• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.025 seconds

IMAGE ENCRYPTION THROUGH THE BIT PLANE DECOMPOSITION

  • Kim, Tae-Sik
    • The Pure and Applied Mathematics
    • /
    • v.11 no.1
    • /
    • pp.1-14
    • /
    • 2004
  • Due to the development of computer network and mobile communications, the security in image data and other related source are very important as in saving or transferring the commercial documents, medical data, and every private picture. Nonetheless, the conventional encryption algorithms are usually focusing on the word message. These methods are too complicated or complex in the respect of image data because they have much more amounts of information to represent. In this sense, we proposed an efficient secret symmetric stream type encryption algorithm which is based on Boolean matrix operation and the characteristic of image data.

  • PDF

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

Military Entrance Control System Using Military Insignia UHF RFID Tags (군 계급장 UHF RFID 태그를 이용한 군 보안출입관리 시스템)

  • Nam, Seahyeon;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.966-971
    • /
    • 2013
  • This paper introduces development of a Military Entrance Control System using the developed military insignia UHF RFID tags. Generally, in the military entrance control system, the security identification (ID) card with HF RFID tag can be used, to increase the security level, the developed insignia UHF RFID tags are used in the enforced military entrance control system. The general metal insignias, have been worn on a hat or on the shoulder pads of a military uniforms, are simulated and developed as UHF RFID insignia tags. The military entrance control system can manage the name, rank, address (information of military personnel), time and date of entrance and the history of entrance of the security area.

SUPERSTABILITY OF A GENERALIZED EXPONENTIAL FUNCTIONAL EQUATION OF PEXIDER TYPE

  • Lee, Young-Whan
    • Communications of the Korean Mathematical Society
    • /
    • v.23 no.3
    • /
    • pp.357-369
    • /
    • 2008
  • We obtain the superstability of a generalized exponential functional equation f(x+y)=E(x,y)g(x)f(y) and investigate the stability in the sense of R. Ger [4] of this equation in the following setting: $$|\frac{f(x+y)}{(E(x,y)g(x)f(y)}-1|{\leq}{\varphi}(x,y)$$ where E(x, y) is a pseudo exponential function. From these results, we have superstabilities of exponential functional equation and Cauchy's gamma-beta functional equation.

An Attack Scheme with a T-DMB TPEG Update based Vulnerability (T-DMB 기반의 TPEG 업데이트 취약점을 이용한 공격 기법)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.1-5
    • /
    • 2014
  • The development of communication method for a variety of intelligent automobiles are delivering comfortable and safe information. However the development of such communication method must also think about security. Even the update of navigation to be used for intelligent automobiles uses the wireless updating methods but the updating methods currently being used has no reliable security measures. The navigation communications used in the intelligent automobiles are being provided with TTI(Traffic and Travel Information) service using a variety of methods by the countries. In the case of Korea, most are based on T-DMB using the TPEG method for transmitting the information. By identifying the characteristics on the navigation wireless update, a security solution is proposed for delivering the reliable update information after creating the attack scenario.

Media Technologies In The Educational Space: The Formation Of Intellectual Independence

  • Parshukova, Lesia;Loboda, Olga;Maha, Petro;Solomenko, Lina;Svanidze, Lia;Levytskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.323-327
    • /
    • 2021
  • The article examines the process of professional training in educational institutions, media technologies and methods of media communication in the educational space of the institution, characterizes the place of media technologies in the educational space in the context of the term "educational space" itself, systematizes the methods of media communications in education. The peculiarities of media education as a set of means and methods of teaching young people adequate media perception are pointed out.

CONTINUITY OF AN APPROXIMATE JORDAN MAPPING

  • Lee, Young-Whan
    • Communications of the Korean Mathematical Society
    • /
    • v.20 no.3
    • /
    • pp.505-509
    • /
    • 2005
  • We show that every $\varepsilon-approximate$ Jordan functional on a Banach algebra A is continuous. From this result we obtain that every $\varepsilon-approximate$ Jordan mapping from A into a continuous function space C(S) is continuous and it's norm less than or equal $1+\varepsilon$ where S is a compact Hausdorff space. This is a generalization of Jarosz's result [3, Proposition 5.5].

Analysis & Implementation of SISO, SIMO, MISO and MIMO in 5G Communication Systems Based on SDR

  • Meriem DRISSI;Nabil BENJELLOUN;Philippe DESCAMPS;Ali GHARSALLAH
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.140-146
    • /
    • 2023
  • With the rapid growth of new users and massive need for very high data rate in 5G communications system, different technologies have been developed and applied to enhance communication efficiency. One of those technologies is the MISO, MISO and MIMO which transmits and receives information with more reliability by using multiple antennas on transmitter or/and receiver side. This paper presents the latest trends in 5G telecommunications system based on software defined radio, A novel low-cost SIMO, MISO and MIMO using flexibility between USRP and Simulink is implemented tested and validated.

Design of the PHY Structure of a Voice and Data Transceiver with Security (보안성을 갖는 음성 및 데이터 트랜시버의 물리 계층 구조 설계)

  • Eun, Chang-Soo;Lom, Sun-Min;Lee, Kyoung-Min
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.46-54
    • /
    • 2006
  • In this paper, we propose a digital transceiver that can overcome the problems which current analog transceivers have. For the proposed transceiver, we assumed a frequency resource that consists of discrete and narrow channels. We also assumed that person-to-group, group-to-group, as well as person-to-person, voice and data communications with moderate security should be devisedand the data rate is 1 Mbps with simultaneous voice and data. Frequency hewing spread spectrum (FH-SS) and differential 8-PSK (D8PSK) were adopted for security reasons and bandwidth constraints, and for the reduction of implementation complexity, respectively. For the carrier and the symbol timing recovery, the structure of the preamble was proposed based on the IEEE 802.11 FHSS frame format to improve detection probability. The computer simulation results and power budget analysis implies that the proposed system can be usedin simple wireless communications in place of such as analog walkie-talkies.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.