• Title/Summary/Keyword: Inforamtion Leakage

Search Result 3, Processing Time 0.019 seconds

A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch (갤럭시 워치를 중심으로 본 스마트워치 활용 기술유출의 위험성 및 대응방안에 대한 연구)

  • Seungjae Jeon;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.893-906
    • /
    • 2023
  • Awareness that smartphones can be used as tools for criminal activity is prevalent in many organizations, but the functionally smartphone-like smartwatch's potential as a criminal tool is being overlooked. Considering this situation, this research verifies the possibility of information leakage through an insider's smartwatch in a situation where smartphones are controlled by security regulations and technologies, but smart watch are not. By analyzing information related application usage and Wi-Fi connection generated in the smartwatch during the verification process, forensic information and limitations are identified. Finally, this research proposes preventive methods to prepare for potential smartwatch-related crimes, and reconsiders awareness of the possibility of using smartwatches as criminal tools.

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

A Study on the Precise Lineament Recovery of Alluvial Deposits Using Satellite Imagery and GIS (충적층의 정밀 선구조 추출을 위한 위성영상과 GIS 기법의 활용에 관한 연구)

  • 이수진;석동우;황종선;이동천;김정우
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.04a
    • /
    • pp.363-368
    • /
    • 2003
  • We have successfully developed a more effective algorithm to extract the lineament in the area covered by wide alluvial deposits characterized by a relatively narrow range of brightness in the Landsat TM image, while the currently used algorithm is limited to the mountainous areas. In the new algorithm, flat areas mainly consisting of alluvial deposits were selected using the Local Enhancement from the Digital Elevation Model (DEM). The aspect values were obtained by 3${\times}$3 moving windowing of Zevenbergen & Thorno's Method, and then the slopes of the study area were determined using the aspect values. After the lineament factors in the alluvial deposits were revealed by comparing the threshold values, the first rank lineament under the alluvial deposits were extracted using the Hough transform In order to extract the final lineament, the lowest points under the alluvial deposits in a given topographic section perpendicular to the first rank lineament were determined through the spline interpolation, and then the final lineament were chosen through Hough transform using the lowest points. The algorithm developed in this study enables us to observe a clearer lineament in the areas covered by much larger alluvial deposits compared with the results extracted using the conventional existing algorithm. There exists, however, some differences between the first rank lineament, obtained using the aspect and the slope, and the final lineament. This study shows that the new algorithm more effectively extracts the lineament in the area covered with wide alluvlal deposits than in the areas of converging slope, areas with narrow alluvial deposits or valleys.

  • PDF