• 제목/요약/키워드: Confidential Target

검색결과 14건 처리시간 0.023초

Object Detection from High Resolution Satellite Image by Using Genetic Algorithms

  • Kim Kwang-Eun
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.120-122
    • /
    • 2005
  • With the commercial availability of very high resolution satellite imagery, the concealment of national confidential targets such as military facilities became one of the most bothering task to the image distributors. This task has been carried out by handwork masking of the target objects. Therefore, the quality of the concealment was fully depends on the ability and skill of a worker. In this study, a spectral clustering based technique for the seamless concealment of confidential targets in high resolution imagery was developed. The applicability test shows that the proposed technique can be used as a practical procedure for those who need to hide some information in image before public distribution

  • PDF

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권11호
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴 (An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital)

  • 안해순;윤은준;남인길
    • 한국통신학회논문지
    • /
    • 제37권5C호
    • /
    • pp.410-419
    • /
    • 2012
  • 본 논문에서는 병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 안전하고 효율적인 익명 인증 스킴을 제안한다. 제안한 스킴은 다음과 같은 장점들을 가진다. (1)안전한 일방향 해쉬 함수(secure one-way hash function)를 사용하여 의료 서비스 사용자와 의료 관리센터 사이에 연산 복잡성을 최소화 하였다. (2)의료 관리센터 측에 삽입공격(insertion attacks) 및 훔친 검증자 공격(stolen-verifier attacks) 등 다양한 암호학적 공격들에 대한 대상이 될 수 있는 민감한 정보를 저장하는 검증 테이블(verification table)을 전혀 필요로 하지 않는다. (3)안전한 상호 인증과 키 설정(secure mutual authentication and key establishment), 기밀 통신(confidential communication), 사용자 프라이버시(user's privacy), 간단한 키 관리(simple key management), 세션 키 독립성 (session key independence)등을 보장하여 높은 보안 수준을 제공한다. 결론적으로 제안한 스킴은 병원 내 실내 위치기반 의료정보 푸쉬 서비스 환경에서 의료 서비스 사용자와 의료 관리센터 사이에서 아주 낮은 연산 오버헤드를 제공하기 때문에 스마트폰과 같은 경량 디바이스를 이용한 다양한 위치기반 의료정보 서비스 환경에 매우 실용적으로 활용될 수 있다.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Clean Report of Findings의 발급과 수출업체의 권리 (Issuance of Clean Report of Findings and Rights of Exporters)

  • 이병락
    • 무역상무연구
    • /
    • 제66권
    • /
    • pp.219-240
    • /
    • 2015
  • Developing countries have faced serious difficulties in implementing customs procedures. For example, they have experienced heavy administrative constraints such as lack of qualified personnel and non-computerization. Some importers in developing countries have tried to undervalue or overvalue the imported goods and misclassify them with the target of lowering the incidence of customs duties. In order to address these problems many of developing countries often require the exporter to get a Clean Report of Findings(CRF) issued by a preshipment inspection entity. This study tries to reply to the following questions with which the exporters are faced in the process of issuance of CRF. First, what are the provisions and regulations that the exporters have to note in the event a CRF is issued by the inspection entity? Second, how do the exporters safeguard their own rights in case of price verification? Third, how to protect the confidential business information to be submitted by the exporters in order to get a CRF? Fourth, how can the exporters respond to the improper conducts that the inspection entities have done?

  • PDF

스텝 애니메이션과 감성 표현 사이의 정량적 상호관계에 관한 연구 (A study of quantitative correlation between step animation and emotional expressions)

  • 이지성;정재욱
    • 디자인학연구
    • /
    • 제17권4호
    • /
    • pp.141-148
    • /
    • 2004
  • 본 논문은 스텝 애니메이션에서 표현되어지는 감성을 정의하고, 스텝 관련 감성 자극 요소들을 추출 측정, 분석하여 스텝의 직관적인 감성 표현을 정량화시키는 것을 목적으로 하고 있다. 실험 방법으로는 스텝 관련 27개의 감성 표현 어휘와 36개의 샘플 스텝 동영상의 상관관계를 설문 조사하였다. 통합된 데이터를 수량화 이론 III류를 이용하여 스텝의 감성적 멘털구조를 2차원 평면화 하였다. 이를 분석한 결과, 감성 스텝은 가로의 자신감 축과 세로의 안정감 축으로 형성되어 있음을 밝혀내었다. 감성 스텝의 2차원 분포도를 분석한 결과, <자신감, 불안감 쪽> 2사분면과 <자신감, 안정감 쪽> 3사분면은 데이터가 풍부한 반면 <소심함, 불안감 쪽> 1사분면과 <소심함, 안정감 쪽> 4사분면의 데이터 분포가 희박함을 보여주었다. 이러한 그래프 분석을 통해 불안감이 느껴지면서 소심한 감성과 안정감이 느껴지는 소심한 캐릭터의 감성은 스텝만으로 표현하기에는 난해한 감성 표현임을 파악할 수 있었다. 감성에 영향을 미치는 스텝의 신체 물리적 요소로는 <스텝의 간격> <스텝의 속도> <골반(Y축)의 움직임 각도> <팔 스윙 폭> <척추(x축)의 움직임 각도> <신체의 기울기> 6가지로 선정하여 분석하였다. 그 결과 <스텝의 속도>와 <신체의 기울기>가 스텝의 감성 자극에 가장 큰 영향을 미치는 요소임을 밝혀낼 수 있었다. 본 연구를 통해 캐릭터의 미묘한 감성 상태를 스텝 애니메이션에 자연스럽게 표현해 내는 과정에 있어 애니메이터들의 주관적인 가성 표현들을 객관화, 정량화시키고자 하였으며 향후 이 데이터들을 활용한 멀티컨텐츠의 적용을 목표로 하고 있다.

  • PDF

동력학적 수리해석모델 해석을 통한 하수관거능력 평가 (Evaluation of Sewer Capacity using Kinetic Hydraulic Model)

  • 양해진;전항배;손대익;이준
    • 상하수도학회지
    • /
    • 제23권5호
    • /
    • pp.565-572
    • /
    • 2009
  • Hydraulic modeling is widely used to simulate wastewater flow. The simulated models are used to prevent flood and many other problems associated with wastewater flow in planning or rehabilitating sewer systems. In this study, MAKESW (An engineer, South Korea), MOUSE (DHI, Denmark), and SWMM (XPSoftware, USA) are used to for hydraulic modeling of wastewater in C-city, South Korea and E-city, Iraq. These modeling tools produced different results. SWMM comparably overpredicted runoff and peak flow. In using SWMM, use of accurate data with a high confidential level, detail examination over the target basin surface, and the careful selection of a runoff model, which describes Korea's unique hydraulic characteristics are recommended. Modification of existing models through the optimization of variables cannot be achieved at this moment. Setting up an integrated modeling environment is considered to be essential to utilize modeling and further apply the results for various projects. Standardization of GIS database, the criteria for and the scope of model application, and database management systems need to be prepared to expand modeling application.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • 통합자연과학논문집
    • /
    • 제14권4호
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Investigation on Media Literacy of China Government Officials: Under the View of Public Opinion Guidance

  • Yang, Ting;Seo, Sangho
    • International Journal of Contents
    • /
    • 제14권4호
    • /
    • pp.10-17
    • /
    • 2018
  • China media environment has drastically changed leading to the an inevitable change of public opinion ecology. Empirical studies have focused less on public opinion guidance, which forms an important component of the government officials' media literacy. This study applied quantitative method in the investigation of media literacy in China. Ideally, media literacy is measured from media cognition, media contact, media usage under the view of public opinion guidance. The findings reveal that the existing problem on 1) incorrect media cognition and public opinion guidance; 2) insufficient contact of personal social media 3) improper tendencies in the use of media to guide the public opinion, especially, on confidential information. Consequently, in order to improve media literacy in China government officials, enhancement of their basic knowledge on news diffusion and public opinion is necessary. Secondly, to effectively deal with "agenda settings", it is important for the government to consider the provision of valuable information and platforms to effectively spread information. So they need to learn how to personally and officially use social media platforms such as Weiboa and Wechat. This ensures they have maximized their potential to acquire valuable information and spread them on valuable platforms. Thirdly, government officials should be able to analyze and understand public opinion trends for official and personal use. Finally, they should understand the development of public opinion and the how online public opinion laws are formed and the target group.