• Title/Summary/Keyword: 사생활침해

Search Result 171, Processing Time 0.024 seconds

Analysis for Digital Evidences using the Features of Digital Pictures on Mobile Phone (디지털 사진 특성을 이용한 휴대전화 증거 분석 방안)

  • Shin, Weon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1450-1456
    • /
    • 2009
  • By the explosive growth of IT technologies, mobile phones have embedded a lot of functions and everyone can use them with facility. But there are various cybercrimes as invasions of one's privacy or thefts of company's sensitive information using a built-in digital camera function in a mobile phone. In this paper, we propose a scheme for analyzing evidences by digital pictures on mobile phones. Therefore we analyze the features of digital pictures on mobile phones and make databases of characteristic patterns based on the vendor and the model of mobile phone. The proposed scheme will help to acquire digital evidences by providing a better decision of the vendor and/or the model of mobile phone by cybercrime suspects.

  • PDF

Web Usage Mining Algorithm for Personalized Recommender System (개인화 된 추천정보 소기를 위한 Web Usage Mining 알고리즘)

  • Lee, Eun-Young;Kwak, Mi-Ra;Youm, Sun-Hee;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2000.11d
    • /
    • pp.827-829
    • /
    • 2000
  • 오늘날 인터넷 사용자들은 정보의 홍수 속에 놓여있다. 웹사이트에 들어가면 대부분은 자신과 관련 없는 정보들이 쏟아진다. 따라서 인터넷 사용자들의 관심에 맞는 내용을 제 공해주어 시간의 절약과 동시에 사용자에게 가치 있는 정보를 제공할 수 있게 하는 서비스가 필요하다. 이러한 개인화 된 서비스를 제공해주기 위해 사용자에 대한 정확한 분석을 바탕으로 사용자에게 효율적인 서비스를 제공하여야 할 것이다. 따라서 본 논문에서는 사용자 프로파일 및 웹 로그 등을 토대로 각 고객의 성향과 패턴을 정확하게 분석하여, 사용자 각 개인에게 적합하며 효율적인 서비스를 제공해 줄 수 있는 Web Usage Mining 을 통한 사용자 패턴 추출 알고리즘을 개발하고자 한다. 본 논문에서 연구한 Web Usage Mining 알고리즘은 사용자의 웹 사용 습관을 토대로 데이터 마이닝의 과정을 거쳐 사용자의 성향과 관심을 결정하고, 이를 바탕으로 사용자에게 알맞은 내용을 제공할 수 있도록 할 것이다. 이때, 사용자의 정보는 웹 내에서의 행동 중에서 중요하게 사용되는 특정한 페이지를 보는 시간, 웹 서핑 패턴, 전자 상거래 사이트의 경우에는 구매한 상품과 쇼핑 카트에 넣은 상품 등의 관찰된 정보를 기반으로 하며, 개인의 사생활을 침해하지 않는 범위 내에서 이루어지도록 했다.

  • PDF

Legal Institutional Considerations of UAV-based Convergence Services : Privacy Protection (UAV기반 융합서비스에 대한 법·제도적 고찰 - Privacy 보호를 중심으로 -)

  • Noh, Jong-ho;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2017
  • UAV (Unmanned Aerial Vehicle) is increasingly used in diverse fields such as disaster, distributi on, and logistics, but it is pointed out that the inadequacy of related laws and invasion of privacy is an obstacle to industrial growth. The regulatory framework for UAV convergence services is pr oposed based on the regulatory framework. From the technical point of view, regulation on archite ctural design, from the market point of view, concurrent operation of services in a limited area, a l egal evaluation based on post-evaluation rather than a pre-regulation under the legislation of visua l information protection law and a social consensus will contribute to the early settlement of UAV -based convergence services.

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

Content Centric Networking Naming Scheme for Efficient Data Sharing (효율적인 데이타 교환을 위한 Content-Centric Networking 식별자 방안)

  • Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1126-1132
    • /
    • 2012
  • To enhance network efficiency, CCN allow intermediate network nodes between a content consumer and a content publisher to temporarily cache transmitted contents. Then the network nodes immediately return back the cached contents to another consumers when the nodes receives relevant contents request messages from the consumers. For that, CCN utilizes hierarchical content names to forward a request message as well as a response message. However, such content names semantically contain much information about domain/user as well as content itself. So it is possible to invade users' privacy. In this paper, we first review both the problem of CCN name in the view point of privacy and proposed schemes. Then we propose an improved name management scheme for users' privacy preservation.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

Research of the Face Extract Algorithm from Road Side Images obtained by vehicle (차량에서 획득된 도로 주변 영상에서의 얼굴 추출 방안 연구)

  • Rhee, Soo-Ahm;Kim, Tae-Jung;Kim, Mun-Gi;Yun, Duck-Ken;Sung, Jung-Gon
    • Proceedings of the KSRS Conference
    • /
    • 2008.03a
    • /
    • pp.20-24
    • /
    • 2008
  • 차량에 부착된 CCD 카메라를 이용하여 취득된 도로 주변의 영상에 존재하는 사람의 얼굴을 추출하여 제거하는 처리를 할 경우, 사생활 침해의 문제 없이 사용자들에게 원하는 지역의 도로영상의 제공이 가능해진다. 이 실험의 목적은 차량에서 취득된 도로 주변의 칼라 영상에서 사람의 얼굴을 자동으로 추출하는 기술을 개발하는데에 있다. 도로 주변의 CCD영상에서의 얼굴 추출을 위해, HSI(색상, 채도, 명도) 칼라 모델과 YCrCb 칼라 모델을 사용하여 이들 모델에 임계값을 적용하여 피부색을 검출하였으며, 두 개의 모델을 사용한 결과 효과적인 피부색의 검출이 가능함을 확인할 수 있었다. 검출된 피부색 영역을 연결성과 밝기 차이를 이용하여 클러스터링을 실행하고 이렇게 나뉘어진 각각의 구역들에 구역의 면적, 구역내 존재하는 화소의 개수, 구역의 가로와 세로 비율 그리고 타원조건을 적용하여 얼굴 후보 구역을 결정하였다. 그리고 최종적으로 남겨진 구역을 이진화 하고, 이진화 된 영상 중 검은 부분이 5% 이상일 때 이들을 눈, 코, 입 등으로 간주하여 최종적인 얼굴로 결정하였다. 실험 결과 추출되지 않은 얼굴과 잘못 추출된 구역이 발생했으나, 얼굴에 해당하는 임계값등의 조건을 약화시킬 경우 대부분의 얼굴의 추출이 가능할 것으로 여겨지며, 추출된 구역을 흐리게 처리할 경우 오인식된 부분에 대한 사용자의 거부감도 줄일 수 있을 것 으로 예상된다.

  • PDF

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Exploratory Research of Possibilities and Limiatation of Drone Journalism (재난재해 대응수단으로 드론저널리즘의 가능성과 한계에 관한 탐색적 연구)

  • Cho, Hang-Min
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.71-79
    • /
    • 2018
  • This study discussed the meaning of a drone, and especially drone journalism and legal and ethical issues around that, at an introductory dimension, which is used in various social bases, but is still just an academic discussion at the beginning stage. As a methodology, content analysis was used. It seems that drone journalism has high diffusibility as a technology with high 'relative advantage', 'compatibility', 'trial ability' and 'observability' and low 'complexity' in terms of the diffusion of innovation theory. However, it will be very likely that controversies will be raised, such as safety issue due to collision and crash, a dispute over violation of privacy that may seriously infringe privacy like individual portrait rights and a controversy about the accuracy and source of information as drone filming low price and ease of use. Suggest solutions to legal and ethical issues based on existing research. Technical stability is required. Also, it is necessary to change the awareness of journalists about the drones coverage and to educate ethics, and it is necessary to establish social public opinion on issues such as privacy violation and establish system and legal measures through it. Future research is expected to carry out empirical research including journalists and public awareness surveys.