• Title/Summary/Keyword: authentication system

Search Result 1,676, Processing Time 0.035 seconds

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

Design of XMP-Based Electronic Document Architecture for Electronic Circulation of Litigation Documents (소송문서의 전자적 유통을 위한 XMP 기반 전자문서 구조 설계)

  • Park, Min-Soo;Song, Choong-Geun;Lee, Nam-Young;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.95-105
    • /
    • 2011
  • It has become commonplace to use web-based business process systems in a variety of fields, and electronic litigation is not an exception. In electronic procedures where court records are at the core of the system, the electronic document architecture should be designed in a way that electronic documents are safely circulated and utilized on the web with a consideration of the authentication of records, particularity of cases and document security such as prevention of forgery or falsification. Based on a study of electronic formats suitable for court records, the Extensible Markup Language (XMP) for management of special case information and security requirements for circulation of electronic documents, this paper suggests an adequate architecture for electronic documents designed for electronic litigation involving constitutional matters and looks into cases where such architectures are applied. The studies in this paper will serve as a useful reference for those planning to realize web-based business process that enables exchanges of electronic documents.

Analysis of Causal Relationship among TQM Implementation Factors, Managerial Goals of Production System and Organizational Performance, Using Path Analysis (경로분석을 이용한 TQM실행요인, 생산관리 목표와 경영성과 간의 인과관계분석)

  • Lee Jin Choon;Lee Sang Jin;Lee Hong Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.1
    • /
    • pp.16-27
    • /
    • 2005
  • This study tried to test hypotheses, using path analysis, whether the implementation factors of TQM have influences to organization performance through achieving the managerial goals of production, or not. This is an attempt to perform comprehensive analysis instead of using the simple correlation approach between the implementation factors and performances. In order to perform the empirical test, this study has surveyed 98 firms which acquired the ISO authentication and analyzed the data using the path analysis of AMOS. After testing the hypotheses of this study, the cause factor, i.e. TQM implementation factor, has effective influences to the goals of production system, and, also, the goals have a significant influence to managerial performance. Therefore, this study concludes that the implementation factors of TQM have significant effects on the managerial performance.

  • PDF

Development of Dynamic Magnetic Field Emulator for Smart Multi-Card (스마트멀티카드를 위한 동적자장모사장치의 개발)

  • Bae, Jae-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.183-190
    • /
    • 2017
  • This paper proposes a dynamic magnetic field emulator (DMFE), which can electrically emulate information for the magnetic stripes of most widely used credit cards. Payment transactions with most common credit cards are performed by reading the card's information, encoded in magnetic stripes, using the reader head of a point-of-sale (POS) system. A stripe-type permanent magnet is attached to the back side of the credit card, and information for payments or value-added service is reorganized by exposing it to strong magnetic field. The process of data recording and retrieving as stated above has been pointed out as a major cause of illegal credit card use, because the information on the magnetic stripe is always exposed, and is thus vulnerable to forgery or alteration. A dynamic magnetic field emulator displays card information only when necessary by using the principle of solenoidal magnets. The DMFE proposed in this paper can prevent fraudulent use if it is operated with a device, like a smart phone, or a separate user-authentication procedure. In addition, because it is possible to display various information as needed, it can be utilized for a smart multi-card application, in which information for multiple cards is stored in one card, and can be selected and used as needed. This paper introduces the necessity of the DMFE and its manufacturing principles. As a result, this study will be helpful for making various application cases in payment, which is a core area of the Fintech (a newly-coined word of finance and technology) industry.

Secure Binding of Identity Reference and Biometric Reference (개인식별정보와 바이오인식정보의 안전한 결합방법)

  • You, Mi-Kyeong;Kwon, Man-Jun;Lee, Sang-Ho;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.610-616
    • /
    • 2010
  • This paper describes how to securely bind the identity reference and biometric reference for satisfying security requirements. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person has been adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular it vidual when combining with other identity information. As a result, a son, anb it canmethod is required for manipulat canthese information. Consider canthese issues, this paper proposes a biit canmethod uiter son, anand uisecure channels for generating the common identifier and ensuring security of identity reference and biometric reference that are stored in the separated DBs.

A Study of Electronic Transaction Law : Basic Electronic Trasaction Law in Korea and Uniform Electronic Transaction Act (전자상거래법 소고 - 우리나라 전자거래기본법과 미국 통일전자거래법 (Uniform Electronic Transaction Act)을 중심으로 -)

  • Kim, Un-Young
    • Korean Business Review
    • /
    • v.13
    • /
    • pp.207-221
    • /
    • 2000
  • In this era of changing system, we may learn lesson from newly developed Uniform Electronic Transation Act(UETA) in 1999. Korea has its counterpart as the Basic Electronic Transaction Act and Electronic Signature Act made by 1999. While UETA stresses on transaction law between individuals, that of Korean stresses on the role of government in electronic transaction. Both laws have the common definitions as electronic record, electronic signature, however, UETA has its own definitions such as automated transaction, computer program, electronic agent, information, information processing system, and security procedure. Especially, transferable record in section 16 is one of the most unique concept which Korean law does not provide. Korean government is planning to introduce electronic note in the near future, which will make unprecedented reform in Korean financial industry. Since Korean law does not have such a concept as electronic note, revision of the law is expected soon. Korean law has its specialty which puts stress on cyber mall, authentication agency, and consumer protection. In U.S., the interpretation of law by court is important when they have disputes according to common law traditon. Studies on cases on disputes in U.S. is needed most for Korean application.

  • PDF

Molecular differentiation of Russian wild ginseng using mitochondrial nad7 intron 3 region

  • Li, Guisheng;Cui, Yan;Wang, Hongtao;Kwon, Woo-Saeng;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.41 no.3
    • /
    • pp.326-329
    • /
    • 2017
  • Background: Cultivated ginseng is often introduced as a substitute and adulterant of Russian wild ginseng due to its lower cost or misidentification caused by similarity in appearance with wild ginseng. The aim of this study is to develop a simple and reliable method to differentiate Russian wild ginseng from cultivated ginseng. Methods: The mitochondrial NADH dehydrogenase subunit 7 (nad7) intron 3 regions of Russian wild ginseng and Chinese cultivated ginseng were analyzed. Based on the multiple sequence alignment result, a specific primer for Russian wild ginseng was designed by introducing additional mismatch and allele-specific polymerase chain reaction (PCR) was performed for identification of wild ginseng. Real-time allele-specific PCR with endpoint analysis was used for validation of the developed Russian wild ginseng single nucleotide polymorphism (SNP) marker. Results: An SNP site specific to Russian wild ginseng was exploited by multiple alignments of mitochondrial nad7 intron 3 regions of different ginseng samples. With the SNP-based specific primer, Russian wild ginseng was successfully discriminated from Chinese and Korean cultivated ginseng samples by allele-specific PCR. The reliability and specificity of the SNP marker was validated by checking 20 individuals of Russian wild ginseng samples with real-time allele-specific PCR assay. Conclusion: An effective DNA method for molecular discrimination of Russian wild ginseng from Chinese and Korean cultivated ginseng was developed. The established real-time allele-specific PCR was simple and reliable, and the present method should be a crucial complement of chemical analysis for authentication of Russian wild ginseng.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.