• 제목/요약/키워드: Copying

검색결과 305건 처리시간 0.025초

극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘 (An Efficient Routing Algorithm for extreme networking environments)

  • 왕종수;서두옥
    • 디지털산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.

파일유출 방지를 위한 저장장치 제어기법에 대한 연구 (A Study of Storage Device Control Method for File Outflow Protecting)

  • 최주호;류성열
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.1-11
    • /
    • 2006
  • 클라이언트에 저장된 파일이나 도면등의 자료가 외부로 유출되는 것을 방지하기 위해서는 파일을 생성한 자신도 관리자의 허락 없이는 저장장치로 파일을 저장/복사할 수 없는 제어가 필요하다. 저장장치 제어를 위하여 저장장치를 디바이스와 드라이브로 인식할 수 있어야 하고, 저장장치의 사용을 제어하기 위한 제어값 설정과 저장프로세스를 후킹하여 파일의 저장을 제한 할 수 있는 방법을 연구한다. 이를 수행하기 위하여 파일시스템의 Win32 API함수를 후킹하여 해당드라이브에 설정된 제어값을 참조하고 파일의 저장프로세스를 제어하는 기법을 제안하였다. 제안한 기법이 제어가 설정된 저장장치에 파일을 복사/저장하면 쓰기가 금지되어 제어가 수행됨을 실험으로 확인하였다.

  • PDF

An Effective Encryption Algorithm for 3D Printing Model Based on Discrete Cosine Transform

  • Pham, Ngoc-Giao;Moon, Kwnag-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제21권1호
    • /
    • pp.61-68
    • /
    • 2018
  • In this paper, we present an effective encryption algorithm for 3D printing models in the frequency domain of discrete cosine transform to prevent illegal copying, access in the secured storage and transmission. Facet data of 3D printing model is extracted to construct a three by three matrix that is then transformed to the frequency domain of discrete cosine transform. The proposed algorithm is based on encrypting the DC coefficients of matrixes of facets in the frequency domain of discrete cosine transform in order to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm is provide a better method and more security than previous methods.

DIGITAL WATERMARK REPRODUCTION IMAGE ATTESTATION THAT USES PHASE ONLY CORRELATION METHOD

  • Inaba, Fumiya;Tanaka, Ken-Ichi
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.508-511
    • /
    • 2009
  • The infringement of the copyright is a problem by the distribution of digital contents copied illegally. The digital watermark is expected as a thing preventing unjust copying by burying information in digital data such as image, animation, the sound, TV, radio and movies. [1] [2]But a noise is included in a digital watermark reproduction image. So there is the case that the certification of the reproduction image has difficulty with. If a computer cannot recognize the information reproduced from digital watermarking, the information does not have a meaning. This paper aimed at improvement of the proof of a digital-watermarking reproduction image. And it is verified whether the difference of the form of a character affects the degree of correlation.

  • PDF

전통한지 표면 및 단면의 현미경적 관찰 (Microscopic Observation of Surface and Cross Section of Korean Traditional Paper-Hanji)

  • 윤승락
    • 펄프종이기술
    • /
    • 제47권6호
    • /
    • pp.49-56
    • /
    • 2015
  • To investigate fiber orientation of Korean traditional paper, Hanji, the fiber arrangements on the surface and cross section of Hanji were observed by scanning electron microscope (SEM). The surface observation showed that the fibers of traditional paper were arranged in vertical and horizontal directions, and those of ssangbal sheet forming were arranged more in vertical direction. The fibers of machine made Hanji and copying paper were usually arranged in vertical direction. As for the observation of cross section of traditional paper, fibers arranged in horizontal direction tended to be increased with the increase of thicknesses. The thick traditional paper have cracks in the middle part of structural section of paper. They were larger in cross section in horizontal direction than in vertical direction. The horizontal arrangement of traditional paper seemed to be about 8% to 14% higher to the vertical arrangement, which is very lower to other papers.

Crowning 롤러를 이용한 벨트 이송 시스템의 시뮬레이션 (Simulation for Belt Transport System using Crowning Roller)

  • 유상헌;인용석;최연선;구자춘
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2006년도 춘계학술대회논문집
    • /
    • pp.676-679
    • /
    • 2006
  • The media transport in automatic office machines such as printers, ATMs, copying machines is achieved by a complicated belt system. The system generally uses a crowning roller and belt which has been well-known for its intrinsic belt centering advantage during its operation. Since the modern office machines require precise high operating speed, stabilization of media transporting system has been one of the important issues of the machine design. Even a minor defect of the belt or the roller in the transport system directly affects its operating stability. This paper delivers a simulation technique that combines a multi-body dynamics analysis routine and a FEM based flexible continuum modeling for the efficient simulation of the flexible media transport problems.

  • PDF

벨트 이송 시스템의 결함 진단을 위한 시뮬레이션 (Simulation for Defect Diagnosis in Belt Transport System)

  • 이남훈;유상헌;인용석;최연선;구자춘
    • 한국소음진동공학회논문집
    • /
    • 제16권4호
    • /
    • pp.366-371
    • /
    • 2006
  • As functional requirements of automatic office machines like printers, Automatic Tellex Machines(ATMs), copying machines are on a trend for the higher speed and precision, extensive technical advances are being developed and implemented in the industry. Media transport system is a device to convey a sheet of paper in ATMs and printers. The stability of media transport system is a matter of concern as their operating throughput rapidly increases. And defects of belts or rollers in a transport system directly affect the level of stability of the system. Therefore an automatic diagnostic system for predicting various defects is necessary for the stable operation of the media transport system. A simulation based on multi-body dynamics has been done for a feasibility study of a system design for the defect anticipation.

3D DCT Video Information Hiding

  • Kim, Young-Gon;Jie Yang;Lee, Hye-Joo;Hong, Jin-Woo;Lee, Moon-Ho
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2002년도 정기총회 및 학술대회
    • /
    • pp.169-172
    • /
    • 2002
  • Embedding information into video data is a topic that recently gained increasing attention. This paper proposes a new approach for digital watermarking and secure copyright protection of video, the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the three dimensional discrete cosine transform of video scene, in contrast with previous works on video watermarking where each video frame was marked separately, or where only intra-frame or motion compensation parameters were marked in MPEG compressed videos. The watermark sequence used is encrypted, pseudo-noise signal to the video. The performance of the presented technique is evaluated experimentally

  • PDF

Robust 3D Wavelet Watermarking for Video

  • Jie Yang;Kim, Young-Gon;Lee, Moon-Ho
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2002년도 정기총회 및 학술대회
    • /
    • pp.173-176
    • /
    • 2002
  • This paper proposes a new approach for digital watermarking and secure copyright protection of video. the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the three dimensional discrete wavelet transform of video scene. The watermark is a copyright information encoded in the form of a spread spectrum signal to ensure the system security and is embedded in the 3D DWT magnitude of video chunks. The performance of the presented technique is evaluated experimentally.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권2호
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.