• Title/Summary/Keyword: 보호 기기

Search Result 1,006, Processing Time 0.026 seconds

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.135-161
    • /
    • 2014
  • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

The Present Situation and Challenges of the Russian Music Industry: Centered on the Digital Sound Sources (러시아 음악 산업 현황과 과제 - 디지털 음원을 중심으로 -)

  • Kwon, ki-bae;Kim, Se-il
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.395-424
    • /
    • 2018
  • The purpose of this paper is to examine the current situation and background of the Russian consumer music market, where digital music sources are making great strides in the noted recent years. In addition, music storage technology, media and change are considered together in this report. Moreover, Russia is the 12th largest music market in the world. The Russian music industry is following the recent trend of the global music industry, where the digital music market is growing rapidly on many different levels. The explosive growth of the digital sound sources in Russia's music industry is attributed to the explosive increase in available consumer downloads, streaming sound source service, and the increase in the number of digital sound sources using mobile technologies due to the development of the Internet. In particular, the sales of the available and accessible streaming sound sources are expected to grow explosively by the year 2020, which is expected to account for more than 85% of total digital music sales. In other words, the spread of smartphones and the resulting changes in the lifestyle of the Russians have created these changes for the global consumer of music. In other words, the time has come for anyone to easily access music and listen to music without a separate audio or digital player. And the fact that the Russian government's strong policy on the eradication of illegal copying of music is becoming an effective deterrent, as is also the factor that led to the increase of the share of the digital sound source to increase sales in Russia. Today, the Russian music industry is leading this change through the age and process of simply adapting to the digital age. Music is the most important element of cultural assets, and it is the beneficial content, which drives the overall growth of the digital economy. In addition, if the following five improvements(First, strengthen the consciousness of the Russian people about copyright protection; Second, utilizing the Big Data Internet resources in the digital music industry; Third, to improve the monopoly situation of digital music distributors; Fourth, distribution of fair music revenues; and Fifth, revitalization of a re-investment in the current Russian music industry) are effective and productive, Russia's role and position in the world music market is likely to expand.

A Study on the Major Issues and Legislative Considerations of CCTV Installation in an Operating Room (수술실 CCTV 설치의 쟁점과 입법방향에 관한 소고(小考))

  • Kim, Sungeun;Choe, A Reum;Bae, Kyounghee
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.2
    • /
    • pp.111-138
    • /
    • 2021
  • 'Unlicensed medical practice by a non-medical practitioner' often represented by surrogate surgery or so-called 'ghost surgery,' causes irreparable damage to life or body, and therefore calls for very strict and effective controls. The 'bill on installment of CCTVs in an operating room' to prevent unlicensed surrogate surgery has been discussed for a long time, but due to numerous issues and heated confrontations, it has been pending in the National Assembly. Nevertheless, it is expected that the bill will be discussed again in earnest in the National Assembly because surrogate surgery and factory-type cosmetic surgery, which has been performed mainly in the field of cosmetic surgery, has also been occurring in the field of therapeutic surgery. In general, an operating room is considered as being locked or closed, as well as disallowing implicit complicity among insiders. Hence, if the insiders conspire to commit or cover up an illegal act, or if a surgeon performs rapid cosmetic surgery and then leaves the recipient (or medical institution) so as to perform more operations for profit - even if it is legitimate practice - it may result in serious consequences in terms of the recovery of a patient. In this case, installation of CCTVs can be of great help in identifying an illegal act and assessing any occurrence of negligence. On the other hand, while the fundamental purpose of therapeutic surgery is to restore a patient's life or body - that is, lifesaving - installation of CCTVs may base the relationship between a surgeon and a patient on distrust and surveillance, so it may increase the number of requests for CCTV footage or lead to more disputes, as well as placing a burden on the surgeon when best results are not achieved for a patient. As a result, the surgeon may choose non-invasive treatment contrary to conscience instead of risky but necessary surgery, or he/she may have significant difficulty in determining the timing of surgery, which may limit the provision of effective surgical medical care. Then, in terms of the relationship between a surgeon and patient, and in the long run, there could be significant disadvantages for the public and patients if CCTV footage is allowed. In this paper, we review domestic and overseas cases and issues regarding installation of CCTVs in an operating room, and present various viewpoints and suggestions to promote legislation with minimized legal problems and side effects, thereby contributing to protection of the lives and health of the public, patients, and recipients of surgery.