• Title/Summary/Keyword: 인지된 취약성

Search Result 156, Processing Time 0.029 seconds

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

A Study on Optimized Emergency Alert Broadcasting Message based Terrestrial UHDTV for Disaster Vulnerable Populations (지상파 UHDTV 기반 취약계층 맞춤형 재난경보 방송메시지 확장 방안 연구)

  • Kim, Nayeon;Bae, Byungjun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.127-128
    • /
    • 2019
  • 우리나라는 현재 지상파 UHDTV 재난경보 방송서비스에 관한 연구를 진행 중에 있다. 한편, 노인, 장애인 등 재난취약계층은 재난 발생 시 최초 상황의 인지와 대응에 어려움을 겪어 일반 대중과의 재난 대응 격차는 커지고 있는 상황이다. 본 논문에서는 연구가 진행중인 지상파 UHDTV 재난경보 방송서비스를 기반으로 재난약자 그룹의 재난 상황 판단, 피난에 도움이 되는 맞춤형 미디어 전달이 가능한 재난메시지 확장 방안을 제안하며, 재난약자의 최적대피 및 대피형평성을 확보하기 위한 연구로 활용될 것을 기대한다.

  • PDF

Digital Watermarking Using Subband Characteristics and Perceptual Weights of Wavelet Transform Image (웨이브릿 변환 영상의 부대역 특성과 인지가중치를 이용한 디지털 워터마킹)

  • Ryu, Kwon-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1254-1259
    • /
    • 2007
  • Watermark insertion methods on low frequency subbands in wavelet transform image are robust in attacks, but become reduction of invisibility. And watermark insertion methods on high frequency subbands have a good visibility, but are weak in attack. In this paper, we propose the method that improve invisibility and robustness of watermarks according as we adaptively control insertion intensity by using subband characteristics and perceptual weights. Experimental result, we show that the proposed method has excellent of invisibility and robustness more than the conventional method, according as it is improved with $1.7dB{\sim}2.6dB$ in invisibility, and is improved with $0.2{\sim}12.9$ in similarity measurement.

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Survey and analysis of disaster safety awareness by gender (성별 차이에 따른 재난 안전 인식에 대한 조사 및 분석)

  • Lee, Min Ji;Chung, Gun Hui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.483-483
    • /
    • 2021
  • 전 세계적으로 대형 재난의 발생으로 인해 사회문화적 관습이나 신체조건 등의 차이로 남성보다 여성의 피해가 크다는 사실들이 다양한 사례와 연구를 통해 보고되었고, 개발도상국은 여성의 피해가 큰 반면에 선진국은 여성들의 재난 안전 및 교육 관리에 적극적인 참여를 통해 전반적인 대응 능력을 보일 수 있다는 연구들도 존재한다. 우리나라의 경우에도 빈번하게 자연 재난이 발생하고 있지만, 실제로 재난 안전 인식에 대한 성별 분석을 하기 위한 자료가 부족한 상황이다. 그러므로 본 연구에서는 이와 같은 문제점을 파악하기 위해 한국 국민 남녀 489명을 대상으로 재난위험인식에 대한 설문을 실시하고, 거주지 주변 발생 가능한 재난을 인지하고 있는지, 대피소의 위치를 인지하고 있는지, 안전 관리 교육 경험이 있는지 등의 문항으로 구성하여 실시하였다. 본 연구의 목적은 국민들의 재난 안전의 위험도에 대한 인식 수준이 어떠한지 분석하고, 영향 요인을 탐색 하는 데에 있다. 조사결과 안전취약계층은 스스로 대피 하는 데에 있어 큰 어려움이 있으며, 이중 여성은 남성에 비해 안전교육과 훈련의 접근성이 적음에 따라 위험도가 더 큰 것을 확인 할 수 있었다. 그럼에도 불구하고, 재난 및 안전관리 교육 및 훈련에 참여하고자 하는 의지는 남성과 여성의 차이가 없었다. 본 연구를 기반으로 재난 안전교육의 필요성을 가지고 재난 안전 시뮬레이션 프로그램이 구축되는 필요성이 있다고 사료되어지고, 미래에 자연재해 발생 시 문제점을 파악하고 인명 피해 감소가 될 전망으로 기대가 된다.

  • PDF

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.

A study on the influence of information security in selecting smart-phone (정보보안이 스마트폰 선택에 미치는 영향에 관한 연구)

  • Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.207-214
    • /
    • 2014
  • Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.

Emergy Evaluation of Typhoon Maemi in Busan (태풍 매미가 부산시에 미치는 영향에 대한 에머지 평가)

  • Park, KyungMin;Kim, Dong-Myung;Lee, Suk Mo
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.20 no.1
    • /
    • pp.18-25
    • /
    • 2017
  • Damage of both life and property has been increased by natural disaster under the influence of climate change, thus many natural disaster vulnerability researches have been carried out to make adaptation policy and impact assessment of climate change recently. Their method for assessing vulnerability usually have used proxy variables for making vulnerability indices. However, because their results were too qualitative and relative it tends to be hard to make absolute comparison and establish standard of prevention or adaptation ability. Accordingly, this study aimed at quantifying natural disaster vulnerability using emergy through recognizing disaster as the relations between order and disorder by system approach. As a result, ordering energy (4.66E+22 sej/yr) and ordered structure (1.98E+22 sej) of Busan in 2003 and disordering energy (7.80E+18 sej), disordered parts (4.55E+20 sej) and rebuilding energy (3.87E+20 sej) by typhoon Maemi were analysed. And then, this was compared with Hurricane Andrew in Dade County. Through this comparison, if the prevention ability of Busan increases, disordered parts can be reduced against the more powerful disordering energy. Also, prevention for additional damages by disaster is needed to practical rebuilding action. In conclusion, it was able to figure out the impact of disaster quantitatively by natural systems and urban systems showing as common measure. Based on this study and further research to make effective prevention for how much prevention ability should be increased will contribute to producing the scientific data for disaster management policy in future.

A Study on antecedent factors of the Female farmers' Information Literacy Competency using smart devices

  • Son, Joo-Lee;Chae, Hye-Sung;Choi, Yoon-Ji;Choi, Jung-Shin;Jeong, Jin-Yi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.247-254
    • /
    • 2021
  • In this paper, we propose antecedent factors that influence the Information Literacy Competency of female farmers using smart devices. The study was analyzed using the materials from the "Primary Survey of Information Literacy Competency Measurement Index for Female Farmers" by the Rural Development Administration. The target of the survey was 200 women working on the farms. The descriptive, correlation, and multiple regression analyses, t-test, and ANOVA using SPSS 21.0 program were performed. Study results found that among the psychological factors, Self-efficacy and Innovativeness have positive effects on Information Literacy Competency. Among the Sociodemographic factors, the education level, presence of smartpads, and tiem spent on smartphones have positive effects on Information Literacy Competency. Findings of the results contributed to the understanding of the Information Literacy Competency for female farmers, who have lack of infromarion on smrt devices, and suggested the direction of enhancing the level of Information Literacy Competency for female farmers.