• Title/Summary/Keyword: Id-1

Search Result 1,042, Processing Time 0.027 seconds

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

A Design of high throughput IDCT processor in Distrited Arithmetic Method (처리율을 개선시킨 분산연산 방식의 IDCT 프로세서 설계)

  • 김병민;배현덕;조태원
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.40 no.6
    • /
    • pp.48-57
    • /
    • 2003
  • In this paper, An 8${\times}$l ID-IDCT processor with adder-based distributed arithmetic(DA) and bit-serial method Is presented. To reduce hardware cost and to improve operating speed, the proposed 8${\times}$1 ID-IDCT used the bit-serial method and DA method. The transform of coefficient equation results in reduction in hardware cost and has a regularity in implementation. The sign extension computation method reduces operation clock. As a result of logic synthesis, The gate count of designed 8${\times}$1 1D-IDCT is 17,504. The sign extension processing block has gate count of 3,620. That is 20% of total 8${\times}$1 ID-IDCT architecture. But the sign extension processing block improves more than twice in throughput. The designed IDCT processes 50Mpixels per second and at a clock frequency of 100MHz.

Analysis and Improvement of ID-based Key Distribution Systems (개인정보에 기초한 키 분배방식의 분석 및 개선방안)

  • 임채훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.47-65
    • /
    • 1991
  • An ID-based scheme provides a very efficient solution to the key distribution problem, since it can solve bothe the authentication problem and the communication complexity problem in a public key scheme. Especilly, and ID-Based ndninterative key distribution system plays an crucial roie in the one-way communication environment such as secure electronic mail, owing to its noninteractiveness. This paper aims at analyzing the previously proposed scheme s and providing possible improvements. It also demonstraes that the Maurey-Yacobi's scheme presented in Eurocry'91 is not secure, and provikdes an countemeasure to overcome the security problem.

Antiinflammatory Activity of Ketoprofen Gel (케토프로펜 겔의 함염증작용)

  • Tan, Hyun-Kwang;Chi, Sang-Cheul;Jun, H.Won
    • Journal of Pharmaceutical Investigation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 1994
  • The antiinflammatory and antirheumatic activities of a 3% ketoprofen gel (ID-GEL) were evaluated using carrageenan-induced paw edema method and adjuvant-induced arthritis method, respectively, after its transdermal administration of 50 mg on rat paws in reference to existing transdermal preparations containing 3% ketoprofen and other nonsteroidal antiinflammatory drugs (NSAIDs). The % inhibition of carrageenan-induced edema by ID-GEL was 56.2-65.0%, close to the maximum inhibition obtainable with this model, while the % inhibition by existing 3% ketoprofen gels and other NSAID transdermal preparations were 33.8-47.7% and 18.7-29.2%, respectively. ID-GEL had a pronounced antirheumatic activity in both preventive and curative studies with adjuvant-induced arthritis in rats in respect with the inhibition of edema, arthritis score and weight gain, in reference to existing 3% ketoprofen gel.

  • PDF

Percutaneous Absorption of Ketoprofen from Gel Preparations (케토프로펜 겔제제로부터 약물의 경피흡수)

  • Tan, Hyun-Kwang;Chi, Sang-Cheul;Jun, H.Won
    • Journal of Pharmaceutical Investigation
    • /
    • v.24 no.1
    • /
    • pp.11-16
    • /
    • 1994
  • In order to reduce the systemic side effects and gastrointestinal irritation of ketoprofen after its oral administration, it was formulated as a 3% ketoprofen gel (ID-GEL) with Pluronic F-127. The pharmacokinetic characteristics of ID-GEL was evaluated following its transdermal application on the dorsal skin of rats at the dose of 9 mg/kg in reference to those of existing 3% ketoprofen gels. Even though the maximum concentration of 810 ng/ml was reached at 6 hrs postdose, the plasma concentration was kept almost constant until 24 hrs postdose, which suggested that ketoprofen was released continuously from the gel during this period. The bioavailability of ID-GEL was two times higher than those of existing 3% ketoprofen gels, based on the calculated area under the plasma concentration-time curves after the percutaneous administration.

  • PDF

이진 변화탐지 컴포넌트의 개발 및 변화영상의 비교 연구

  • Yu, Byeong-Hyeok;Ji, Gwang-Hun
    • Proceedings of the KSRS Conference
    • /
    • 2008.03a
    • /
    • pp.231-236
    • /
    • 2008
  • 본 연구에서는 이진 변화탐지 방법상 요구되는 수동적인 자료처리 단계들을 모듈화하고 통합한 '이진 변화탐지 컴포넌트'를 개발하였으며, 대전 지역의 IKONOS 다중시계열 위성영상의 2개 연구지역에 적용함으로써 그 성능을 검증하였다. 개발된 컴포넌트는 ESRI의 ArcGIS 9.x 상에서 설치 및 실행되며, Visual Basic과 GIS 객체 라이브러리의 결합을 통해 구현되었다. 적용된 모델은 Im. J.(2007)의 연구에서 제시된 '캘리브레이션 기법을 이용한 자동 이진 변화탐지 모델'을 확장 적용한 것으로, 변화영상 히스토그램의 비정규분포를 고려한 누적 생산자 및 사용자 정확도 평가 기법이 최적 임계치 결정에 사용되었다. 다양한 변화탐지 기술들, ID, IR, NCIs, CVA, PCA와 ID, IR의 결합이 실험을 통해 비교 분석되었다. 실험 결과, 개선된 캘리브레이션 기법 적용을 통해 기존 기법보다 향상된 분류정확도를 얻었으며, PC1의 ID가 연구지역의 변화탐지 상에서 가장 우수한 분류 능을 보여주었다.

  • PDF

Influence of Ion-Nitriding on Dynamic Fracture Toughness in Cr Alloy Steels (크롬합금강의 동적파괴인성에 미치는 이온실화처리의 영향)

  • 오세욱;윤한기;장래웅;김기술
    • Journal of Ocean Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.150-162
    • /
    • 1988
  • The dynamic fracture toughness, $K_{Id}$,is measured in the heat-treated and ion-nitrided Cr-Mo, Ni-Cr-Mo steel using standard and Precracked Charpy specimens an imstrumented impact machine. The value of $K_{Id}$and both the energy of initiate fracture, and the total energy of fracture. Since the $K_{Id}$values of the precraked impact specimens are in accord with their theoretical ones, this testing method is sufficently practical. The effect of ion-nitriding are found to be larger than the heat-treaded specimen.

  • PDF

Group Separation Anti-collision Algorithm for RFID Tag Recognition (효율적인 RFID 태그의 인식을 위한 Group Separation 충돌 방지 알고리즘 개발)

  • Lee, Hyun-Soo;Ko, Young-Eun;Bang, Sung-Il
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.29-30
    • /
    • 2007
  • In this paper, we propose Group Separation(GS) algorithm for RFID tag recognition. In GS algorithm, reader calculates tag ID by collision point, stores memory with the collision table. And reader classifies according to total number of tag ID's 1, requests each group. If tag comes into collision with the other tag, reader searches tag ID in collision table. As a result, we observes that transmitted data rate, the recognition time is decreased.

  • PDF

Study on 2BP Distance Bounding Protocol to Prevent Relay Attack in RFID environment (RFID 환경에서 중계공격을 방지를 위한 2BP Distance Bounding 프로토콜 연구)

  • Jung, Youn-Sung;Kim, Hyeong-Ju;Lee, A-Young;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.892-895
    • /
    • 2012
  • RIFD 시스템은 개체 인증, 전자결제 등 다양한 분야에서 사용되고 있다. 무선통신의 특성상 악의적인 공격자로부터 중계공격이 가능하여 공격자가 정당한 사용자로 가장할 수 있다. 이러한 중계공격을 예방하기 위하여 Distance Bounding이라는 개념의 프로토콜이 제안되어 왔다. 하지만, 기존 연구는 태그 ID 전달의 기밀성을 보장하지만 ID 검색의 비효율성 및 불필요한 두 번째 저속 단계가 존재하는 단점이 있다. 따라서 본 논문은 ID의 검색 없고, 시도 값과 응답 값을 2bits로 하여 마지막 저속 단계를 생략하며, 고속 단계에서 공격자의 공격 탐지 및 Terrorist 공격에 대하여 $(1/2)^n$의 공격 성공률을 갖는 2BP(2Bit 2Phase) Distance Bounding 프로토콜을 제안한다.

Implementation of Truck and Dock Management System for Manufacturers and Couriers using RF-ID

  • Lee, June-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.119-125
    • /
    • 2021
  • Companies' efforts to find ways to reduce logistics costs for products and raw materials currently being brought in to produce products in all manufacturing processes are one of the biggest challenges, and the recent global recession has made logistics management even more important. This development technology limits the development of IN/OUT Bound truck logistics and dock management optimization system in the factory, especially by using UHF 900Mhz RFID radio frequency technology.