• 제목/요약/키워드: Information verification

검색결과 3,458건 처리시간 0.035초

GML파일을 이용한 검증조건의 시각화 (Visualization of Verification Condition by GML file)

  • 허혜림;김제민;박준석;유원희
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권7호
    • /
    • pp.23-32
    • /
    • 2012
  • 프로그램 검증을위해 사용되는방법으로 프로그램을 검증조건으로 변환하여정리증명기를 통해 프로그램의유효성을 확인하는 방법이 있다. 검증조건 생성을 통한 프로그램의 검증의 경우 검증조건은 프로그램을 검증하기 위한 충분하고 정확한 정보를 가지고 있어야한다. 하지만 프로그램의 변환을 통해 생성된 검증조건의 경우 논리식만으로 구성되어 있어 사용자가 쉽게 그 내용을파악할 수 없다. 본 논문에서는 가독성이 떨어지는 검증조건을 시각화하는 프로그램을 구현하였다. 프로그램을 통해 검증조건을 구성하고 있는 논리식간의 관계 등을 비롯한 정보를 보다 쉽게 확인할 수 있다.

Medical Image Verification Watermarking for Healthcare Information Management

  • Choi, Un-Sook;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • 제4권4호
    • /
    • pp.205-210
    • /
    • 2017
  • This paper presents a verification watermarking applied to healthcare information management. The proposed method uses the whole region based on the public-key cryptograph, which is transformed by the DWT transform to integrity verification. Furthermore, the public-key cryptograph algorithm is used for the embedded watermark image. We adaptively select the upper bit-plane including the LSB parts of each block when the watermark is inserted.

연령 검증정보의 안정성을 위한 평가인자에 대한 연구 (The Study on the Evaluation Factor for Security of Age Verification Information)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise

  • Wu, Yumei;Li, Zhen;Zhao, LanJie;Yu, Zhengwei;Miao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권4호
    • /
    • pp.1360-1388
    • /
    • 2021
  • Shipbuilding and repairing enterprise has the characteristics of many hazards and accidents. Therefore, the safety management ability of shipbuilding and repairing MIS (management information system) must be effectively guaranteed. The verification on safety management is the necessary measure to ensure and improve the safety management ability of MIS. Safety verification can not only increase the safety of MIS, but also make early warning of potential risks in management to avoid the accidents. Based on the authoritative standards in the field of safety in shipbuilding and repairing enterprise, this paper applied modeling and verification method based on ontology to safety verification of MIS, extracted the concepts and associations from related safety standards to construct axiom set to support safety verification on MIS of shipbuilding and repairing enterprise. Then, this paper developed the corresponding safety ontology modeling and verification tool-SOMVT. By the application and comparison of two examples, this paper effectively verified the safety of MIS to prove the modeling method and the SOMVT can improve the safety of MIS in a much more effective and stable way to traditional manual analysis.

자바 바이트코드의 검증을 위한 프레임워크 설계 (A Design of Verification Framework for Java Bytecode)

  • 김제민;박준석;유원희
    • 디지털산업정보학회논문지
    • /
    • 제7권2호
    • /
    • pp.29-37
    • /
    • 2011
  • Java bytecode verification is a critical process to guarantee the safety of transmitted Java applet on the web or contemporary embedded devices. We propose a design of framework which enables to analyze and verify java bytecode. The designed framework translates from a java bytecode into the intermediate representation which can specify a properties of program without using an operand stack. Using the framework is able to produce automatically error specifications that could be occurred in a program and express specifications annotated in intermediate representation by a user. Furthermore we design a verification condition generator which converts from an intermediate representation to a verification condition, a verification engine which verifies verification conditions from verification condition generator, and a result reporter which displays results of verification.

Two Verification Phases in Multimedia Authoring Modeling

  • Wijaya, Marvin Chandra;Maksom, Zulisman;Abdullah, Muhammad Haziq Lim
    • Journal of information and communication convergence engineering
    • /
    • 제19권1호
    • /
    • pp.42-47
    • /
    • 2021
  • Multimedia Authoring Tool is a tool for creating multimedia presentations. With this tool, a user can produce playable multimedia documents. A Multimedia Authoring Tool requires input in the form of a spatial layout and a temporal layout. Users can make many mistakes in creating multimedia presentations and verification is required in the Multimedia Authoring process in order to produce multimedia documents. In this study, two verification phases are proposed: Time Computation and Spatiotemporal Conflict Verification. In the experiment conducted for this study, two kinds of verification were carried out: The use of single-phase verification and the use of double-phase verifications. By using these two types of verification, it became easier to successfully detect errors in the spatial and temporal layouts, and the types of verification have also been successful in increasing the success of error detection.

서명자동검정을 위한 개인별 특징 세트 선택 (Customised feature set selection for automatic signature verification)

  • 배영래;조동욱;김지영
    • 한국통신학회논문지
    • /
    • 제21권7호
    • /
    • pp.1642-1653
    • /
    • 1996
  • This paper covers feature extraction for automatic handwritten signature verification. Several major feature selection techniques are investigated from a practical perspective to realise an optimal signature verification system, and customised feature set selection based on set-on-set distance measurement is presented. The experimental results have proved the proposed methods to be efficient, offering considerably improved verification performance compared to conventional methods. Also, they dramatically reduce the processing complexity in the verification system.

  • PDF

센싱 데이터 수집 시스템을 위한 통합검증 프로세스 설계 (Design of Integrated Verification Process for Sending Data Gathering System)

  • 김유두
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.305-306
    • /
    • 2021
  • 다양한 센싱 데이터를 수집하는 시스템은 복잡하게 구성되어 있다. 따라서 그 기능에 대한 검증을 수행하는 절차를 설계하는 것이 매우 중요하다. 이러한 환경에서 개발된 시스템의 통합 검증 프로세스를 설계하기 위해서, 본 논문에서는 다양한 센싱 데이터를 수집하는 시스템을 검증하는 절차에 대해 설계한다.

  • PDF

A Study on Feature Extraction and Matching of Enhanced Dynamic Signature Verification

  • Kim Jin-Whan;Cho Hyuk-Gyn;Cha Eui-Young
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2005년도 춘계학술대회 학술발표 논문집 제15권 제1호
    • /
    • pp.419-423
    • /
    • 2005
  • This paper is a research on feature extraction and comparison method of dynamic (on-line) signature verification. We suggest desirable feature information and modified DTW(Dynamic Time Warping) and describe the performance results of our enhanced dynamic signature verification system.

  • PDF