• Title/Summary/Keyword: Information and communication network violation

Search Result 17, Processing Time 0.022 seconds

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Implementation of efficient parking enforcement system using smartphone

  • Kim, Doyeon;Kim, Jaejoon
    • International Journal of Contents
    • /
    • v.9 no.1
    • /
    • pp.26-32
    • /
    • 2013
  • To date, parking enforcement systems have only been used by parking enforcement authorities, who detect and penalize violators. This paper introduces a modified version of the parking enforcement system utilizing smartphones that allows ordinary citizens to report parking violators to parking enforcement officers. The procedures of the system are taking a picture of a vehicle in violation, receiving the violation report virtually and finally reporting if violation car still remained at same location after five minutes have passed. The proposed system contains properties for transmission and receiving data about whether the complaint report of the violator's vehicle has been received in real time. It also works in conjunction with the existing parking enforcement system. This paper describes implementation of the proposed system.

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.

Performance Analysis of Wireless Communication Networks for Smart Metering Implemented with Channel Coding Adopted Multi-Purpose Wireless Communication Chip (오류 정정 부호를 사용하는 범용 무선 통신 칩으로 구현된 스마트 미터링 무선 네트워크 시스템 성능 분석)

  • Wang, Hanho
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.4
    • /
    • pp.321-326
    • /
    • 2015
  • Smart metering is one of the most implementable internet-of-thing service. In order to implement the smart metering, a wireless communication network should be newly designed and evaluated so as to satisfy quality-of-service of smart metering. In this paper, we consider a wireless network for the smart metering implemented with multi-purpose wireless chips and channel coding-functioned micro controllers. Especially, channel coding is newly adopted to improve successful frame transmission probability. Based on the successful frame transmission probability, average transmission delay and delay violation probability are analyzed. Using the analytical results, service coverage expansion is evaluated. Through the delay analysis, service feasibility can be verified. According to our results, channel coding needs not to be utilized to improve the delay performance if the smart metering service coverage is several tens of meters. However, if more coverage is required, chanel coding adoption definitely reduces the delay time and improve the service feasibility.

Performance Evaluation of Distributed Network-based System Adopting an Object-oriented Method (객체지향기법이 도입된 분산 네트워크기반 시스템의 실시간 응답성능 평가)

  • Pae, Duck-Jin;Kim, Hong-Ryeol;Kim, Dae-Won
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2531-2533
    • /
    • 2002
  • In this paper, we evaluate feasibility of an object-oriented method in a distributed real-time control environment through the prediction of delay expected. We adopt CAN as the distributed network and the application layer of the CAN is composed of client/server communication model of COM and surroundings for the support of real-time capability of the COM. Mathematical models formalizing delays which are predicted to invoke in the COM architecture are proposed. Sensors and actuators which are widely used in distributed network-based systems are represented by COM objects in this paper. It is expected that the mathematical models can be used to protect distributed network-based systems from violation of real-time features by the COM.

  • PDF

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

A Method for Automation of Traffic Violation Report Using Automobile Black Boxes (차량용 블랙박스를 활용한 교통위반신고 자동화 방법)

  • Jeong, Min Seok;Kim, Seong Hyuk;Yeom, In Ho;Kim, Hyeon Gyu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.351-356
    • /
    • 2014
  • Recently, automobile black boxes have evolved to support functionality to transfer videos stored in them into mobile phones via wireless network, from which the videos can be utilized for various purposes. This paper presents a method for automation of traffic violation reports using the automobile black boxes. When a traffic violation is captured by a black box, the proposed method helps a user to transfer the video capturing it into a mobile phone through a simple UI operation. With the video, an HTTP request to report the violation is automatically generated from the mobile phone, and then is transferred to a cyber-report center. We present a prototype system that implements the proposed method, and discuss several issues necessary to apply the method to real-world applications.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Design and Implementation of Fault-tolerant Communication Middleware for a High-reliable Launch Control System (고신뢰성 발사통제시스템을 위한 고장허용 통신 미들웨어 설계 및 구현)

  • Song, Dae-Ki;Jang, Bu-Cheol;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.37-46
    • /
    • 2008
  • Launch control system controls the sequence for launching missile in weapon systems. This system have to generate the engagement plan, input information and launch the missile in timeliness requirement. Such a system may fail to operate correctly either due to errors in hardware and software or due to violation of timing constraints. We presented fault-tolerant ethernet for embedded real-time system like launch control system. This approach is designed to handle network faults using dual commercial-off-the-shelf(COTS) network devices. To support fault-tolerant ethernet each node is composed dual channel ethernet and designed the communication middleware for network fault detect and recovery. Especially for time-critical system, the middleware is being developed to achieve that no point of network failure shall take down or cause loss of communication to network nodes.

An encryption algorithm of images using a mass transfer function (물질전달함수를 이용한 영상 암호화 알고리즘)

  • 김승종;최병욱
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.11
    • /
    • pp.31-43
    • /
    • 1996
  • In this paper, we propsoe an encryption algorithm of image information using a mass transfer function (MTF). The algorithm is based on a diffusion phenomenon of black ink when black ink dropped in the stationary water. We mathematically analyze the phenomenon, in consideration of characteristics of image information, and apply the results of analysis to the security of image transfer phenomenon. The cryptosystem proposed in this paper enables the security services of information in narrow-band channel communication network to be provided. And in transmission of important information, it can secure against intentional disturbance and violation. Also, it can guarantee the safe flow of information.

  • PDF