• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.038 seconds

Wide FOV Panorama Image Acquisition Method (광각 파노라마 영상획득 방법)

  • Kim, Soon-Cheol;Yi, Soo-Yeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2117-2122
    • /
    • 2015
  • Wide FOV(Field-of-View) is required to contain much more visual information in a single image. The wide FOV imaging system has many industrial applications such as surveillance, security, tele-conference, and mobile robots. In order to obtain a wide FOV panorama image, an imaging system with hyperbolic cylinder mirror is proposed in this paper. Because the horizontal FOV is more important than the vertical FOV in general, a hyperbolic cylinder mirror is designed in this paper, that has a hyperbolic curve in the horizontal surface and is the same as a planar mirror in the vertical axis. Imaging model of the proposed imaging system is presented by ray tracing method and the hyperbolic cylinder mirror is implemented. The imaging performance of wide FOV is verified by experiments in this paper. This imaging system is cost-effective and is possible to acquire a wide panorama image having 210 degree horizontal FOV in real-time without an extra image processing.

Fully Phase-based Optical Encryption System Using Computer Holography and Fresnel Diffraction (컴퓨터 홀로그래피와 프레넬 회절을 이용한 위상 영상 광 암호화 시스템)

  • 윤경효;신창목;조규보;김수중;김철수;서동환
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.11
    • /
    • pp.43-51
    • /
    • 2004
  • In this paper, we propose a high-level optical encryption system, which is tolerant with noises and cropping, by encrypting the phase-encoded CGH pattern of original image with the phase-encoded Fresnel diffraction pattern of random key images. For encryption, the phase-encoded CGH pattern of original image is multiplied by conjugate components which are the phase-encoded Fresnel diffraction patterns of random key images. The original information can be reconstructed by multiplying encrypted image by phase-encoded Fresnel diffraction pattern of random key images and performing Fourier transform of the multiplication result. The proposed system is robust to noises and cropping due to characteristics of CGH pattern and can guarantee high-level encryption by using Fresnel diffraction information. We verified the validity of proposed system by computer simulations, numerical analysis of noises and cropping effect and optical experiment.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

Development of Safety Equipment Database for Effective Management in Wooden Cultural Heritage (효율적 목조 문화재 방재관리를 위한 방재설비 데이터베이스구축)

  • Kim, Donghyun;Lee, Ji-hee;Yi, Myungsun
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.46-53
    • /
    • 2016
  • Wooden cultural heritage is vulnerable to fire, flooding and other hazards. Therefore, an effective disaster prevention and mitigation strategy for them should include preventive measures in a full range of management. These were used to construct a disaster safety system for 508 wooden cultural heritage items by the Cultural Heritage Administration. According to the type of ownership and administration, national and public heritage is controlled by personal management or commissional management. Among them, it is arranged with the safety security institute for important cultural properties. In addition, they have problems of field management with no computerization about the management information for a disaster facility system. Therefore, this study aimed to develop a DB platform that can share information with many users who need to manage cultural heritage. Through a field survey, it is feasible to develop a disaster facility system to provide the information, such as the main data, quantity and location.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

A Design of the Social Disasters Safety Platform based on the Structured and Unstructured Data (정형/비정형 데이터 기반 사회재난 안전 플랫폼 설계)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Junggon;Kim, Taehwan
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.609-621
    • /
    • 2022
  • Purpose: Natural Disaster has well formed framework more than social disaster, because natural disaster is controlled by one department, such as MOIS, but social disaster is distributed. This study is on the design of the integrated service platform for the social diaster data. and then, apply to the local governments. Method: Firstly, we design DB templates for the incident cases considering the incident investigation reports. For the risk management, life-damage oriented social disaster risk assessment is defined. In case of the real-time incident data from NDMS, AI system provides the prediction information in the life damage and the cause of the incident. Result: We design the structured and unstructured incident data management system, and design the integrated social disaster and safety incident management system. Conclusion: The integrated social disaster and safety incident management system may be used in the local governments

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF

Geospatial analysis of terrorist bombing attacks in Afghanistan (아프가니스탄 폭탄테러공격에 관한 지리-공간 분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.261-290
    • /
    • 2012
  • Since the launch of Operation Enduring Freedom in 2001, Afghanistan has been a critical battle ground for war against global terrorism. For the last 10 years, the U.S. government and its allies and the Afghan government have put a considerable effort to crush terrorists and insurgents and at the same time to construct nationwide governance system. Yet, the noble mission still seems far from complete. Terrorist or insurgent operations in Afghanistan are still active and troublesome. Thus this subject continues to draw a considerable attention of research or investigative reports to grasp an insightful knowledge or intelligence that may allow a better handling of terrorist troubles in this war-torn nation. This study hopes to serve this purpose by providing analyzed information on terrorist bombings in Afghanistan occurred between 2004 and 2007. It adopts GIS (Geographic information System) analysis technique to uncover spatially patterned aspects of terrorist bombing attacks in Afghanistan. The specific focus of this study is to examine whether terrorists behave rationally when they decide which targets to attack. For analysis, this study will focus on examining whether characteristics of localities have certain impact on the risk of being targets of terrorist bombing attacks. To examine the hypothesis of this study, it will explore how the spatial risk of becoming targets of terrorist bombing attack interacts with cost necessary for executing a ttack paid b y terrorists; 1) by demonstrating the spatial distribution of bombing attacks in Afghanistan and 2) by estimating the distance between headquarters (or home base) of terrorists groups and the bombed target area.

  • PDF