• Title/Summary/Keyword: Copy prevention

Search Result 51, Processing Time 0.025 seconds

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

POCS Based Digital Watermarking in Buyer-Seller Watermarking Protocal (Buyer-Seller 워터마킹 프로토콜 상에서 POCS 기반의 디지털 워터마킹)

  • Kwon, Seong-Geun;Lee, Ji-Hye;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.569-582
    • /
    • 2007
  • Digital watermarking technique for copyright protection and prevention of illegal copy and distribution can provide the reliable transaction to both buyer and seller in e-commerce through the cryptographic protocol such as 'Buyer-seller watermarking protocol'. Recently there has been researched about some cryptographic protocols for watermarking system but there has no yet mentioned about the implementation of practical watermarking technique in protocol. This paper presents the watermark embedding technique based on POCS in buyer-seller watermarking protocol. The proposed method designs the robust convex set based on EZW and the invisible convex set using PSNR and then projects into two sets until the convergence condition is satisfied. Experimental results verified that BER of watermark that is embedded by the proposed method has lower 0.02-0.10 than BER of the conventional method.

  • PDF

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Genomic characterization of clonal evolution during oropharyngeal carcinogenesis driven by human papillomavirus 16

  • Chae, Jeesoo;Park, Weon Seo;Kim, Min Jung;Jang, Se Song;Hong, Dongwan;Ryu, Junsun;Ryu, Chang Hwan;Kim, Ji-Hyun;Choi, Moon-Kyung;Cho, Kwan Ho;Moon, Sung Ho;Yun, Tak;Kim, Jong-Il;Jung, Yuh-Seog
    • BMB Reports
    • /
    • v.51 no.11
    • /
    • pp.584-589
    • /
    • 2018
  • Secondary prevention via earlier detection would afford the greatest chance for a cure in premalignant lesions. We investigated the exomic profiles of non-malignant and malignant changes in head and neck squamous cell carcinoma (HNSCC) and the genomic blueprint of human papillomavirus (HPV)-driven carcinogenesis in oropharyngeal squamous cell carcinoma (OPSCC). Whole-exome (WES) and whole-genome (WGS) sequencing were performed on peripheral blood and adjacent non-tumor and tumor specimens obtained from eight Korean HNSCC patients from 2013 to 2015. Next-generation sequencing yielded an average coverage of $94.3{\times}$ for WES and $35.3{\times}$ for WGS. In comparative genomic analysis of non-tumor and tumor tissue pairs, we were unable to identify common cancer-associated early mutations and copy number alterations (CNA) except in one pair. Interestingly, in this case, we observed that non-tumor tonsillar crypts adjacent to HPV-positive OPSCC appeared normal under a microscope; however, this tissue also showed weak p16 expression. WGS revealed the infection and integration of high-risk type HPV16 in this tissue as well as in the matched tumor. Furthermore, WES identified shared and tumor-specific genomic alterations for this pair. Clonal analysis enabled us to infer the process by which this transitional crypt epithelium (TrCE) evolved into a tumor; this evolution was accompanied by the subsequent accumulation of genomic alterations, including an ERBB3 mutation and large-scale CNAs, such as 3q27-qter amplification and 9p deletion. We suggest that HPV16-driven OPSCC carcinogenesis is a stepwise evolutionary process that is consistent with a multistep carcinogenesis model. Our results highlight the carcinogenic changes driven by HPV16 infection and provide a basis for the secondary prevention of OPSCC.

Detection of mcr-1 Plasmids in Enterobacteriaceae Isolates From Human Specimens: Comparison With Those in Escherichia coli Isolates From Livestock in Korea

  • Yoon, Eun-Jeong;Hong, Jun Sung;Yang, Ji Woo;Lee, Kwang Jun;Lee, Hyukmin;Jeong, Seok Hoon
    • Annals of Laboratory Medicine
    • /
    • v.38 no.6
    • /
    • pp.555-562
    • /
    • 2018
  • Background: The emerging mobile colistin resistance gene, mcr-1, is an ongoing worldwide concern and an evaluation of clinical isolates harboring this gene is required in Korea. We investigated mcr-1-possessing Enterobacteriaceae among Enterobacteriaceae strains isolated in Korea, and compared the genetic details of the plasmids with those in Escherichia coli isolates from livestock. Methods: Among 9,396 Enterobacteriaceae clinical isolates collected between 2010 and 2015, 1,347 (14.3%) strains were resistant to colistin and those were screened for mcr-1 by PCR. Colistin minimum inhibitory concentrations (MICs) were determined by microdilution, and conjugal transfer of the mcr-1-harboring plasmids was assessed by direct mating. Whole genomes of three mcr-1-positive Enterobacteriaceae clinical isolates and 11 livestock-origin mcr-1-positive E. coli isolates were sequenced. Results: Two E. coli and one Enterobacter aerogenes clinical isolates carried carried IncI2 plasmids harboring mcr-1, which conferred colistin resistance (E. coli MIC, 4 mg/L; E. aerogenes MIC, 32 mg/L). The strains possessed the complete conjugal machinery except for E. aerogenes harboring a truncated prepilin peptidase. The E. coli plasmid transferred more efficiently to E. coli than to Klebsiella pneumoniae or Enterobacter cloacae recipients. Among the three bacterial hosts, the colistin MIC was the highest for E. coli owing to the higher mcr-1-plasmid copy number and mcr-1 expression levels. Ten mcr-1-positive chicken-origin E. coli strains also possessed mcr-1-harboring IncI2 plasmids closely related to that in the clinical E. aerogenes isolate, and the remaining one porcine-origin E. coli possessed an mcr-1-harboring IncX4 plasmid. Conclusions: mcr-1-harboring IncI2 plasmids were identified in clinical Enterobacteriaceae isolates. These plasmids were closely associated with those in chicken-origin E. coli strains in Korea, supporting the concept of mcr-1 dissemination between humans and livestock.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

Confirmation of Drought Tolerance of Ectopically Expressed AtABF3 Gene in Soybean

  • Kim, Hye Jeong;Cho, Hyun Suk;Pak, Jung Hun;Kwon, Tackmin;Lee, Jai-Heon;Kim, Doh-Hoon;Lee, Dong Hee;Kim, Chang-Gi;Chung, Young-Soo
    • Molecules and Cells
    • /
    • v.41 no.5
    • /
    • pp.413-422
    • /
    • 2018
  • Soybean transgenic plants with ectopically expressed AtABF3 were produced by Agrobacterium-mediated transformation and investigated the effects of AtABF3 expression on drought and salt tolerance. Stable Agrobacterium-mediated soybean transformation was carried based on the half-seed method (Paz et al. 2006). The integration of the transgene was confirmed from the genomic DNA of transformed soybean plants using PCR and the copy number of transgene was determined by Southern blotting using leaf samples from $T_2$ seedlings. In addition to genomic integration, the expression of the transgenes was analyzed by RT-PCR and most of the transgenic lines expressed the transgenes introduced. The chosen two transgenic lines (line #2 and #9) for further experiment showed the substantial drought stress tolerance by surviving even at the end of the 20-day of drought treatment. And the positive relationship between the levels of AtABF3 gene expression and drought-tolerance was confirmed by qRT-PCR and drought tolerance test. The stronger drought tolerance of transgenic lines seemed to be resulted from physiological changes. Transgenic lines #2 and #9 showed ion leakage at a significantly lower level (P < 0.01) than ${\underline{n}}on-{\underline{t}}ransgenic$ (NT) control. In addition, the chlorophyll contents of the leaves of transgenic lines were significantly higher (P < 0.01). The results indicated that their enhanced drought tolerance was due to the prevention of cell membrane damage and maintenance of chlorophyll content. Water loss by transpiration also slowly proceeded in transgenic plants. In microscopic observation, higher stomata closure was confirmed in transgenic lines. Especially, line #9 had 56% of completely closed stomata whereas only 16% were completely open. In subsequent salt tolerance test, the apparently enhanced salt tolerance of transgenic lines was measured in ion leakage rate and chlorophyll contents. Finally, the agronomic characteristics of ectopically expressed AtABF3 transgenic plants ($T_2$) compared to NT plants under regular watering (every 4 days) or low rate of watering condition (every 10 days) was investigated. When watered regularly, the plant height of drought-tolerant line (#9) was shorter than NT plants. However, under the drought condition, total seed weight of line #9 was significantly higher than in NT plants (P < 0.01). Moreover, the pods of NT plants showed severe withering, and most of the pods failed to set normal seeds. All the evidences in the study clearly suggested that overexpression of the AtABF3 gene conferred drought and salt tolerance in major crop soybean, especially under the growth condition of low watering.

DNA Watermarking Method based on Random Codon Circular Code (랜덤 코돈 원형 부호 기반의 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.

A Study on Legal and Institutional Improvement Measures for the Effective Implementation of SMS -Focusing on Aircraft Accident Investigation-

  • Yoo, Kyung-In
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.101-127
    • /
    • 2017
  • Even with the most advanced aviation technology benefits, aircraft accidents are constantly occurring while air passenger transportation volume is expected to double in the next 15 years. Since it is not possible to secure aviation safety only by the post aircraft accident safety action of accident investigations, it has been recognized and consensus has been formed that proactive and predictive prevention measures are necessary. In this sense, the aviation safety management system (SMS) was introduced in 2008 and has been carried out in earnest since 2011. SMS is a proactive and predictive aircraft accident preventive measure, which is a mechanism to eliminate the fundamental risk factors by approaching organizational factors beyond technological factors and human factors related to aviation safety. The methodology is to collect hazards in all the sites required for aircraft operations, to build a database, to analyze the risks, and through managing risks, to keep the risks acceptable or below. Therefore, the improper implementation of SMS indicates that the aircraft accident prevention is insufficient and it is to be directly connected with the aircraft accident. Reports of duty performance related hazards including their own errors are essential and most important in SMS. Under the policy of just culture for voluntary reporting, the guarantee of information providers' anonymity, non-punishment and non-blame should be basically secured, but to this end, under-reporting is stagnant due to lack of trust in their own organizations. It is necessary for the accountable executive(CEO) and senior management to take a leading role to foster the safety culture initiating from just culture with the safety consciousness, balancing between safety and profit for the organization. Though a Ministry of Land, Infrastructure and Transport's order, "Guidance on SMS Implementation" states the training required for the accountable executive(CEO) and senior management, it is not legally binding. Thus it is suggested that the SMS training completion certificates of accountable executive(CEO) and senior management be included in SMS approval application form that is legally required by "Korea Aviation Safety Program" in addition to other required documents such as a copy of SMS manual. Also, SMS related items are missing in the aircraft accident investigation, so that organizational factors in association with safety culture and risk management are not being investigated. This hinders from preventing future accidents, as the root cause cannot be identified. The Aircraft Accident Investigation Manuals issued by ICAO contain the SMS investigation wheres it is not included in the final report form of Annex 13 to the Convention on International Civil Aviation. In addition, the US National Transportation Safety Board(NTSB) that has been a substantial example of the aircraft accident investigation for the other accident investigation agencies worldwide does not appear to expand the scope of investigation activities further to SMS. For these reasons, it is believed that investigation agencies conducting their investigations under Annex 13 do not include SMS in the investigation items, and the aircraft accident investigators are hardly exposed to SMS investigation methods or techniques. In this respect, it is necessary to include the SMS investigation in the organization and management information of the final report format of Annex 13. In Korea as well, in the same manner, SMS item should be added to the final report format of the Operating Regulation of the Aircraft and Railway Accident Investigation Board. If such legal and institutional improvement methods are complemented, SMS will serve the purpose of aircraft accident prevention effectively and contribute to the improvement of aviation safety in the future.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.