• 제목/요약/키워드: Information Verification

검색결과 3,486건 처리시간 0.031초

Cryptol을 이용한 국내 표준 블록 암호 모듈의 자동 정형 검증 (Automated Formal Verification of Korean Standard Block Cipher Using Cryptol)

  • 최원빈;김승주
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.53-60
    • /
    • 2018
  • 암호 알고리즘은 세계적으로 표준화가 진행되고 있으며, 암호 알고리즘의 안전성은 충분히 입증되어 왔다. 하지만, 기존 검증 방법으로는 구현상의 취약점이 존재하여 심각한 피해를 야기할 수 있기 때문에 표준에 따라 올바르게 구현되었는지에 대한 개선된 검증 방법이 필요하다. 그러므로 본 논문에서는 국가정보원에서 수행하는 128비트 이상 블록 암호 모듈 중에서 검증 대상인 ARIA와 LEA를 선정하였고, 고신뢰 암호 모듈을 위해 Cryptol을 이용하여 올바르게 구현되었는지 검증하는 방법을 제시하고자 한다.

시맨틱 웹 기술을 이용한 특성 모델 및 특성 구성 검증 도구 (Verification Tool for Feature Models and Configurations using Semantic Web Technologies)

  • 최승훈
    • 한국IT서비스학회지
    • /
    • 제10권3호
    • /
    • pp.189-201
    • /
    • 2011
  • Feature models are widely used to model commonalities and variabilities among products during software product line development. Feature configurations are generated by selecting the features to be included in individual products. Automated tools to identify errors or inconsistencies in the feature models and configurations are essential to successful software product line engineering. This paper proposes a verification technique and tool based on semantic web technologies such as OWL, SWRL and Protege API. This approach checks the feature model and configuration based on predefined rules and provides information on existence of errors as well as the kinds of those errors. This approach is extensible due to ease of rule modification and may be easily applied to other environments because semantic web technologies can be easily integrated with other programming environments. This paper demonstrates how various semantic web-related technologies can support automatic verification of one kind of software development artifact, the feature model.

사용자 인증 보안을 위한 동적 서명인증시스템 (Dynamic Signature Verification System for the User Authentication Security)

  • 김진환;조혁규;차의영
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(3)
    • /
    • pp.131-134
    • /
    • 2002
  • As the increased use of computer, wired/wireless/mobile Internet, security in using Internet becomes a more important problem. Thus, biometric technology using physical and behavior characteristics of a person is hot issue. Many different types of biometric technologies of a person such as fingerprint, face, iris, vein, DNA, brain wave, palm, voice, dynamic signature, etc. had already been studied but remained unsuccessful because they do not meet social demands. However, recently many of these technologies have been actively revived and researchers have developed new products on various commercial fields. Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, the down/up/movement of pen when the signer input his signature with an electronic pen for his authentication. Then signature verification system collects mentioned above various feature information and compares it with the original one and simultaneously analyzes to decide whether signature is forgery or true. The prospect of signature verification technology is very promising and its use will be wide spread in terms of economy, security, practicality, stability and convenience.

  • PDF

고성능 동적 서명인증시스템 구현 (Implementation of Advanced Dynamic Signature Verification System)

  • 김진환;조혁규;차의영
    • 한국정보통신학회논문지
    • /
    • 제9권4호
    • /
    • pp.890-895
    • /
    • 2005
  • 동적(온라인) 서명인증시스템은 내부 처리 과정에서는 불필요한 점들을 제거하는 전처리과정, 서명의 변화폭을 줄여주고 서명자의 고유한 특징 정보를 추출하는 특징추출과정, 두 서명의 특징벡터를 비교하여 유사도를 계산하는 비교과정, 보안수준에 따른 인증 여부를 결정하는 판단과정으로 구성되며, 사용자 관점에서의 화면 구성은 서명을 입력받아 기준서명과 보안수준 값을 만들어 주는 등록화면과 권한 부여를 위하여 진서명인지 모조서명인지를 판단하는 인증화면으로 나누어진다. 본 논문에서는 동적 서명인증시스템의 처리 속도, 서명의 특징벡터의 추출방법과 비교 알고리즘, 사용자 인터페이스 등과 실제 환경에서의 설계 및 구현에 대한 연구이다.

비쥬얼 리듬을 이용한 효율적 비데오 인덱싱 기법 (An Efficient Video Indexing Scheme Exploiting Visual Rhythm)

  • 정지문;김정길
    • 정보통신설비학회논문지
    • /
    • 제10권3호
    • /
    • pp.103-109
    • /
    • 2011
  • With the growing popularity of digital video applications, those areas of the efficient transmit, storage management, and search technology for video data are emerging as an important core technology. To be an effective video indexing system, users need to be able to find the video segments that they want. Unfortunately, video data is difficult to manage because of its unstructured data type and large volume with linear forms. This paper proposes a shot verification using visual rhythm and video retrieval system. The shot verification is designed to detect a segment from video easily and quickly, known as shot boundaries, just by changing the visual rhythm without playing the image. Therefore, this can decrease the false detected shots and generate the unidentified shots and key frames. The retrieval system is constructed in terms of visual descriptor from the list of MPEG-7. The effectiveness of the proposed shot verification process and video retrieval system is demonstrated.

  • PDF

온라인 서명 검증을 위한 SVM의 커널 함수와 결정 계수 선택 (Selection of Kernels and its Parameters in Applying SVM to ASV)

  • 판윈허;우영운;김성훈
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 추계학술대회
    • /
    • pp.1045-1046
    • /
    • 2015
  • When using the Support Vector Machine in the online signature verification, SVM kernel function should be chosen to use non-linear SVM and the constant parameters in the kernel functions should be adjusted to appropriate values to reduce the error rate of signature verification. Non-linear SVM which is built on a strong mathematical basis shows better performance of classification with the higher discrimination power. However, choosing the kernel function and adjusting constant parameter values depend on the heuristics of the problem domain. In the signature verification, this paper deals with the problems of selecting the correct kernel function and constant parameters' values, and shows the kernel function and coefficient parameter's values with the minimum error rate. As a result of this research, we expect the average error rate to be less than 1%.

  • PDF

스마트폰용 동적 서명인증의 모바일 구현 (Mobile Implementation of Enhanced Dynamic Signature Verification for the Smart-phone)

  • 김진환;조혁규;서창진;차의영
    • 한국정보통신학회논문지
    • /
    • 제11권9호
    • /
    • pp.1781-1785
    • /
    • 2007
  • 본 논문에서는 스마트폰에서 사용 가능한 동적서명 인증기술의 사용자 인터페이스와 알고리즘을 제안하고, 제안된 시스템의 성능을 기술하였다. 개인 서명의 모양, 쓰는 속도, 기울기, 획수와 획순서 등의 정보를 활용함으로써 인증 여부를 결정하게 되며, 컴퓨터와 무선인터 넷이 발달하고 관련 산업이 급성장함에 따라서 폭 넓은 산업 분야에 활용될 것으로 기대된다.

Palmprint Verification Using Multi-scale Gradient Orientation Maps

  • Kim, Min-Ki
    • Journal of the Optical Society of Korea
    • /
    • 제15권1호
    • /
    • pp.15-21
    • /
    • 2011
  • This paper proposes a new approach to palmprint verification based on the gradient, in which a palm image is considered to be a three-dimensional terrain. Principal lines and wrinkles make deep and shallow valleys on a palm landscape. Then the steepest slope direction in each local area is first computed using the Kirsch operator, after which an orientation map is created that represents the dominant slope direction of each pixel. In this study, three orientation maps were made with different scales to represent local and global gradient information. Next, feature matching based on pixel-unit comparison was performed. The experimental results showed that the proposed method is superior to several state-of-the-art methods. In addition, the verification could be greatly improved by fusing orientation maps with different scales.

액티브 네트워크 응용의 검증 (Verifying Active Network Applications)

  • 박준철
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권5호
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

영상 기반 지문인증에 관한 연구 (A Study on the Fingerprint Verification based on Image)

  • 채승훈;반성범;문대성;문기영;정용화
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2007년도 하계종합학술대회 논문집
    • /
    • pp.237-238
    • /
    • 2007
  • Fingerprint verification based on minutiae mostly has used because it stores a few data and is good for speed. However personal verification errors are caused by extracted from false minutiae. Therefore, in this paper, we propose a new methodology performing together based on image and minutiae. As the result of performing with image and minutiae, false accept rate and false reject rate are improved.

  • PDF