• Title/Summary/Keyword: School security

Search Result 3,327, Processing Time 0.045 seconds

A Robust Reversible Data Hiding Scheme with Large Embedding Capacity and High Visual Quality

  • Munkbaatar, Doyoddorj;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.891-902
    • /
    • 2012
  • Reversible data hiding scheme is a form of steganography in which the secret embedding data can be retrieved from a stego image for the purpose of identification, copyright protection and making a covert channel. The reversible data hiding should satisfy that not only are the distortions due to artifacts against the cover image invisible but also it has large embedding capacity as far as possible. In this paper, we propose a robust reversible data hiding scheme by exploiting the differences between a center pixel and its neighboring pixels in each sub-block of the image to embed secret data into extra space. Moreover, our scheme enhances the embedding capacity and can recover the embedded data from the stego image without causing any perceptible distortions to the cover image. Simulation results show that our proposed scheme has lower visible distortions in the stego image and provides robustness to geometrical image manipulations, such as rotation and cropping operations.

A Study on Efficient Market Hypothesis to Predict Exchange Rate Trends Using Sentiment Analysis of Twitter Data

  • Komariah, Kokoy Siti;Machbub, Carmadi;Prihatmanto, Ary S.;Sin, Bong-Kee
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1107-1115
    • /
    • 2016
  • Efficient Market Hypothesis (EMH), states that at any point in time in a liquid market security prices fully reflect all available information. This paper presents a study of proving the hypothesis through daily Twitter sentiments using the hybrid approach of the lexicon-based approach and the naïve Bayes classifier. In this research we analyze the currency exchange rate movement of Indonesia Rupiah vs US dollar as a way of testing the Efficient Market Hypothesis. In order to find a correlation between the prediction sentiments from Twitter data and the actual currency exchange rate trends we collect Twitter data every day and compute the overall sentiment to label them as positive or negative. Experimental results have shown 69% correct prediction of sentiment analysis and 65.7% correlation with positive sentiments. This implies that EMH is semi-strong Efficient Market Hypothesis, and that public information provide by Twitter sentiment correlate with changes in the exchange market trends.

Differential Fault Attack on SSB Cipher (SSB 암호 알고리즘에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.48-52
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on SSB having same structure in encryption and decryption proposed in 2011. The target algorithm was designed using advanced encryption standard and has advantage about hardware implementations. The differential fault analysis is one of side channel attacks, combination of the fault injection attacks with the differential cryptanalysis. Because SSB is suitable for hardware, it must be secure for the differential fault analysis. However, using proposed differential fault attack in this paper, we can recover the 128 bit secret key of SSB through only one random byte fault injection and an exhausted search of $2^8$. This is the first cryptanalytic result on SSB having same structure in encryption and decryption.

Security Analysis of SCOS-3 Block Cipher against a Related-Key Attack (블록 암호 SCOS-3의 연관키 차분 공격에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.977-983
    • /
    • 2009
  • Recently, several DDP, DDO and COS-based block ciphers have been proposed for hardware implementations with low cost. However, most of them are vulnerable to related-keyt attacks. A 12-round block cipher SCOS-3 is desinged to eliminate the weakness of DDP, DDO and COS-based block ciphers. In this paper, we propose a related-key differential attack on an 11-round reduced SCOS-3. The attack on an 11-round reduced SCOS-3 requires $2^{58}$ related-key chosen plaintexts and $2^{117.54}$ 11-round reduced SCOS-3 encryptions. This work is the first known attack on SCOS-3. Therefore, SCOS-3 is still vulnerable to related-key attacks.

  • PDF

Comparative analysis for security technology to WiBro terminals's vulnerability (모바일 기기의 ERP 인터페이스 방안)

  • Park, Jong-Youel;Chang, Young-Hyun;Yoon, Kyung-Bae;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.281-283
    • /
    • 2013
  • In this paper, we have presented the implementation plan for the Server interface and how to implement the Client GUI interface of a form you can use Android considerations and ERP Interface methods available in mobile devices, with iOS. It provides in the form of Web services using TCP / IP, how to handle the data, communication of Client and Server in mobile devices, coordination of ERP that can be used in mobile devices by presenting how to send in XML format it presented a new method which can be performed more efficiently.

  • PDF

Foreign Key Management Server Products and the necessity of Korean Related Law and Policy (해외의 키관리서버 제품들과 우리나라의 해당 법규정 및 정책 설정의 필요성)

  • Kim, Ji Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.501-504
    • /
    • 2012
  • Personal Information Protection Law and Information Communication Network Law is administered from March, 2012 and August, 2012. It is very important to protect and manage the key well so that the third party doesn't know the key. Thus, at present, there increases an importance of Key Management Server. Key Management Server is an appliance type of hardware equipment which can securely store and manage encryption and decryption key. In this paper, we will survey on foreign key management server products and discuss about the necessities of legislation of related law and establishment of policy.

  • PDF

A Real Business Cycle Model to Study the Effect of Overseas Oil Resource Development on the Korean Economy (실물경기변동 모형을 이용한 해외석유가스 개발사업의 경제적 효과분석)

  • Park, Hojeong;Kim, Jaekyung
    • Environmental and Resource Economics Review
    • /
    • v.25 no.2
    • /
    • pp.179-197
    • /
    • 2016
  • The development of overseas resource is a driving force to secure the energy security in Korea with low sufficiency rate of energy. This paper analyzes the effect of overseas oil resource development on the economy by presenting a real business cycle model with consolidated energy price index. A linear-quadratic dynamic programming is adopted to raise computational transparency and efficiency. The analysis shows that the overseas oil resource development project during 2010 and 2012 decreases the energy price by 1.2% per annum which effect is equivalent to the positive 0.47% to the GDP. The implication calls for steady and robust support for overseas resource development projects to enhance energy resilience.

Study on the Role of Media in the Building of Interpersonal Trust (개인간 신뢰형성 과정에서 미디어의 역할에 관한 연구)

  • Oh, Jinwouk;Cho, Namjae
    • Korean Management Science Review
    • /
    • v.33 no.2
    • /
    • pp.29-47
    • /
    • 2016
  • Trust is formed from the day-to-day and persistent interaction relationship. The trust demands more and more at the age of uncertainty. Human beings are using media interaction. The area of communication with media is extended to virtual space. The purpose of this study is to qualitatively explain trust building process in virtual team by media using. In the pursuit of this purpose, we executed in-depth interview with the person who have experience communicating by media with a man of a complete stranger. They experienced the trust building process. Interview data were analyzed by a Structured Coding Techniques. The derived seven categories were reconstructed in consideration of the cause-and-effect relationship and the flow of events. We have discovered a new trust model that was the result from communication by a media using. The model presented is very useful to Individuals who need a new trust building relationship with stranger or virtual team member.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

On Study for the CIM By DAS(DATA Acquisition System) (CIM구축을 위한 생산현장의 정보화 사례연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-76
    • /
    • 2005
  • This study for Customer Satisfaction(Customer Focus) by Profit security' in the field Process improvement activity and man-power upgrade by DAS(DATA Acquisition System) in the Plant that is fusion Off Line and On Line(IT), Especially the basic of the most foundation in the beginning Step of Toyota system is 3-jeong(a standard instrument; right volume, right box, right position), 5S(Seiri, Seiton, Seisoh, Seiketsu, Sitsuke ; KAISEN, KANBNA System(for Logistic), Further more KPC has established the digital environment such as CIM ; Computer Integrated Manufacturing), IMS ; Intelligent Manufacturing System ERP ; Enterprise Resource Planning, DAS; Data Acquisition System, Autonomous QC & SPC etc,.) in order to realize the intelligent informatization, which is core base for obtaining the competitive power and for responding to the various 21C management environment in flexibility. In this digital management environment, continuously and powerfully they would advance for becoming the best of the world. For strategic changes to take place in industry 3 key important factors need to be included ; Integration of tasks function and process, Decentralization of information, Responsibility, Finally simplification of products and product structures.

  • PDF