• Title/Summary/Keyword: 블록 기반의 융합기법

Search Result 63, Processing Time 0.025 seconds

Efficient AIOT Information Link Processing in Cloud Edge Environment Using Blockchain-Based Time Series Information (블록체인 기반의 시계열 정보를 이용한 클라우드 엣지 환경의 효율적인 AIoT 정보 연계 처리 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.9-15
    • /
    • 2021
  • With the recent development of 5G and artificial intelligence technologies, it is interested in AIOT technology to collect, process, and analyze information in cloud edge environments. AIIoT technology is being applied to various smart environments, but research is needed to perform fast response processing through accurate analysis of collected information. In this paper, we propose a technique to minimize bandwidth and processing time by blocking the connection processing between AIOT information through fast processing and accurate analysis/forecasting of information collected in the smart environment. The proposed technique generates seeds for data indexes on AIOT devices by multipointing information collected by blockchain, and blocks them along with collection information to deliver them to the data center. At this time, we deploy Deep Neural Network (DNN) models between cloud and AIOT devices to reduce network overhead. Furthermore, server/data centers have improved the accuracy of inaccurate AIIoT information through the analysis and predicted results delivered to minimize latency. Furthermore, the proposed technique minimizes data latency by allowing it to be partitioned into a layered multilayer network because it groups it into blockchain by applying weights to AIOT information.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

Face Texture Generation using Geometric Characteristics of Ellipsoid Prototype Model (타원체형 모텔의 기하학적인 특성을 이용한 얼굴 텍스쳐 생성)

  • 노명우;이중재;김계영;최형일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.346-348
    • /
    • 2003
  • 본 논문에서는 얼굴 형태와 유사한 타원체형 모텔의 가변적 블록크기를 기반으로 하는 영상정렬 알고리즘을 제안한다. 실린더형 모델을 사용한 기존의 방법은 블록정합 수행 시 좌우 곡률을 고려하므로 좌우영상은 정확히 정렬하지만 상하 부분은 사람의 두상모양이나 턱 구조와 다르기 때문에 상하 영상을 정렬할 때 오류가 발생한다. 본 논문에서 제안하는 알고리즘은 얼굴 모델의 상하좌우의 곡률에 따라 가변적인 블록크기론 사용하고 영상의 상관관계를 이용하여 정확한 정렬을 할 수 있도록 한다. 그리고 얼굴 텍스쳐영상을 생성하기 위하여 영상 모자익 기법을 사용하며 영상들이 서로 잘 융합하도록 크로스디졸브(Cross dissolve) 기법을 적용하여 영상을 스티칭한다.

  • PDF

A Study of Privacy Protection for Users of Electronic Money Using Blockchain Technology (블록체인 기법을 사용하는 전자화폐 사용자의 프라이버시 보호에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.571-572
    • /
    • 2017
  • The blockchain technology that implements electronic money uses decentralized computing and all transactions in a blockchain are open to everyone. This technique seems to guarantee anonymity by performing the transaction on the address instead of the user, but by using direction acyclic graph based on the transaction graph, the privacy problem is caused by tracking the addresses. In this paper, we analyze various techniques for centralized processing which makes it difficult to find the relevance on the graph in order to protect the privacy in the block chain technology. We also analyze the techniques of anonymizing in a distributed way to enhance privacy. Using the zero knowledge proof scheme guarantees full distributed anonymity but requires more computation and storage space, and various techniques to make this efficient are proposed. In this paper, we propose a privacy protection scheme of blockchain technology to integrate existing privacy protection techniques into a blockchain technology and perform it more efficiently with a centralized or decentralized technique.

  • PDF

Improved Intraframe Coding Method based on H.263 Annex I (H.263 Annex I 기반 화면내 부호화 기법의 성능개선)

  • 유국열
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.213-216
    • /
    • 2001
  • The H.263 Annex I method for the intraframe coding is based on the prediction in DCT domain, unlike JPEG, MPEG-1, and MPEG-2 where the intraframe coding uses block DCT, independent of the neighboring blocks. In this paper, we show the ineffectiveness of H.263 Annex I prediction method by mathematically deriving the spatial domain meaning of H.263 Annex I prediction method. Based on the derivation, we propose a prediction method which is based on the spatial correlation property of image signals. From the experiment and derivation, we verified the proposed method.

  • PDF

Data Volume based Trust Metric for Blockchain Networks (블록체인 망을 위한 데이터 볼륨 기반 신뢰 메트릭)

  • Jeon, Seung Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.65-70
    • /
    • 2020
  • With the appearance of Bitcoin that builds peer-to-peer networks for transaction of digital content and issuance of cryptocurrency, lots of blockchain networks have been developed to improve transaction performance. Recently, Joseph Lubin discussed Decentralization Transaction per Second (DTPS) against alleviating the value of biased TPS. However, this Lubin's trust model did not enough consider a security issue in scalability trilemma. Accordingly, we proposed a trust metric based on blockchain size, stale block rate, and average block size, using a sigmoid function and convex optimization. Via numerical analysis, we presented the optimal blockchain size of popular blockchain networks and then compared the proposed trust metric with the Lubin's trust model. Besides, Bitcoin based blockchain networks such as Litecoin were superior to Ethereum for trust satisfaction and data volume.

A Study on Face Masks Distribution System based on the Blockchain Decentralized Identity (블록체인 분산신원증명에 기반한 공적마스크 중복구매 확인 시스템에 대한 연구)

  • Noh, Siwan;Jang, Seolah;Rhee, Kyune-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.214-217
    • /
    • 2020
  • 2020년 1월 국내에 신종 코로나 바이러스의 확산으로 인해 보건 마스크의 수요가 급증하고 이에 따라 마스크의 가격이 폭등하자 정부가 건강보험정보를 기반으로 보건용 마스크 판매에 관여하는 공적 마스크 5부제를 시행해 왔다. 하지만 건강보험 가입정보에 의존적인 신원 인증 시스템으로 인해 유학생 등 건강보험 미가입자의 경우 마스크의 구입이 어렵고 개인정보 접근 문제 등으로 판매채널의 확장이 어려운 문제가 있었다. 본 논문에서는 건강보험과 같은 특정 신원정보 시스템에 의존하지 않고 중앙기관이 발행하는 신뢰할 수 있는 모든 신원정보(여권, 외국인등록증 등)에 기반하여 사용자가 스스로 자신의 신원정보 속성을 블록체인을 통해 관리하는 방법을 제안한다. 또한 제안 방법에 대해 디지털신원 기법을 평가할 수 있는 지표를 기반으로 자체 평가를 수행한다.

Research on Efficient Data Verification Methods Using Hyperledger Fabric (하이퍼레저 패브릭 활용 효율적 데이터 검증방안 연구)

  • Chai Bong-Soo;Baek Seunghyun;Kim Taeyoon;Lee Hanjin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.331-334
    • /
    • 2024
  • 하이퍼레저 패브릭(Hyperledger Fabric)은 참여자의 신원을 확인하고, 정보교환(트랜잭션)의 유효성을 검증하는 허가형 블록체인 모델이다. 기존의 대표적인 블록체인 모델인 비트코인, 이더리움과 대비하여 효율적인 데이터 검증 방안이 가능한대, 체인코드와 채널, 그리고 피어를 중심으로 구성되어 있기 때문이다. 먼저 본 블록체인 모델은 '체인코드'라는 스마트 계약(컨트랙트)를 실행하며 허가된 사용자만 네트워크에 참여할 수 있다. 또한, '채널' 기능이 있어 서로 다른 조직 간의 데이터 공유와 검증에 대한 새로운 접근방식을 보여줄 수 있으며, 특정 네트워크 내에서 데이터를 분리할 수 있다. 이를 통해 특정 데이터에 대한 접근권한을 제어하는 기능을 제공하며 동시에 데이터의 신뢰성과 보안성을 높일 수 있다. 마지막으로 '피어'는 체인코드를 통해 들어온 트랜잭션을 검증하고, 유효한 데이터만 원장에 추가하는 기법으로 무결성을 유지하는 데 중요한 역할 담당하고 있다. 본 연구결과를 기반으로 하이퍼레저 패브릭을 효과적으로 활용하여 데이터 검증 프로세스가 산업계에 널리 적용될 수 있기를 기대한다.

  • PDF

CCTV Video Privacy Protection Scheme Based on Edge Blockchain (엣지 블록체인 기반의 CCTV 영상 프라이버시 보호 기법)

  • Lee, Donghyeok;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.10
    • /
    • pp.101-113
    • /
    • 2019
  • Recently, the intelligent video surveillance technology has become able to provide various services such as predictive surveillance that have not been provided previously. Securing the security of the intelligent video surveillance is essential, and malicious manipulation of the original CCTV video data can lead to serious social problems. Therefore, in this paper, we proposed an intelligent video surveillance environment based on blockchain. The proposed scheme guarantees the integrity of the CCTV image data and protects the ROI privacy through the edge blockchain, so there is no privacy exposure of the object. In addition, it is effective because it is possible to increase the transmission efficiency and reduce storage by enabling video deduplication.

The Fractal Image Compression Based on the Wavelet Transform Using the SAS Techniques (SAS 기법을 이용한 웨이브릿 변환 기반 프랙탈 영상 압축)

  • 정태일;강경원;문광석;권기룡;류권열
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.1
    • /
    • pp.19-27
    • /
    • 2001
  • The conventional fractal image compression based on wavelet transform has the disadvantage that the encoding takes many time, since it finds the optimum domain for all the range blocks. In this paper, we propose the fractal image compression based on wavelet transform using the SAS(Self Affine System) techniques. It consists of the range and domain blocks in the wavelet transform, and the range blocks select the domain which is located the relatively same position. In the encoding process, the proposed methods introduce SAS techniques that the searching process of the domains blocks is not required. Therefore, it can perform a fast encoding by reducing the computational complexity. And, the image quality is improved using the different scale factors for each level and the sub-tree in the decoding. As a result, the image quality and the compression ratio are adjustable by the scale factors.

  • PDF