• Title/Summary/Keyword: 인증기법

Search Result 1,456, Processing Time 0.031 seconds

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.

Quantified Lockscreen: Integration of Personalized Facial Expression Detection and Mobile Lockscreen application for Emotion Mining and Quantified Self (Quantified Lockscreen: 감정 마이닝과 자기정량화를 위한 개인화된 표정인식 및 모바일 잠금화면 통합 어플리케이션)

  • Kim, Sung Sil;Park, Junsoo;Woo, Woontack
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1459-1466
    • /
    • 2015
  • Lockscreen is one of the most frequently encountered interfaces by smartphone users. Although users perform unlocking actions every day, there are no benefits in using lockscreens apart from security and authentication purposes. In this paper, we replace the traditional lockscreen with an application that analyzes facial expressions in order to collect facial expression data and provide real-time feedback to users. To evaluate this concept, we have implemented Quantified Lockscreen application, supporting the following contributions of this paper: 1) an unobtrusive interface for collecting facial expression data and evaluating emotional patterns, 2) an improvement in accuracy of facial expression detection through a personalized machine learning process, and 3) an enhancement of the validity of emotion data through bidirectional, multi-channel and multi-input methodology.

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

A Method of Selecting Test Metrics for Certifying Package Software using Bayesian Belief Network (베이지언 사용한 패키지 소프트웨어 인증을 위한 시험 메트릭 선택 기법)

  • Lee, Chong-Won;Lee, Byung-Jeong;Oh, Jae-Won;Wu, Chi-Su
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.10
    • /
    • pp.836-850
    • /
    • 2006
  • Nowadays, due to the rapidly increasing number of package software products, quality test has been emphasized for package software products. When testing software products, one of the most important factors is to select metrics which form the bases for tests. In this paper, the types of package software are represented as characteristic vectors having probabilistic relationships with metrics. The characteristic vectors could be regarded as indicators of software type. To assign the metrics for each software type, the past test metrics are collected and analyzed. Using Bayesian belief network, the dependency relationship network of the characteristic vectors and metrics is constructed. The dependency relationship network is then used to find the proper metrics for the test of new package software products.

The Study of Assessment Tool as an Outcomes Achievement : Part 3 Undergraduate Thesis (프로그램학습성과 달성을 위한 평가도구 연구 : Part 3 졸업논문)

  • Kim, Myoung-Lang;Kim, Dong-Hwan;Chung, Jin-Taek;Kim, Bok-Ki;Yoon, Woo-Young
    • Journal of Engineering Education Research
    • /
    • v.10 no.1
    • /
    • pp.97-108
    • /
    • 2007
  • Undergraduate thesis contains overall results that students has acquired to express their ability during four university years. Undergraduate thesis includes an ability to apply knowledge of engineering, communicate engineering logic and thinking effectively, and use the techniques, skills for engineering practice. In terms of an assessment tool for program outcomes, undergraduate thesis provides the results of the student with authentic, reflective, interactive and individuals features. Also undergraduate thesis provides an opportunity of improvement about curriculum and engineering program. To apply the excellency of undergraduate thesis, the principle of undergraduate thesis should be understood well and reflected the real state of engineering education. The basic concept of undergraduate thesis as a assessment tool of engineering program outcomes has been introduced. The rubrics for measuring of a specific outcome was also suggested.

Policy agenda proposals from text mining analysis of patents and news articles (특허 및 뉴스 기사 텍스트 마이닝을 활용한 정책의제 제안)

  • Lee, Sae-Mi;Hong, Soon-Goo
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.1-12
    • /
    • 2020
  • The purpose of this study is to explore the trend of blockchain technology through analysis of patents and news articles using text mining, and to suggest the blockchain policy agenda by grasping social interests. For this purpose, 327 blockchain-related patent abstracts in Korea and 5,941 full-text online news articles were collected and preprocessed. 12 patent topics and 19 news topics were extracted with latent dirichlet allocation topic modeling. Analysis of patents showed that topics related to authentication and transaction accounted were largely predominant. Analysis of news articles showed that social interests are mainly concerned with cryptocurrency. Policy agendas were then derived for blockchain development. This study demonstrates the efficient and objective use of an automated technique for the analysis of large text documents. Additionally, specific policy agendas are proposed in this study which can inform future policy-making processes.

Template Fusion for Fingerprint Recognition (지문 등록을 위한 템플릿 융합 알고리즘)

  • 류춘우;문지현;김학일
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.51-64
    • /
    • 2004
  • This paper proposes an algerian of generating a tuner-template from multiple fingerprint impressions using a data fusion technique for fingerprint enrollment. The super-template is considered as a single fingerprint template which contains most likely true minutiae based on multiple fingerprint images. The proposed algorithm creates the super template by utilizing a recursive Bayesian estimation method (RBEM), which assumes a sequential fingerprint input model and estimates the credibility of the minutiae in previous input templates froma current input template. Consequently. the RBEM assigns a higher credibility to commonly detectable minutiae from several input templates and a lower credibility to rarely found minutiae from other input templates. Likewise, the RBEM is able to estimate a credibility of the minutia type (ridge ending or bifurcation). Preliminary experiments demonstrate that, as the number of fingerfrint images increases, the performance of recognition can be improved while maintaining the processing time and the size of memory storage for tile super-template almost constant.

User Recognition Method using Human Body Impulse Response Signals (인체의 임펄스 응답 신호를 이용한 사용자 인식 방법)

  • Park, Beom-Su;Kang, Eun-Jung;Kang, Taewook;Lee, Jae-Jin;Kim, Seong-Eun
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.120-126
    • /
    • 2020
  • We present a user recognition method using human body impulse response signals. The body compositions vary from person to person depending on the portion of water, muscle, and fat. In the body communication study, the body has been interpreted circuit models using capacitance and resistances, and its characteristics are determined by the body compositions. Therefore, the individual body channel is unique and can be used for user recognition. In this paper, we applied pseudo impulse signals to the left hand and recorded received signals from the right hand. The empirical mode decomposition (EMD) method removed noise from the received signals and 10 peak values are extracted. We set the differences between peak amplitudes as a key feature to identify individuals. We collected data from 6 subjects and achieved accuracy of 97.71% for the user recognition application.

A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator (난수생성기를 이용한 멀티채널 보안카드 설계)

  • Seo, Hwa-jeong;Seok, Seon-hee;Kim, Kyoung-hoon;Kim, Ho-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.501-507
    • /
    • 2015
  • The online banking service handles a banking business over the internet, it is necessary to ensure that all financial transactions are processed securely. So, there are various authentication technique for e-banking service : a certificate, a personal identification number(PIN), a security card and a one-time password(OTP). Especially, the security card is most important means including secret information. If the secret information of card is leaked, it means not only loss of security but also easy to attack because security card is a difficult method to get. In this paper, we propose that a multi-channel security card saves an secret information in distributed channel. Proposed multi-channel security card reduces vulnerability of the exposed and has a function to prevent phishing attacks through decreasing the amount of information displayed and generating secret number randomly.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.