• Title/Summary/Keyword: Quality Authentication

Search Result 134, Processing Time 0.025 seconds

Image Authentication and Restoration Using Digital Watermarking by Quantization of Integer Wavelet Transform Coefficients

  • Ahsan, Tanveer;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.187-193
    • /
    • 2012
  • An image authentication scheme for gray scale image through embedding a digital watermark by quantization of Integer Wavelet Transform (IWT) coefficients of the image is proposed in this paper. Proposed method is designed to detect modification of an image and to identify tampered location of the image. To embed the watermark mid-frequency band of a second level IWT was used. An approximation of the original image based on LL band was stored in LSB bits of the pixel data as a recovery mark for restoration of the image. Watermarked image has achieved a good PSNR of 40 dB compared to original cover image. Restored image quality was also very good with a PSNR of more than 35 dB compared to unmodified watermarked image even when 25% of the received image is cropped. Thus, the proposed method ensures a proper balance between the fidelity of the watermarked image and the quality of the restored image.

A Study to Establish the Core Evaluation Items of SP Authentication using ANP(Analytic Network Process) (ANP 모형을 이용한 SP 인증 핵심 평가항목 도출 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • Software process (SP) authentication is a certification system designed in order to improve software process and ensure software reliability of the Korean small and medium enterprises (SMEs). It is composed of 3 grades, 17 evaluation items and 70 detailed evaluation items (software process). In order to certificate grade 2, 42 detailed evaluation items must be satisfied. In order to certificate grade 3, all 70 detailed evaluation items must be satisfied. SMEs are more vulnerable to manpower and material resources than the major company. Therefore, it is difficult for SMEs to invest in the long term to improve the software process. If we can provide the core evaluation items to SMEs, SMEs will be able to improve software quality more efficiently and effectively. It can be used as a short way to acquire SP authentication. The evaluation items of SP are defined as influencing each other. Therefore, the core evaluation items might be established using related techniques. Although we searched for previous researches and related informations, the associated study was insufficient. In this study, ANP (Analytic Network Process) technique was applied, and the core evaluation items of SP authentication were established. SMEs will be able to acquire SP authentication more easily using the core evaluation items. Finally, we expect that this study will be used as a basis material for creating the SP 2.0 version.

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

A Study on the Perceived Quality and Application of Authentication Evaluation System of Teaching Materials and Implements for Children and the trend in Early Childhood Education Field (유아교육 현장에서의 유아용 교재 · 교구 활용에 대한 품질인식과 인증평가제도 적용에 대한 연구)

  • Kang, Young-Sik;Park, Jung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5601-5609
    • /
    • 2013
  • The purpose of this study is to figure out the application of perceived quality and authentication evaluation system of teaching materials and implements for children in the early childhood education field. To achieve this, a survey was carried out from April 20 to April 30, 2013 on 150 guidance teachers who teach children classes for more than 3 years at kindergartens in Daejeon area, Chungnam. The results of the analysis are as follows. First, for the use of teaching materials and implements, 96.1% of teachers thought the quality of teaching materials and implements in their interaction with children was important. Most of them had a high perception of the quantity and quality when using teaching materials and implements with early childhood curriculum. For the most inconvenience when using teaching implements, developmental appropriateness was the highest by 47.3%. And the convenience of the application to children was 3.54 points on average. Above this, the application of teaching implements to children when using play and teaching implements was useful by 3.89 points on verage. The current teaching materials and implements for children in the early childhood education field was normal by 3.29 points on average. Second, teachers' perception of teaching materials and implements was relatively positive by 3.99 points on average, proving that the quality of teaching materials and implements based on the application of teaching materials and implements to early children in kindergartens was very important. Consequently, considering the importance and usefulness of teaching materials and implements, it is necessary to introduce institutional policies that teaching materials and implements with quality standard and institution evaluation can introduce the evaluation authentication system to guarantee the convenience of children' safety and use by the supply of quality-guaranteed products.

Evaluation of Authentication Signaling Load in 3GPP LTE/SAE Networks (3GPP LTE/SAE 네트워크에서의 인증 시그널링 부하에 대한 평가)

  • Kang, Seong-Yong;Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.213-224
    • /
    • 2012
  • The integrated core network architecture and various mobile subscriber behavior can result in a significant increase of signaling load inside the evolved packet core network proposed by 3GPP in Release 8. Consequently, an authentication signaling analysis can provide insights into reducing the authentication signaling loads and latency, satisfying the quality-of-experience. In this paper, we evaluate the signaling loads in the EPS architecture via analytical modeling based on the renewal process theory. The renewal process theory works well, irrespective of a specific random process (i.e. Poisson). This paper considers various subscribers patterns in terms of call arrival rate, mobility, subscriber's preference and operational policy. Numerical results are illustrated to show the interactions between the parameters and the performance metrics. The sensitivity of vertical handover performance and the effects of heavy-tail process are also discussed.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

Checkmeat: A Review on the Applicability of Conventional Meat Authentication Techniques to Cultured Meat

  • Ermie Jr. Mariano;Da Young Lee;Seung Hyeon Yun;Juhyun Lee;Seung Yun Lee;Sun Jin Hur
    • Food Science of Animal Resources
    • /
    • v.43 no.6
    • /
    • pp.1055-1066
    • /
    • 2023
  • The cultured meat industry is continuously evolving due to the collective efforts of cultured meat companies and academics worldwide. Though still technologically limited, recent reports of regulatory approvals for cultured meat companies have initiated the standards-based approach towards cultured meat production. Incidents of deception in the meat industry call for fool-proof authentication methods to ensure consumer safety, product quality, and traceability. The cultured meat industry is not exempt from the threats of food fraud. Meat authentication techniques based on DNA, protein, and metabolite fingerprints of animal meat species needs to be evaluated for their applicability to cultured meat. Technique-based categorization of cultured meat products could ease the identification of appropriate authentication methods. The combination of methods with high sensitivity and specificity is key to increasing the accuracy and precision of meat authentication. The identification of markers (both physical and biochemical) to differentiate conventional meat from cultured meat needs to be established to ensure overall product traceability. The current review briefly discusses some areas in the cultured meat industry that are vulnerable to food fraud. Specifically, it targets the current meat and meat product authentication tests to emphasize the need for ensuring the traceability of cultured meat.

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability

  • Qin, Chuan;Chang, Chin-Chen;Hsu, Tai-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2941-2956
    • /
    • 2013
  • In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.

A Study of Authentication Algorithm in Electronic Commerce (전자상거래에서의 인증 알고리즘에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Interval-based Audio Integrity Authentication Algorithm using Reversible Watermarking (가역 워터마킹을 이용한 구간 단위 오디오 무결성 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.1
    • /
    • pp.9-18
    • /
    • 2012
  • Many audio watermarking researches which have been adapted to authenticate contents can not recover the original media after watermark removal. Therefore, reversible watermarking can be regarded as an effective method to ensure the integrity of audio data in the applications requiring high-confidential audio contents. Reversible watermarking inserts watermark into digital media in such a way that perceptual transparency is preserved, which enables the restoration of the original media from the watermarked one without any loss of media quality. This paper presents a new interval-based audio integrity authentication algorithm which can detect malicious tampering. To provide complete reversibility, we used differential histogram-based reversible watermarking. To authenticate audio in parts, not the entire audio at once, the proposed algorithm processes audio by dividing into intervals and the confirmation of the authentication is carried out in each interval. Through experiments using multiple kinds of test data, we prove that the presented algorithm provides over 99% authenticating rate, complete reversibility, and higher perceptual quality, while maintaining the induced-distortion low.