• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.036 seconds

Detection and Blocking of a Face Area Using a Tracking Facility in Color Images (컬러 영상에서 추적 기능을 활용한 얼굴 영역 검출 및 차단)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.454-460
    • /
    • 2020
  • In recent years, the rapid increases in video distribution and viewing over the Internet have increased the risk of personal information exposure. In this paper, a method is proposed to robustly identify areas in images where a person's privacy is compromised and simultaneously blocking the object area by blurring it while rapidly tracking it using a prediction algorithm. With this method, the target object area is accurately identified using artificial neural network-based learning. The detected object area is then tracked using a location prediction algorithm and is continuously blocked by blurring it. Experimental results show that the proposed method effectively blocks private areas in images by blurring them, while at the same time tracking the target objects about 2.5% more accurately than another existing method. The proposed blocking method is expected to be useful in many applications, such as protection of personal information, video security, object tracking, etc.

Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm (개선된 몽고메리 알고리즘을 이용한 저면적용 RSA 암호 회로 설계)

  • 김무섭;최용제;김호원;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.95-105
    • /
    • 2002
  • This paper describes an efficient method to implement a hardware circuit of RSA public key cryptographic algorithm, which is important to public-key cryptographic system for an authentication, a key exchange and a digital signature. The RSA algorithm needs a modular exponential for its cryptographic operation, and the modular exponential operation is consists of repeated modular multiplication. In a numerous algorithm to compute a modular multiplication, the Montgomery algorithm is one of the most widely used algorithms for its conspicuous efficiency on hardware implementation. Over the past a few decades a considerable number of studies have been conducted on the efficient hardware design of modular multiplication for RSA cryptographic system. But many of those studies focused on the decrease of operating time for its higher performance. The most important thing to design a hardware circuit, which has a limit on a circuit area, is a trade off between a small circuit area and a feasible operating time. For these reasons, we modified the Montgomery algorithm for its efficient hardware structure for a system having a limit in its circuit area and implemented the refined algorithm in the IESA system developed for ETRI's smart card emulating system.

Malicious Code Injection Vulnerability Analysis in the Deflate Algorithm (Deflate 압축 알고리즘에서 악성코드 주입 취약점 분석)

  • Kim, Jung-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.869-879
    • /
    • 2022
  • Through this study, we discovered that among three types of compressed data blocks generated through the Deflate algorithm, No-Payload Non-Compressed Block type (NPNCB) which has no literal data can be randomly generated and inserted between normal compressed blocks. In the header of the non-compressed block, there is a data area that exists only for byte alignment, and we called this area as DBA (Disposed Bit Area), where an attacker can hide various malicious codes and data. Finally we found the vulnerability that hides malicious codes or arbitrary data through inserting NPNCBs with infected DBA between normal compressed blocks according to a pre-designed attack scenario. Experiments show that even though contaminated NPNCB blocks were inserted between normal compressed blocks, commercial programs decoded normally contaminated zip file without any warning, and malicious code could be executed by the malicious decoder.

Information Support of the Educational Process in the Development of Leadership Potential of Modern University in the Conditions of Distance Learning

  • Viznyuk, Inessa;Rokosovyk, Nataliia;Vytrykhovska, Oksana;Paslawska, Alla;Bielikova, Olena;Radziievska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.209-216
    • /
    • 2022
  • The modern development of higher education in Ukraine is the result of two main factors. One of them - the factor of social progress - reflects the transformations inherent in modern Ukrainian society. These include, first of all, the processes of democratization and the development of civic responsibility. European the choice of Ukraine, the integration of our state into the European space determine accordingly, the second factor influencing the development of domestic higher education - the trends that guide the progress of the European Higher Education Area (European Higher Education Area (hereinafter - EHEA) and the European Research Area Research Area, hereinafter - ERA). The strategy of information support of the educational process (approved by the European Commission in 2010) recognizes the leading role of higher education as a driver of social progress, accordingly states the priority - the development of free economic education and identifies indicators of such progress - the achievement and international attractiveness of European free economic education. The information support of modernization challenges in higher education are aimed at the educational process, the leadership position of students, in particular through promotion and implementation of leading achievements and best practices in the context of globalization.

A Study on the Improvement of the Management System of Rockfall Risk Area Using the Rockfall Analysis Program (낙석 해석 프로그램을 이용한 낙석위험지역 관리체계 개선 방안에 대한 연구)

  • Bae Dong Kang;Jae Chae Jeong;Chang Deok Jang;Kye Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.79-86
    • /
    • 2022
  • The National Park Service is making efforts to create a safe environment by installing rockfall prevention facilities (rockfall prevention nets, fences, and Piam tunnels) in areas at risk of falling rocks. However, the occurrence of falling rocks is increasing every year due to torrential rains caused by climate change, abnormal temperatures in winter, and aging of the ground, and the need to improve the existing rock risk area management plan has emerged. In this study, a pilot area at risk of falling rocks was selected for the Hwanggol district of Chiaksan National Park among Korean national parks, and rockfall analysis was performed using the Rockfall program, and monitoring was conducted by applying a countermeasure method combined with the measurement system to the pilot area. Through this, a rockfall management plan was proposed for continuous management and monitoring of rockfall.

Strategies to improve irrigation water management for rice production in Pulangui River Irrigation System

  • Siem, Paul Roderick M.;Ahmad, Mirza Junaid;Choi, Kyung-Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.509-509
    • /
    • 2022
  • Rice has always been the anchor of food security in the Philippines and the government is adamant about sustaining rice production by ensuring reliable irrigation water availability. Among the numerous irrigation schemes, the importance of the Pulangui River Irrigation System (PRIS) is undeniable, as it is the largest and primary irrigation source for rice production areas which are considered the food basket in Northern Mindanao. However, the ageing irrigation structures, unlined canals, long-standing water delivery systems, and climate change are compromising the performance of PRIS; and every year, during the dry and wet season, the maximum rice irrigable area is not achieved. From the field-scale water management perspective, untimely irrigation application, an unregulated roster of turn for irrigation among farmers, and the traditional practice of flooding the rice fields are the main causes of substantial water losses in conveyance, distribution, and farm application of irrigation water. Hence, proper irrigation scheduling is crucial to cultivate the maximum irrigable area by ensuring equity among the farmers and to increase the water use efficiency and yield. In this study, the FAO single crop coefficient approach was adopted to estimate rice water requirements, which were subsequently used to suggest appropriate irrigation schedules based on the recommended field-scale rice cultivation practices. The study results would improve the irrigation system management in the study area by facilitating in regulating the canal water flows and releases according to suggested irrigation schedules that could lead to increased benefited area, yield, and water efficiency without straining the available water resources.

  • PDF

Landslide Risk Analysis due to Development of Mountain Area (산지지역 개발에 의한 산사태 위험 분석)

  • Namgyun Kim;Yunseong Park
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.67-74
    • /
    • 2023
  • In this study, the risk of landslides was analyzed for planned development sites in mountainous areas. Field survey was conducted on the research area with the slope and valley site. The criteria for evaluating the risk of landslides in the field survey were based on the risk assessment table of the Korea Forest Service Notice No. 2023-10. The research area has 13 slopes and 11 valleys. As a result of evaluating the risk area, two slopes and two valley were found to be dangerous sites in each. Numerical simulation was performed on the investigated risk areas to predict the spread of damage. The debris flow was simulated to have an affect on roads and buildings located in the lower part of the basin, and it was determined that a disaster prevention facility was nacessary to minimize damage. This information can be used to determine the impact of disasters before carrying out mountain development.

A Study on the Establishment of the Korea-Russia Trade Activation with the Arctic Sea Route Cooperation (북극항로 협력 등 한-러 무역활성화 구축을 위한 연구)

  • Kim, Bong-chul
    • Korea Trade Review
    • /
    • v.44 no.4
    • /
    • pp.115-128
    • /
    • 2019
  • This article analyzes issues regarding the economic development of the arctic area with the aim of finding ways to help solve the problems and to support sustainable economic development of the arctic area. Some proposals are introduced for establishing a sound legal infrastructure of the Korea-Russia economic development of the arctic area. As Russia develops the Arctic area and the route through the Arctic area, Korea will gain the possibility of transportation efficiency, vitalization of international transaction, and finding new markets. Resource development in the North Pole is ongoing, with matching international transaction and economic benefits. To reflect the Korea-Russia interests and to sustain the effect, the legal infrastructure is inevitable. For example, it would be reinforced by pushing forward the Korea-Russia FTA. The legal infrastructure for economic cooperation of Korea and Russia has to reflect that 'the development of the Arctic area and making the route through the Arctic area' should increase the sustainability and vitality of international transaction. The legal infrastructure for economic benefits can also help mitigating non-economic arguments of international community such as the security risk in the Korean-peninsula and around the world.

A Study on the Role of Maritime Enforcement Organization As Response of Illegal Fishing (불법어업에 대한 해상집행기관의 역할 및 방향 - 중국어선의 불법어업을 중심으로 -)

  • Jung, Bong-Kyu;Choi, Jung-Ho;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.26 no.4
    • /
    • pp.769-788
    • /
    • 2014
  • Today, all the countries of the world newly recognize importance of sea on 70% area of the earth, which are focused on efforts for security of marine territory and fishes resources. On the security concerns of the ocean & fishes resources, Sea are very important on the ground of the importance of the ocean, thus international community has been trying to combat a maritime security threat and illegal fisheries. Coastal states need to have proper state's jurisdiction and exercise it's jurisdiction to response effectively to a maritime security threat and illegal fisheries. Here, many of the coastal states strengthened the rights in Exclusive Economic Zone(;EEZ) naturally, there are made cooperation activities and keen competition in the sea because deepening of complex understanding of the relationship between the surrounding countries with marine surveys & continental shelf development, island territorial sovereignty & marine jurisdiction in overlap of sea area on EEZ. In these circumstances, foreign fishing boats invaded to our territorial waters and EEZ many times. in addition, Chinese fishing boats are going to illegal fisheries naturally. On this point, a powerful crackdown of maritime enforcement organization had no effect on them. Also more and more their resistance gathered strength and tendency of a illegal activities became systematization, group action and atrocity little by little. So this thesis includes a study on the regal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the activities of illegal fishing and boats controlled by Korea Coast Guard(KCG), fishing patrol vessels of Ministry of Maritime Affaires and Fisheries(MOMAF) and Navy etc. from in adjacent sea area of Korea. In relation to this, the policy and activity plan were devised to crackdown to illegal fisheries of foreign fishing boats and then it was enforced every year. According to this, analyze the present conditions of illegal fisheries of a foreign fishing boats on this study, also analyze the present conditions of maritime enforcement organization & found out problems to compared it. protect the territorial waters, at the same time protection of marine mineral resources & fishes resources of EEZ including continental shelf, which has want to study for the role & response of maritime enforcement organization for the protection of fisheries resources and a proper, a realistic confrontation plan of maritime enforcement organization against illegal fisheries of foreign fishing boats.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.