• Title/Summary/Keyword: Virtual key

Search Result 512, Processing Time 0.027 seconds

Implementation and Analysis of Multi-precision Multiplication for Public Key Cryptography Based on NDK (NDK 기반 공개키 암호를 위한 곱셈기 구현 및 분석)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2347-2354
    • /
    • 2012
  • On Android environment, program development is conducted with JAVA SDK. However, using JAVA, it is operated over virtual machine which shows lower performance in terms of speed than traditional C language programming. The method writes program in C language, which conducts operation efficiently. In the paper, we implement multiplication using NDK and SDK to analyze the public key cryptography over Android environment. In case of SDK, we used BigInteger package and in case of NDK, we used Comb method. Moreover, execution time of arithmetic, branch and call operations over Android environment is compared to understand performance enhancement using NDK package.

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data

  • Tong, Deyu;Zhu, Changqing;Ren, Na;Shi, Wenzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6190-6213
    • /
    • 2019
  • For small-scale vector data, restrictions on watermark scheme capacity and robustness limit the use of copyright protection. A watermarking scheme based on robust geometric features and capacity maximization strategy that simultaneously improves capacity and robustness is presented in this paper. The distance ratio and angle of adjacent vertices are chosen as the watermark domain due to their resistance to vertex and geometric attacks. Regarding watermark embedding and extraction, a capacity-improved strategy based on quantization index modulation, which divides more intervals to carry sufficient watermark bits, is proposed. By considering the error tolerance of the vector map and the numerical accuracy, the optimization of the capacity-improved strategy is studied to maximize the embedded watermark bits for each vertex. The experimental results demonstrated that the map distortion caused by watermarks is small and much lower than the map tolerance. Additionally, the proposed scheme can embed a copyright image of 1024 bits into vector data of 150 vertices, which reaches capacity at approximately 14 bits/vertex, and shows prominent robustness against vertex and geometric attacks for small-scale vector data.

An Implementation of Spatio-Temporal Graph to Represent Situations in the Virtual World (가상현실 속의 상황 표현을 위한 시공간 그래프의 구현)

  • Park, Jong-Hee;Jung, Gung-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.9-19
    • /
    • 2013
  • In this paper, we develop a Spatio-Temporal graph as of a key component of our knowledge representation Scheme. We design an integrated representation scheme to depict not only present and past but future in parallel with the spaces in an effective and intuitive manner. An event in general occupies not only a space but a time. Hence a crucial premise for the simulation of virtual situations is to position events in the multi-dimensional context, that is, 3-D space extended by the temporal dimension. Furthermore an event tends to have physical, social and mental aspects intertwined. As a result we need diverse information structures and functions to model entities and relations associated with events and to describe situations in different stances or perspectives of the virtual agents. These structures and functions are implemented in terms of integrated and intuitive representation schemes at different levels such as Ontology View, Instance View, ST View, Reality View. The resulting multi-dimensional comprehensive knowledge structure accommodates multi-layered virtual world developing in the time to maximize the diversity of situations in the historical context. The viability of this knowledge representation scheme is demonstrated with a typical scenario applied to a simulator implemented based on the ST Graph. The virtual stage based on the ST graph can be used to provide natural contexts for situated learning or next-generation simulation games.

A study on the actual precision shooting training based on virtual reality (가상현실 기반 실전적 정밀사격훈련 구현 연구)

  • Lee, Byounghwak;Kim, Jonghwan;Shin, Kyuyoung;Kim, Dongwook;Lee, Wonwoo;Kim, Namhyuk
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.62-71
    • /
    • 2018
  • The rapid growth of virtual reality technology in the era of the 4th Industrial Revolution has accelerated scientification of combat training systems in addition to ICT(information and communications technology) in military field. Recently, research and development of simulators based on virtual reality have been actively conducted in order to solve sensitive issues such as increase of civil complaints due to the noise of a shooting range, prevention of shooting accident, and reduction of training cost. In this paper, we propose two key solutions: spatial synchronization method and modified point mass trajectory model with small angle approximation to overcome technical limitations of a current training simulator. A trainee who wears a haptic vest in a mixed reality environment built in MARS(medium-range assault rifle shooting simulator) is able to conduct not only precision shooting but also two-way engagement with virtual opponents. It is possible for trainee to receive more reliable evaluations in the MARS than an existing rifle simulator based on laser.

  • PDF

A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery (VMware Workstation 가상 머신 이미지에 대한 디지털 포렌식 조사 절차 및 손상된 이미지 복구 방안)

  • Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • Virtualization is a technology that uses a logical environment to overcome physical limitations in hardware. As a part of cost savings and green IT policies, there is a tendency in which recent businesses increase the adoption of such virtualization. In particular, regarding the virtualization in desktop, it is one of the most widely used technology at the present time. Because it is able to efficiently use various types of operating systems in a physical computer. A virtual machine image that is a key component of virtualization is difficult to investigate. because the structure of virtual machine image is different from hard disk image. Therefore, we need researches about appropriate investigation procedure and method based on technical understanding of a virtual machine. In this research, we suggest a procedure of investigation on a virtual machine image and a method for a corrupted image of the VMware Workstation that has the largest number of users.

Virtual Reality Based Fall Training System (가상현실기반 낙하훈련시스템 개발)

  • Ryu, Jae-Jeong;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1749-1755
    • /
    • 2021
  • Virtual reality is actively applied in the fields of games, entertainment, communication, sports, and architecture. In particular, many virtual reality-based education systems are being developed in the field of education, creating efficient learning effects. In addition, virtual reality-based education is used in areas such as maintenance, fighter control, medical care, and firefighting as it can maximize the educational effect through the mastery process of the function itself through the curriculum as well as indirect experiences of dangerous situations that are difficult to experience. However, due to technical limitations, lack of contents, and lack of theoretical research, the level of application of military education and training is still insufficient. This paper aim to contribute to the development of a virtual reality-based education system as a military training system by developing a high-quality drop training system applicable to military group descent training, studying key technologies and implementation methods necessary for development.

An Optimized Model for the Local Compression Deformation of Soft Tissue

  • Zhang, Xiaorui;Yu, Xuefeng;Sun, Wei;Song, Aiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.671-686
    • /
    • 2020
  • Due to the long training time and high training cost of traditional surgical training methods, the emerging virtual surgical training method has gradually replaced it as the mainstream. However, the virtual surgical system suffers from poor authenticity and high computational cost problems. For overcoming the deficiency of these problems, we propose an optimized model for the local compression deformation of soft tissue. This model uses a simulated annealing algorithm to optimize the parameters of the soft tissue model to improve the authenticity of the simulation. Meanwhile, although the soft tissue deformation is divided into local deformation region and non-deformation region, our proposed model only needs to calculate and update the deformation region, which can improve the simulation real-time performance. Besides, we define a compensation strategy for the "superelastic" effect which often occurs with the mass-spring model. To verify the validity of the model, we carry out a compression simulation experiment of abdomen and human foot and compare it with other models. The experimental results indicate the proposed model is realistic and effective in soft tissue compression simulation, and it outperforms other models in accuracy and real-time performance.

A proposed image stitching method for web-based panoramic virtual reality for Hoseo Cyber Museum (호서 사이버 박물관: 웹기반의 파노라마 비디오 가상현실에 대한 효율적인 이미지 스티칭 알고리즘)

  • Khan, Irfan;Soo, Hong Song
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.2
    • /
    • pp.893-898
    • /
    • 2013
  • It is always a dream to recreate the experience of a particular place, the Panorama Virtual Reality has been interpreted as a kind of technology to create virtual environments and the ability to maneuver angle for and select the path of view in a dynamic scene. In this paper we examined an efficient method for Image registration and stitching of captured imaged. Two approaches are studied in this paper. First, dynamic programming is used to spot the ideal key points, match these points to merge adjacent images together, later image blending is used for smooth color transitions. In second approach, FAST and SURF detection are used to find distinct features in the images and nearest neighbor algorithm is used to match corresponding features, estimate homography with matched key points using RANSAC. The paper also covers the automatically choosing (recognizing, comparing) images to stitching method.

Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device (보안 저장장치를 구비한 가상의 인비저블한 보안 디스크 (VIPDISK) 설계 및 구현)

  • Quan, Shan Guo;Kwon, Yong-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.781-792
    • /
    • 2015
  • This paper proposes a virtual and invisible private disk (VIPDISK) technology equipped with the secure storage devices. As a software based security technology, it can create hidden partitions on any data storage device which can not be identified by the windows OS, so the program running on it, does not have any evidence of the existence of the hidden storage space. Under inactive state, it maintains an unexposed secure partition which can only be activated with a matching combination of a unique digital key and a user password to open the decryption tool. In addition, VIPDISK can store data to secure storage device with real-time encryption, it is worry-free even in the case of lost or theft. Simulation results show that VIPDISK provides a much higher level of security compared to other existing schemes.

A Robust Digital Watermarking based on Virtual Optics (가상 광학에 기반한 강인한 디지털 워터마킹)

  • Lee, Geum-Boon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1073-1080
    • /
    • 2011
  • In this paper, we propose a novel digital watermarking method by virtual optics which secures multimedia information such as images, videos and sounds. To secure the multimedia data, we use Fresnel transform which describes the diffraction phenomena of the waves. Also, this method attaches the random phase function to Fresnel transform so that original image and watermark image would be gaussian random vectors. The complex numbers of watermark by Fresnel transform are separated the real part and the imaginary part. The former is embedded in original image as a encoding key imperceptibly and the latter is used for detecting the watermark as a decoding key. This method for digital watermarking ensures that watermark can be successfully registered and extracted from the watermarked image. Further, it provides the robustness to signal processing operation and geometric distortion and proves the strong resilience against cropping attack. The performance evaluation of the experiment is carried out with PSNR, and the numerical simulation results show the efficiency of the proposed method.