• Title/Summary/Keyword: attacks

Search Result 3,722, Processing Time 0.027 seconds

An Empirical Digital Image Watermarking using Frequency Properties of DWT (DWT의 주파수 특성을 이용한 실험적 디지털 영상 워터마킹)

  • Kang, I-Seul;Lee, Yong-Seok;Seob), Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.295-312
    • /
    • 2017
  • Digital video content is the most information-intensive and high-value content. Therefore, it is necessary to protect the intellectual property rights of these contents, and this paper also proposes a watermarking method of digital image for this purpose. The proposed method uses the frequency characteristics of 2-Dimensional Discrete Wavelet Transform (2D-DWT) for digital images and digital watermark on global data without using local or specific data of the image for watermark embedding. The method to insert digital watermark data uses a simple Quantization Index Modulation (QIM) and a multiple watermarking method that inserts the same watermark data in multiple. When extracting a watermark, multiple watermarks are extracted and the final watermark data is determined by a simple statistical method. This method is an empirical method for experimentally determining the parameters in the watermark embedding process. The proposed method performs experiments on various images against various attacks and shows the superiority of the proposed method by comparing the performance with the representative existing methods.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

Safety and Risk Management Measures from the Private Security Industry for the Successful Hosting of an International Event (Safety and Risk Management Counter measures for Pyeongchang Winter Olympics) (국제행사의 성공적 개최를 위한 경호·경비 분야의 안전·위기관리 방안 (평창 동계올림픽 안전·위기관리 대응 방안))

  • Kim, Eun-Jung;Wang, Sug-Won
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.43-70
    • /
    • 2017
  • Terrorist organizations that take advantage of the occasion of international events are changing from targeting specified people to attacking general public, raising the anxiety of the audience and participating countries. Therefore, the host country intends to improve its status as the host by ensuring safety and crisis management at any cost. As a country with a wealth of experience of hosting international events, Korea takes the burden of the security at Pyeongchang Winter Olympics. Consequently, to successfully host this winter Olympics, the organizing committee should bear in mind that Korea is no longer a safe country regarding terrorist attacks and take countermeasures against various crimes and terrorism that may arise during the Winter Olympic Games. This study overviews various measures as follows. First, the change of counter-terrorism strategy is necessary. Second, the safety entity and safety measures for Pyeongchang Olympic Games should be established. Third, private security companies should be actively utilized. Fourth, the safety management training for private security and safety personnel should be strengthened. Lastly, it is necessary to establish a rapid and organic preemptive safety management system to cope with safety and crisis effectively at Pyeongchang Winter Olympics and other international events that will be held in the future.

  • PDF

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

A Study on the Stabilization of the Papain Enzyme in the Moderately Concentrated Anionic Surfactant System (음이온 계면활성제에서 파파인 효소의 안정도에 관한 연구)

  • Kim, Ji-Yeong;Kim, Jin-Woo;Kim, Yong-Jin;Lee, Jae-Wook;Lee, Hae-Kwang;Kang, Hak-Hee
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.33 no.2
    • /
    • pp.93-97
    • /
    • 2007
  • Even in the moderately concentrated anionic surfactant system, some special encapsulation method can shield the papain enzyme from proteolytic attacks. The stabilization of enzyme has been a major issue for successful therapies. In this study, we first stabilized an enzyme, papain in the microcapsules by using polyols, polyethyleneglycol (PEG), poly-propyleneglycol (PPG), and PEG-PPG-PEG block copolymer. In the analysis of EDS and CLSM, it was demonstrated that polyols are effectively located in the interface of papain and polymer. Polyols located in the interface had an ability to buffer the external triggers by hydrophobic partitioning, preventing consequently the catalytic activity of papain in the micro-capsules. Second. we introduced multi-layer capsulation methods containing ion complex. Such a moderately concentrated anionic surfactant system as wash-off cleansers, surfactants and waters can cause instability of entrapped enzymes. Surfactants and water in our final products swell the surface of enzyme capsules and penetrate into the core so easily that we can not achieve the effect of enzyme, papain. In this case, the ion complex multi-layer capsule composed of sodium lauroyl sarcosinate and polyquaternium-6 could effectively prevent water from penetration into the core enzyme, followed by in vivo test, and evaluate the stratum corneum (SC) turn-over speed.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Silica Nanoparticles Suppress the Root Rot of Panax ginseg from Ilyonectria mors-panacis Infection by Reducing Sugar Efflux into Apoplast

  • Abbai, Ragavendran;Ahn, Jong-Chan;Mohanan, Padmanaban;Mathiyalagan, Ramya;Gokulanathan, Anandapadmanaban;Kim, Yu-Jin;Kim, Yoen-Ju;Yang, Deok-Chun
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2018.04a
    • /
    • pp.59-59
    • /
    • 2018
  • Panax ginseng Meyer (Korean ginseng) is in the spotlight of Oriental medicine and is proclaimed as the king of medicinal plants owing to its adaptogenic characteristics. Ginseng root rot is a devastating disease caused by the fungus, Ilyonectria mors-panacis that generally attacks younger roots (~2 years), leading to defects in root quality, ginsenoside accumulation and also life cycle of the plant. Hence, there is an indispensable need to develop strategies resulting in tolerance against ginseng root rot. In the present study, we evaluated the effect of silica nanoparticles(N-SiO2) in Panax ginseng during I. mors-panacis infection. Long term analysis (30 dpi) revealed a striking 50% reduction in disease severity index upon 1mM and 2mM treatment of N-SiO2. However, N-SiO2 did not have any direct antifungal activity against I. mors-panacis. Membrane bound sugar efflux transporter, SWEET (Sugars Will Eventually be Exported Transporters) was identified in ginseng and as expected, its expression was suppressed upon N-SiO2 treatment in the root rot pathosystem. Furthermore, the total and reducing sugars in the apoplastic fluid clearly revealed that N-SiO2 regulates sugar efflux into apoplast. In a nut shell, N-SiO2 administration induces transcriptional reprogramming in ginseng roots, leading to regulated sugar efflux into apoplast resulting in enhanced tolerance against I. mors-panacis.

  • PDF

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.