• Title/Summary/Keyword: 인증기법

Search Result 1,460, Processing Time 0.028 seconds

Person Identification based on Clothing Feature (의상 특징 기반의 동일인 식별)

  • Choi, Yoo-Joo;Park, Sun-Mi;Cho, We-Duke;Kim, Ku-Jin
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • With the widespread use of vision-based surveillance systems, the capability for person identification is now an essential component. However, the CCTV cameras used in surveillance systems tend to produce relatively low-resolution images, making it difficult to use face recognition techniques for person identification. Therefore, an algorithm is proposed for person identification in CCTV camera images based on the clothing. Whenever a person is authenticated at the main entrance of a building, the clothing feature of that person is extracted and added to the database. Using a given image, the clothing area is detected using background subtraction and skin color detection techniques. The clothing feature vector is then composed of textural and color features of the clothing region, where the textural feature is extracted based on a local edge histogram, while the color feature is extracted using octree-based quantization of a color map. When given a query image, the person can then be identified by finding the most similar clothing feature from the database, where the Euclidean distance is used as the similarity measure. Experimental results show an 80% success rate for person identification with the proposed algorithm, and only a 43% success rate when using face recognition.

Comparison of The Importance of Evaluation Items for Landscape Performance and Sustainability Using Analytic Network Process (ANP) (ANP기법을 이용한 조경성능 및 친환경 평가항목 중요도 비교)

  • Ryu, Myeung-Ji;Lee, Hyung-Sook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.6
    • /
    • pp.45-52
    • /
    • 2019
  • As international criteria and standards are required in the fields of design and construction, landscape performance must also be considered not only for the value of the landscape but also for providing quality assurance and sustainability. Given the lack of research on landscape performance, the present research was purposed to analyze the importance of potential assessment categories and items using an analytical network process. A list of assessment items, which is composed of 20 items and 6 categories, was derived through a literature review and a preliminary survey of 11 landscape professionals. An ANP model was established and a survey was conducted among 30 landscape practitioners to determine the weight of priorities considering the criteria. The results of ANP showed that the categories of site selection, preservation and health, and convenience had high priorities while materials had the lowest importance score. For the assessment items, a monitoring plan was the highest importance, followed by cultural/ historic preservation, management cost reduction, and natural ground areas. Despite the difficulties in quantifying landscape achievements, most respondents agreed that there needs to be an evaluation system for landscape performance in order to assure the quality and sustainability of landscape development. More research and discussion are needed to develop an assessment system for landscape performance that is applicable to Korean context.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Functional Requirements to Develop the Marine Navigation Supporting System for Northern Sea Route (북극해 안전운항 지원시스템 구축을 위한 기능적 요구조건 도출)

  • Hong, Sung Chul;Kim, Sun Hwa;Yang, Chan Su
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • International attention on the Northern Sea Route has been increased as the decreased sea-ice extents in Northern Sea raise the possibility to develop new sea routes and natural resources. However, to protect ships' safety and pristine environments in polar waters, International Maritime Organization(IMO) has been developing the Polar Code to regulate polar shipping. The marine navigation supporting system is essential for ships traveling long distance in the Northern Sea as they are affected by ocean weather and sea-ice. Therefore, to cope with the IMO Polar Code, this research proposes the functional requirements to develop the marine navigation supporting system for the Northern Sea Route. The functional requirements derived from the IMO Polar code consist of arctic voyage risk map, arctic voyage planning and MSI(Marine Safety Information) methods, based on which the navigation supporting system is able to provide dynamic and safe-economical sea route service using the sea-ice observation and prediction technologies. Also, a requirement of the system application is derived to apply the marine navigation supporting system for authorizing ships operating in the Northern Sea. To reflect the proposed system in the Polar Code, continual international exchange and policy proposals are necessary along with the development of sea-ice observation and prediction technologies.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Carbon Footprint Analysis of Mineral Paper using LCA Method (전과정 평가기법을 활용한 미네랄 페이퍼의 탄소발자국 연구)

  • Kim, Byoung Jik;Kang, Seong Min;Lee, Jeongwoo;Sa, Jae Hwan;Kim, Ik;Jeon, Eui Chan
    • Journal of Climate Change Research
    • /
    • v.4 no.3
    • /
    • pp.201-210
    • /
    • 2013
  • In recent years, with the rising interest to reduce greenhouse gas emissions, the demand for using environmentally friendly product with low greenhouse gas emission is increasing in the printing industry as well. In this study, the carbon footprint of environmentally friendly product mineral paper that uses less plastic and wood than normal printing paper materials was analyzed by utilizing the life cycle assessment (LCA) technique. An analysis utilizing the LCA technique was done per the Korea carbon footprint certification guidelines and, for scope of study, it included the premanufacturing stage and manufacturing stage except for the use and disposal stages. As a result of the study, the emission coefficient of the mineral paper was calculated to be $0.81kg\;CO_2eq/kg$ and the emission from electricity usage of the entire greenhouse gas emission was calculated to be 45.85% ($0.37kg\;CO_2eq/kg$). In order to reduce greenhouse gas emission, required are the efforts to reduce the environmental loads by using energies that have relatively lower environmental loads, such as improvement in electricity usage efficiency and renewable energy, by increasing product completion rates during the manufacturing process of mineral paper.

Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP (공용 블록체인 지갑을 위한 OTP 기반 계정 복구 문자열 관리 체계)

  • Song, Seounghan;Kim, Suntae;Shin, Jung-Hoon;Lee, Jeong-Hyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The growing use of public blockchain-based virtual cryptocurrency calls for secure management of blockchain account information managed through cryptocurrency wallet programs. The previously proposed wallet program has high security in terms of managing an account's private key, but low security in managing an account's recovery phrase. Therefore, in this paper, we propose a safe management system of blockchain account recovery string based on the new user authentication method using the user's mobile device information and OTP technique to overcome the problem of the existing account recovery string management method. It also conducts an analysis of the proposed blockchain account recovery string management system based on the expected behavior scenario.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

A Case Study of Password Usage for Domestic Users (국내 사용자의 패스워드 사용 현황 분석)

  • Kim, Seung-Yeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.961-972
    • /
    • 2016
  • For securing password-based authentication, a user must select and manage a strong password that has sufficient length and randomness. Unfortunately, however, it is known that many users are likely to choose easy-to-remember weak passwords and very poorly manage them. In this paper, we study a domestic user case of password selection and management. We conducted a survey on 327 domestic users and analyzed their tendency on password creation and update strategies, and also on the password structure and account management. We then analyzed an effect of a server's password creation rule on a structure of a user-chosen password. Our findings include that there are password structures and special characters that users significantly prefer while the effect of server's password creation rule is insignificant.

Analysis on Vulnerability of Password Entry Using Virtual Onscreen Keyboard (가상 온스크린 키보드를 이용한 비밀번호 입력의 취약점 분석)

  • Shakirov, Bobur;Kim, Hyejin;Lee, KyungHee;Nyang, DaeHun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.857-869
    • /
    • 2016
  • It is a well-known fact that password based authentication system has been threatened for crucial data leakage through monitoring key log. Recently, to prevent this type of attack using keystroke logging, virtual onscreen keyboards are widely used as one of the solutions. The virtual keyboards, however, also have some crucial vulnerabilities and the major weak point is that important information, such as password, can be exposed by tracking the trajectory of the mouse cursor. Thus, in this paper, we discuss the vulnerabilities of the onscreen keyboard, and present hypothetical attack scenario and a method to crack passwords. Finally to evaluate the performance of the proposed scheme, we demonstrate an example experiment which includes attacking and cracking by utilizing password dictionary and analyze the result.