• Title/Summary/Keyword: Original text

Search Result 428, Processing Time 0.02 seconds

Signcryption Schemes with Forward Secrecy (Forward Secrecy를 제공하는 Signcryption 기법들)

  • 정희윤;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.43-52
    • /
    • 2001
  • Y. Zheng introduced a new type of cryptograghic primitive as \"signcryption\", which combines a function of digital signature scheme with a symmetric key encryption algorithm. Signcryption doesn\`t only provide authenticity and confidentiality in a single step, but also give more efficient computation than the traditional \"signature-then-encryption\". And C. Gamage proposed a proxy-signcryption that efficiently combines a proxy signature with the signcryption. But, in the proposed signcryption schemes, one who obtains the sender\`s private key can recover the original message of a signcrypted text. That is, forward secrecy is not offered by the signcryption scheme with respect to the sender\`s private key. In this paper, we will propose a modified signcryption of Zheng\`s signcryption and a variant of proxy-signcryption with forward secrecy.ith forward secrecy.

A Differential Fault Attack against Block Cipher HIGHT (블록 암호 HIGHT에 대한 차분 오류 공격)

  • Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.485-494
    • /
    • 2012
  • The block cipher HIGHT is designed suitable for low-resource hardware implementation. It established as the TTA standard and ISO/IEC 18033-3 standard. In this paper, we propose a differentail fault attack against the block cipher HIGHT. In the proposed attack, we assume that an attacker is possible to inject a random byte fault in the input value of the 28-th round. This attack can recover the secret key by using the differential property between the original ciphertext and fault cipher text pairs. Using 7 and 12 error, our attack recover secret key within a few second with success probability 87% and 51%, respectively.

Delivering Augmented Information in a Session Initiation Protocol-Based Video Telephony Using Real-Time AR

  • Jang, Sung-Bong;Ko, Young-Woong
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Online video telephony systems have been increasingly used in several industrial areas because of coronavirus disease 2019 (COVID-19) spread. The existing session initiation protocol (SIP)-based video call system is being usefully utilized, however, there is a limitation that it is very inconvenient for users to transmit additional information during conversation to the other party in real time. To overcome this problem, an enhanced scheme is presented based on augmented real-time reality (AR). In this scheme, augmented information is automatically searched from the Internet and displayed on the user's device during video telephony. The proposed approach was qualitatively evaluated by comparing it with other conferencing systems. Furthermore, to evaluate the feasibility of the approach, we implemented a simple network application that can generate SIP call requests and answer with AR object pre-fetching. Using this application, the call setup time was measured and compared between the original SIP and pre-fetching schemes. The advantage of this approach is that it can increase the convenience of a user's mobile phone by providing a way to automatically deliver the required text or images to the receiving side.

A Protein-Protein Interaction Extraction Approach Based on Large Pre-trained Language Model and Adversarial Training

  • Tang, Zhan;Guo, Xuchao;Bai, Zhao;Diao, Lei;Lu, Shuhan;Li, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.771-791
    • /
    • 2022
  • Protein-protein interaction (PPI) extraction from original text is important for revealing the molecular mechanism of biological processes. With the rapid growth of biomedical literature, manually extracting PPI has become more time-consuming and laborious. Therefore, the automatic PPI extraction from the raw literature through natural language processing technology has attracted the attention of the majority of researchers. We propose a PPI extraction model based on the large pre-trained language model and adversarial training. It enhances the learning of semantic and syntactic features using BioBERT pre-trained weights, which are built on large-scale domain corpora, and adversarial perturbations are applied to the embedding layer to improve the robustness of the model. Experimental results showed that the proposed model achieved the highest F1 scores (83.93% and 90.31%) on two corpora with large sample sizes, namely, AIMed and BioInfer, respectively, compared with the previous method. It also achieved comparable performance on three corpora with small sample sizes, namely, HPRD50, IEPA, and LLL.

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Visuality and Hapticity in Acupoints: A Study on Benshu Chapter in Huangdi Neijng Lingshu (경혈의 시각성과 촉각성: 『영추·본수』의 한 연구)

  • Song, Seok Mo
    • Korean Journal of Acupuncture
    • /
    • v.38 no.4
    • /
    • pp.290-307
    • /
    • 2021
  • Objectives : Perceptual experiences have a causal relationship with reality. If there exists something corresponding to acupoints, there should be perceptual experiences for that something. The purpose of this study is to identify and to analyze the perceptual experiences for acupoints within 『LingShu·BenShu』. Methods : First, we briefly propose a perceptual anatomy in order to describe the perceived human body parts, and their perceived directions and places. Second, we analyze the ways of identifying acupoints in the original text of 『LingShu·BenShu』. Results : From 『LingShu·BenShu』, the procedures of identifying total 64 acupoints were recognized. It was clarified that they are by way of visual and haptic explorations in body regions and partial regions. Conclusions : Perceptual explorations for acupoints follow three major principles: of gradual narrowing down, of determination of direction or place, of relative distance. At the final stages, categories of form and location are encountered by observers. The forms have either concavities or convexities. They are determinate indicators of where acupoints are, while the locations are indetermanate. Haptic forms of acupoints are newly discovered from textual analysis with perceptual anatomy. These properties will shed new light both on study of acupoints and on study of meridians.

BPNN Algorithm with SVD Technique for Korean Document categorization (한글문서분류에 SVD를 이용한 BPNN 알고리즘)

  • Li, Chenghua;Byun, Dong-Ryul;Park, Soon-Choel
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.49-57
    • /
    • 2010
  • This paper proposes a Korean document. categorization algorithm using Back Propagation Neural Network(BPNN) with Singular Value Decomposition(SVD). BPNN makes a network through its learning process and classifies documents using the network. The main difficulty in the application of BPNN to document categorization is high dimensionality of the feature space of the input documents. SVD projects the original high dimensional vector into low dimensional vector, makes the important associative relationship between terms and constructs the semantic vector space. The categorization algorithm is tested and compared on HKIB-20000/HKIB-40075 Korean Text Categorization Test Collections. Experimental results show that BPNN algorithm with SVD achieves high effectiveness for Korean document categorization.

A Study on the 'Tangaek-Unhoei(湯液韻彙)' Index of Herbal Medicine in the Inje-Ji(仁濟志) of the Imwon-Gyeongje-Ji(林園經濟志), by Seo-Yugu(徐有榘) Focusing on 'Fang(方)' (풍석(楓石) 서유구(徐有榘)의 『임원경제지(林園經濟志)』 「인제지(仁濟志)」 '탕액운휘(湯液韻彙)'와 처방 제형에 대한 연구 - '방(方)'을 중심으로 -)

  • JEON, Jongwook
    • Journal of Korean Medical classics
    • /
    • v.36 no.4
    • /
    • pp.25-40
    • /
    • 2023
  • Objectives : This paper studies the Tangaek-Unhoei(湯液韻彙) index of herbal medicine in the Inje-Ji(仁濟志) of the Imwon-Gyeongje-Ji(林園經濟志), which contains about 4,800 formulas. Created by 19th-century Joseon scholar Seo, Yugu, it not only lists the formulas according to their names, but also provides index by topic, which enabled the collection and effective application of massive medical information. Methods : We quantitatively examined the nearly 4,800 herbal medicines in the Tangaek-Unhoei and their categorization. Any uncommon or particular categorization was examined further by analyzing the original text. Results & Conclusions : The prescriptions contained in the Inje-Ji are categorized under 26 headings. They are listed according to the 106 units of the Chinese character dictionary and organized by double headings. This unique index makes it easy to browse the contents of such a vast book containing massive medicinal knowledge. In addition, the fifty or so remedies called 'Fang(方)' exemplify the author's attitude toward medicinal knowledge, which is both rational and inclusive. This is an attitude that should be recognized beyond tradition.

Research Analysis of the 『醫方類聚』 Do-In Section - Based on the Original Text and Its Interpretation – (『의방류취(醫方類聚)』 도인법(導引法) 연구 - 원문과 어석을 중심으로 -)

  • PARK Hyung-jun;CHUNG Won-seok;CHA Woong-seok
    • The Journal of Korean Medical History
    • /
    • v.36 no.2
    • /
    • pp.61-76
    • /
    • 2023
  • Objectives: This study was designed to introduce distinctive Do-In techniques among the many found in the book 'Euibangyoochi'. Methods: 'Do-In section' of Euibangyoochi was translated, and distinctive Do-In techniques were extracted from it. These techniques were categorized as 'using specific actions', 'using vocal sounds'. Results: The Do-In methods in the 'Do-In section' of Euibangyoochi were categorized. The first category includes Do-In methods that involve specific actions, such as 'Myung Chun Go', 'Go-chi Beob', 'Ak-go Beob', 'Gun-yok Beob', and 'An-ma Beob'. The second category is the Do-In technique using vocal sounds, known as 'Yuk Ja Gyeol'. Conclusion: The 'Do-In section' of Euibangyoochi contains numerous Do-In techniques recorded in various texts. Among them, techniques with specified names were extracted and categorized. While there are currently no studies on the actual effects of these techniques, it is hoped that future research can validate their efficacy.

A Study on Cho Heon-yeong's Buinbyeongchiryobeob (婦人病治療法) - Focused on Medical Ideology and Prescription (조헌영의 『부인병치료법(婦人病治療法)』 연구: 의학사상과 처방을 중심으로)

  • Dowon Kim;Wung-Seok Cha
    • The Journal of Korean Medical History
    • /
    • v.34 no.1
    • /
    • pp.11-22
    • /
    • 2021
  • In this study, we examine Cho Heon-yeong's medical theory in obstetrics and gynecology by looking at the contents and prescriptions of 『Buinbyeongchiryobeob (婦人病治療法)』. This book is a clinical text on obstetrics and gynecology written in the 1940's. This book consists of an Introduction, Jeungchi (證治), Yangjinhanchi (洋診漢治), Cheobangnonhae (處方論解) and refers to 『Donguibogam(東醫寶鑑)』, 『Keongakjeonseo (景岳全書)』, 『Junguihaksajeon (中醫學辭典)』, 『Jejungsinpyeon (濟衆新編)』, 『Uihakipmun (醫學入門)』 and 『UijongKeumkam (醫宗金鑑)』. Cho Heon-yeong's theory in this book has the following characteristics. First, his medical eclecticism is centered on Korean Medicine, with incidental use of Western medicine. Second, he regarded weakness (虛證) as a vital factor in obstetrics and gynecology. Third, he added "mental state" to the list of basic physiological characteristics of women. Fourth, he presented a new diagnostic standard based on a spectrum of fire (火) and cold (冷). There are 363 prescriptions in this book, and 171 of them are from 『Donguibogam (東醫寶鑑)』. The books frequently used prescriptions are all designed to supplement (補藥). There are 48 prescriptions that original to Cho Heon-yeong. Additionally, this book contains eopsaeng (攝生) and pretended stimulation therapies and exercise methods.