• Title/Summary/Keyword: Ownership Authentication

Search Result 36, Processing Time 0.019 seconds

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

The Biometric based Convertible Undeniable Multi-Signature Scheme (바이오정보 기반 전환 부인봉쇄 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1670-1676
    • /
    • 2010
  • It is easy to reproduce and manipulate the digital contents. It's difficult to distinguish the original contents with a pirate one. A digital signature scheme is used to protect the contents author's ownership and to provide secure contents distribution. Generally, the digital contents is completed with many authors' help. It's necessary to apply a cryptographic method for protecting co-authors' rights and interests. In this paper, the biometric based convertible undeniable multi-signature scheme is proposed. In the proposed scheme, keys are generated by using a signer's biometric data. Consigning the private key to another signer is infeasible. Signers must participate in signature generation and verification stages. Our scheme also provides signature conversion protocol in which the undeniable signature is converted to the ordinary one. For applications, we show how the proposed scheme is used to protect co-authors' rights and to distribute the contents securely.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Analysis on Writing Status of Laboratory Notebook by Science-Gifted High School Students (과학고 및 영재학교에 재학 중인 과학영재의 연구노트 작성실태 분석)

  • Hyeoksang Yu;Jiwon Lee
    • Journal of Science Education
    • /
    • v.46 no.3
    • /
    • pp.266-277
    • /
    • 2022
  • We analyzed the responses of 152 science-gifted high school students by surveying the status and recognition of writing and keeping laboratory notebooks to develop guidelines and education plans. Science-gifted students did not write laboratory notes diligently, despite recognizing that it is crucial to do so. Mentors also tended not to provide faithful guidance and inspection. There was an insufficient practice in using research evidence in laboratory notebooks, such as including names and dates for authentication. In addition, while a high ratio of students owned their own laboratory notebooks, there was not a high level of recognition regarding the retention period, ownership, and responsibility. Based on these results, we propose suggestions for improving educational institutions for gifted students in science. First, it is necessary to strengthen the guidance for science-gifted students to faithfully write laboratory notebooks. Second, education on writing laboratory notebooks should be provided. Third, science-gifted high schools should prepare regulations for the management of lab notes and conduct education based on them.

Quantitative Effectiveness Analysis of Vehicle Inspection (자동차검사제도의 정량적 효과분석)

  • Jo, Han-Seon;Sim, Jae-Ik;Kim, Jong-Ryong
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.3
    • /
    • pp.65-74
    • /
    • 2007
  • Vehicle inspection is a system to help all vehicles function safely through periodic maintenance. Vehicle inspections have been performed since 1962 in Korea by the government in order to reduce traffic accidents due to vehicle defects. Also, vehicle inspections may help protect citizens against uninsured vehicles and illegal vehicle remodeling by discovering and disclosing those vehicles. The prime objective of vehicle inspection is to guarantee all vehicles drive safely on the road by inspecting and fixing items which can affect traffic accidents. In addition, vehicle inspections may help to improve the public order related to vehicle operations and prevent crime through the confirmation of vehicle identity and authentication of ownership. Although there are many benefits of vehicle inspection. there are some negative opinions of the system. In this study, a methodology to analyze the effectiveness of the vehicle inspection system quantitatively in terms of traffic safety was developed. According to the developed methodology. accidents were reduced by 23.735, which is 11% of the total number of accidents in 2005.