• Title/Summary/Keyword: Authentication method

Search Result 1,052, Processing Time 0.025 seconds

Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks

  • Yi, Chuanjun;Yang, Geng;Dai, Hua;Liu, Liang;Chen, Yunhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4183-4204
    • /
    • 2018
  • The existing en-route filtering schemes only consider some simple false data injection attacks, which results in lower safety performance. In this paper, we propose an efficient geographical information-based en-route filtering scheme (EGEFS), in which each forwarding node verifies not only the message authentication codes (MACs), but also the report identifier and the legitimacy and authenticity of locations carried in a data report. Thus, EGEFS can defend against not only the simple false data injection attacks and the replay attack, but also the collusion attack with forged locations proposed in this paper. In addition, we propose a new method for electing the center-of-stimulus (CoS) node, which can ensure that only one detecting node will be elected as the CoS node to generate one data report for an event. The simulation results show that, compared to the existing en-route filtering schemes, EGEFS has higher safety performance, because it can resist more types of false data injection attacks, and it also has higher filtering efficiency and lower energy expenditure.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

Software license acquisition Authority authentication management system development by Client Sever method (Client·Sever방식을 활용한 Software License 사용자 인증 통합관리시스템 개발에 관한 연구)

  • Kim, Jae-Hyeun;Ju, Ireh;Kim, Hyuhng Joon;Kim, Ye-Eun;Kim, Jin-Mook;Lee, Dong-Sub;Kim, Dong-wan;Park, Gyeong-Sik;Lee, Da-Heun;Koo, Dae-Geun;Yoon, Do-Sang;Kim, Do-Yen
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.407-410
    • /
    • 2017
  • 본 라이선스 통합관리시스템은 사용자에게는 소프트웨어 라이선스의 간편한 인증 요청과 재인증 절차를 제공하고 라이선스 발급하고 인증하는 관리자는 사용자의 현황 파악이 가능하며 언제 어디서나 간편하게 라이선스를 제공하여 많은 시간을 단축하고 라이선스 관리 비용을 절감한다. 효율적인 소프트웨어 인증관리시스템의 개발로 소프트웨어 불법적인 사용을 방지하여 건전한 생태계를 조성할 수 있다.

Development of Microsatellite Markers to Distinguish South Korean and Chinese Ginseng

  • Ahn, Chang-Ho;Kim, Boo-Bae;Yoon, Eui-Soo;Choi, Yong-Eui
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.5
    • /
    • pp.568-575
    • /
    • 2009
  • Korean wild and forest cultivated ginseng has long been accepted as high medicinal values compared to field cultivated ginseng. Owing to the high price of Korean wild ginseng, Chinese wild and forest cultivated ginseng were smuggled and sold as Korean wild and forest cultivated ginseng. Therefore, an efficient method is required to distinguish Korean ginseng from Chinese ginseng. Microsatellites, simple sequence repeats (SSRs), are highly polymorphic loci present in DNA that consist of repeating units of base pairs. Thus SSR markers are highly advantageous for detection of small genetic variances of intra-species. In the present study, we constructed a microsatellite-enriched genomic library from South Korean wild Panax ginseng. After sequence analysis of 992 randomly picked positive colonies, 126 (12.7%) of the colonies were found to contain microsatellite sequences, and 38 primer pairs were designed. By polymorphism assessment using 36 primer pairs, 4 primers (PG409, PG450, PG491, and PG582) were shown to be polymorphic to distinguish the South Korean ginseng from the Chinese ginseng. These 4 microsatellite markers will provide powerful tools to authenticate South Korean ginseng from Chinese ginseng.

Study For Watermarking Technique In Medical Image (의료영상에서의 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.348-351
    • /
    • 2002
  • Recently, the medical imaging field has been digitalized by the development of computer science and digitization of the medical devices. There are needs of the medical imaging database service and long term storage today because of the installation of PACS system following DICOM standards, telemedicine and etc. and ,also, the illegal distortion of the medical information, data authentication and copyright are being happened. In this paper, we propose watermarking technique as a method which can protect private informations and medical imaging from geometric distortion. Because many watermarks for images are sensitive to geometric distortion, we present a algorithm that is insensitive to RST distortion in medical image. we observed the robustness against several of the signal processing and attacks in medical imaging field by embedding watermark after making a region which is insensitive to RST distortion by using FFT and LPM transformation.

  • PDF

The Effects of User's Security Awareness on Password Security Behavior (정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구)

  • Ha, Sang-Won;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.179-189
    • /
    • 2013
  • With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.

Face Recognition: A Survey (얼굴인식 기술동향)

  • Mun, Hyeon-Jun
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02c
    • /
    • pp.172-177
    • /
    • 2008
  • Biometrics is essential for person identification because of its uniqueness from each individuals. Face recognition technology has advantage over other biometrics because of its convenience and non-intrusive characteristics. In this paper, we will present a overview of face recognition technology including face detection, feature extraction, and face recognition system. For face detection, we will describe template based method and face component based approach. PCA and LDA approach will be discussed for feature extraction, and nearest neighbor classifiers -will be covered for matching. Large database and the standardized performance evaluation methodology is essential in order to support state-of-the-art face recognition system. Also, 3D based face recognition technology is the key solution for the pose, lighting and expression variations in many applications.

  • PDF

A Study of Model on File Transfer Using Public-key Cryptography (공개키 암호방식을 이용한 파일전송 모델의 연구)

  • 최진탁;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.545-552
    • /
    • 1990
  • This paper is concerned with the file protection in the file transfer systems. In the existing file transfer systems, passwords are used in the protection but do not provide any data protection and can only provide some protection against unauthorized access. Even provided with this protection, we cannot be free form computer hackers. In order to achieve higher standards of protection for our privacy (protection for data themselves, authentication of senders...) analternative technical system should be developed in using of pulic key cryptography by choosing the public key method (RSA public key) in the file transfer. A new system suggested in the paper can achieve some higher standards of protection for our privacy. We a result thie system will be easily applied to various document handling systems as in the data base.

  • PDF

An Effective Eye Location for Face Recognition (얼굴 인식을 위한 효과적인 눈 위치 추출)

  • Jung Jo Nam;Rhee Phill Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.109-114
    • /
    • 2005
  • Many researchers have been interested in user authentication using biometric information, and face recognition is a lively field of study of ones in the latest biometric recognition field because of advantage that it can recognize who he/she is without touching machinery. This paper proposes method to extract eye location effectively at face detection step that is precedence work of face recognition. The iterative threshold selection was adopted to get a proper binary image and also the Gaussian filter was used to intensify the properties of eyes to extract an eye location. The correlation was adopted to verify if the eye location is correct or not. Extraction of an eye location that propose in paper as well as accuracy, considered so that may can apply to online system and showed satisfactory performance as result that apply to on line system.

Re-classifying Method for Face Recognition (얼굴 인식 성능 향상을 위한 재분류 방법)

  • Bae Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.105-114
    • /
    • 2004
  • In the past year, the increasing concern about the biometric recognition makes the great activities on the security fields, such as the entrance control or user authentication. In particular, although the features of face recognition, such as user friendly and non-contact made it to be used widely, unhappily it has some disadvantages of low accuracy or low Re-attempts Rates. For this reason, I suggest the new approach to re-classify the classified data of recognition result data to solve the problems. For this study, I will use the typical appearance-based, PCA(Principal Component Analysis) algorithm and verify the performance improvement by adopting the re-classification approach using 200 peoples (10 pictures per one person).

  • PDF