• Title/Summary/Keyword: Border Security

Search Result 120, Processing Time 0.022 seconds

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

Distributed System Cryptocurrency and Data Transfer

  • Alotaibi, Leena;Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.77-83
    • /
    • 2021
  • The dependency on technology has increased with the increase in population. Technology plays a crucial role in facilitating, organizing and securing people's life nowadays. The Internet has penetrated every face of present-day lifestyles. Yet another ubiquitous use of digital technology today is evident in transferring money and speeding cross border payments that are done through digital transactions. This paper investigates transferring money and data through banks and companies by using the Blockchain concept through decentralized distributed system. The present research also peruses several contexts in which this technology has already been implemented successfully and demonstrates the advantages of replacing the paper money with digital money. Using cryptocurrency will facilitate people's life by reducing time, securing the process of money transfer, and increasing data integrity. The primary benefit of this content analysis is that it addresses an innovative subject, in a new light and using timely recent research references drawn from 2018-2020. Thus, our study is a contemporary and conclusive source for all present and future endeavours being undertaken in the domain of using blockchain for e-transactions.

Efficient container door Open/Closed detection mechanism for Container Security Device(ConTracer) (컨테이너 보안장치(ConTracer)를 위한 효율적인 컨테이너 도어 개폐감지 메커니즘)

  • Moon, Young-Sik;Lee, Eun-Kyu;Shin, Joong-Jo;Shon, Jung-Rock;Choi, Sung-Pill;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.831-834
    • /
    • 2011
  • This paper is intended as performance verification of efficient container door Open/Closed detection mechanism for Container Security Device(ConTracer) to container cargo transportation. Container door Open/Closed detection mechanism using Reed sensor is important to satisfies the US Department of homeland security customs and border protections requirements to many types of container door. Also, Verify that the container door is configured correctly and that you can check the illegal opening. In this article, Performance valuation of this Contacer on reed sensor has been verified through field test for each other 30 containers. Once the improvement has been made, we are suggest that propose skills will meet the highest standards for container security safety.

  • PDF

Exceptional Characteristics of Cross-border Production Networks in Dandong, North Korea-China Border Region (북중 접경지역 단둥의 대북 생산 네트워크의 예외적 성격)

  • Lee, Sung-Cheol;Kim, Boo-Heon;Chung, Su-Yeul;Kim, Minho;Chi, Sang-Hyun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.329-352
    • /
    • 2017
  • Since the late 2000s Korean foreign direct investors in North Korea and China border regions have gone through the closure of outward processing trade(OPT) networks and changes in their location due to UN security council resolution and Korean independent sanctions against North Korea's nuclear and missile tests. However, the introduction of new Chinese OPT policy has led to the invigoration of domestic market-based OPT networks towards North Korea. The main aim of this paper is to identify the exceptional characteristics of Dandong in Liaoning province, a North Korea and China border region by analyzing OPT networks towards North Korea. Fundamentally the establishment of OPT networks towards North Korea is likely to be based on the utilization of a plenty of low wages in North Korea. The main reasons for this are fallen into two perspectives: geo-economics and geo-politics. The first perspective is geo-economics centering on the consolidation of economic exchange between North Korea and China, and North Korean economic development. For example, the introduction of Chinese OPT in border region has enabled Chinese local firms based on domestic market to access a plenty of low wage in North Korea in formal and institutional contexts. The second is geo-politics for the stability of North Korean regime based on the means of geo-economics. As the invigoration of domestic market-based OPT networks might make North Korea possible promoting foreign money earning, it enable North Korea to be sustainable as a buffering region between capitalist and socialist regime for China. It shows Chinese geo-strategic attempts to deal with the economic and regime stability of North Korean as a buffering state. In other words, OPT networks in North Korea should be concerned with the discourse practice of geo-economics and geo-politics which might lead to various and contingent spatial economies in border region. As a consequence, North Korea and China border regions could defined as a space in which is applicable to exceptional institutions and policies, and an exploitative space in which create surplus and rents by utilizing a plenty of low wages in North Korea through OPT networks.

Entry Types and Locational Determinants of North Korean Workers in Cross-border Regions between North Korea and China (중국 대북 접경지역의 북한 노동력 진입 유형과 요인)

  • Lee, Sung-Cheol;Lee, Yong-Hee;Kim, Boo-Heon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.4
    • /
    • pp.438-457
    • /
    • 2019
  • The main purpose of this paper is to identify the entry types and locational determinants of North Korean workers in cross-border regions between North Korea and China. More specifically, the paper has attempted to divide the entry type of them in the regions into two; 1) entry via transactions between Chinese traders with North Korea and North Korea trade companies, and 2) entry via transactions between Korean-Chinese middlemen and North Korean trade companies. Also, it has analyzed main factors of their locational determinants in the spatial contexts of the regions. There have been changes in two perspectives in terms of the entry paths and types of them in accordance with the transformation of characteristics of United Nations sanction against North Korea from 'call-upon' to 'decide' after UN Security Council Resolution 2094 in 2013. Firstly, main agents who have dealing with North Korean trade companies which have right to dispatch North Korean workers have been changed from Chinese traders into Korean-Chinese brokers who are specialized in the introduction of North Korean workers with one-stop service from visa administrative to labor managements. Secondly, there has been a transfer of North Korean workers in the regions from formal to informal workers who has been admitted into China with a short stay or a tourist visa, and then remained illegally to be employed in China. Therefore, as demands on service which is able to guarantee the security of North Korean informal workers and their managements have increased, Korean-Chinese brokers have been stimulated in the regions after the operation of real international sanctions against overseas North Korean workers. In addition, the main factors of their locational determinants in cross-border regions between North Korea and China are could be analyzed in three perspectives; 1) an increase in real wages in accordance with the reform of the Chinese social insurance system after 2011, 2) the structural vulnerability of labor markets in the regions, 3) the utilization of stable and manageable workers.

Monthly Water Balance Analysis of Hwanggang Dam Reservoir for Imjin river in Border Area using Optical Satellite (광학위성을 활용한 임진강 접경지역 황강댐 저수지의 월단위 물수지 분석)

  • KIM, Jin-Gyeom;KANG, Boo-Sik;YU, Wan-Sik;HWANG, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.4
    • /
    • pp.194-208
    • /
    • 2021
  • The Hwanggang Dam in North Korea is located upstream of the Imjin River which is a shared river in the border area. It is known to have a reservoir capacity of 350 million cubic meters and releases a discharge primarily for generating hydroelectric power and partly for transferring to the Yesung River basin. Due to the supply of water from the Hwanggang Dam to another basin, the flow of the Imjin River has decreased, which has a negative impact on the water supply, river maintenance flow, water quality, and ecological environment in Korea. However, due to the special national security issue of the South and North Korea border region, the hydrological data is not shared, and the operation method of the Hwanggang Dam is unknown, so there is a risk of damage to the southern part of the downstream area. In this study, the monthly diversion as the long-term runoff concept was derived through the calibrated hydrological model based on optical remotely sensed Images and water balance analysis. As a result of the water balance analysis from January 2019 to September 2021, the average diversion of the Hwanggang Dam was 29.2m3/s, which is equivalent to 922 million tons per year and 45.6% of the annual inflow of 2.02 million tons into the Hwanggang Dam.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach (국경간 개인정보 이전 규제에 대한 개선방안 연구: EU사례를 중심으로)

  • Lee, Sang-Hyuk;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1013-1023
    • /
    • 2016
  • Transborder data flow(TBDF) of personal information in Korea has been limited by current Privacy law which request data subject to give consent. As the IT industry is growing at an incredible rate, there is a need to review the existing law to cope with growing industrial demand and increasing numbers of international data transfer. The transfer of personal data overseas not only allow businesses providing IT services including finance, internet, e-commerce to thrive, but also impact every aspect of our lives which are increasingly depended on these technology. Transmitting personal data across borders raises serious questions of privacy protection and restriction of business operation. In ordrer to promote interoperability of personal data in international environment, a considerable amount of research and debate needs to be taken before implementing a sound policy. This paper presents a need for a sound TBDF policy in Korea by examine the main policy challenges associated with TBDF. Finally, the paper identify policy suggestions based on European Union's approach as they have successfully implemented TBDF policy that balanced data privacy and economic agenda.

China's Reorganization of Maritime Law Enforcement Administrations and ROK-China Maritime Cooperation (중국 해상법집행기관조직 개편과 한·중 해양협력)

  • Kim, Seok-kyun
    • Strategy21
    • /
    • s.33
    • /
    • pp.178-201
    • /
    • 2014
  • China National People's Congress has passed the bill to combine the Marine Law Enforcement into "State Oceanic Administration People's Republic of China". This bill was intended to resolve the overlapping jurisdiction and disputes caused in ocean territory in nearby countries. The purpose of reorganizing the administration was to combine the dispersed organization into one group. This new big administration was basically organized to increase the power of China marine state on the long-term. The reorganization plan is to group General Administration of Customs, China Marine Surveillance, Fisheries Law Enforcement Command, and Border Control Department into one State Oceanic Administration. The new state Oceanic Administration carries the authority to protect rights and enforce the marine law supported by Public Security Bureau. Korea Coast Guard has been cooperating with China Marine Surveillance since 1998 when the first pact was made. The next step expanded to General Administration of Customs. Currently working with Regional Maritime Law Enforcement organizations dealing mostly with illegal Chinese fishing boats and IEODO conflict. In order to solve the problems we face today is to observe the process of the New China Coast Guard administration, analysing the effects that could be caused by the change and to keep close cooperation between the new administrations.

A Study on the VoIP Intrusion prevention over MANET (MANET 기반 VoIP의 침해방지에 관한 연구)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.543-545
    • /
    • 2011
  • The concern which is abundant in MANET VoIP for comprising the mobility guarantee and mobile network is received without the infrastructure system between the mobile terminal node. However, because the access of system and border is easy, the issue which is big in the security problem becomes more than the wired network system with this convenience by the foreign network attacker differently. In this paper, we would like to the fundamental web network, NAT and concluding the security problem technology in which Firewall can inquire on MANET VoIP and whether it is appropriate or not which can solve this is proposed.

  • PDF