• Title/Summary/Keyword: 실험 정보보호

Search Result 965, Processing Time 0.033 seconds

A Study on the layered structure and supplementation of the international commerce order (국제통상질서의 충화구조와 보완성에 관한 연구)

  • Ko, Yong-Bu
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.215-233
    • /
    • 2001
  • Nowadays, the international economic environment has been improved by the World Trade Organization based on UR trade negotiation. In such state, the international commerce cooperation, which means trade liberalization through relaxation or abolition of customs and noncustoms harrier, is necessary a country's policy for overseas strategy. To the view point of international commerce order, there co-exist the globalism represntatived by GATT/WTO and the regionalism operated by European Community including 15 countries, or North American Zone with canada, Maxico. The former expands the trade liberalization through the most favoured nation treatment of WTO among whole world nations and the latter takes the differential trade policy to other countries. For extreme dependence on foreign natural resources and raw materials, Our country should strengthen it' comming prospect for the world economy. To put it more concrete, We must enforce in advance the legal basis of convention and norm which in adopted by WTO. Also we are desirable to cooperate with Asia and pacific economy area or APEC. Finally, under the direction of international commerce environment and world economy, we must take the commerce cooperation in global order considering the tendency of regionalism and bloc economy.

  • PDF

Development of a Low frequency Operating Electronic Ballast for Fish Attracting Lamps (저주파 구동형 집어등용 전자식 안정기 개발)

  • Kil Gyung-suk;Kim Il-kwon;Song Jae-yong;Han Ju-seop;Shin Gwang-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1052-1058
    • /
    • 2005
  • This paper dealt with the design and fabrication of a low frequency electronic ballast for ruh attracting lamps. The proposed electronic ballast was composed of a full-wave rectifier, a step don converter operated as a constant power controled current source, an inverter operated by 130 Hz square wave, and an ignition circuit. An acoustic resonance phenomenon of discharge lamps could be eliminated by application of 130 Hz square wave. Also, a circuit of high voltage pulse generation for lamp ignition was added to the ballast. From the experimental results, voltage and current of the lamp operated by the electronic ballast were estimated 132.5 V and 7.6 A, respectively. and the power consumption was about 1,000 W. The weight of the ballast, which is one of important advantages, was reduced to one-fifth of conventional magnetic ballasts.

Development of a Surge Protective Device for Computer Network to International Standards (국제규격 대응 컴퓨터 네트워크용 서지방호장치 개발)

  • Park Dae-won;Song Jae-yong;Han Joo-sup;Kil Gyung-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1253-1259
    • /
    • 2005
  • This paper dealt with the development of surge protection devices (SPDs) that can protect high speed computer network devices from overvoltages caused by switching operations or lightning surges. The designed SPD is a form of hybrid circuit which is composed of a gas tube having large current diverting capability, high response bi-directional avalanche diodes, and fast recovery diodes to reduce insertion loss on high frequency domain. Surge protection and signal transmission characteristics of the fabricated SPD was tested according to the international standards, IEC 61000-4-5 and IEC 61643-21. From the test results, the SPD is satisfied with the international standards and the high cut-off frequency was 204 MHz. Also, the SPD showed a good performance without an insertion loss on a field test of 100 Mbps class Local Area Network.

A Wavelet Based Robust Logo Watermarking Algorithm for Digital Content Protection (디지털 콘텐트 보호를 위한 강인한 웨이블릿 기반 로고 워터마킹 알고리즘)

  • Kim, Tae-Jung;Hwang, Jae-Ho;Hong, Choong-Seon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.33-41
    • /
    • 2008
  • Due to the advantage of wavelet transform such as the compatibility with JPEG2000, multi-resolution decomposition, and application of HVS(Human Visual System), watermarking algorithm based on wavelet transform (DWT) is recently mast interesting research subject. However, mast of researches are focused on theoretical aspects for the robustness rather than practical usage, and. may be not suitable too much complicated to use in practice. In this paper, robust logo watermarking algorithm based on DWT is proposed for large and huge data processing. The proposed method embeds the logo watermark by mapping of $8{\times}8$ blocks in order of the number of '1' of the original image and the randomized watermark image with LFSR. The original image is transformed by 2 level wavelet. The experimental results shows that the watermark is embedded successfully, and the proposed algorithm has the valuable robustness from the image processing like JPEG compression, low pass filter, high pass filter and changes in brightness and contrast.

  • PDF

An Image Watermarking Method for Embedding Copyrighter's Audio Signal (저작권자의 음성 삽입을 위한 영상 워터마킹 방법)

  • Choi Jae-Seung;Kim Chung-Hwa;Koh Sung-Shik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.4
    • /
    • pp.202-209
    • /
    • 2005
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding owner's audio signal. Because this method uses an audio signal as a watermark to be embedded, it is very useful to claim the ownership aurally. And it has the advantage of restoring audio signal modified and especially removed by image removing attacks by applying our LBX(Linear Bit-expansion) interleaving. Three basic stages of our watermarking include: 1) Encode . analogue owner's audio signal by PCM and create new digital audio watermark, 2) Interleave an audio watermark by our LBX; and 3) Embed the interleaved audio watermark in the low frequency band on DTn (Discrete Haar Wavelet Transform) of image. The experimental results prove that this method is resistant to lossy JPEG compression as standard image compression and especially to cropping and rotation which remove a part of Image.

A Study on the Analysis and Countermeasures of Security Vulnerabilities in Drone (드론의 보안 취약점 분석 및 대응방안 연구)

  • Son, Chung-Ho;Sim, Jaebum;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.355-358
    • /
    • 2016
  • Recently, As the interest of the drone has increased the fields such as broadcasting, disaster site and leisure which uses the drone has been constantly expanded. However, an invasion of a person's privacy and a threat of hacking attack also have increased as population of drone. High-resolution cameras mounted on drones can take a photo or real-time video anytime and anywhere. It causes the invasion of privacy from private houses, buildings, and hotels. In this paper, we perform a security vulnerability assessment tests on the camera's from common commercial drones and we propose the countermeasures to protect the drones against unauthorized attacker who attempts to access the drone's camera from internal or external. Through this research, we expect the Aviation Act and legislation accept the concept of security and provide the polices such as drones equipped with security devices from the production stage to promote drone industry.

  • PDF

Development of Advanced Personal Identification System Using Iris Image and Speech Signal (홍채와 음성을 이용한 고도의 개인확인시스템)

  • Lee, Dae-Jong;Go, Hyoun-Joo;Kwak, Keun-Chang;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.348-354
    • /
    • 2003
  • This proposes a new algorithm for advanced personal identification system using iris pattern and speech signal. Since the proposed algorithm adopts a fusion scheme to take advantage of iris recognition and speaker identification, it shows robustness for noisy environments. For evaluating the performance of the proposed scheme, we compare it with the iris pattern recognition and speaker identification respectively. In the experiments, the proposed method showed more 56.7% improvements than the iris recognition method and more 10% improvements than the speaker identification method for high quality security level. Also, in noisy environments, the proposed method showed more 30% improvements than the iris recognition method and more 60% improvements than the speaker identification method for high quality security level.

Optical Security System Using Phase Mask and Interferometer (위상 카드와 간섭계를 이용한 광학적 보안 시스템)

  • Kim, Jong-Yun;Kim, Gi-Jeong;Park, Se-Jun;Kim, Cheol-Su;Bae, Jang-Geun;Kim, Jeong-U;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.37-43
    • /
    • 2001
  • In this paper, we propose a new optical security technique using two phase masks based on interferometer. A binary random phase image is used as a reference image and the encrypted image is generated according to the phase difference between the reference image and the original image. If there is no phase difference of a same pixel position in two phase masks, interference intensity of the pixel has minimum value and if phase difference of a same pixel position in two phase masks is $\pi$, its interference intensity has maximum value. We can decrypt the original image by putting two phase masks on each of the two optical paths of the Mach-Zehnder interferometer. Computer simulation and the optical experiments show a good performance of the proposed optical security system.

  • PDF

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

Digital Watermarking using ART2 Algorithm (ART2 알고리즘을 이용한 디지털 워터마킹)

  • 김철기;김광백
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.81-97
    • /
    • 2003
  • In this paper, we suggest a method of robust watermarking for protection of multimedia data using the wavelet transform and artificial neural network. for the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except fur the lowest subband LL$_3$, we apply a calculated threshold about chosen cluster as the biggest. We used binary logo watermarks to make sure that it is true or not on behalf of the Gaussian Random Vector. Besides, we tested a method of dual watermark insertion and extraction. For the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except for the lowest subband LL$_3$, we apply a above mentioned watermark insert method. In the experimental results, we found that it has a good quality and robust about many attacks.

  • PDF