• Title/Summary/Keyword: Template protection

Search Result 31, Processing Time 0.025 seconds

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

Transiently Experessed Salt-Stress Protection of Rice by Transfer of a Bacterial Gene, mtlD

  • Lee, Eun-A;Kim, Jung-Dae;Cha, Yoo-Kyung;Woo, Dong-Ho;Han, In-Seob
    • Journal of Microbiology and Biotechnology
    • /
    • v.10 no.3
    • /
    • pp.415-418
    • /
    • 2000
  • Productivity of a rice plant is greatly influenced by salt stress. One of the ways to achieve tolerance to salinity is to transfer genes encoding protective enzymes from other organisms, such as microorganisms. The bacterial gene, mtlD, which encodes mannitol-1-phosphate dehydrogenase (Mtl-DH), was introduced to the cytosol of a rice plant by an imbibition technique to overproduce mannitol. The germination and survival rate of the imbibed rice seeds were markedly increased by transferring the mtlD gene when it was delivered in either a pBIN19 or pBmin binary vector. When a polymerase chain reaction was performed with the genomic DNAs of the imbibed rice leaves as a template and with mtlD-specific primers, several lines were shown to contain an exogenous mtlD DNA. However, a reverse transcription (RT)-PCR analysis revealed that not all of them showed an expression of this foreign gene. This paper demonstrates that the growth and germination of rice plants transiently transformed with the bacterial gene, mtlD, are enhanced and these enhancements may have resulted from the experssion of the mtlD gene. The imbibition method empolyed in this study fulfills the requirements for testing the function of such a putative gene in vivo prior to the production of a stable transgenic plant.

  • PDF

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

A Synthesis Method of Software Fault Tree from NuSCR Formal Specification using Templates (템플릿에 기반한 NuSCR 정형 명세의 소프트웨어 고장 수목 생성 방법)

  • Kim, Tae-Ho;Yoo, Jun-Beom;Cha, Sung-Deok
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1178-1191
    • /
    • 2005
  • In this paper, we propose a synthesis method of software fault tree from software requirements specification written in NuSCR formal specification language. The software fault tree, proposed in this paper, reflects requirements on both structure and behavior and it is an integrated form. The software fault tree can be used for analyzing safety in the view of structure and behavior. We propose templates for each components in NuSCR specification language and a synthesis method of software fault tree using the templates. The research was applied into the main trip logic of the reactor protection system of ARP1400, the Korean next generation nuclear reactor system, developed by KNICS. And we evaluate feasibility of our approach through this case study.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

Cancelable Iris Templates Using Index-of-Max Hashing (Index-of-Max 해싱을 이용한 폐기가능한 홍채 템플릿)

  • Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.565-577
    • /
    • 2019
  • In recent years, biometric authentication has been used for various applications. Since biometric features are unchangeable and cannot be revoked unlike other personal information, there is increasing concern about leakage of biometric information. Recently, Jin et al. proposed a new cancelable biometric scheme, called "Index-of-Max" (IoM) to protect fingerprint template. The authors presented two realizations, namely, Gaussian random projection-based and uniformly random permutation-based hashing schemes. They also showed that their schemes can provide high accuracy, guarantee the security against recently presented privacy attacks, and satisfy some criteria of cancelable biometrics. However, the authors did not provide experimental results for other biometric features (e.g. finger-vein, iris). In this paper, we present the results of applying Jin et al.'s scheme to iris data. To do this, we propose a new method for processing iris data into a suitable form applicable to the Jin et al.'s scheme. Our experimental results show that it can guarantee favorable accuracy performance compared to the previous schemes. We also show that our scheme satisfies cancelable biometrics criteria and robustness to security and privacy attacks demonstrated in the Jin et al.'s work.

Discovery of a new primer set for detection and quantification of Ilyonectria mors-panacis in soils for ginseng cultivation

  • Farh, Mohamed El-Agamy;Han, Jeong A.;Kim, Yeon-Ju;Kim, Jae Chun;Singh, Priyanka;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.43 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • Background: Korean ginseng is an important cash crop in Asian countries. However, plant yield is reduced by pathogens. Among the Ilyonectria radicicola-species complex, I. mors-panacis is responsible for root-rot and replant failure of ginseng in Asia. The development of new methods to reveal the existence of the pathogen before cultivation is started is essential. Therefore, a quantitative real-time polymerase chain reaction method was developed to detect and quantify the pathogen in ginseng soils. Methods: In this study, a species-specific histone H3 primer set was developed for the quantification of I. mors-panacis. The primer set was used on DNA from other microbes to evaluate its sensitivity and selectivity for I. mors-panacis DNA. Sterilized soil samples artificially infected with the pathogen at different concentrations were used to evaluate the ability of the primer set to detect the pathogen population in the soil DNA. Finally, the pathogen was quantified in many natural soil samples. Results: The designed primer set was found to be sensitive and selective for I. mors-panacis DNA. In artificially infected sterilized soil samples, using quantitative real-time polymerase chain reaction the estimated amount of template was positively correlated with the pathogen concentration in soil samples ($R^2=0.95$), disease severity index ($R^2=0.99$), and colony-forming units ($R^2=0.87$). In natural soils, the pathogen was recorded in most fields producing bad yields at a range of $5.82{\pm}2.35pg/g$ to $892.34{\pm}103.70pg/g$ of soil. Conclusion: According to these results, the proposed primer set is applicable for estimating soil quality before ginseng cultivation. This will contribute to disease management and crop protection in the future.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Specific Primer Sets for RT-PCR Detection of Major RNA Viruses of Tomato Plants in Korea (국내의 토마토 주요 바이러스 진단을 위한 역전사중합반응법용 프라이머 세트)

  • Shin, Jun-Sung;Han, Jung-Heon;Shin, Yu-Ju;Kwak, Hae-Ryun;Choi, Hong-Soo;Kim, Jeong-Soo
    • Research in Plant Disease
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2017
  • Major tomato viruses in Korea are Tomato chlorosis virus (ToCV), Tomato spotted wilt virus (TSWV), Cucumber mosaic virus (CMV), Pepper mottle virus (PepMoV), and Tomato mosaic virus (ToMV). RT-PCR conditions for the viruses were examined, especially in primer set and RT-PCR mixture. Total 46 primer sets from the unique sequence of the viruses were tested for nonspecific background products in a RT-PCR mixture without template. Among them 16 primer sets were applied to healthy tomato RNA, resulting the compatibility between RT-PCR mixture and primer set influenced RT-PCR to reduce nonspecific background products. Based on the combinations among cDNA synthesis parameters and RT-PCR mixtures, two reaction mixtures were finally selected for ToCV detection. The condition allowed to determine more specific primer sets; C029 (ToCV), C072 (TSWV), C070 (CMV), C048 (PepMoV), and C065 (ToMV). These primer sets are expected to be of use to specific detection of the major viruses in tomato plants.