• Title/Summary/Keyword: Collusion

Search Result 120, Processing Time 0.023 seconds

A Study on Types of Surrealistic Fashion Art (초현실주의적 패션아트의 유형분석)

  • Lyu, Keun-Jong
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.4 s.113
    • /
    • pp.30-44
    • /
    • 2007
  • This research searched characteristic of expression of Surrealism in Fashion Art which is new genre as source of design origination and classified as type of Time, Instinct, Existence and analyzed these and after analyzed result, it tried to verify the value aesthetically and followed by compared characteristic of expression in Surrealism appeared in Art based on content of type of expression that deduced and discussed it. Also comparing common characteristic appeared in Fashion Art in surrealism of the east and the west, it suggested discussion that try to find out identity that draw more near to Fashion Art. Results of research are as following these; Surrealist deliver sentiment and emotion that impossible to happen in reality and primitive thought by combination of unrealistic image and this tendency concreted by expression of Time, Expression of Instinct, expression of Existence. It appeared that deconstruct function and purpose of Fashion Art and existing traditional beauty of form and it is in collusion with way of expression of modelling used in Art of Surrealism those are Irregularity, Disorder, Imperfection and Dissymmetry.

Digital Image Fingerprinting Technique Against JFEG Compression and Collusion Attack (JPEG 압축 및 공모공격에 강인한 디지털 이미지 핑거프린팅 기술)

  • Kim, Kwang-Il;Kim, Jong-Weon;Choi, Jong-Uk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.313-316
    • /
    • 2006
  • 디지털 핑거프린팅(Digital Fingerprinting)은 기 밀 정보를 디지털 콘텐츠에 삽입하는 측면에서는 디지털 워터마킹과 동일 하다고 볼 수 있으나 저작권자나 판매자의 정보가 아닌 콘텐츠를 구매한 사용자의 정보를 삽입함으로써 콘텐츠 불법 배포자를 추적할 수 있도록 한다는 점에서 워터마킹과 차별화된 기술이다. 이러한 핑거프린팅 기술은 소유권에 대한 인증뿐만 아니라 개인 식별 기능까지 제공해야 하므로 기존의 워터마킹이 갖추어야 할 요구사항인 비가시성, 견고성, 유일성과 더불어 공모허용, 비대칭성, 익명성, 조건부 추적성 등이 부가적으로 필요하다. 본 논문에서는 행렬의 한 열을 선택 후 쉬프팅 기법을 사용 하서 사용자 정보로 조합하여 핑거프린트를 생성하였다. 이렇게 생성된 핑거프린트 정보를 2레벨 웨이블릿 변환 영역 중 LH2, HL2, HH2 부대역에 삽입하였다. 쉬프팅 정보와 도메인 개념을 사용하여 보다 많은 사용자에게 핑거프린트 정보를 삽입할 수 있으며, 공모공격과 JPEG 압축에서도 최소한 1명 이상의 공모자를 검출할 수 있는 핑거프린팅의 기본 조건을 만족하였다.

  • PDF

Efficient Public Key Broadcast Encryption System (효율적인 공개키 기반의 디지털 콘텐츠 전송 시스템)

  • Lee, Moon-Shik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.635-641
    • /
    • 2010
  • In this paper, we propose an efficient public key broadcast encryption system which can also extend traitor trace and revoke system. Although the proposed system has limited collusion size, the ciphertext size in the system can be sublinear in the number of total users, the private key size is constant, the computational cost can be sublinear and it can support black-box tracing algorithm, therefore, our system can be an option to applications where reducing the ciphertext size, private key size is a top priority. Furthermore, we can also apply our system to military document broadcast system, because it has such an efficient measurement.

Cryptanalysis of Bresson-Chevassut-Essiari-Pointcheval′s Key Agreement Scheme for Low-Power Mobile Devices (Bresson-Chevassut-Essiari-Pointcheval의 저전력 모바일 장치를 위한 키 동의 방식의 안전성 분석)

  • Nam Junghyun;Lee Younggyo;Kim Seungioo;Won Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.67-76
    • /
    • 2005
  • Bresson et al. have recently proposed an efficient group key agreement scheme well suited for a wireless network environment. Although it is claimed that the proposed scheme is provably secure under certain intractability assumptions, we show in this paper that this claim is unfounded, breaking the allegedly secure scheme in various ways.

Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07 (Nakazato-Wang-Yamamura '07의 프라이버시가 강화된 크레덴셜 시스템에 대한 크레덴셜 위조 공격)

  • Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.195-199
    • /
    • 2008
  • We present an attack which forges a credential without the help of the credential issuer in the protocol designed by Nakazato, Wang and Yamamura at ASIAN 2007 The attack avoids using the credential issuer's private key by taking advantage of the property of bilinear pairing. Implication of this collusion attack by user and verifiers also discussed.

Suggestions for Detection System of Bid-rigging in Public Construction Projects

  • Song, Sanghoon;Bang, Jong-Dae;Sohn, Jeong-Rak;Cho, Gun-Hee
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.712-713
    • /
    • 2015
  • In recent years, the bid-rigging in public construction markets has been treated as a critical issue in Fair Trade Commission. The investigation revealed that the collusion was implemented extensively in every area from the material supply to the construction service of general contractors. This study reviewed the causes of the bid-rigging in public construction projects, and proposed the improvement plan to eradicate bad practices. Firstly, the causes and purposes of bid-rigging were categorized into two types of internal factors from construction companies and external environment factors influencing business activities. Secondly, the system development method was explained to detect the signs of bid-rigging based on the technical proposal documents in open tender. The detection systems of repetitive public owner also provide the function of sharing data on the companies and cases to violate the fair trade regulation. In addition, the problems and improvement direction of public procurement policies were discussed.

  • PDF

The Issues of Workers' Solidarity and Labor Collectivism in terms of the American Two-Tier Wage Systems (미국 이중임금제를 통해 본 노조 연대와 집단이기주의의 문제)

  • Lee, Jeonghyun
    • International Area Studies Review
    • /
    • v.22 no.3
    • /
    • pp.221-251
    • /
    • 2018
  • Two-tier wage systems mean the dual wage systems that the new wage system require the new future employees to get much lower wage level, compared to the level of wages for existing employees under the existing wage system. While it allows employers to benefit from low-cost advantages, the two-tier wage systems is definitely a type of wage discrimination by the collusion between management and trade unions in that it forces the new future employee to accept the low wages. Also it reflects extreme collectivism which old union members try to keep having their jobs and wages at the sacrifice of future members' wages. The two-tier wage systems had been introduced by airplane industry in 1980s and introduced again in Big Three auto companies in 2007. The purpose of this paper is to examine the history, contents, and details of two-tier wage system in the United States and to think of the possibility of recurrence of the systems in the context of Korean auto industry in the near future. The tentative findings from this paper implies that the two-tier wage systems will likely happen in Korean auto industry because the collusion between trade unions and management are found easily and the degree of extreme collectivism favored by the old permanent union members is seriously high. It is time for trade unions to go back to their original ideals and purposes and to revitalize solidarity among workers.

An adaptive digital watermark using the spatial masking (공간 마스킹을 이용한 적응적 디지털 워터 마크)

  • 김현태
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.39-52
    • /
    • 1999
  • In this paper we propose a new watermarking technique for copyright protection of images. The proposed technique is based on a spatial masking method with a spatial scale parameter. In general it becomes more robust against various attacks but with some degradations on the image quality as the amplitude of the watermark increases. On the other hand it becomes perceptually more invisible but more vulnerable to various attacks as the amplitude of the watermark decreases. Thus it is quite complex to decide the compromise between the robustness of watermark and its visibility. We note that watermarking using the spread spectrum is not robust enought. That is there may be some areas in the image that are tolerable to strong watermark signals. However large smooth areas may not be strong enough. Thus in order to enhance the invisibility of watermarked image for those areas the spatial masking characteristics of the HVS(Human Visual System) should be exploited. That is for texture regions the magnitude of the watermark can be large whereas for those smooth regions the magnitude of the watermark can be small. As a result the proposed watermarking algorithm is intend to satisfy both the robustness of watermark and the quality of the image. The experimental results show that the proposed algorithm is robust to image deformations(such as compression adding noise image scaling clipping and collusion attack).

Market Structure and Pricing Behavior in the Korean Transportation Fuel Market (국내 수송용 석유제품 시장의 시장구조와 가격행태)

  • Moon, Choon-Geol
    • Environmental and Resource Economics Review
    • /
    • v.24 no.2
    • /
    • pp.311-342
    • /
    • 2015
  • We evaluate two main rationales of massive policy intervention of Lee Administration in the Korean transportation fuel market: high market share of domestic refineries, perceived by the Administration as the result of high market concentration, and asymmetry in price adjustment, perceived as the result of collusion. Domestic refineries, huge in capacity and located at seaports, maintain international competitiveness in price. Considering market openness offering preferential treatment to importers, they set domestic prices competitively on the basis of MOPS prices. Yet, the price competitiveness of domestic refineries is so high that they are able to sustain high market share. We confirm that the Korean before-tax consumer prices of gasoline and diesel are lower than Japan's and the weighted averages of 27 EU countries by as much as 159KRW and 21KRW per liter in the case of gasoline and 170KRW and 63KRW in the case of diesel. Price asymmetry is caused by diverse economic and managerial reasons and, as FTC (2005) states, price asymmetry does not immediately imply exercise of market power or collusion. We analyzed price asymmetry in Korea, Japan and 14 EU countries, and found asymmetry in Korea and 11 EU countries in the case of gasoline and in Korea and 8 EU countries in the case of diesel.

A Study on Asymmetric Price Adjustment in Domestic Petroleum Market (국내 석유시장에서 비대칭 가격조정에 관한 연구)

  • Kim, Jin Hyung
    • Environmental and Resource Economics Review
    • /
    • v.24 no.3
    • /
    • pp.523-549
    • /
    • 2015
  • This paper investigates an oil refiner's asymmetric behavior in the adjustments of gasoline and diesel prices to changes in his own price and his rivals' prices as well as input costs. An asymmetric error correction model which allows a firm's pricing behavior to the deviation of other firms' prices from their long-run equilibrium level is employed for estimation using weekly data for the period April 2009 to January 2015. Evidence is found that there is a significant degree of asymmetry in the adjustment of wholesale prices to changes in crude oil price. A similar result in regard to the exchange rate is also found by the data. The estimation results for firm's response to changes in other firms' prices indicates that implicit collusion could be more easily exploited in the wholesale petroleum market as results of firms' interaction with each other and anticipation of rivals' pricing behavior. A few refiners show competitive price adjustment in response to the upward deviation of the others' prices from their equilibrium level.