• Title/Summary/Keyword: K-Anonymity

Search Result 227, Processing Time 0.021 seconds

An analysis on the Deconstructed Visage in Fashion Illustration - Based on the Deconstructed Visage of Francis Bacon's Painting - (패션 일러스트레이션에 나타난 얼굴해체 - 프란시스 베이컨 회화의 얼굴해체를 바탕으로 -)

  • Choi, Jung-Hwa;Choi, Yoo-Jin
    • Fashion & Textile Research Journal
    • /
    • v.15 no.6
    • /
    • pp.874-885
    • /
    • 2013
  • This study analyzes the visage in fashion illustration based on the deconstructed visage of Francis Bacon's paintings as well as analyzes fashion illustration works since 2000. The deconstructed visages in Francis Bacon's paintings are classified as blurring, elimination, distortion and division. The expressive methods and meanings in fashion illustration (according to categorization) are as follow. Blurring shows an ambiguous visage organ by the sweeping of the brush, removal of a boundary among the visage, body and clothes, gradation of organic line like visage shapes, stretching of the a plat combined to visage and fragmentation of visage. It represents an uncertainty of the fashion theme and image interpretation, impossibility of figure by ambiguity, fantastic effect and the induction of the uncanny. Elimination shows the background color's painting of a photo-montage, overlap of a cutting of visage's part and background of a plat, elimination of the visage and the elimination of eyes, nose or lips. It represents a weakened identity, the reinforcement of anonymity, creation of a violent image, and uncanny unfamiliarity. Distortion shows a distorted visage by free drawing, and unconscious drawing line, fluid digital body, combination of an unconscious curve, and an eccentric combination of the accidental. It represents the relief of specialty about realistic existence, hypothetical immateriality and fantasy. Division shows overlapped visages with different angles, the weird combination of a plural visage and different species and a plural breakaway of direction, and the position of several organs. It represents motion by power's trace, non-territory of species, ambiguity and uncertainty and the uncanny.

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

A Study of Bias Draping Design (바이어스 드레이핑 디자인 연구(硏究))

  • Kim, Hee-Kyun;Cho, Kyu-Hwa
    • Journal of Fashion Business
    • /
    • v.4 no.4
    • /
    • pp.1-16
    • /
    • 2000
  • The purpose of this study is to investigate the formative beauty, changes in fashion and aesthetical sense that can be seen in the bias drapings of Madeleine Vionnet and her influences on modern fashion since she used draping as a new fashion means to represent the new feminine images which modernism of the early 20th century and social changes from the two great World War's generated, and to provide proper data to encourage designers' creativity that is wanting in the circle of Korea fashion. Bias draping led women to respect worship their body from the heart with seductive modernism enriching the material's texture to the utmost through geometrical patterns of triangle, quartered plane and quardrants and simple cylindrical cuts and with an attribute adapting itself to the wearer's body. Bias draped wear consisted of light and transparent materials and overall surface decoration revealed women's movements and sought the extension of environmental movements and demonstrated its eroticism. On the other hand, biased daywear gained anonymity through cutting true to body line and psychological protective quality as of cape, and this went well with the independent femininity accepting difference as well as pursuing revolution from the inside. The great inflation and the 2nd World War gave birth to escape from reality like surrealistic artistic tendencies and Hollywood films and increased romanticism. Bias draping once underwent unpopularity except in expensive clothes due to knit wear boom and the utilization of new elastic materials, however, it began to receive lights again from pluralization waves and retro tendencies and to be introduced in many designers' collections. A young genius of England, John Galliano improved functions of Haute Couture through creation of new styles and fantastic shows to promote profits in the fashion markets. Bias draping fitted in human body line provides us comfort and aesthetic qualities through careful choice of material and elegance by delicate cutting.

  • PDF

Recognition of the Type and Cause of Trolling (<리그 오브 레전드> 트롤링의 유형과 발생 원인에 대한 인식 -사용자 심층인터뷰를 중심으로-)

  • Seo, Seong-Eun;Kim, Chi-Yo
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.93-110
    • /
    • 2015
  • This study aimed at identifying user recognition of the types and causes of online game trolling through in-depth interview with users of . Online game trolling refers to anti-social behaviors to do acts provoking other users to anger intentionally so induce their actual reaction in online games. Types of online game trolling contained flaming, griefing, unskilled player and lack of understanding on user's rule. And users are recognizing as problems that anonymity is excessively high in the game, a single game has undue significance, team play is given too much emphasis in a situation lacking in social cohesivenessk as the structural causes of trolling in . Accordingly, in order to decrease online game trolling, it is urgent to improve the game-structured layer causing trolling rather than regulate trollers only.

The Relationships of Website Quality, e-Satisfaction, e-Trust, and e-Loyalty in Low-Cost Carriers (저비용 항공사의 웹사이트 품질, e-만족, e-신뢰, e-충성도 간의 구조적 관계 연구)

  • In, Ok Nam;Kim, Seung Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.207-216
    • /
    • 2013
  • The A low-cost carriers(LCC)' website represents their public face to the world. Futhermore, distribution through their own websites is generally regarded as the being most cost effective for airlines The Internet website has become an effective marketing vehicle for low-cost carriers(LCC). The objective of this study was to examine theoretical relationship of website quality, e-satisfaction, e-trust, and e-loyalty to the low-cost carriers' website. The study sample included respondents who had visited any LCC websites in the last 12 months. Data were collected by conducting a web-based survey to maintain respondents' anonymity and overcome time and place constraints. From the 334 usable data obtained, hypotheses are tested using structural equation modeling. The results indicate that website quality, e-satisfaction, and e-trust are antecedents of e-loyalty in loyalty relationships between passengers and low-cost carriers' websites. Website quality positively influences e-satisfaction, e-trust while e-satisfaction. However, contrary to our expectation, e-satisfaction has a negative effect on e-trust. Managerial implications are provided following presentation of the findings.

GNUnet improvement for anonymity supporting is large multimedia file (대형 멀티미디어 파일의 익명성 지원을 위한 수정 GNUnet)

  • Lee, Myeong-Hun;Jo, In-Jun
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.89-97
    • /
    • 2005
  • The GNUnet proposed a file encoding method by 1KB block size to support anonimity of file and decentralizes encoded block to peers through unstructed model. but, the encoding and block decentralizing method with 600~700MB large multimedia file appered two problems. First problem, it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructed model added network load by broadcasting decentralizing method. The paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation from 4% to 1%. and network load by proposal structured model sending answer through dedicated peer to decentralize block.

  • PDF

A Model for Privacy Preserving Publication of Social Network Data (소셜 네트워크 데이터의 프라이버시 보호 배포를 위한 모델)

  • Sung, Min-Kyung;Chung, Yon-Dohn
    • Journal of KIISE:Databases
    • /
    • v.37 no.4
    • /
    • pp.209-219
    • /
    • 2010
  • Online social network services that are rapidly growing recently store tremendous data and analyze them for many research areas. To enhance the effectiveness of information, companies or public institutions publish their data and utilize the published data for many purposes. However, a social network containing information of individuals may cause a privacy disclosure problem. Eliminating identifiers such as names is not effective for the privacy protection, since private information can be inferred through the structural information of a social network. In this paper, we consider a new complex attack type that uses both the content and structure information, and propose a model, $\ell$-degree diversity, for the privacy preserving publication of the social network data against such attacks. $\ell$-degree diversity is the first model for applying $\ell$-diversity to social network data publication and through the experiments it shows high data preservation rate.

A Study on an Efficient and Robust Differential Privacy Scheme Using a Tag Field in Medical Environment

  • Kim, Soon-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.109-117
    • /
    • 2019
  • Recently, the invasion of privacy in medical information has been issued following the interest in the secondary use of mass medical information. The mass medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to privacy laws such as the Privacy Act and Medical Law, this information, including patients' or health professionals' personal information, is difficult to utilize as a secondary use of mass information. To do these problem, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we discuss the differential privacy processing of the various methods that have been studied so far, and discuss the problems of differential privacy using Laplace noise and the previously proposed differential privacy. Finally, we propose a new scheme to solve the existing problem by adding a 1-bit status field to the last column of a given data set to confirm the response to queries from analysts.

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.