• Title/Summary/Keyword: 절단공격

Search Result 27, Processing Time 0.033 seconds

A Security Scheme of Mobile Agent using QCRT from Colluded Truncation Attacks (공모된 체인 절단 공격으로부터 QCRT를 이용한 이동 에이전트의 보호 기법)

  • Jung, Chang-Ryul;Kim, Kwang-Oh;Song, Jin-Kook;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.382-388
    • /
    • 2011
  • This paper proposes a mechanism that guarantees secured performance against DDoS attack to protect data from free-roaming agent. Also, as it makes up QCRT(query chain relationship tree) structure which is an enhanced chain relation of existing chain relations that improves extension, It also finds malicious elements. The proposed mechanism extends chain relationship of agent as well by checking chain relation structure as a structure according to the route of agent. For it complements existing weakness with single-side chain relation extension, it guarantees secure performance against DDoS and truncation attacks from mobile agent.

Secure Execution Assurance Mechanism of Mobile Agent from Truncation Attack in Free-Roaming Environments (Free-Roaming 실행 환경에서 절단공격으로부터 이동에이전트의 안전한 실행 보장 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.97-108
    • /
    • 2010
  • The data security of free-roaming mobile agent is a problem which hasn't been resolved to the mobility and inter-host mapping. totally, especially in theaspect of keeping away truncation attacks. Therefore, when the agent is utilized for user oriented applied technique, the secure execution guarantee of agent is essential. In this paper, it guarantees safe execution from security threats generated by malicious host during the agent's execution. And the secure execution guarantee mechanism of agent is proposed from favorable host is maliciously abused by attacker. Thus, the execution trace protocol mechanism proposed as secure mobile agents execution guarantee. As security analysis of the safety analysis.

3D Mesh Watermaking Based on POCS (POCS 기반의 3D 메쉬 워터마킹)

  • 이석환;김태수;김승진;권성근;권기룡;이건일
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.37-40
    • /
    • 2004
  • 본 논문에서는 POSC 기반의 3D 메쉬 워터마킹 방법을 제안하였다. 제안한 방법에서는 3D 메쉬를 두 가지의 제약 조건 집합으로 수렴 조건을 만족할 때까지 반복 투영한다. 이들 집합은 워터마크를 삽입하기 위한 강인성 집합 및 비가시성 집합으로 구성된다. 원 모델없이 워터마크를 추출하기 위하여 제안한 방법에서는 워터마크가 삽입되는 위치 정보 및 결정치를 이용한다. 실험 결과로부터 제안한 방법이 메쉬 간단화, 절단, 아핀 변환, 및 랜덤 잡음 첨가 등의 공격에 우수한 강인성을 가짐을 확인하였다.

  • PDF

An LBX Interleaving Watermarking Method with Robustness against Image Removing Attack (영상제거 공격에 강인한 LBX 인터리빙 워터마킹 방법)

  • 고성식;김정화
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.1-7
    • /
    • 2004
  • The rapid growth of digital media and communication networks has created an urgent need for self-contained data identification methods to create adequate intellectual property right(IPR) protection technology. In this paper we propose a new watermarking method that could embed the gray-scale watermark logo in low frequency coefficients of discrete wavelet transform(DWT) domain as the marking space by using our Linear Bit-eXpansion(LBX) interleaving of gray-scale watermark, to use lots of watermark information without distortion of watermarked image quality and particularly to be robust against attack which could remove a part of image. Experimental results demonstrated the high robustness in particular against attacks such as image cropping and rotation which could remove a part of image.

An Improved Dual-mode Laser Probing System for Fault Injecton Attack (오류주입공격에 대한 개선된 이중모드 레이저 프로빙 시스템)

  • Lee, Young Sil;Non, Thiranant;Lee, HoonJae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.453-460
    • /
    • 2014
  • Fault injection attack is the process of attempting to acquire the information on-chip through inject artificially generated error code into the cryptographic algorithms operation (or perform) which is implemented in hardware or software. From the details above, the laser-assisted failure injection attacks have been proven particularly successful. In this paper, we propose an improved laser probing system for fault injection attack which is called the Dual-Laser FA tool set, a hybrid approach of the Flash-pumping laser and fiber laser. The main concept of the idea is to improve the laser probe through utilizing existing equipment. The proposed laser probe can be divided into two parts, which are Laser-I for laser cutting, and Laser-II for fault injection. We study the advantages of existing equipment, and consider the significant parameters such as energy, repetition rate, wavelength, etc. In this approach, it solves the high energy problem caused by flash-pumping laser in higher repetition frequency from the fiber laser.

Determination of Reactivities by MO Theory (ⅩⅥ). Theoretical Studies on Acid Catalyzed Displacement Reactions at Carbonyl Carbon (MO 理論에 依한 反應性의 決定 (第16報). 카르보닐炭素의 酸觸媒置換反應에 關한 理論的 硏究)

  • Ikchoon Lee;Soonki Rhee;Kae Soo Lee
    • Journal of the Korean Chemical Society
    • /
    • v.24 no.3
    • /
    • pp.201-208
    • /
    • 1980
  • The CNDO/2 MO method has been used to study gas phase reactions of protonated acetaldehyde with alcohols and protonated acetic acid with alcohols respectively by optimizing state geometries. Results showed that the former is predicted to proceed by alkyl-O cleavage and the latter by acyl-O cleavage. It has also been found using eigenvector properties of reactants that the former should be a charge controlled while the latter an orbital controlled reaction. According to the calculated activation energies assuming the transition states proposed by Caserio et al., the predicted reactivity order for alcohols agreed with the experiments for the latter but the order predicted was the reverse of the experimental one for the former.

  • PDF

Coefficients-Contorlled Watermarking Scheme using Fuzzy Inference (퍼지추론을 이용한 계수조절 워터마킹 기법)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1748-1754
    • /
    • 2004
  • In this paper, We propose a image watermarking method which combine frequence-domain with fuzzy inference. In our method, the original image is transformed and decomposed using DWT. The watermark is added to high-frequency coefficients, which analyzed optimally so as to genarate the fuzzfied data. In order to evaluate the robustness, the embeded watermark is detected in case of attacking by JPEG compression and cropping. Experimental results showed that proposed scheme is superior to the typical method with PSNR and similarity under the same conditions.

A adaptively robust method of DCT-based watermarking (DCT 기반 워터마킹의 적응적 강인화 방법)

  • Jun, Young-Min;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.629-638
    • /
    • 2003
  • In this paper, we propose an improved method of watermarking to increase the invisibility of a watermark and robustness against attacks for the purpose of removing the embedded watermark. The proposed method adaptively selects DCT blocks and determines position and intensity for watermarking based on the characteristics of human visual system. The used features are texture, luminance and contrast. We show the experimental results against image processing attacks such as cropping, image enhancement, low pass filtering, and JPEG compression, and then discuss the performance of the proposed method.

Role of Phospholipase $A_2$ on lipid peroxidation (과산화지질 형성에 있어서 Phospholipase $A_2$의 역할)

  • 황화신;정규찬;장현옥
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1994.04a
    • /
    • pp.341-341
    • /
    • 1994
  • 생체막의 주요 구성성분인 인지질의 2번 위치에 결합한 불포화지방산은 각종 전이금속이나 각종 활성산소들의 공격을 쉽게 받아 지질과산화반응이 일어나서 생체에 유독한 화합물을 생성하게 된다. 생체는 이러한 기구의 해독을 위하여 크게 2가지 방어기전을 갖고 있다. 즉 Vitamin- C, $\alpha$-tocopherol, flavonoid, SOD, catalase 등과 같이 생성된 활성산소를 제거시키는 기구와. 활성산소에 의해 생성된 과산화물을 제거시키는 기구로 glutathione peroxidase (GPX)가 알려졌으며 GPX에 의해 독성이 낮은 수산화물까지 환원시키는 기구가 보고되었다. 그러나 인지질의 과산화물 그대로는 GPX의 기질이 쥘수 없으므로, 산화된 지방산을 절단하는 효소에 대한 기구의 해석이 요구되고 있다. 최근 여러질병에 관련되어 있는 인지질 2번위치의 지방산을 분해하는 phospholipase $A_2$ (PLA$_2$)가 과산화지질의 분해에 관여한다는 주장이 제기되었다. 따라서 본 연구에서는 rat liver microsome에 $CCl_4$투여로 일어나는 과산화반응에 있어서 PLA$_2$의 역할을 규명하기 위하여 본 실험을 행하였다.

  • PDF

Human Vision System based Adaptive Watermarking Algorithm (시각적 특성에 기반한 적응적 워터마킹 알고리즘)

  • 전영민;고일주;김계영
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.101-109
    • /
    • 2004
  • This paper proposes an adaptive watermarking algerian technique concerning the visual characteristics of human. To embed watermark to an image, features such as contrast, brightness, and texture are used. The propose method adaptively select blocks and determine the position and intensity of watermark to be applied, concerning the visual characteristics of a human. The experiment involves cropping, image enhancement, low pass filtering, and JPEG compression, which are compared on detectability of watermark against image manipulation and attack