• Title/Summary/Keyword: information Security

Search Result 17,747, Processing Time 0.048 seconds

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Object Segmentation for Detection of Moths in the Pheromone Trap Images (페로몬 트랩 영상에서 해충 검출을 위한 객체 분할)

  • Kim, Tae-Woo;Cho, Tae-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.157-163
    • /
    • 2017
  • The object segmentation approach has the merit of reducing the processing cost required to detect moths of interest, because it applies a moth detection algorithm to the segmented objects after segmenting the objects individually in the moth image. In this paper, an object segmentation method for moth detection in pheromone trap images is proposed. Our method consists of preprocessing, thresholding, morphological filtering, and object labeling processes. Thresholding in the process is a critical step significantly influencing the performance of object segmentation. The proposed method can threshold very elaborately by reflecting the local properties of the moth images. We performed thresholding using global and local versions of Ostu's method and, used the proposed method for the moth images of Carposina sasakii acquired on a pheromone trap placed in an orchard. It was demonstrated that the proposed method could reflect the properties of light and background on the moth images. Also, we performed object segmentation and moth classification for Carposina sasakii images, where the latter process used an SVM classifier with training and classification steps. In the experiments, the proposed method performed the detection of Carposina sasakii for 10 moth images and achieved an average detection rate of 95% of them. Therefore, it was shown that the proposed technique is an effective monitoring method of Carposina sasakii in an orchard.

Dynamic Predicate: An Efficient Access Control Mechanism for Hippocratic XML Databases (동적 프레디킷 : 허포크라테스 XML 데이타베이스를 위한 효율적인 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.5
    • /
    • pp.473-486
    • /
    • 2005
  • The Hippocratic database model recently proposed by Agrawal et at. incorporates privacy protection capabilities into relational databases. The authors have subsequenty proposed the Hippocratic XML daかabase model[4], an extension of the Hippocratic database model for XML databases. In this paper, we propose a new concept that we cail the dynamic predicate(DP) for effective access control in the Hippocratic XML database model. A DP is a novel concept that represents a dynamically constructed rendition that tan be adapted for determining the accessibility of elements during query execution. DPs allow us to effectively integrate authorization checking into the query plan so that unauthorized elements are excluded in the process of query execution. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 219 times over the top-down access control strategy and by up to 499 times over the bottom-up access control strategy. The major contribution of our, paper is enabling effective integration of access control mechanisms with the query plan using the DP under the Hippocratic XML database model.

A Study of Policy Direction on O2O industry developing (O2O산업 발전을 위한 정책방향 연구)

  • Kim, Hee Yeong;Song, Seongryong
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.13-25
    • /
    • 2017
  • The purpose of this study is to suggest the direction of O2O industry policy for solving the conflict problems with the traditional industry stakeholder and for enhancing the regulations as new industry development is inevitable. We make use of TAIDA that is one of scenario methods to accomplish the purpose and suggest the direction of policy. First, it is needed to prepare directly by government the environment that new business models are able to emerge easily with various consulting services and information supports like public system servers and IT infra, it is practical support policy. Second, positive legal application for new business and making the law for new business are needed in legal issues situation as soon as possible. Third, the conflicts with old and new industry would be managed to the direction of "predictable" progressively. Incongruity among laws, safety and security problems, and the conflict of stakeholder are urgent. Because of the limit in this study, it is expected that O2O industry is categorized in detail aligned to the characteristics and that new policies along to the separate industry areas are developed by the following study.

A study for middle-aged on oral health knowledge, oral health care and satisfaction with prosthetic treatment (중년층의 구강건강지식, 실천 및 보철치료 만족실태 조사)

  • Go, Eun-Jeong;Lee, Yong-Hwan;Park, Kwang-Hwan
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.5
    • /
    • pp.671-683
    • /
    • 2011
  • Objectives : The purpose of this study was to examine the oral health knowledge and actual oral health care of the selected subjects, their decision making about prosthetic treatment, the state and characteristics of their prosthetic treatment and their satisfaction with prosthetic treatment in an attempt to provide some information on the improvement of the quality of life related to oral health and the promotion of oral health. Methods : The subjects in this study were 250 people who received education in two different lifelong education institutions in the city of Busan. After a survey was conducted from May 23 to June 15, 2011, the answer sheets from 217 respondents were analyzed. Results : 1. As for the general characteristics of the respondents, the men(52.1%) outnumbered the women. Those who were in their 60 and up(47.5%) made up the largest age group, and the married people(65.4%) outnumbered the unmarried ones. By occupation, the company employees(20.3%) made up the biggest group. By education, the greatest group was high-school graduates(36.1%). By monthly mean income, the biggest group gained an income of 2.01 million won or more(36.9%). As to medical security, community-based insurance was most prevailing (36.9%). In terms of health promotion, the largest group worked out to stay fit(52.4%). 2. Regarding oral health knowledge, they had a good knowledge about the cause of dental caries(56.7%), but they weren't well aware of the right time for regular dental checkup(47.9%). In relation to oral health care, regular scaling wasn't prevailing(16.9%). 3. Regarding connections between the general characteristics and satisfaction with prosthesis, the less-educated respondents expressed significantly more dissatisfaction(p=0.015). By monthly mean income, those who had a smaller income were dissatisfied in general(p=0.028). Conclusions : The findings of the study illustrated that it's required to spread awareness of the importance of oral health among people in general, and that differentiated incremental oral health care should be provided for different age groups. In order to raise the satisfaction of patients with prosthesis, how to relieve their pain and anxiety and how to adjust prosthetic treatment cost properly should carefully be considered. In addition, the government should take measures to offer assistance for the low-income classes in preparation for an increase in the elderly population.

Method for Restoring the Spatial Resolution of KOMPSAT-3A MIR Image (KOMPSAT-3A 중적외선 영상의 공간해상도 복원 기법)

  • Oh, Kwan-Young;Lee, Kwang-Jae;Jung, Hyung-Sup;Park, Sung-Hwan;Kim, Jeong-Cheol
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_4
    • /
    • pp.1391-1401
    • /
    • 2019
  • The KOMPSAT-3A is a high-resolution optical satellite launched in 2015 by Korea Aerospace Research Institute (KARI). KOMPSAT-3A provides Panchromatic (PAN-0.55 m), Multispectral (MS-2.2 m), and Mid-wavelength infrared (MIROR-5.5 m) image. However, due to security or military problems, MIROR image with 5.5m spatial resolution are provided down sampled at 33 m spatial resolution (MIRrd). In this study, we propose spatial sharpening method to improve the spatial resolution of MIRrd image (33 m) using virtual High Frequency (HF) image and optimal fusion factor. Using MS image and MIRrd image, we generated virtual high resolution (5.5 m) MIRORfus image and then compared them to actual high-resolution MIROR image. The test results show that the proposed method merges the spatial resolution of MS image and the spectral information of MIRrd image efficiently.

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Characteristics of the Han River Basin drought using SPEI and RDI (SPEI와 RDI를 이용한 한강유역 가뭄의 특징 분석)

  • Won, Kwang Jai;Chung, Eun-Sung;Lee, Bo-Ram;Sung, Jang Hyun
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.3
    • /
    • pp.187-196
    • /
    • 2016
  • Standardized Precipitation Evapotranspiration Index (SPEI) considering evapotranspiration and precipitation is generally used to quantify the drought severity. Also, Reconnaissance Drought Index (RDI) has been frequently used in the arid regions which is suffering severe droughts, but drought analysis in association with RDI has been the focus of few studies in South Korea. Therefore, this study compared two meterological drought indices based on precipitation and evapotranspiration using Thornthwaite, Hargreaves, and Blaney-Criddle evaportranspiration calculation methods. Meteorological data of sixteen weather stations which are operated by Korea Meteorological Administration (KMA) were used to quantify drought and to compare characteristics of drought for the Han River Basin from 1992 to 2015. As a result, in case of Han River Basin, severe drought sharply increased in recent years. While the correlation coefficients are relatively high between the SPEIs and RDIs, the drought severity and year of severe drought are partially different. Therefore, it is necessary that RDI will be also measured to quantify severity and occurrence year of drought.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

Key-pair(Public key, Private key) conflict analysis using OpenSSL (OpenSSL을 이용한 키쌍(공개키·개인키) 충돌율 분석)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5294-5302
    • /
    • 2014
  • The development of public-key-based technique that enables a variety of services(E-government, e-banking, e-payment, etc.) evaluated as having complete safety. On the other hand, vulnerabilities(e.g, heartbleed bug, etc.) are constantly being discovered. In this paper, a public key infrastructure to verify the safety and reliability, the collision rate using OpenSSL key pair was analyzed. the experiment was performed using the following procedure. Openssl was used to create five private certification agencies, and each of the private certificate authority certificates to create 2 million, generating a total of 10 million by the certificate of the key pair conflicts analysis. The results revealed 35,000 in 1 million, 0.35% chance of a public key, a private key conflict occurred. This is sufficient in various fields(E-payment, Security Server, etc.). A future public-key-based technique to remove the threat of a random number generator, large minority issues, in-depth study of selection will be needed.