• Title/Summary/Keyword: Security Technique

Search Result 1,705, Processing Time 0.027 seconds

DNA Information Hiding Method for DNA Data Storage (DNA 데이터 저장을 위한 DNA 정보 은닉 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.118-127
    • /
    • 2014
  • DNA data storage refers to any technique for storing massive digital data in base sequence of DNA and has been recognized as the future storage medium recently. This paper presents an information hiding method for DNA data storage that the massive data is hidden in non-coding strand based on DNA steganography. Our method maps the encrypted data to the data base sequence using the numerical mapping table and then hides it in the non-coding strand using the key that consists of the seed and sector length. Therefore, our method can preserve the protein, extract the hidden data without the knowledge of host DNA sequence, and detect the position of mutation error. Experimental results verify that our method has more high data capacity than conventional methods and also detects the positions of mutation errors by the parity bases.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

Application to 2-D Page-oriented Data Optical Cryptography Based on CFB Mode (CFB 모드에 기반한 2 차원 페이지 데이터의 광학적 암호화 응용)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.424-430
    • /
    • 2015
  • This paper proposes an optical cryptography application to 2-D page-oriented data based on CFB(Cipher Feedback) mode algorithm. The proposed method uses a free-space optical interconnected dual-encoding technique which performs XOR logic operations in order to implement 2-D page-oriented data encryption. The proposed method provides more enhanced cryptosystem with greater security strength than the conventional CFB block mode with 1-D encryption key due to the huge encryption key with 2-D arrayed page type. To verify the proposed method, encryption and decryption of 2-D page data and error analysis are carried out by computer simulations. The results show that the proposed CFB optical encryption system makes it possible to implement stronger cryptosystem with massive data processing and long encryption key compared to 1-D block method.

Development of a Real-time Simulation Technique for Cyber-physical System (사이버 물리 시스템을 위한 실시간 시뮬레이션 기술 개발)

  • Kim, Jiyeon;Kim, Hyung-Jong;Kang, Sungjoo
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.181-188
    • /
    • 2014
  • Heterogeneous physical systems and computational devices are incorporated on a large-scale in a CPS (cyber-physical system) environment. Simulations can be useful for the reliable behaviors of CPSs. Time synchronization is one of major technical issues for the simulations. In the CPS, distributed systems control themselves by interacting with each other during runtime. When some simulation models have high complexity, wrong control commands as well as incorrect data can be exchanged due to the time error. We propose a time synchronization algorithm for the hybrid model that has characteristics of both continuous time systems and discrete event systems. In addition, we develop a CPS simulator based on our algorithm. For the verification of the algorithm and the execution of the simulator, we develop an example hybrid model and simulate considering user controls as well as interactions among the distributed systems.

Detection of Moving Objects using Depth Frame Data of 3D Sensor (3D센서의 Depth frame 데이터를 이용한 이동물체 감지)

  • Lee, Seong-Ho;Han, Kyong-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.243-248
    • /
    • 2014
  • This study presents an investigation into the ways to detect the areas of object movement with Kinect's Depth Frame, which is capable of receiving 3D information regardless of external light sources. Applied to remove noises along the boundaries of objects among the depth information received from sensors were the blurring technique for the x and y coordinates of pixels and the frequency filter for the z coordinate. In addition, a clustering filter was applied according to the changing amounts of adjacent pixels to extract the areas of moving objects. It was also designed to detect fast movements above the standard according to filter settings, being applicable to mobile robots. Detected movements can be applied to security systems when being delivered to distant places via a network and can also be expanded to large-scale data through concerned information.

The Efficient Signal Estimation Method for Monitor Electromagnetic Signal (모니터 전자파 신호를 위한 효과적인 신호 추정 기법)

  • Lee, Hyun-So;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2008
  • Recently according to the development of an information society the information technology equipments which a clock frequency has the facility over a number giga hertz have been developed much. And we have research which leakage electromagnetic signals can use at the communication security and tapping. In this paper, we restored leakage electromagnetic signals of the monitors. And we proposed efficient recovery technique to restore the screen of the monitor. First of all, we understand a screen characteristic of the monitor. And then we restored a monitor screen from leakage electromagnetic signals from the monitor. For also we tried to use a Wavelet transform and filters to remove the noise for better performance. In the result of the experiment, we used leakage electromagnetic signals and confirmed the possibility of a monitor screen of the recovery. And we improve the performance with Wavelet transform and filters.

  • PDF

Analysis of the Electromagnetic Leakage from Liquid Crystal Display Monitors (LCD 모니터의 누설 전자파에 대한 분석)

  • Lee, Ho seong;Sim, Kyuhong;Oh, Seungsub;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.9
    • /
    • pp.844-853
    • /
    • 2016
  • Generally, the compromising electromagnetic emanations are generated from LCD(Liquid Crystal Display) monitor which is typical output component of computer. Because display information transmitted to LCD monitor is included in these emanations, there are risks about information leakage of monitor by eavesdropping of leaked signal. So, analysis about possibility of information leakage is necessary because electromagnetic security through the electromagnetic emanations is being at issue. In this paper, the possibility of display information leakage are demonstrated by analyzing the electromagnetic emanations from desktop and laptop monitors. The characteristics of leaked signal from LCD monitor is verified by analyzing display mechanism and the electromagnetic emanations are measured in the long distance by eavesdropping experiment. Also, threat of information leakage is confirmed by recovering display information with several signal processing technique and comprising with target display.

A Study on the Improving Management Method for the Small Projects applying Senior Construction Engineer (고령 건설기술자를 활용한 소규모공사의 공사관리방법 개선방안)

  • Song, Jin-Woo;Jeong, Yong-Sik;Lee, Sang-Beom
    • Journal of the Korea Institute of Building Construction
    • /
    • v.5 no.2 s.16
    • /
    • pp.115-121
    • /
    • 2005
  • The building below standard scales to be built only by constructive report to authorities. Construction law 8 illustrates that supervision should be deployed in all the construction sites at the building which is found to have more than 3 floors and also to have more than loom of total squares in especially outside area of city plan zone. Such a small construction is have a important and the most basic meaning. Many problems were found to occur in all the constructive places which were out of the limit of this law. The construction sites were found to be controlled by public official's visiting without supervisors and designers of architecture. Technique of construction in architecture was found to be not different from that of 1980. The security of employees in construction on sites has a serious problem. Because of choosing ail the materials of the building without a reasonable point. All the building were found to have a law material about inside and outside aspects. The purpose of this study are to examine existing law about a small project and than to analyze the situation of constructive control through questionnaires and interviews with all the supervisors. Based on the data base of engineers who had a great experience in construction sites, The purpose of this study is also to suggest and advise the method of controlling all the items in architecture through on and off line.

Electro-fatigue Characteristic of Shape Memory Alloy Applied to the Electrosurgical Knee Wand of Variation of Wand Head Angle in Electrosurgical Knee Surgeries (헤드각이 변화하는 Electrosurgical Knee Wand에 적용된 형상기억합금 스프링의 전기적 피로특성)

  • An, Jae-Uk;Kim, Cheol-Woong;Lee, Ho-Sang;Wang, Joon-Ho;Oh, Dong-Joon
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1547-1552
    • /
    • 2008
  • The tip of these catheter with straight needles is not able to reach in the vicinity of the disc bulging, which are the cause of the low back pain and because the far indirect radio-frequency treatment results in the decompression, the nucleoplasty has the limit. Many incurable diseases has not been solved due to the unexistence of the advanced technique for the MIS human body catheter device. To increase the possibility of nucleoplasty, the needle tip should be located at the closest area of the lesion. For this reason, the best way to increase the success rate of the operation is that the needle tip should access 3-dimensionally to the operating field as soon as possible. To achieve this aim, our studies are restricted as follows: 1) the SMA catheter design to control the 3-dimensional direction, 2) the security of the immediate response by the positive control of the SMA element thermal distribution using Peltier thermoelectric elements, 3) the aquisition of the control data by monitoring the relationship between the temperature of SMA element and the displacement, and 4) the design of the controller to guarantee the accurate location.

  • PDF

A Study on the Application Technique of Realtime Bridge Monitoring System based on GNSS (GNSS 기반의 실시간 교량변위 모니터링 시스템 적용기술 연구)

  • Yeon, Sang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.362-369
    • /
    • 2016
  • Recently, Last to check the security status of various medium and large bridge structures using various kinds of measurement equipment, but most of the methods are used to measure and check the displacement behavior of the bridge by a certain period. In this study, receive GPS satellite signals that can be observed in real time the whole region, a bridge to automatically measure the displacement and behavior characteristics of the structure in real-time in mm over the 24 hours, the measurement information and transmits the data to the wireless network, by making use, it was applied to the real-time monitoring system in connection with a bridge to be able to automatically notify GNSS fine displacement behavior. In fact, analysis and receives the measurement data to GNSS provided in the upper bridge of the middle and large-sized aging for this purpose, measuring USN and at the same time is converted into a three-dimensional position information of a test study was conducted to monitor the bridge displacement in real time. As a result, a vertical displacement of about 0.027~0.037m at the measurement time of day of the measurement point is that the repeated and confirmed.