• Title/Summary/Keyword: Confidential Target

Search Result 14, Processing Time 0.027 seconds

Object Detection from High Resolution Satellite Image by Using Genetic Algorithms

  • Kim Kwang-Eun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.120-122
    • /
    • 2005
  • With the commercial availability of very high resolution satellite imagery, the concealment of national confidential targets such as military facilities became one of the most bothering task to the image distributors. This task has been carried out by handwork masking of the target objects. Therefore, the quality of the concealment was fully depends on the ability and skill of a worker. In this study, a spectral clustering based technique for the seamless concealment of confidential targets in high resolution imagery was developed. The applicability test shows that the proposed technique can be used as a practical procedure for those who need to hide some information in image before public distribution

  • PDF

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Issuance of Clean Report of Findings and Rights of Exporters (Clean Report of Findings의 발급과 수출업체의 권리)

  • LEE, Byung-Lak
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.66
    • /
    • pp.219-240
    • /
    • 2015
  • Developing countries have faced serious difficulties in implementing customs procedures. For example, they have experienced heavy administrative constraints such as lack of qualified personnel and non-computerization. Some importers in developing countries have tried to undervalue or overvalue the imported goods and misclassify them with the target of lowering the incidence of customs duties. In order to address these problems many of developing countries often require the exporter to get a Clean Report of Findings(CRF) issued by a preshipment inspection entity. This study tries to reply to the following questions with which the exporters are faced in the process of issuance of CRF. First, what are the provisions and regulations that the exporters have to note in the event a CRF is issued by the inspection entity? Second, how do the exporters safeguard their own rights in case of price verification? Third, how to protect the confidential business information to be submitted by the exporters in order to get a CRF? Fourth, how can the exporters respond to the improper conducts that the inspection entities have done?

  • PDF

A study of quantitative correlation between step animation and emotional expressions (스텝 애니메이션과 감성 표현 사이의 정량적 상호관계에 관한 연구)

  • Lee, Ji-Sung;Jeong, Jae-Wook
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.141-148
    • /
    • 2004
  • The purpose of this study is to define the emotion that expressed in step animation and to quantify the intuitional expression of emotion that related step for using extract, measure, analysis the stimulate element about step. The survey of relation with 27 word of emotional expressions and 36 moving pictures of step sample is used for method of this test. The emotional mental structure is transferred to 2 dimensional planes as applying the results of analysis of integrated data using Quantification Method 3, which the integrated data is composed two axial - confidential axial and stabling axial. Analysis of distribution of 2 dimensional diagram shows that the second of the plane and the third of the plane have much data. However, the first of the plane and the forth of the plane have a little data. Through this kind of analysis of graph, it is difficult to express a different emotion between unstable the timidity mind and stable feel the timidity mind using only step analysis. Six difference types about physical elements affecting to emotion are selected and analyzed such as the paces of step, the rate of step, the movement angle of pelvis, the swing range of arm, angle of backbone and the lean angle of body. The result is that the rate of stop and the lean angle of body are the major element that effects to emotional stimulate of stop. This thesis argues about methods transforming subjective expression to objective and quantitative expression with the state of delicate emotion of character apply to step animation naturally. Those data to apply to multi-contents in future are the main target in this study.

  • PDF

Evaluation of Sewer Capacity using Kinetic Hydraulic Model (동력학적 수리해석모델 해석을 통한 하수관거능력 평가)

  • Yang, Hae Jin;Jun, Hang Bae;Son, Dae Ik;Lee, Joon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.23 no.5
    • /
    • pp.565-572
    • /
    • 2009
  • Hydraulic modeling is widely used to simulate wastewater flow. The simulated models are used to prevent flood and many other problems associated with wastewater flow in planning or rehabilitating sewer systems. In this study, MAKESW (An engineer, South Korea), MOUSE (DHI, Denmark), and SWMM (XPSoftware, USA) are used to for hydraulic modeling of wastewater in C-city, South Korea and E-city, Iraq. These modeling tools produced different results. SWMM comparably overpredicted runoff and peak flow. In using SWMM, use of accurate data with a high confidential level, detail examination over the target basin surface, and the careful selection of a runoff model, which describes Korea's unique hydraulic characteristics are recommended. Modification of existing models through the optimization of variables cannot be achieved at this moment. Setting up an integrated modeling environment is considered to be essential to utilize modeling and further apply the results for various projects. Standardization of GIS database, the criteria for and the scope of model application, and database management systems need to be prepared to expand modeling application.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Investigation on Media Literacy of China Government Officials: Under the View of Public Opinion Guidance

  • Yang, Ting;Seo, Sangho
    • International Journal of Contents
    • /
    • v.14 no.4
    • /
    • pp.10-17
    • /
    • 2018
  • China media environment has drastically changed leading to the an inevitable change of public opinion ecology. Empirical studies have focused less on public opinion guidance, which forms an important component of the government officials' media literacy. This study applied quantitative method in the investigation of media literacy in China. Ideally, media literacy is measured from media cognition, media contact, media usage under the view of public opinion guidance. The findings reveal that the existing problem on 1) incorrect media cognition and public opinion guidance; 2) insufficient contact of personal social media 3) improper tendencies in the use of media to guide the public opinion, especially, on confidential information. Consequently, in order to improve media literacy in China government officials, enhancement of their basic knowledge on news diffusion and public opinion is necessary. Secondly, to effectively deal with "agenda settings", it is important for the government to consider the provision of valuable information and platforms to effectively spread information. So they need to learn how to personally and officially use social media platforms such as Weiboa and Wechat. This ensures they have maximized their potential to acquire valuable information and spread them on valuable platforms. Thirdly, government officials should be able to analyze and understand public opinion trends for official and personal use. Finally, they should understand the development of public opinion and the how online public opinion laws are formed and the target group.