• Title/Summary/Keyword: Electronic Attack

Search Result 237, Processing Time 0.023 seconds

Digital Watermarking on Image for View-point Change and Malicious Attacks (영상의 시점변화와 악의적 공격에 대한 디지털 워터마킹)

  • Kim, Bo-Ra;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.19 no.3
    • /
    • pp.342-354
    • /
    • 2014
  • This paper deals with digital watermarking methods to protect ownership of image with targeting the ultra-high multi-view or free-view image service in which an arbitrary viewpoint image should be rendered at the user side. The main purpose of it is not to propose a superior method to the previous methods but to show how difficult to construct a watermarking scheme to overcome the viewpoint translation attack. Therefore we target the images with various attacks including viewpoint translation. This paper first shows how high the error rate of the extracted watermark data from viewpoint-translated image by basic schemes of the method using 2DDCT(2D discrete cosine transform) and the one using 2DDWT(2D discrete wavelet transform), which are for 2D image. Because the difficulty in watermarking for the viewpoint-translated image comes from the fact that we don't know the translated viewpoint, we propose a scheme to find the translated viewpoint, which uses the image and the corresponding depth information at the original viewpoint. This method is used to construct the two non-blind watermarking methods to be proposed. They are used to show that recovery of the viewpoint affect a great deal of the error rate of the extracted watermark. Also by comparing the performances of the proposed methods and the previous ones, we show that the proposed ones are better in invisibility and robustness, even if they are non-blind.

PVD Image Steganography with Locally-fixed Number of Embedding Bits (지역적 삽입 비트를 고정시킨 PVD 영상 스테가노그래피)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.350-365
    • /
    • 2017
  • Steganography is a technique for secret data communication, which is not perceived by third person between a receiver and a transmitter. It has been developed for thousands of years for the transmission of military, diplomatic or business information. The development of digital media and communication has led to the development of steganography techniques in modern times. Technic of image steganography include the LSB, which fixes the number of embedded bits into a pixel, and PVD, which exploits the difference value in the neighboring pixel pairs. In the case of PVD image steganography, a large amount of information is embedded fluidly by difference value in neighboring pixel pairs and the designed range table. However, since the secret information in order is embedded, if an error of the number of embedded bits occurs in a certain pixel pair, all subsequent information will be destroyed. In this paper, we proposes the method, which improve the vulnerability of PVD property about external attack or various noise and extract secret information. Experimental process is comparison analysis about stego-image, which embedded various noise. PVD shows that it is not possible to preserve secret information at all about noise, but it was possible to robustly extract secret information for partial noise of stego-image in case of the proposed PVD image steganography with locally-fixed number of embedding bits.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Efficacy of ketamine in the treatment of migraines and other unspecified primary headache disorders compared to placebo and other interventions: a systematic review

  • Chah, Neysan;Jones, Mike;Milord, Steve;Al-Eryani, Kamal;Enciso, Reyes
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.21 no.5
    • /
    • pp.413-429
    • /
    • 2021
  • Background: Migraine headaches are the second leading cause of disability worldwide and are responsible for significant morbidity, reduction in the quality of life, and loss of productivity on a global scale. The purpose of this systematic review and meta-analysis was to evaluate the efficacy of ketamine on migraines and other primary headache disorders compared to placebo and other active interventions, such as midazolam, metoclopramide/diphenhydramine, and prochlorperazine/diphenhydramine. Methods: An electronic search of databases published up to February 2021, including Medline via PubMed, EMBASE, Web of Science, and Cochrane Library, a hand search of the bibliographies of the included studies, as well as literature and systematic reviews found through the search was conducted to identify randomized controlled trials (RCTs) investigating ketamine in the treatment of migraine/headache disorders compared to the placebo. The authors assessed the risk of bias according to the Cochrane Handbook guidelines. Results: The initial search strategy yielded 398 unduplicated references, which were independently assessed by three review authors. After evaluation, this number was reduced to five RCTs (two unclear risk of bias and three high risk of bias). The total number of patients in all the studies was 193. Due to the high risk of bias, small sample size, heterogeneity of the outcomes reported, and heterogeneity of the comparison groups, the quality of the evidence was very low. One RCT reported that intranasal ketamine was superior to intranasal midazolam in improving the aura attack severity, but not duration, while another reported that intranasal ketamine was not superior to metoclopramide and diphenhydramine in reducing the headache severity. In one trial, subcutaneous ketamine was superior to saline in migraine severity reduction; however, intravenous (I.V.) ketamine was inferior to I.V. prochlorperazine and diphenhydramine in another study. Conclusion: Further double-blind controlled studies are needed to assess the efficacy of ketamine in treating acute and chronic refractory migraines and other primary headaches using intranasal and subcutaneous routes. These studies should include a long-term follow-up and different ketamine dosages in diagnosed patients following international standards for diagnosing headache/migraine.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF