• Title/Summary/Keyword: Protection and security

Search Result 1,999, Processing Time 0.032 seconds

A New Copyright Protection Scheme for Depth Map in 3D Video

  • Li, Zhaotian;Zhu, Yuesheng;Luo, Guibo;Guo, Biao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3558-3577
    • /
    • 2017
  • In 2D-to-3D video conversion process, the virtual left and right view can be generated from 2D video and its corresponding depth map by depth image based rendering (DIBR). The depth map plays an important role in conversion system, so the copyright protection for depth map is necessary. However, the provided virtual views may be distributed illegally and the depth map does not directly expose to viewers. In previous works, the copyright information embedded into the depth map cannot be extracted from virtual views after the DIBR process. In this paper, a new copyright protection scheme for the depth map is proposed, in which the copyright information can be detected from the virtual views even without the depth map. The experimental results have shown that the proposed method has a good robustness against JPEG attacks, filtering and noise.

RADIOACTIVE SOURCE SECURITY: WHY DO WE NOT YET HAVE A GLOBAL PROTECTION SYSTEM?

  • Englefield, C.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.4
    • /
    • pp.461-466
    • /
    • 2014
  • Security of radioactive sources has been an issue since the earliest days of safety regulation of such materials. Since the events of September 11 2001, some governments and regulatory bodies have been much more focussed on these issues and have introduced extensive and enhanced security arrangements. International organisations like the IAEA and WINS have worked hard to help States in this regard. However, only a minority of States have implemented statutory security systems for radioactive source security. Why have so many States still to take action? What can be done to encourage and support these changes? This paper will offer some possible explanations for the lack of action in so many States and some potential answers to these questions.

Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem (미국의 항공보안정책 적용과 프라이버시 문제점)

  • Kang, J.Y.;Kim, C.H.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF

Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations - (국내외 개인정보보호정책 비교 분석 - 개인정보보호 법률과 전담조직을 중심으로 -)

  • Jeong, Dae-Kyeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.923-939
    • /
    • 2012
  • In the information society, to serve the normal economic activity and to delivery the public service is to secure the privacy information. The government endeavors to support with the privacy protection laws and public organizations. This paper is to study the privacy protection policy in the major countries by analyzing the laws and organizations. At last, The study is to examine the policy tasks to support the privacy protection policy.

Analysis of the effects of digital privacy security awareness and digital civic engagement on digital privacy protection behavior : focusing on volition and horizontality (디지털 개인 보안 인식과 디지털 시민 참여의식이 디지털 개인 정보보호 행동에 미치는 영향 분석: 자의성과 수평성을 중심으로)

  • Lee, Ryo-whoa;Hu, Sung-ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.349-358
    • /
    • 2022
  • The aim of this study to analyze the effect of person and situation on digital privacy protection behaviors. The research method design is a factorial design of volition and horizontality. The measurement variables used in the investigation are digital privacy security awareness, digital civic engagement, and digital privacy protection behavior. As a result, the volition had a significant effect on digital privacy protection behavior, and it was found that influence of the high-volition-based condition was greater than the low-volition-based condition. The horizontality had a significant effect on digital privacy security awareness, digital civic engagement, and it was found that influence of the high-horizontality-based condition was greater than the low-horizontality-based condition. In addition, the discussion explains the suitable contents of information security usability based on these research results.

SEAndroid Policy Protection Architecture Design and Implementation in Android (안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현)

  • Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1105-1119
    • /
    • 2016
  • Android includes SEAndroid as a core security feature. SELinux is applied to Android OS as a SEAndroid, because there exists structural differences between Linux and Android. Since the security of SEAndroid depends on the reliable policy if the policy is tampered by the attacker, the serious security problems can be occurred. So we must protect policies which are the most important thing in SEAndoroid. In this paper, we analyze the process of SEAndroid policy updating to find out vulnerabilities and study the attack points on policy tampering. And we propose the SPPA to detect whether the policy is modified by an attacker. Moreover, we prove the performance and the effect of our proposed method on mobile device.

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

A Study on the Reorganization of the National Critical Facilities Protection Personnel System in Accordance with the Changes in the Government Policy of the Temporary Position into Permanent Position (비정규직의 정규직화 정책기조 변화에 따른국가중요시설 방호인력체계 개편 방안)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.9-26
    • /
    • 2018
  • In order to reflect the Changes in this government's policy of making Temporary Position employees into the Public sector permanent, special security guards from Private Security firms in the National Critical Facilities protection Position are moving forward transformation to Permanent Position. Especially, the organization of the protection personnel of the National Government Buildings designated as the National Critical Facilities is comprised of various types of security personnels, protective officer, special security guards from Private Security firms, Private police guards, police officers and these types of security personnels protect for the Government Buildings. Recently, The Government Security planning division is discussing various types of transformation, Special Security guards are employed directly by the Government in order to convert them into Permanent position, Special Security guards are employed directly through a establishment of Public Security corporation, protective officers are hired by the Government, Self-guards are hired directly by the Government, Private police guards are employed directly by the Government. In order to reflect the Changes the Government policy of making Temporary position employees into the Permanent, the Special Security Guards from Private Security Firms in the National Critical Facility's protection environment, protective personnels operation characteristic under various circumstances. Especially, in the process of making Special Security Guards to Permanent position, it is necessary to take precedence over the various opinions of Special Security Guards and stakeholder.