• Title/Summary/Keyword: 이미지 기반 인증

Search Result 77, Processing Time 0.029 seconds

A Study for Analyzing the Outcome of the Accreditation System of the Extracurriculum: Focused on the Case of K University (비교과 인증제 성과 분석 연구: K 대학의 사례를 중심으로)

  • Lee, Seongah;Yoon, Hyeajin;Lim, Sua
    • Journal of Christian Education in Korea
    • /
    • v.69
    • /
    • pp.193-220
    • /
    • 2022
  • Competency cannot be transformed as knowledge, so the operation of competency-based curriculum requires support from the extracurriculum that gives many opportunities practical experience. Therefore, many universities establish the own extracurricular courses by using much financial, human, and physical infrastructure. However, it is doubtful whether the extracurriculum is effective on cultivating competencies, what kinds of programs is useful to nurture right abilities, how to assess the outcome of implementing of the extracurriculum. For these reason, the accreditation system, that awards to student who accomplish certain programs based on the given standard, has been used as the tool to manage outcome achieved by the extracurriculum. This study aimed to investigate the outcome of the accreditation system of K university in order to verify its effectiveness for cultivating competencies through the extracurriculum. Through the analysis of prior research, it could be inferred that students who achieved the accreditation system would be able to cultivate relevant competencies, improve major abilities, and instill a positive image of related administrative departments while participating in various programs. Thus, this study collected data of those who achieved the accreditation and did not by participating at least once in extracurricular program from March 2020 to February 2021 to compare their results of the diagnosis of core competencies and student circumstances, and survey of educational satisfaction and interpreted interviews of 10 students, excellent certifier. As a result, it was verified that the more evenly participating in various programs to achieve the accreditation system, the more diverse competency was obtained, and the satisfaction with the student support department and major education was improved.

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.

Product Development for Color Vision Deficiency based on Internet (인터넷 기반 색약 보정 제품 개발)

  • Lee, Ho-Jun;Kim, Tae-Hoon;Choi, Sung-Tae;Kim, Cheon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.133-134
    • /
    • 2007
  • 본 논문은 색약자가 웹을 통한 멀티미디어 컨텐츠를 사용시 정상인이 인지하는 것과 동등한 정보를 인지 할 수 있도록 컴퓨터화된 색약 진단 및 보정이 통합된 시스템의 상용화 개발에 관한 것이다. 개발된 시스템은 인증 및 진단을 하는 CVDWeb 서버와 클라이언트에 다운 로드 되어 보정을 하는 WebAgent 로 구성되어 있어 사용이 쉽고, 서버의 부하를 최소로 줄일 수 있으며, 텍스트, 이미지 및 동영상의 실시간 처리 및 원색 보정이 가능하다.

  • PDF

A Rolling Image based Virtual Keyboard Resilient to Spyware on Smartphones (스마트폰 환경에서 스파이웨어에 저항하는 동적 이미지 기반 가상 키보드 기법)

  • Na, Sarang;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1219-1223
    • /
    • 2013
  • Due to the fundamental features of smartphones, such as openness and mobility, a great deal of malicious software including spyware can be installed more easily. Since spyware can steal user's sensitive information and invade privacy, it is necessary to provide proper security mechanisms like secure virtual keyboards. In this paper, we propose a novel password input system to resist spyware and show how effectively it can reduce the threats.

Partially Occluded Face Recognition in Video using Intensity Distortion (Intensity Distortion을 이용한 Partially Occluded 얼굴인식)

  • Ju, Myung-Ho;Kang, Hang-Bong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.683-684
    • /
    • 2006
  • 본 논문은 비디오기반의 얼굴인식에 있어서 환경의 변화나 왜곡, 노이즈 등으로 발생할 수 있는 부분적인 가림현상(Partial Occlusion)에 대한 처리기법을 제시한다. 인증되는 각 사람은 하나의 Manifold 를 구성하며 각 Manifold 는 m 개의 pose-Manifold 로 구성된다. Pose-Manifold 를 구성하기 위한 학습데이터는 매우 유사한 포즈들로 구성되기 때문에 얼굴을 이루는 영역의 픽셀에 대한 Intensity 의 변화는 크지 않다. 입력되는 이미지의 Intensity 를 학습데이터의 Intensity 의 변화량을 고려한 Intensity Distortion 을 이용하면 Occlusion 이 발생한 영역을 찾을 수 있고, Occlusion 이 발생한 정도에 따라 가중치를 부여할 수 있다. 이렇게 Occlusion 에 따라 영역에 중요도를 다르게 하여 얼굴인식률을 높이고자 한다. 실험에서는 제시하는 Mask 를 사용하지 않았을 경우와 기존에 제시된 알고리즘과의 성능을 비교한다.

  • PDF

Enhanced Security Network Storage System based L4 (L4 기반 네트워크 스토리지 보안 강화방법)

  • Park, Woo-Ram;Na, Yun-Ju;Ryu, Jun-Kil;Park, Chan-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.393-398
    • /
    • 2007
  • 데이터의 양이 급격히 커지면서, 그에 따라 요구되는 스토리지의 확장 비용 및 관리의 어려움을 해결하기 위하여 네트워크 스토리지에 대한 관심이 증대되고 있다. 네트워크 스토리지는 다수의 사용자가 접근하여 하기 때문에 보안에 대한 심각한 고려가 필요하다. 보안을 강화하기 위하여 페어 키를 이용한 인증 방식을 사용하고 있는데, 이러한 소프트웨어적인 보안 방식은 시스템 보안의 결함 혹은 취약성에 의하여 키의 외부 유출이 가능하다 [11]. 본 연구에서는 L4 마이크로커널[1]과 하드웨어적 보안 방식인 TPM (Trusted Platform Module)[2]을 사용하여 네트워크 스토리지 보안을 강화 시 방법을 제안하고자 한다. 본 연구를 이용할 경우 authenticated boot 기법[3]을 이용하여 네트워크 스토리지에서 동작할 이미지를 검증하고, 하드웨어적으로 암호화 키 값을 관리함으로써 데이터 패킷의 전송 과정에서 발생할 수 있는 소프트웨어적인 보안 방식의 취약점을 보완할 수 있다.

  • PDF

A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid (지능형 전력량계 SW의 안전한 배포 및 업그레이드를 위한 스마트카드 기반 보안 메커니즘에 대한 연구)

  • Yang, Inseok;Hong, Seokhie
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.129-142
    • /
    • 2014
  • Latest in Smart Grid projects are emerging as the biggest issue that smart meter should meet the security goal and the SW upgrade for compliance with future standard. However, unlike regular equipment, Smart meters should be designed in accordance with the regulation of legal metrology instrument in order to establish a fair trade-based business and unauthorized changes, it is not allowed and it is strictly limited by law. Therefore, this paper propose a new scheme of certification regarding type approval and verification for legal smart meter as analyzing the requirements of a smart meter regarding upgrade and security. This analysis shows that the proposed scheme comply with the regulation and the specification of smart meter by applying it to smart meter with smart card.

Watermarking of Gray Logo & Color Image based on Human Visual System (인간시각 시스템 기반의 그레이로고 & 컬러 이미지의 워터마킹)

  • NOH Jin Soo;SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.73-82
    • /
    • 2005
  • Recently, The wide range of the Internet applications and the related technology developments enabled the ease use of the digital multimedia contents (fixed images, movies, digital audios). However, due to the replay ability which the contents may be easily duplicated and not only the duplicates are capable of providing the same original quality. There are mainly the encipher techniques and the watermarking techniques which are studied and used as solutions for the above problem in order to protect the license holders' rights. To the protection of the IP(Intellectual Property) rights of the owner, digital watermarking is the technique that authenticates the legal copyrighter. This paper proposed the watermarking algorithms to watermark the 256 gray logo image and the color image by applying the wavelet transformation to the color stand-still images. The proposed algorithms conducted the watermark insertion at the LH frequency region among the wavelet transformation regions (LL, LH, HL, HH). The interleaving algorithms which applied in data communication was applied to the watermark. the amount of watermark increased which consequently caused the PSNR to decrease but this might provide the perseverance against the external attacks such as extraction, filtering, and crop.

Home Network Observation System Using Activate Pattern Analysis of User and Multimedia Streaming (사용자의 행동 패턴 분석과 멀티미디어 스트리밍 기술을 이용한 홈 네트워크 감시 시스템)

  • Oh Dong-Yeol;Oh Hae-Seok;Sung Kyung-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1258-1268
    • /
    • 2005
  • While the concept of Home Network is laying by and its interests are increasing by means of digitalizing of the information communication infrastructure, many efforts are in progress toward convenient lives. Moreover, as information household appliances which have a junction of connecting to the network are appearing over the past a few years, the demands against intellectual Home Services are increasing. In this paper, by being based upon Multimedia which is an essential factor for developing of various application services on ubiquitous computing environments, we suggest a simplified application model that could apply the information to the automated processing system after studying user's behavior patterns using authentication and access control for identity certification of users. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. And that made safe of user certification as adopting self-developed certification method which was used 'Hash' algorism through salt function of 12 byte. In order to show the usefulness of this proposed model, we did some testing by emulator for control of information after construction for Intellectual Multimedia Server, which ubiquitous network is available on as a scheme so as to check out developed applications. According to experimental results, it is very reasonable to believe that we could extend various multimedia applications in our daily lives.

  • PDF

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF