• Title/Summary/Keyword: Information Authenticity

Search Result 246, Processing Time 0.023 seconds

Signcryption Schemes with Forward Secrecy (Forward Secrecy를 제공하는 Signcryption 기법들)

  • 정희윤;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.43-52
    • /
    • 2001
  • Y. Zheng introduced a new type of cryptograghic primitive as \"signcryption\", which combines a function of digital signature scheme with a symmetric key encryption algorithm. Signcryption doesn\`t only provide authenticity and confidentiality in a single step, but also give more efficient computation than the traditional \"signature-then-encryption\". And C. Gamage proposed a proxy-signcryption that efficiently combines a proxy signature with the signcryption. But, in the proposed signcryption schemes, one who obtains the sender\`s private key can recover the original message of a signcrypted text. That is, forward secrecy is not offered by the signcryption scheme with respect to the sender\`s private key. In this paper, we will propose a modified signcryption of Zheng\`s signcryption and a variant of proxy-signcryption with forward secrecy.ith forward secrecy.

The Impact of Authentic Leadership on Job Satisfaction: The Mediating Role of Work Motivation (관리자의 진정성 리더십이 조직 구성원의 직무만족에 미치는 영향에 관한 연구: 동기부여의 매개효과를 중심으로)

  • Lee Jaejin;Joo Jae-Sung;Lee Sung-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.43-55
    • /
    • 2023
  • The purpose of this study is to examine the effects of authentic leadership on employee job satisfaction as well as the mediating role of motivation in the relationship between these two variables. Prior literature on authentic leadership have repeatedly argued that authentic leadership is not simply the ethically "right" thing to do, but also can effectively boost firm performance by increasing employees' job satisfaction and motivation. This study investigates whether the proposition is supported by empirical evidence in the context of Korean companies. Survey data were collected from 230 employees from several companies in South Korea. The results show that authentic leadership has a positive effect on employees' job satisfaction. As to the effects of authentic leadership and work motivation, authentic leadership turns out to have a positive effect on both extrinsic and intrinsic work motivation. The study also confirmed partial mediating effect of job satisfaction in the relationship between authentic leadership and job satisfaction.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.

A Study on the User Satisfaction of Records and Information Management System in Construction (건설 기록정보관리시스템 이용만족도에 관한 연구)

  • Yun, Kyoungsook;Lee, Yebin;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.2
    • /
    • pp.5-27
    • /
    • 2016
  • To be able to present authenticity, or to cope with patent related cases or any possible law suite for intellectual. The purpose of this study was to investigate factors affecting the satisfaction of records and information management system on the construction industry. Data was collected through a survey of 129 employees who work for A engineering company. Independent variables in this study included system quality, information quality, and service quality. Latent variable was selected as easy of use and usefulness. Dependent variable was user's satisfaction for the system. The results of analysis of structural equation modeling showed that system quality was found to have both direct and indirect impacts on user's satisfaction. On the other hand, information quality was significant only in direct impact on ease of use. Service quality was not statistically significant in the effect on user's satisfaction.

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.

Certificateless Strong Designated Verifier Signature Scheme (인증서가 없는 강한 지정된 검증자 서명기법)

  • Koo, Young-Ju;Chen, Ji-Young;Choi, Kyu-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.27-37
    • /
    • 2008
  • In the traditional signature techniques, anyone can verify the signed message. It may cause a problem since a receiver of the signature can transfer the conviction of signature to a third party. In 1996, Jakobsson introduced a designate verifier signature(DVS) which is allowed to verify only specific verifier. DVS is the solution of conflict between authenticity and privacy because it provides message authentication without non-repudiation property. In this paper based on the notion of certificateless, we suggest a certificateless strong designated verifier signature scheme including the notion of strong which provides privacy of the signer. We suggest a scheme which is first trial to propose a certificateless strong designated verifier signature scheme including the notion of strong and non-delegatability, although it is not more efficient than previous one.

The Effect of Influencer's Characteristics and Contnets Quality on Brand Attitude and Purchase Intention: Trust and Self-congruity as a Mediator (소셜미디어 인플루언서의 개인특성과 콘텐츠 특성이 브랜드 태도와 구매의도에 미치는 영향: 신뢰와 자아일치성을 매개로)

  • Lee, Myung Jin;Lee, Sang Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.5
    • /
    • pp.159-175
    • /
    • 2021
  • This study attempted to analyze the relationship between influencer's characteristic factors such as professionalism, authenticity, and interactivity and content quality factors consisting of accuracy, completeness, and diversity on brand attitude and purchase attitude through trust and self-consistency. To reveal the structural relationship between main variables, a survey was conducted on 201 users. An EFA, CFA, and reliability analysis were performed to confirm reliability and validity. And structural equation was conducted to verify hypothesis. The main results are as follows. First, it was found that professionalism and interactivity had a significant positive effect on trust. And, accuracy, completeness, and variety were all found to have a significant positive effect on trust. Second, in the relationship between individual characteristic factors and self-consistency, it was found that professionalism and authenticity had a significant positive effect on self-consistency. In addition, in the relationship between content quality and self-consistency, accuracy, completeness, and diversity were found to have a positive effect on self-consistency along with trust. Third, in the relationship between trust and self-consistency on brand attitude and purchase intention, both trust and self-consistency were found to have a statistically significant positive effect on brand attitude. It was found that only self-consistency and brand attitude had a statistically significant positive effect on purchase intention. These findings showed that when users perceive professionalism and interaction with influencer, trust increases, and professionalism and progress increase self-consistency with influencer. In addition, in the case of content quality, it was found that trust and self-consistency responded positively when perceived content quality through content accuracy, completeness, and diversity. Also, trust and self-consistency increased attitudes toward brands and could influence consumption behavior such as purchase intention. Therefore, for effective marketing performance using influencer's influence in the field of influencer marketing, which has a strong information delivery on products and brands, not only personal characteristics such as professionalism, authenticity, and interactivity, but also quality of content should be considered. The above research results are expected to suggest implications for marketing strategies and practices as one available basic data to exert the expected effect of marketing using influencer.

Effective Eye Detection for Face Recognition to Protect Medical Information (의료정보 보호를 위해 얼굴인식에 필요한 효과적인 시선 검출)

  • Kim, Suk-Il;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.923-932
    • /
    • 2017
  • In this paper, we propose a GRNN(: Generalized Regression Neural Network) algorithms for new eyes and face recognition identification system to solve the points that need corrective action in accordance with the existing problems of facial movements gaze upon it difficult to identify the user and. Using a Kalman filter structural information elements of a face feature to determine the authenticity of the face was estimated future location using the location information of the current head and the treatment time is relatively fast horizontal and vertical elements of the face using a histogram analysis the detected. And the light obtained by configuring the infrared illuminator pupil effects in real-time detection of the pupil, the pupil tracking was to extract the text print vector. The abstract is to be in fully-justified italicized text as it is here, below the author information.

Countermeasure against Social Technologic Attack using Privacy Input-Detection (개인정보 입력 감지를 이용한 사회공학적 공격 대응방안)

  • Park, Ki-Hong;Lee, Jun-Hwan;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.32-39
    • /
    • 2012
  • When you want to be given the on-line service, their homepage requires sign-up with detail personal information. This collected private information lead to mass data spill by hacking. Especially, this makes terrible social problems that the users who sign up their site are persistingly attacked and damaged by hackers using this information. As methods of the social technologic attacks are simple but based upon human psychology, it is easy that people become a victim in the majority of cases. There is a strategy blocking fishing sites by using the black list for defending these attacks. This tactic, however, has some problems that it isn't possible to handle new fishing sites having a short life-cycle. In this paper, we suggest two solutions to minimize data spill. One marks existing sites with the sign of a reliability measured by a comparison between black list and the white list; therefore, the user check the authenticity about the homepage. The other shut off previously the leaking of private information by sensing a entry of personal information into new sites.