• Title/Summary/Keyword: 정직한 신호

Search Result 2, Processing Time 0.019 seconds

Insect Communication: Concepts, Channels and Contexts (곤충의 의사소통: 개념, 채널 및 상황)

  • Jang, Yi-Kweon
    • Korean journal of applied entomology
    • /
    • v.50 no.4
    • /
    • pp.383-393
    • /
    • 2011
  • Because communication facilitates behaviors that are critical for survival and reproduction, it is central to the study of behavior and evolution. One of the most important and difficult issues with respect to communication has been the definition of communication itself. Broadly, it can be defined as an exchange of information from a signaler to a receiver. However, evolution of a signal is likely possible only under conditions in which both the signaler and receiver increase fitness from the exchange of information, often referred to as "true communication." The three primary sensory channels of communication used by animals are chemical, visual, and acoustic. Chemical signals are the oldest and most widespread method of communication. Visual and acoustic signals convey a great deal of information due to ease of modulation, flexibility of signal production, and fast transmission. The most widespread contexts in which animals communicate are sexual interaction and conflict resolution. Signals used for sexual interaction typically contain information about species identity and sexual attractiveness, whereas signals used for conflict resolution may contain information about resource holding potential. Other contexts under which animals communicate include territorial defense, parent-offspring interactions, social integration, sharing of environmental information, and auto-communication.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.