• Title/Summary/Keyword: 취약지 분석

Search Result 1,623, Processing Time 0.03 seconds

PVD Image Steganography with Locally-fixed Number of Embedding Bits (지역적 삽입 비트를 고정시킨 PVD 영상 스테가노그래피)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.350-365
    • /
    • 2017
  • Steganography is a technique for secret data communication, which is not perceived by third person between a receiver and a transmitter. It has been developed for thousands of years for the transmission of military, diplomatic or business information. The development of digital media and communication has led to the development of steganography techniques in modern times. Technic of image steganography include the LSB, which fixes the number of embedded bits into a pixel, and PVD, which exploits the difference value in the neighboring pixel pairs. In the case of PVD image steganography, a large amount of information is embedded fluidly by difference value in neighboring pixel pairs and the designed range table. However, since the secret information in order is embedded, if an error of the number of embedded bits occurs in a certain pixel pair, all subsequent information will be destroyed. In this paper, we proposes the method, which improve the vulnerability of PVD property about external attack or various noise and extract secret information. Experimental process is comparison analysis about stego-image, which embedded various noise. PVD shows that it is not possible to preserve secret information at all about noise, but it was possible to robustly extract secret information for partial noise of stego-image in case of the proposed PVD image steganography with locally-fixed number of embedding bits.

A Utility-Based Hybrid Error Recovery Scheme for Multimedia Transmission over 3G Cellular Broadcast Networks (3G 방송망에서의 효율적인 멀티미디어 전송을 위한 유틸리티 기반 하이브라드 에러 복구기법)

  • Kang Kyung-Tae;Cho Yong-Jin;Cho Yong-Woo;Cho Jin-Sung;Shin Heon-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.333-342
    • /
    • 2006
  • The cdma2000 lxEV - DO mobile communication system provides broadcast and multicast services (BCMCS) to meet an increasing demand from multimedia data services. The servicing of video streams over a BCMCS network must, however, face a challenge from the unreliable and error-prone nature of the radio channel. The BCMCS network uses Reed-Solomon coding integrated with the MAC protocol for error recovery. We analyze this coding technique and show that it is not effective in the case of slowly moving mobiles. To improve the playback quality of an MPEG-4 FGS video stream, we propose the Hybrid error recovery scheme, which combines Reed-Solomon with ARQ, using slots which are saved by reducing the Reed-Solomon coding overhead. The target packets to be retransmitted are prioritized by a utility function to reduce the packet error rate in the application layer within a fixed retransmission budget. This is achieved by considering of the map of the error control block at each mobile node. The proposed Hybrid error recovery scheme also uses the characteristics of MPEG-4 FGS (fine granularity scalability) to improve the video quality even when conditions are adverse: slow-moving nodes and a high error rate in the physical channel.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Comparison in Convergence Factors in Stress of Workers in the Field of Railroad Electricity and Vehicles by their working position (근무지별 철도 전기 및 차량 분야 종사자들의 스트레스에 대한 융복합적 관련 요인 비교)

  • Jeon, Byeong-Rock;Lee, Hyun-Ju
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.337-347
    • /
    • 2016
  • This study is aimed at figuring out the stress of workers in the field of railroad electricity and vehicles and its convergence factors. The workers were divided into the workers in the headquarters and in the field. A self-administered survey was conducted from February 9 to March 6 in 2015. 628 respondents' reply was analyzed by PASW Statistics Ver. 18.0. As the result, 94.7% of them belonged to the over weight group and frequently drank alcohol. The stress score was higher in the workers in the headquarters(3.00/5.00) than those in the field(2.85). For the workers in the headquarters, those who smoke everyday showed higher stress level than that of those who have never smoked while stress level decreased in those who are satisfied with their company life. For the workers in the field, stress increased in the higher age group than those in their the twenties and those who skip their breakfast. The more positive their subjective awareness toward their body shape and the more satisfied they were with their company life, the more their stress level decreased. Therefore, the study suggests that we have to focus on those who are vulnerable to stress using the factors.

Comparative Analysis on Preference of Men's Jewelry in Korea and China (Focused on Tie-pin and Cufflinks) (한국과 중국의 남성 장신구 선호도 비교 분석 (넥타이핀과 커프스 버튼을 중심으로))

  • Ko, Seung-Geun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.201-206
    • /
    • 2018
  • This is the study on the preference of men's jewelry in Korea and China. It started to change and develop the market of modern men's jewelry, which is increasingly growing. The men's jewelry market, in Korea, has developed as small market as part of women's, and since 2006, it has started to grow as men's jewelry. However, it is still treated only by some brands. It is a time when innovation is needed because design diversity is weak. The men's jewelry market in China is rapidly developing under the influence of young emerging rich people. However, as in Korea, a research on the design of men's jewelry is insufficient, so it is urgent to study the preference for men's jewelry. Each survey was conducted on a the tie-pin and cufflinks as the most representative men's jewelry in Korea and China. As a result, both countries were not satisfied with the designs currently being sold. In Korea, the popularity of the tie-pin and the cufflinks is made to some extent, and customizing to consumer and innovative development are required. And, in China, the popularity of the tie-pin and the cufflinks made it possible to expect the growth of the men's jewelry market.

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

A Study on Protection Depending on Mesh Size of Expanded Metal for Slope Reinforcement (사면보강용 Expanded Metal 격자크기에 따른 인발 특성 연구)

  • Ji, Younghwan;Kim, Kihwan;Kim, Sungho;Hwang, Yeongcheol;Lee, Seungho
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.12
    • /
    • pp.47-56
    • /
    • 2010
  • The construction of new roads and the consistent extension of already-existing roads or the line-shape revision of those roads are increased with the governmental investment to SOC facilities currently. Accordingly, the road cut slopes are in the trend of rapidly increasing. As the road slope has increased, a lot of human and property damages has entailed consequently and in the local case, numerous studies have carried out aiming at minimizing this damages caused by the rockfall and landslide. In general, standard falling rock prevention facility has employed for most of the local road slope based on "Guide for Installation and Management of Road Safety Facilities" published by MLTM(the Ministry of Land, Transport, and Maritime Affairs) but profound doubt has raised as to whether this rockfall prevention facility would function properly enough to prevent rockfall efficiently without any damages in case of actual occurrence of rockfall. In addition, it is a reality that in most cases, such work is relied on overseas technology as a whole as the local technical level is low and in case of rockfall prevention net, it is judged that a study on rockfall prevention net that is able to endure more powerful rockfall energy is required as the problem including net bursting is taken place as a result of enough bearing force being failed to be demonstrated due to its partial weak point(not uniformly made). Under this background, in this study, three kinds of model depending on mesh size of expanded metal that is considered to have an adoptability as rockfall prevention net, as target are selected and characteristics depending on mesh size of expanded metal is intended to be researched through a pull-out test performance by using pull-out test equipment rockfall prevention net.

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

The Trend in Household Catastrophic Medical Expenditure according to Healthcare Coverage Types and Its Associated Factors (의료보장 형태에 따른 연간 가구 과부담 의료비 지출 추이와 관련요인)

  • Lee, Seon Hwa;Kam, Sin;Lee, Won Kee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4067-4076
    • /
    • 2015
  • This study aims to examine the trend in household catastrophic medical expenditure according to the healthcare coverage types and its associated factors based on the raw data of the Korean Health Panel over the years 2008 to 2011. Correspondence analysis was used to investigate the trend in the incidence rates of annual catastrophic medical expenditure and generalized estimating equation to examine the factors influencing the incidence of catastrophic medical expenditure. The annual mean incidence rates of household catastrophic medical expenditure were 25.1%, 15.4%, 10.1%, 5.4% and 3.2% in the threshold levels of 10%, 15%, 20%, 30%, and 40% respectively. The incidence rate of household catastrophic medical expenditure was higher when the total annual household income was lower, the education level of the householder was lower, the healthcare coverage type was National Health Insurance, the householder had disability, the age of the householder was older, the number of household members was smaller, the subjective health status of household members was lower, and the prevalence rate of the chronic disease of the household was higher(p<0.05). Therefore, a policy for vulnerable households with older or patient members of chronic diseases should be established.