• Title/Summary/Keyword: data hiding

Search Result 302, Processing Time 0.022 seconds

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.

A new warp scheduling technique for improving the performance of GPUs by utilizing MSHR information (GPU 성능 향상을 위한 MSHR 정보 기반 워프 스케줄링 기법)

  • Kim, Gwang Bok;Kim, Jong Myon;Kim, Cheol Hong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.72-83
    • /
    • 2017
  • GPUs can provide high throughput with latency hiding by executing many warps in parallel. MSHR(Miss Status Holding Registers) for L1 data cache tracks cache miss requests until required data is serviced from lower level memory. In recent GPUs, excessive requests for cache resources cause underutilization problem of GPU resources due to cache resource reservation fails. In this paper, we propose a new warp scheduling technique to reduce stall cycles under MSHR resource shortage. Cache miss rates for each warp is predicted based on the observation that each warp shows similar cache miss rates for long period. The warps showing low miss rates or computation-intensive warps are given high priority to be issued when MSHR is full status. Our proposal improves GPU performance by utilizing cache resource more efficiently based on cache miss rate prediction and monitoring the MSHR entries. According to our experimental results, reservation fail cycles can be reduced by 25.7% and IPC is increased by 6.2% with the proposed scheduling technique compared to loose round robin scheduler.

Study of the Introduction on the Aviation Safety Data Protection System (항공안전데이터 보호제도 도입 방안 연구)

  • Kim, Eun-jung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.81-120
    • /
    • 2018
  • To promote the aviation safety reporting system that is operated to enhance aviation safety and to utilize related information, it should first be preceded by standards for non-punishment and data protection. It is because the purpose of collection and analysis of aviation safety related data through the aviation safety reporting system is to prevent recurrence of accidents by investigating their causes through collection and analysis of diverse types of information related to aviation safety. Both mandatory and voluntary reporting systems are in operation for aviation safety under the current Aviation Safety Act. It is said that they were introduced to survey causes for accidents and to prevent recurrences. In fact, however, it is hard to expect active implementation of the reporting system for aviation safety unless the reporters are firstly exempted from punishment. Therefore, the system should be improved so that it can satisfy its purpose and the purposes of data collection concerning aviation safety through examination of the purposes of the reporting system. One of the matters that needs to be considered to promote the reporting system should be the scope of aviation safety hindrances presupposed under the current institution. The voluntary aviation safety reporting system differs from the systems of ICAO or the key advanced countries, including the USA and the UK as it limits the target accidents subject to reporting to minor aviation safety hindrances only. That being said, improvements should be made by requiring mandatory reporting of aviation safety hindrances based on their severity while recognizing a greater variety of aviation safety concerns like international standards. Safety actions and sharing of information based on collection and analysis of diverse data related to aviation safety will greatly contribute to enhance aviation safety as the purposes of the reporting system are to explore causes for accidents and to prevent their recurrences. What is most important in this regard is strict data protection and non-punishment principles; compliance with them should be secured. We can hardly expect the successful operation of the system unless the reporter is exempted from punishment and the relevant data is protected as promotion of voluntary reporting is an essential factor for enhancing the safety culture. Otherwise, the current system may induce hiding of relevant facts or data to evade punishment. It is true that the regulation for enhancing safety tends to have limitations or blind spots; nevertheless, it should still be enforced strictly and completely. Technological progresses and mistakes of operators appear in different forms based on individual cases. The consequential damages may amount to a truly severe level. Therefore, we have studied and suggested to the methods of activiation and amendments on the aviation safety reporting system, which is referred for one of the proactive safety management systems. The proposed improvement of the reporting system and introduction of non-punishment for collection of aviation safety data for deploying a preemptive prevention system would serve as the backbone for enhancing aviation safety in Korea.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

"Servicescape" Differentiation in a Hair Salon (헤어살롱 서비스스케이프 차별화 성공사례)

  • Lee, Sang-Hyun;Park, Chul-Ju
    • Journal of Distribution Science
    • /
    • v.13 no.9
    • /
    • pp.71-79
    • /
    • 2015
  • Purpose - The purpose of this paper is to find out the effect of changes in the differentiated "servicescape" on the business performance in the hair salon industry using a case study. For this, we selected hair salon M located in Suwon. The shop is innovatively different from existing shops in terms of spatial layout and functionality. We conducted in-depth research, beginning with the launch of the shop concept through investment and ongoing stable sales. Research design, data, and methodology - The M hair salon is a start up shop providing a differentiated servicescape (physical environment where the service takes place) located in Suwon, Yeongtong-gu. We conducted research to investigate how spatial layout and functionality of the servicescape impact customers' perceived quality. The interview period and case analysis was May 2014 through March 2015, covering 11 months. To conduct the case analysis, we analyzed the spatial layout and functionality of existing shops and interviewed customers and experts about the difference between hair salon M and existing shops. Results - Our results found clues to the positive effect of spatial layout and functionality among servicescape factors on perceived service quality at the salon. The shop showed a fast payback of the principal investment, growth potential in contrast to competitors near the salon, and 45 percent returning customers. The problem with the spatial layout at existing shops was that customers were aware of the way other people were looking at them, since viewing angles overlapped, therefore there was a limitation to the relationship intensity with an exclusive hair designer. In contrast, the layout of the stands at the M salon kept the number of dressing stands limited to maximize the customer's emotional response. Additionally, because of the new layout of dressing stands hiding other customer voices and appearance in the salon, customers perceived their service space as independent. Therefore, they did not have to focus on their personal emotional response, which was one of the advantages of the new layout. Conclusions - This study conducted case study analysis by offering a new perspective focusing on spatial layout, previously not considered as an independent variable of quality evaluations and customer satisfaction in existing literature on hair salon management. Therefore, this study contributes to the field by offering an opportunity to discover the causal relationships between the overlooked physical environment and a customer's perceived quality. However, a process objectifying the results of the study through empirical analysis and hypotheses is needed to overcome the limitations of the case study approach and generalize the results. Moreover, it would be beneficial to conduct further empirical study of the relationship between the spatial layout provided in the case and a customer's emotional response and change in mood. In addition, an analysis is needed regarding how customers feel about the factors using the Kano Model. These suggestions would be considered in further study.

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

A Qualitative study on Daily Life Experiences of Korean Elderly Welfare Recipients: Focused on Time and Space on Daily lives (국민기초생활보장 수급노인의 일상생활 경험에 대한 질적 사례연구 - 시간과 공간적 맥락을 중심으로)

  • Ju, Kyong Hee;Kim, Hee Joo;Kim, Se Won;Oh, Hye In
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.200-218
    • /
    • 2015
  • The purpose of the present study was to examine daily lives of elderly welfare recipients and their experiences with social welfare services. Researchers collected and analyzed data through individual interviews with 11 elderly welfare recipients. A major theme in the time context was "Daily lives enduring physical and mental sufferings alone and mismatches of social welfare services": 'Starting same tedious days: trading diligent work for basic living assistance', 'Forced ritual of having meals', 'Struggle with depressing night: not attentive welfare services at closing hours', 'Welfare services suspended in holidays', 'Mind and body withered by economic hardship in winter', 'Social support for enduring weary lives'. In the space context, a major themes was "Inadequate welfare services and social interaction in the context of social isolation": 'Unhygienic and unsafe living environment', 'Hiding places: spending tedious days in vacant lots', 'Community welfare centers useful only for healthy elderly', 'Differences and similarities of elderly in urban and rural areas', 'Receiving restricted medical services at hospitals', 'Hard-to-reach public institutions', 'ambivalence about living as welfare recipients'. Based on the findings, the researchers proposed implications for policy and practice to improve elderly welfare recipients' quality of life.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Effect of Cognitive Affordance of Interactive Media Art Content on the Interaction and Interest of Audience (인터랙티브 미디어아트 콘텐츠의 인지적 어포던스가 관람자의 인터랙션과 흥미에 미치는 영향)

  • Lee, Gangso;Choi, Yoo-Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.9
    • /
    • pp.441-450
    • /
    • 2016
  • In this study, we investigate the effect of the level of cognitive affordance which explains an explicit interaction method on the interest of viewers. Viewer's recognition of the interaction method is associated with cognitive affordance as a matter of visual-perceptual exposure of the input device and viewer's cognition of it. The final goal of the research on affordance is to enhance the audience participation rather than the smooth interation. Many interactive media artworks have been designed with hiding the explicit explanation to the artwork due to worry that the explicit explanation may also hinder the induction of impressions leading the viewer to an aesthetic experience and the retainment of interest. In this context, we set up two hypotheses for study on cognitive affordance. First, the more explicit the explanation of interaction method is, the higher the viewer' understanding of interaction method is. Second, the more explicit the explanation of interaction method is, the lower the interest of the viewer is. An interactive media art work was manufactured with three versions which vary in the degree of visual-perceptual information suggestion and we analyzed the participation and interest level of audience in each version. As a result of the experiments, the version with high explicitness of interaction was found to have long time spent on watching and high participation and interest of viewers. On the contrary, the version with an unexplicit interaction method was found to have low interest and satisfaction of viewers. Therefore, regarding usability, the hypothesis that a more explicit explanation of interaction would lower the curiosity and interest in exploration of the viewer was dismissed. It was confirmed that improvement of cognitive affordance raised the interaction of the work of art and interest of the viewer in the proposed interactive content. This study implies that interactive media art work should be designed in view of that the interaction and interest of audience can be lowered when cognitive affordance is low.