• 제목/요약/키워드: International User

검색결과 1,527건 처리시간 0.024초

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • 제10권4호
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

User Review Mining: An Approach for Software Requirements Evolution

  • Lee, Jee Young
    • International journal of advanced smart convergence
    • /
    • 제9권4호
    • /
    • pp.124-131
    • /
    • 2020
  • As users of internet-based software applications increase, functional and non-functional problems for software applications are quickly exposed to user reviews. These user reviews are an important source of information for software improvement. User review mining has become an important topic of intelligent software engineering. This study proposes a user review mining method for software improvement. User review data collected by crawling on the app review page is analyzed to check user satisfaction. It analyzes the sentiment of positive and negative that users feel with a machine learning method. And it analyzes user requirement issues through topic analysis based on structural topic modeling. The user review mining process proposed in this study conducted a case study with the a non-face-to-face video conferencing app. Software improvement through user review mining contributes to the user lock-in effect and extending the life cycle of the software. The results of this study will contribute to providing insight on improvement not only for developers, but also for service operators and marketing.

증강현실 어플리케이션의 사용자 경험과 만족도 연구 -중국의 패션 소비자를 중심으로 (User Experience and Satisfaction of Augmented Reality Applications -Focused on Chinese Fashion Consumers)

  • 진천천;대명월;박현정
    • 디지털융복합연구
    • /
    • 제17권10호
    • /
    • pp.159-167
    • /
    • 2019
  • 본 연구는 사용자 경험을 중심으로 하여 증강현실 패션 어플리케이션에 대한 소비자 만족도에 영향을 미치는 요인들을 살펴보고자 하였다. 증강현실 패션 어플리케이션을 이용해본 중국 사용자 280명을 대상으로 설문조사를 실시하고 구조방정식 모형을 사용하여 분석하였다. 결과에 따르면 사용자 경험이 현존감, 몰입, 만족도에 각각 영향을 미치고 개인화 수준도 만족도를 증가시키는 것으로 나타났다. 현존감의 경우 몰입을 높이고 몰입이 만족도를 제고하는 것으로 나타나 현존감이 몰입을 경유하여 만족에 간접적인 영향을 미치는 것을 확인하였다. 본 연구의 결과는 향후 증강현실 기술에 주목하고 있는 다양한 산업에서 소비자들의 제품을 체험을 돕고 어플리케이션에 대한 만족도 향상을 위하여 고려해야 하는 요소들을 파악하여 전략적인 시사점을 제공할 수 있을 것으로 기대한다.

비대면 시대 미술관 학교 연계 온라인 교육프로그램 사용자 경험 연구 (A Study on User Experience of Online Education Programs with Elementary Schools and Art Museums in Non-Face-to-Face Era)

  • 김나연;김승인
    • 디지털융복합연구
    • /
    • 제19권8호
    • /
    • pp.311-317
    • /
    • 2021
  • 본 연구는 비대면 시대에 따른 미술관과 초등학교 연계 온라인 교육프로그램을 중심으로 디지털 기술기반의 더 나은 교육 환경 조성을 위한 사용자 경험 유도 방안을 제안하고자 한다. 이에 국내외 실시하고 있는 미술관 온라인 교육프로그램 현황을 분석하고 사용자 경험을 측정하기 위해 참여한 어린이와 학급 교사를 대상으로 1차 온라인 설문을 진행하였으며, 2차로는 전문가를 대상으로 심층 인터뷰를 시행하였다. 연구 결과, 디지털 미디어를 활용한 학교 연계 교육프로그램의 장단점이 존재했다. 이에 부정적인 의견을 토대로 사용자의 만족도를 높이려는 방안을 제시하였다. 본 연구는 디지털 기술기반의 온라인 교육을 활성화하는 데 의의가 있다. 이 연구가 향후 초등학교에서 진행되는 비대면 온라인 미술 교육프로그램 사용자 경험에 대한 자료로 활용되고 나아가 실질적 활성화 방안을 논의하는 데 도움이 되기를 기대한다.

모바일 이커머스 페이 원터치 결제 시 심리적 안정감을 제공하는 사용자 경험 연구 (A Study on User Experience that Provides Psychological Stability during Mobile E-commerce One-touch Payment)

  • 장다희;김승인
    • 디지털융복합연구
    • /
    • 제20권1호
    • /
    • pp.277-283
    • /
    • 2022
  • 본 연구는 모바일 이커머스 페이 원터치 결제 시 심리적 안정감을 제공하는 사용자 경험을 연구하는 데 목적이 있다. 문헌 조사와 사례연구를 통해 이커머스 페이 원터치 결제를 파악하고, 설문과 심층 인터뷰를 통해 사용자 경험을 조사하였다. 애런 윌터(Aarron Walter)의 사용자 욕구 단계(Hierarchy of User Needs) 모형을 토대로 작성한 설문은 원터치 결제에 대한 기능성, 사용성은 높은 평균값을 받지만, 신뢰성과 안정감은 다소 낮게 나타났다. 이후 사용자 관점에서 바라본 사용자 경험 디자인(A User's Eye View of User Experience Design) 모형을 바탕으로 진행된 심층인터뷰를 분석하여 심리적 안정감을 보완하기 위한 디자인 개선안 네 가지를 제시하였다. 이 연구는 원터치 결제 시 안정감을 느낄 수 있는 결제 경험 기초 연구에 도움이 될 것으로 기대한다.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • 제8권3호
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Cost-Benefit based User Review Selection Method

  • Neung-Hoe Kim;Man-Soo Hwang
    • International journal of advanced smart convergence
    • /
    • 제12권4호
    • /
    • pp.177-181
    • /
    • 2023
  • User reviews posted in the application market show high relevance with the satisfaction of application users and its significance has been proven from numerous studies. User reviews are also crucial data as they are essential for improving applications after its release. However, as infinite amounts of user reviews are posted per day, application developers are unable to examine every user review and address them. Simply addressing the reviews in a chronological order will not be enough for an adequate user satisfaction given the limited resources of the developers. As such, the following research suggests a systematical method of analyzing user reviews with a cost-benefit analysis, in which the benefit of each user review is quantified based on the number of positive/negative words and the cost of each user review is quantified by using function point, a technique that measures software size.