• Title/Summary/Keyword: Key share

Search Result 446, Processing Time 0.027 seconds

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

Relationship between Team Cohesion and Knowledge Hiding : Moderating Effects of Ethical Leadership (팀 응집력이 지식은폐에 미치는 영향 : 윤리적 리더십의 조절효과)

  • Kang, Sora;Han, Su Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.31-48
    • /
    • 2021
  • Knowledge is a key resource for organizations to gain and maintain competitive advantage. Therefore, it is important for organizations to motivate employees to share knowledge with each other in order to achieve optimal performance of knowledge resources. Despite the efforts of organizations to share knowledge, knowledge hiding is still prevalent among employees. In this paper, we want to analyze the factors that may cause more general and pervasive knowledge-hiding behavior in organizations through empirical analysis. The results of this study show that, first, the relationship between team cohesion and knowledge hiding has been verified differently depending on the sub-behavior of knowledge hiding : playing dumb, evasive hiding, and rationalized hiding. Team cohesion has been shown to significantly reduce the playing dumb and evasive hiding. On the other hand, it was shown that team cohesion did not have a significant causal relationship with rationalized hiding. Second, the moderating effect of ethical leadership has been statistically significant in terms of team cohesion and relationships with playing dumb and evasive hiding. In other words, the higher the ethical leadership, the stronger the negative relationship between team cohesion and knowledge hiding. Finally, the theoretical and practical implications of this paper and future research directions are discussed.

The Causality of Empowerment on Job Crafting: Focus on the Moderating Variable of LMX (임파워먼트와 잡 크래프팅의 인과구조: 조절변수를 중심으로)

  • Jung, Young-deuk;Yu, Byung-Nam
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.135-146
    • /
    • 2021
  • It is getting more intensified with the competition among participating companies for global market share in major industrial fields. The situation is accelerating especially within the top 5 market share, and these include electric vehicles, semiconductors, chemicals, and shipbuilding industries. The key to the advantage over the competition within a strategic group is which company leads the innovation in the field. On-the-ground innovation refers to job-based innovation. This paper aims to analyze job unit innovation in the structure of empowerment, LMX, and job crafting. Existing studies on job crafting have suggested a causal structure based on job design in the traditional sense, and there are not many scholars who study the causal structure using a job situational model. Therefore, this paper takes an approach from the perspective of the job situation. As a result of the study, LMX showed a moderating effect on the relationship between autonomy provision and job crafting. While, in the relationship between meaing-giving and cognitive crafting, there is no significant moderating effect shown on the relationship between autonomy provision and cognitive crafting. Therefore, the results of the analysis in this study suggest that the meaning of jobs and participation in decision-making should be managed in an integrated way in structural and design areas, not just qualitative factors such as empowerment and leadership.

Direct Share: Photo Management System Based on Round-robin Concept-driven User Preference Feedback

  • Song, Tae-Houn;Jeong, Soon-Mook;Kim, Hyung-Min;Kwon, Key-Ho;Jeon, Jae-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1346-1367
    • /
    • 2011
  • As the size of camera modules is decreasing and as the computing performance of portable devices is improving, taking photos has become a part of daily life. However, existing photo management programs and products that manage such photos still require extensive user effort to facilitate the sharing and browsing of images. It is especially difficult for novice users to manage and share photos. In this paper, we develop a round-robin concept-driven user preference feedback mechanism for achieving direct photo sharing, instant display, and easy management using optimized user controls and user preference-driven classification. Compared with commercial photo management systems, our proposed solution provides new features: optimized user controls, direct sharing and instant display, and user preference feedback driven classification. These new features boost the round-robin concept-driven user preference feedback. This paper proposes a photo finder that automatically searches for photos in storage spaces or cameras. The proposed photo finder relies on user preference feedback to share photos by leveraging user preferences, and the round-robin connection transmits photos to the family's digital photo frame or web album by arbiter. The proposed method saves time and spares users the effort required for photo management. Moreover, this method does not merely direct photo sharing and simple photo management, but it also increases the satisfaction level of users viewing the photos.

A Scheduling Algorithm for Continuous Media (연속미디어를 위한 스케쥴링 알고리즘)

  • 유명련;안병철
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.5
    • /
    • pp.371-376
    • /
    • 2001
  • Since continuous media such as video and audio data are displayed within a certain time constraint, their computation and manipulation should be handled under limited condition. Traditional real-time scheduling algorithms cold be directly applicable, because they are not suitable for multimedia scheduling applications which support many clients at the same time. Rate Regulating Proportional Share Scheduling Algorithm based on the stride scheduler is a scheduling algorithm considered the time constraint of the continuous media. The stride schedulers, which are designed to general tasks, guarantee the fairness of resource allocation and predictability. The key concept of RRPSSA is a rate regulator which prevents tasks from receiving more resource than its share in a given period. But this algorithm loses fairness which is a strong point of the stride schedulers, and does not show graceful degradation of performance under overloaded situation. This paper proposes a new modified algorithm, namely Modified Proportional Share Scheduling Algorithm considering the characteristics of multimedia data such as its continuity and time dependency. Proposed scheduling algorithm shows graceful degradation of performance in overloaded situation and it reduces the scheduling violations up to 70% by maintaining the fair resource allocation. The number of context switching is 8% less than RRPSSA and the overall performance is increased.

  • PDF

A Study on Characteristic Changes in Korea's Inward FDI in Connection with Global Outward FDI (국제투자동향과 한국내 외국인직접투자의 특징적 변화)

  • Yung-sun Lee;Ho-sang Shin
    • Korea Trade Review
    • /
    • v.47 no.6
    • /
    • pp.119-134
    • /
    • 2022
  • A new protectionism caused by the US-China competition and a following new Cold War would have a negative impact on global FDI. In this time, this study researched the effects of the long lasting global openness and liberalization on Korea's Inward FDI. 1,387 foreign invested companies in Korea were analyzed. The results are summarized as follows. First, Korea's FDI has been expanded under the environment of globalization. The IFDI amount and share in GDP increased. Seven countries out of the world top 10 were listed in Korea' the top 10. However, the share of the US and Japan's FDI in Korea's IFDI decreased. Second, non-manufacturing industry became prevalent in Korea's IFDI. Considering it's local market-oriented characteristics, the biggest investment motivation by global companies was Korean market pursuit. The US was more local market-oriented than Japan. Third, cross-border M&A, which became active in developed countries since 1980s, also kicked off in Korea from late 1990s. Global companies managed foreign-invested companies in Korea with shares close to wholly owned. The US had higher share ratios than Japan. The implications by this research are as follows. First, looming protectionism by a New Cold War would negatively affect Korea's IFDI through the adverse function of globalization. Second, Korea's IFDI has been converted to a market pursuit type being mainly leaded by non-manufacturing industry. Since GDP is the largest FDI motive in this type of FDI, the key policy for IFDI promotion is lying in the expansion of domestic market rather than deregulation.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Accelerated Implementation of NTRU on GPU for Efficient Key Exchange in Multi-Client Environment (다중 사용자 환경에서 효과적인 키 교환을 위한 GPU 기반의 NTRU 고속구현)

  • Seong, Hyoeun;Kim, Yewon;Yeom, Yongjin;Kang, Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.481-496
    • /
    • 2021
  • It is imperative to migrate the current public key cryptosystem to a quantum-resistance system ahead of the realization of large-scale quantum computing technology. The National Institute of Standards and Technology, NIST, is promoting a public standardization project for Post-Quantum Cryptography(PQC) and also many research efforts have been conducted to apply PQC to TLS(Transport Layer Security) protocols, which are used for Internet communication security. In this paper, we propose a scenario in which a server and multi-clients share session keys on TLS by using the parallelized NTRU which is PQC in the key exchange process. In addition, we propose a method of accelerating NTRU using GPU and analyze its efficiency in an environment where a server needs to process large-scale data simultaneously.

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

Requirements and Analysis for Efficient Key Management Mechanism on IPSec-6LoWPAN (IPSec-6LoWPAN을 위한 키 관리 요구사항과 프로토콜 분석)

  • Lee, Yun-Jung;Cho, Jung-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2739-2742
    • /
    • 2012
  • 6LoWPAN is a standard to enable IPv6 packets to be carried on top of low power wireless networks. It needs to achieve security in 6LoWPAN, which is being defined at the 6LoWPAN working group of the IETF. IPSec is already part of IPv6, which makes it a candidate to be directly employed or adapted for WSNs. Some results showed that the adoption of IPSec is viable, and also point towards the successful design and deployment of security architecture for WSNs. IPSec requires two communicating entities to share a secret key that is typically established dynamically with the IKE. However, there are some limitations to use IKE on wireless networks. In this article, we show requirements for being Efficient Key management Mechanism for IPSec on 6LoWPAN and analyze candidate protocols.