• Title/Summary/Keyword: Data protection

Search Result 3,440, Processing Time 0.043 seconds

Generation and Protection of Efficient Watermark Signals and Image Quality Preservation in Transmission Channel Using Turbo Coding (효과적인 워터마크 신호의 생성과 보호 및 터보코딩을 이용한 전송채널상에서의 화질 보존)

  • Cho, Dong-Uk;Bae, Young-Lae
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.91-98
    • /
    • 2002
  • In this paper, an implementation method of the efficient image transmission stage using watermarking and channel ceding is proposed. Usually, image communication system consists of both a transmitter part and a receiver part. The transmitter part takes charge of copyright protection of the generated image data, and image coding and compression that can deal with channel noises when transmitting. In the transmitter part, we propose a channel coding method which protects both the watermark signal and the original signal for protecting the copyright of image data and solving channel noises when transmitting. Firstly, copyright protection of image data is conducted. For this, image structure analysis is performed, and both the improvement of image quality and the generation of the watermark signal are made. Then, the histogram is constructed and the watermark signals are selected from this. At this stage, by embedding of the coefficients of curve fittness into the lower 4 bits of the image data pixels, image quality degradation due to the embedding of watermark signals are prevented. Finally, turbo coding, which has the most efficient error correction capability in error correction codes, has been conducted to protect signals of watermark and preserved original image quality against noises on the transmission channel. Particularly, a new interleaving method named "semi random inter]easer" has been proposed.

Geographic Information System Application to Wellhead Protection Area Delineation (우물수원 보호구역의 범위 결정에 대한 지형정보시스템의 응용)

  • Kim, Chul
    • Journal of Korea Water Resources Association
    • /
    • v.31 no.1
    • /
    • pp.27-34
    • /
    • 1998
  • Groundwater simulation model suing GIS and Arc/Info Gridfunctions were used to delineate wellhead protection areas. Groundwater simulation model was developed within Arcview GIS. The model. which integrates the data input and manipulation. Process simulation. and display of the results . was developed by considering time variations of the parameters. The model was applied to the EPA data. The hydraulic distributions from the EPA data and those calculated from groundwater simulation model agree well and zone of influence from EPA data and that calculated suing GRID functions seem to be consistent. The developed model may be an efficient tool to delineate WHPA because it integrates all the processes inside the GIS.

  • PDF

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

A Study of Automatic Deep Learning Data Generation by Considering Private Information Protection (개인정보 보호를 고려한 딥러닝 데이터 자동 생성 방안 연구)

  • Sung-Bong Jang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.435-441
    • /
    • 2024
  • In order for the large amount of collected data sets to be used as deep learning training data, sensitive personal information such as resident registration number and disease information must be changed or encrypted to prevent it from being exposed to hackers, and the data must be reconstructed to match the structure of the built deep learning model. Currently, these tasks are performed manually by experts, which takes a lot of time and money. To solve these problems, this paper proposes a technique that can automatically perform data processing tasks to protect personal information during the deep learning process. In the proposed technique, privacy protection tasks are performed based on data generalization and data reconstruction tasks are performed using circular queues. To verify the validity of the proposed technique, it was directly implemented using C language. As a result of the verification, it was confirmed that data generalization was performed normally and data reconstruction suitable for the deep learning model was performed properly.

Design of Pitch Limit Detection Algorithm for Submarine (잠수함의 종동요각 한계예측 알고리즘 설계)

  • Park, Jong-Yong;Kim, Nakwan;Shin, Yong-Ku
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.2
    • /
    • pp.134-140
    • /
    • 2016
  • An envelope protection system is a control system that allows a submarine to operate freely using its own operational envelope without exceeding the structural limit, dynamic limit, and control input limit. In this paper, an envelope protection system for the pitch angle of a submarine is designed using a dynamic trim algorithm. A linear quadratic regulator and artificial neural network are used for the true dynamics approximation. A submarine maneuvering simulation program developed using experimental data is used to validate the designed envelope protection system. Simulation results show the effectiveness of the designed envelope protection system.

A Special Protection Scheme Against a Local Low-Voltage Problem and Zone 3 Protection in the KEPCO System

  • Yun, Ki-Seob;Lee, Byong-Jun;Song, Hwa-Chang
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.3
    • /
    • pp.294-299
    • /
    • 2007
  • This paper presents a special protection scheme, which was established in the KEPCO (Korea Electric Power Corporation) system, against a critically low voltage profile in a part of the system after a double-circuit tower outage. Without establishing the scheme, the outage triggers the operation of a zone 3 relay and trips the component. This sequence of events possibly leads to a blackout of the local system. The scheme consists of an inter-substation communication network using PITR (Protective Integrated Transmitter and Receiver) for acquisition of the substations' data, and under-voltage load shedding devices. This paper describes the procedure for determining the load shedding in the scheme and the experiences of the implementation.

Adaptive Protection Algorithm for Overcurrent Relay in Distribution System with DG

  • Sung, Byung Chul;Lee, Soo Hyoung;Park, Jung-Wook;Meliopoulos, A.P.S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.5
    • /
    • pp.1002-1011
    • /
    • 2013
  • This paper proposes the new adaptive protection algorithm for inverse-time overcurrent relays (OCRs) to ensure their proper operating time and protective coordination. The application of the proposed algorithm requires digital protection relays with microcontroller and memory. The operating parameters of digital OCRs are adjusted based on the available data whenever system conditions (system with distributed generation (DG)) vary. Moreover, it can reduce the calculation time required to determine the operating parameters for achieving its purpose. To verify its effectiveness, several case studies are performed in time-domain simulation. The results show that the proposed adaptive protection algorithm can keep the proper operating time and provide the protective coordination time interval with fast response.

Concepts, Quantities, Units and Terminology for Non-ionizing Radiation (비이온화방사선에 대한 제반 개념 양, 단위 및 용어)

  • Lee, Soo-Yong
    • Journal of Radiation Protection and Research
    • /
    • v.20 no.3
    • /
    • pp.201-213
    • /
    • 1995
  • Protection against non-ionizing radiation(NIR) is the subject of an increasing interest but the use of very different concepts depending on the type of radiation or application, makes it rather difficult to compile studies and the data obtained in an uniformity in this field. The main object of the present paper is to summarizes and provide an inventory of concepts, quantities, units and terminology currently used for purposes of NIR protection. Furthermore a systematic classification and comparison of these quantities is given, and in particular the concepts used to quantify exposure limitation and radiation protection standards are summarized and discussed.

  • PDF

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.