• Title/Summary/Keyword: Security Assessment

Search Result 720, Processing Time 0.025 seconds

Quality Assessment of Fingerprint Images and Correlation with Recognition Performance (지문 영상의 품질 평가 및 인식 성능과의 상관성 분석)

  • Shin, Yong-Nyuo;Sung, Won-Je;Jung, Soon-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2008
  • In this paper, we propose a new method to assess fingerprint image quality. In the proposed method, analysis of local variance of image's gray values, local orientation, minutiae density, size and position is applied. Especially by using position information of inputted fingerprint images, partial fingerprint images are filtered and recognition performance is improved. In the experimental results, quality threshold value for improving performance can be decided by analysis of correlation between image quality and recognition rate.

The Belt and Road Initiative in Lebanon: A Promising Initiative in a Complex Society

  • AL SHAHER, Shaher;ZREIK, Mohamad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.2
    • /
    • pp.151-158
    • /
    • 2022
  • The study aims to investigate Lebanese-Chinese relations within the framework of the Belt and Road Initiative. Lebanon formally joined the effort in 2017; this paper emphasizes Lebanon's geostrategic importance. The paper presents an assessment of the investment risks in Lebanon, which is considered an economically unstable country with a volatile security situation, with many internal and external political hurdles. The paper refers to the obstacles and challenges that the Chinese investor may face in Lebanese society. The study employs qualitative descriptive analysis to address the status of Chinese investment in Lebanon and the consequences of this partnership; the paper examines previous research related to the Belt and Road Initiative and the Lebanese political, security, and economic situation literature. Due to the deteriorating security situation, external intervention, and the economic crisis, the results reveal that Lebanon is not a top investment priority for China, which is a big impediment to China entering into economic cooperation with Lebanon. The findings of this study suggest that the Lebanese government should adopt an anti-corruption policy to build confidence for the Chinese investor, reduce unnecessary public spending, and hold a national dialogue to build confidence among the Lebanese parties.

Vulnerability Assessment on the Secured USB Keyboard (보안 USB 키보드의 데이터 탈취 가능성 진단)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.39-46
    • /
    • 2011
  • The user authentication on the security applications is one of the most important process. Because character based password is commonly used for user authentication, it is most important to protect the keyboard. Due to the reason, several software solutions for keyboard security have been applied to critical sites. This paper introduces vulnerabilities to the commonly used USB keyboard, implements a sample code using the vulnerabilities and evaluates the possibility for the keyboard data to be stolen in the guarded environment. Through the comparison of the result, a countermeasure to the vulnerabilities is proposed.

Development of On-line Dynamic Security Assessment System (온라인 동적 안전도평가 시스템의 개발)

  • Nam, H.K.;Song, S.G.;Shim, K.S.;Moon, C.J.
    • Proceedings of the KIEE Conference
    • /
    • 2001.11b
    • /
    • pp.73-76
    • /
    • 2001
  • This paper presents a new systematic contingency selection, screening and ranking method for on-line transient security assessment. Transient stability of a particular generator is influenced most by fault near it. Fault at the transmission lines adjacent to the generators are selected as contingency. Two screening methods are developed using the sensitivity of modal synchronizing torque coefficient and computing an approximate critical clearing time(CCT) without time simulation. The first method, which considers only synchronizing power, may mislead in some cases since it does not consider the acceleration power. The approximate CCT method, which consider both the acceleration and deceleration power, worked well. Finally the Single Machine Equivalent(SIME) method is implemented using IPLAN of PSS/E for detailed stability analysis.

  • PDF

Redundancy assessment of PIMS and PIPL by parsing (구문분석을 통한 PIMS와 PIPL의 중복성 평가)

  • Kim, So-Ra;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.745-756
    • /
    • 2016
  • As infringement accidents of personal information have often occurred and estimates of damages are too large, the government introduces many certifications related with personal information management system for protecting personal information. Among them, PIMS and PIPL share many points in common, so many complaints about duplicate regulation have been suggested. This study evaluates the duplication of two certifications in order to examine redundancy between PIMS and PIPL both of which have been controversial.

Development of on-line Transient Security Assessment Algorithm (온라인 과도안전도 평가 알고리즘 개발)

  • Kim Y. H.;Cha S. T.;Kim T. K.;Kim H. K.;Jeon M. R.;Choo J. B;Nam H. K.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.91-93
    • /
    • 2004
  • This paper is to develope the fast screening algorithm for on line transient security assessment. All generators are represented in a classical model and stability index is defined as a ratio between acceleration power and deceleration power Critical machines and remaining machines are identified based on stability index and aggregated into two equivalent machines. And finally equivalent machines are reduced into OMIB system then CCT is computed. The Proposed algorithm is applied to the KEPCO system and obtained the reasonable results compared with TSA Tool.

  • PDF

Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach (개선된 OCTAVE 접근방법을 이용한 정보시스템 취약성 평가 사례연구)

  • 김기윤;양동구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.69-79
    • /
    • 2003
  • We analyze key business process by using IDEF method in the perspective of business continuity, identify key information assets by using Skandia model, and use Nessus Version 1.4.2 to assess vulnerability about the sever of library information system according to OCTAVE(The Operationally Critical Threat, Asset, and Vulnerability Evaluation) approach. We suggest the vulnerability assessment case for introducing improved OCTAVE method including IDEF method and Skandia model.

Model Based Vulnerability Analysis for SOA (SOA를 위한 모델기반 취약점 분석)

  • Kim, Hyunha;Kim, Yukyong;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.8 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • This paper is to identify and assess vulnerabilities of services considering the nature of service layers for analyzing vulnerability of SOA security. It is a model driven approach which provides the way to present security requirements of the business model and identify the vulnerabilities of the services to extract the secure service model. We validate the proposed method with the analytic evaluation because the predictive nature of our methodology poses some specific challenges for its validation.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Improving Performance Certification of Aviation Security Equipment (항공보안장비 성능인증기술 고도화 방안 연구)

  • Jung, Jin Hyeong;Kim, Ki-Yeon;Yoon, Yeon Ah;Kim, Na Yeon;Sim, Hyun Su;Lee, Seung Hoon;Ha, Da Som;Seol, Eun-Suk;Han, Soo Jin;Park, Soo-Hong;Yu, Sang Woo;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.1
    • /
    • pp.187-199
    • /
    • 2020
  • Purpose: This study suggests how to upgrade performance certification technology. Current performance certification of aviation security equipment and the requirements thereof were analyzed. Methods: The performance certification of aviation security equipment worldwide and identified issues with the domestic certification system were compared. The government must upgrade certification in terms of technical standards, the assessment methodology used, and the operating system. Results: Three principal conclusions were drawn. First, certification requirements must be based on a review of the technical literature and real-world experience. Second, development priorities must be set by reference to assessment techniques. Third, both research on the certification system and improvements thereof are essential. Conclusion: Certification of aviation security equipment performance requires gradual upgrading.