclosing them to the outside world. The findings reveal that there is a demand to utilize analysis infrastructure and services when provided through the framework. However, it is difficult to disclose and share the analysis resources held by each organization. In order to establish the KRDC system, it is essential to share research sites' analysis infrastructure and services, and in addition, changes in the perception of research sites and institutional changes are necessary. Furthermore, there is a need to establish policies that consider the system's convenience, security, and compensation system raised in the follow-up interviews.

The Analysis of the Prevention against Virus Infection in Dental Hygienist at Medical Treatment (치과위생사의 진료실 감염방지에 대한 행태 분석)

  • Yoon, Mi-Suk;Choi, Mi-Suk
    • Journal of dental hygiene science
    • /
    • v.7 no.2
    • /
    • pp.101-106
    • /
    • 2007
  • This research was based on self-filling survey which 128 dental hygienists who work in dental clinic and dental hospital on May 2006 through July 2006. This survey was analyzed the prevention against virus infection in dental hygienist at medical treatment. As follows analyzed results The experience of get a hand pricked by an infected needle rate is 76.6 percent and the majority of the dental hygienist are sterilize by disinfectant after wash hand and draw blood. The most of dental hygienist are experienced the education of the prevention infection in student and they think that It is necessary to prevention infection in medical treatment. The proportion of use the glove and mask in medical treatment and disuse the glove after medical treatment and the mask when mask get damped is high but the rate of put on the goggle in medical treatment and use the glove in washing and re-treat is low irrespective of age, clinical career, work place. As a result of Independent-sample T Test, the Hygienist who have experience the education of the prevention against virus infection are more excellent work than in-experience group in medical treatment. So we can find that the experience of the education of the prevention infection is very significant to prevention infection in dental hygienist.

  • PDF