• Title/Summary/Keyword: Optical security

Search Result 229, Processing Time 0.022 seconds

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Method for Restoring the Spatial Resolution of KOMPSAT-3A MIR Image (KOMPSAT-3A 중적외선 영상의 공간해상도 복원 기법)

  • Oh, Kwan-Young;Lee, Kwang-Jae;Jung, Hyung-Sup;Park, Sung-Hwan;Kim, Jeong-Cheol
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_4
    • /
    • pp.1391-1401
    • /
    • 2019
  • The KOMPSAT-3A is a high-resolution optical satellite launched in 2015 by Korea Aerospace Research Institute (KARI). KOMPSAT-3A provides Panchromatic (PAN-0.55 m), Multispectral (MS-2.2 m), and Mid-wavelength infrared (MIROR-5.5 m) image. However, due to security or military problems, MIROR image with 5.5m spatial resolution are provided down sampled at 33 m spatial resolution (MIRrd). In this study, we propose spatial sharpening method to improve the spatial resolution of MIRrd image (33 m) using virtual High Frequency (HF) image and optimal fusion factor. Using MS image and MIRrd image, we generated virtual high resolution (5.5 m) MIRORfus image and then compared them to actual high-resolution MIROR image. The test results show that the proposed method merges the spatial resolution of MS image and the spectral information of MIRrd image efficiently.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

Synthesis and Properties of SrMoO4 Phosphors Doped with Various Rare Earth Ions for Anti-Counterfeiting Applications (위조 방지 분야에 응용 가능한 다양한 희토류 이온이 도핑된 SrMoO4 형광체의 제조 및 특성)

  • Moon, Tae-Ok;Jung, Jae-Yong;Cho, Shinho
    • Korean Journal of Materials Research
    • /
    • v.30 no.8
    • /
    • pp.406-412
    • /
    • 2020
  • SrMoO4:RE3+ (RE=Dy, Sm, Tb, Eu, Dy/Sm) phosphors are prepared by co-precipitation method. The effects of the type and the molar ratio of activator ions on the structural, morphological, and optical properties of the phosphor particles are investigated. X-ray diffraction data reveal that all the phosphors have a tetragonal system with a main (112) diffraction peak. The emission spectra of the SrMoO4 phosphors doped with several activator ions indicate different multicolor emissions: strong yellow-emitting light at 573 nm for Dy3+, red light at 643 nm for Sm3+, green light at 545 nm for Tb3+, and reddish orange light at 614 nm for Eu3+ activator ions. The Dy3+ singly-doped SrMoO4 phosphor shows two dominant emission peaks at 479 and 573 nm corresponding to the 4F9/26H15/2 magnetic dipole transition and 4F9/26H13/2 electric dipole transition, respectively. For Dy3+ and Sm3+ doubly-doped SrMoO4 phosphors, two kinds of emission peaks are observed. The two emission peaks at 479 and 573 nm are attributed to 4F9/26H15/2 and 4F9/26H13/2 transitions of Dy3+ and two emission bands centered at 599 and 643 nm are ascribed to 4G5/26H7/2 and 4G5/26H9/2 transitions of Sm3+. As the concentration of Sm3+ increases from 1 to 5 mol%, the intensities of the emission bands of Dy3+ gradually decrease; those of Sm3+ slowly increase and reach maxima at 5 mol% of Sm3+ ions, and then rapidly decrease with increasing molar ratio of Sm3+ ions due to the concentration quenching effect. Fluorescent security inks based on as-prepared phosphors are synthesized and designed to demonstrate an anti-counterfeiting application.

Forest Fire Monitoring System Using Satellite (위성활용 산불감시 시스템 구축)

  • Park, Beom-Sun;Cho, In-Je;Lim, Jae-Hwan;Kim, In-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • It introduces the contents of establishing a geostationary satellite-based forest fire monitoring system that can monitor areas of the Korean Peninsula 24 hours a day for forest fire monitoring, and describes how to establish a forest fire monitoring system and use it in various ways. In order to establish a satellite-utilized forest fire monitoring system, we will describe and draw conclusions on literature research, technical principles, forest fire monitoring means, and satellite forest fire monitoring system. The satellite-utilized forest fire monitoring system can consist of one geostationary satellite equipped with infrared detection optical sensors and a ground processing station that processes data received from satellites to spread surveillance information. Forest fire monitoring satellites are located in the country's geostationary orbit and should be operated 24 hours a day, 365 days a day. Forest fire monitoring technology is an infrared detection technology that can be used in national public interests such as forest fire monitoring and national security. It should be operated 24 hours a day, and to satisfy this, it is efficient to establish a geostationary satellite-based forest fire monitoring satellite system.

Detection of Marine Oil Spills from PlanetScope Images Using DeepLabV3+ Model (DeepLabV3+ 모델을 이용한 PlanetScope 영상의 해상 유출유 탐지)

  • Kang, Jonggu;Youn, Youjeong;Kim, Geunah;Park, Ganghyun;Choi, Soyeon;Yang, Chan-Su;Yi, Jonghyuk;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1623-1631
    • /
    • 2022
  • Since oil spills can be a significant threat to the marine ecosystem, it is necessary to obtain information on the current contamination status quickly to minimize the damage. Satellite-based detection of marine oil spills has the advantage of spatiotemporal coverage because it can monitor a wide area compared to aircraft. Due to the recent development of computer vision and deep learning, marine oil spill detection can also be facilitated by deep learning. Unlike the existing studies based on Synthetic Aperture Radar (SAR) images, we conducted a deep learning modeling using PlanetScope optical satellite images. The blind test of the DeepLabV3+ model for oil spill detection showed the performance statistics with an accuracy of 0.885, a precision of 0.888, a recall of 0.886, an F1-score of 0.883, and a Mean Intersection over Union (mIOU) of 0.793.

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

Calculation Method of Oil Slick Area on Sea Surface Using High-resolution Satellite Imagery: M/V Symphony Oil Spill Accident (고해상도 광학위성을 이용한 해상 유출유 면적 산출: 심포니호 기름유출 사고 사례)

  • Kim, Tae-Ho;Shin, Hye-Kyeong;Jang, So Yeong;Ryu, Joung-Mi;Kim, Pyeongjoong;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_1
    • /
    • pp.1773-1784
    • /
    • 2021
  • In order to minimize damage to oil spill accidents in the ocean, it is essential to collect a spilled area as soon as possible. Thus satellite-based remote sensing is a powerful source to detect oil spills in the ocean. With the recent rapid increase in the number of available satellites, it has become possible to generate a status report of marine oil spills soon after the accident. In this study, the oil spill area was calculated using various satellite images for the Symphony oil spill accident that occurred off the coast of Qingdao Port, China, on April 27, 2021. In particular, improving the accuracy of oil spill area determination was applied using high-resolution commercial satellite images with a spatial resolution of 2m. Sentinel-1, Sentinel-2, LANDSAT-8, GEO-KOMPSAT-2B (GOCI-II) and Skysat satellite images were collected from April 27 to May 13, but five images were available considering the weather conditions. The spilled oil had spread northeastward, bound for coastal region of China. This trend was confirmed in the Skysat image and also similar to the movement prediction of oil particles from the accident location. From this result, the look-alike patch observed in the north area from the Sentinel-1A (2021.05.01) image was discriminated as a false alarm. Through the survey period, the spilled oil area tends to increase linearly after the accident. This study showed that high-resolution optical satellites can be used to calculate more accurately the distribution area of spilled oil and contribute to establishing efficient response strategies for oil spill accidents.