• Title/Summary/Keyword: Dual Security

Search Result 143, Processing Time 0.025 seconds

An Efficient Quadratic Projection-Based Iris Recognition: Performance Improvements of Iris Recognition Using Dual QML (효율적인 Quadratic Projection 기반 홍채 인식: Dual QML을 적용한 홍채 인식의 성능 개선 방안)

  • Kwon, Taeyean;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.85-93
    • /
    • 2018
  • Biometric user authentications, day after day, propagate more to human life instead of traditional systems which use passwords and ID cards. However, most of these systems have many problems for given biometric information such noisy data, low-quality data, a limitation of recognition rate, and so on. To deal with these problems, I used Dual QML which is non-linear classification for classifying correctly the real-world data and then proposed preprocessing method for increasing recognition rate and performance by segmenting a specific region on an image. The previous published Dual QML used face, palmprint, ear for the experiment. In this paper, I used iris for experiment and then proved excellence of Dual QML at iris recognition. Finally I demonstrated these results (e.g. increasing recognition rate and performance, suitability for iris recognition) through experiments.

A Empirical Study on Mediating Effect of Social Capital on Employee's Dual Commitment (구성원의 이중몰입에 대한 사회적 자본의 매개 효과에 관한 실증연구)

  • Kim, Dong-Hyun;Jeong, Jae-Hoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.219-229
    • /
    • 2011
  • A empirical study about dual commitment of members of labor union for logistics companies based around the capital for their companies and union was carried out. This paper reviewed the effects of job security, organizational justice and social capital on dual commitment, and the mediating effect of social capital between job security and organizational justice, and dual commitment. Also, by establishing the social capital as a mediating variable, whether the effects of job security and organization justice to dual commitment exhibit mediating effects was identified.

Proposal and Implementation of Security Keypad with Dual Touch (이중 터치를 이용한 보안 키패드 제안 및 구현)

  • Song, Jinseok;Jung, Myung-Woo;Choi, Jung-In;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.73-80
    • /
    • 2018
  • Due to the popularity of smartphones and the simplification of financial services, the number of mobile financial services is increasing. However, the security keypads developed for existing financial services are susceptible to probability analysis attacks and have security vulnerabilities. In this paper, we propose and implement a security keypad based on dual touch. Prior to the proposal, we examined the existing types of security keypads used in the mobile banking and mobile payment systems of Korean mobile financial businesses and analyzed the vulnerabilities. In addition, we compared the security of the proposed dual touch keypad as well as existing keypads using the authentication framework and the existing keypad attack types (Brute Force Attack, Smudge Attack, Key Logging Attack, and Shoulder Surfing Attack, Joseph Bonneau). Based on the results, we can confirm that the proposed security keypad with dual touch presented in this paper shows a high level of security. The security keypad with dual touch can provide more secure financial services, and it can be applied to other mobile services to enhance their security.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

QR Code Based Mobile Dual Transmission OTP System (QR 코드를 이용한 모바일 이중 전송 OTP 시스템)

  • Seo, Se Hyeon;Choi, Chang Yeol;Lee, Goo Yeon;Choi, Hwang Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.377-384
    • /
    • 2013
  • In order to improve the security strength in the password based user authentication, in which the security vulnerability is increased while the same password is repeatedly used, the OTP(One-Time Password) system has been introduced. In the OTP systems, however, the user account information and OTP value may be hacked if the user PC is infected by the malicious codes, because the user types the OTP value, which is generated by the mobile device synchronized with the server, directly onto the user PC. In this paper, we propose a new method, called DTOTP(Dual Transmission OTP), to solve this security problem. The DTOTP system is an improved two-factor authentication method by using the dual transmission, in which the user performs the server authentication by typing the user account and password information onto the PC, and then for the OTP authentication the mobile device scans the QR code displayed on the PC and the OTP value is sent to the server directly. The proposed system provides more improved security strength than that of the existing OTP system, and also can adopt the existing OTP algorithm without any modification. As a result, the proposed system can be safely applied to various security services such like banking, portal, and game services.

A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory (침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로)

  • Kim, Chang-Il;Heo, Deok-Won;Lee, Hye-Min;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.62-80
    • /
    • 2019
  • The purpose of this study is to investigate the direct effect of victimization experience on cyber security behavior and the indirect effect of information protection awareness through the Dual Process Theory. Baron & Kenny regression analysis was conducted and the results are as follows - first, victimization experience has a positive effect on cyber security behavior; second, the relationship between victimization experience and cyber security behavior is mediated by cyber security awareness; and third, the direct effect of victimization experience on cyber security behavior and the indirect mediating effect of cyber security awareness are both positive (+). The direct effect of victimization experience on cyber security behavior is analyzed to be relatively large compared to the indirect effect that cyber security awareness has on cyber security behavior. Based on these results, It is suggested that periodic cyber security education and campaign policies are needed to enhance cyber security behavior.

Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems

  • Luo, Zhangkai;Wang, Huali;Zhou, Kaijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5610-5624
    • /
    • 2017
  • A novel scheme based on polarization modulation and the weighted fractional Fourier transform (PM-WFRFT) is proposed in this paper to enhance the physical layer security of dual-polarized satellite systems. This scheme utilizes the amplitude and phase of the carrier as information-bearing parameters to transmit the normal signal and conceals the confidential information in the carrier's polarization state (PS). After being processed by WFRFT, the characteristics of the transmit signal (including amplitude, phase and polarization state) vary randomly and in nearly Gaussian distribution. This makes the signal very difficult for an eavesdropper to recognize or capture. The WFRFT parameter is also encrypted by a pseudo-random sequence and updated in real time, which enhances its anti-interception performance. Furthermore, to prevent the polarization-based impairment to PM-WFRFT caused by depolarization in the wireless channel, two components of the polarized signal are transmitted respectively in two symbol periods; this prevents any mutual interference between the two orthogonally polarized components. Demodulation performance in the system was also assessed, then the proposed scheme was validated with a simulated dual-polarized satellite system.

Dual LAN Topology with the Dual Path Ethernet Module (서버 독립적 LAN 이중화 모듈을 통한 네트워크 속도 및 가용성 향상 방안)

  • Park, Ji-Hun;Park, Jong-Gyu;Han, Il-Seok;Kim, Hak-Bae
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.3
    • /
    • pp.264-269
    • /
    • 2002
  • A Dual-Path Ethernet Module(DPEM) is developed to improve Local Area Network (LAN)'s performance, High Availability(H/A) and security. Since a DPEM simply locates at the front end of any network device as a transparent add-on, it does not require sophisticated server reconfiguration. Our evaluation results show that the developed scheme is more efficient than conventional LAN structures in various aspects.

Dual-Band Fractal Antenna with Bandwidth Improvement for Wireless Applications

  • Nsir, Chiraz Ben;Boussetta, Chokri;Ribero, Jean-Marc;Gharsallah, Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.75-80
    • /
    • 2021
  • In this paper, a dual-band Koch Snowflake antenna is proposed for wireless communication systems. Fractal geometry, CPW-feed and stepped ground planes are used to improve the impedance bandwidth. By properly introducing a hexagonal split-ring slot to radiating element, a lower frequency band is generated. The proposed structure is fabricated and tested. Experiment results exhibit dual-band of 0.73-0.98 GHZ and 1.6-3.1 GHz which makes this antenna suitable candidate for GSM900, GSM1800, UTMS2100, Wi-Fi 2400 and LTE2600 bands. In addition, a good radiation pattern, a satisfactory peak gain and a radiation efficiency, which reaches 95%, are achieved.