• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.041 seconds

Development of a Visitor Recognition System Using Open APIs for Face Recognition (얼굴 인식 Open API를 활용한 출입자 인식 시스템 개발)

  • Ok, Kisu;Kwon, Dongwoo;Kim, Hyeonwoo;An, Donghyeok;Ju, Hongtaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.169-178
    • /
    • 2017
  • Recently, as the interest rate and necessity for security is growing, the demands for a visitor recognition system are being increased. In order to recognize a visitor in visitor recognition systems, the various biometric methods are used. In this paper, we propose a visitor recognition system based on face recognition. The visitor recognition system improves the face recognition performance by integrating several open APIs as a single algorithm and by performing the ensemble of the recognition results. For the performance evaluation, we collected the face data for about five months and measured the performance of the visitor recognition system. As the results of the performance measurement, the visitor recognition system shows a higher face recognition rate than using a single face recognition API, meeting the requirements on performance.

An Importance-Performance Analysis of the Healthcare Reform on a Doctor-Designation System - Focused on the Perception of Medical Providers' at Tertiary Hospital in Seoul - (선택진료제도 개편에 대한 중요도-성취도 분석(IPA) - 서울시내 상급종합병원 의료종사자 인식을 중심으로 -)

  • Park, Hye Jin;Kim, Hyo Jeong;Kim, Young Hoon
    • Korea Journal of Hospital Management
    • /
    • v.23 no.1
    • /
    • pp.28-40
    • /
    • 2018
  • Purpose: The purpose is to understand the perception of medical providers at tertiary hospitals in Seoul on the importance-performance of the reform on a doctor-designation system, and to provide the policy suggestion of the perception on such a system. Methodology: To achieve the purpose, this study utilized structured survey tools to conduct a questionnaire survey of nursing, administrative and medical technology professionals at six tertiary hospitals in Seoul. An importance-performance analysis was utilized for an analysis that showed the perception of the reform on a doctor-designation system. Findings: First, it was identified that those medical providers had the highest perception of the importance about the performance of the reform on a doctor-designation system. Second, according to the result of action grid of an importance-performance analysis (IPA), it can be identified that in the 2nd stage of 'Concentrate here' included are the items as to design and effect of medical care quality and subsidies & patient infection and safety and control fees, effect of income security of the method for compensating for loss established by the government and offering sufficient information on general medical services and doctor-designation medical services. In the 1st stage of 'Keep up the Good Work', and the 2nd stage of 'Concentrate here' included is the item as to the performance of patients of the reform on a doctor designation system. Practical Implications: There could be identified the effect of the reform bill on the perception of medical providers. It is expected that a better environment would be provided for patients to use a hospital and for medical providers to offer medical services, if the goverment makes efforts to improve methods for compensating for loss and continuous monitoring of the performance of patients.

An SMS Notarization System Using Smartphones (스마트폰을 활용한 SMS 공증 시스템)

  • Lee, Yunho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.13-19
    • /
    • 2018
  • Although it's been nearly decade since the electronic notarization system enforced, the utilization is not high because of the troublesomeness of the client or his agent to visit the notarial office directly. Recently, the ministry of justice introduced e-notary based on audio-visual conference through amendament of the notarial law, and hence it will vitalize the usage of e-notary. In addition, due to the spread of smartphones, many people use SMS messages to express simple statements or promises. However, in case of legal disputes, the judgment of the court is different according to the case. The electronic notarization system can be used to prove of evidence of SMS messages, however, there is a hassle to convert SMS messages to electronic documents. To solve this problem, this paper proposes an SMS notarization system using smartphones. The proposed system uses reliable notarization server and it is divided into notarization system for message senders and notarization system for message receivers according to notary requestor.

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments (이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법)

  • 노환주;이기현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.528-538
    • /
    • 2000
  • Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

  • PDF

Design of Watermarking Algorithm of Medical Image Security based on Picture Archiving & Communication System (PACS을 기반으로 한 의료 영상 보안 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack;Jung, Min-Six
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.527-530
    • /
    • 2008
  • The watermarking method was suggested to protect the right of the copyright and the right of property, data loss is yes or not, copy prevention and pursuit about the brainchild(music, image, video and so on) in the early 1990. In this paper, we suggest the watermarking algorithm against the geometrical transformation of the medical images applied the Watershed algorithm. The robust watermarking methodology is being suggested using the several algorithm against the attacks such as compression, filtering, noise and geometrical transformation of the medical image.

  • PDF

A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario

  • Lim, Meng-Hui;Jeong, Min-Yi;Teoh, Andrew Beng Jin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.173-179
    • /
    • 2010
  • Over recent years, much research attention has been devoted to a two-factor authentication mechanism which integrates both tokenized pseudorandom numbers with user specific biometric features for biometric verification, known as Biohash. The main advantage of Biohash over sole biometrics is that Biohash is able to achieve a zero equal error rate and provide a clean separation of the genuine and imposter populations, thereby allowing elimination of false accept rates without imperiling the false reject rates. Nonetheless, when the token of a user is compromised, the recognition performance of a biometric system drops drastically. As such, a few solutions have been proposed to improve the degraded performance but such improvements appear to be insignificant. In this paper, we investigate and pinpoint the basis of such deterioration. Subsequently, we propose a two-level approach by utilizing strong inner products and fuzzy logic weighting strategies accordingly to increase the original performance of Biohash under this scenario.

AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups

  • Kim, Jonghak;Yang, Joonhyuk;Wohn, Kwangyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1071-1092
    • /
    • 2014
  • Annotating images with tags that describe the content of the images facilitates image retrieval. However, this task is challenging for both humans and computers. In response, a new approach has been proposed that converts the manual image annotation task into CAPTCHA challenges. However, this approach has not been widely used because of its weak security and the fact that it can be applied only to annotate for a specific type of attribute clearly separated into mutually exclusive categories (e.g., gender). In this paper, we propose a novel image annotation CAPTCHA scheme, which can successfully differentiate between humans and computers, annotate image content difficult to separate into mutually exclusive categories, and generate verified test images difficult for computers to identify but easy for humans. To test its feasibility, we applied our scheme to annotate images of human faces with their age groups and conducted user studies. The results showed that our proposed system, called AgeCAPTCHA, annotated images of human faces with high reliability, yet the process was completed by the subjects quickly and accurately enough for practical use. As a result, we have not only verified the effectiveness of our scheme but also increased the applicability of image annotation CAPTCHAs.

The Problems and Guidances of Digital Certification in EC (전자서명 인증제도의 문제점과 발전방향)

  • Kang Tea-Gyung;Hwang Sang-Gyu
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.1-15
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

Energy Detection Based Sensing for Secure Cognitive Spectrum Sharing in the Presence of Primary User Emulation Attack

  • Salem, Fatty M.;Ibrahim, Maged H.;Ibrahim, I.I.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.6
    • /
    • pp.357-366
    • /
    • 2013
  • Spectrum sensing, as a fundamental functionality of Cognitive Radio (CR), enables Secondary Users (SUs) to monitor the spectrum and detect spectrum holes that could be used. Recently, the security issues of Cognitive Radio Networks (CRNs) have attracted increasing research attention. As one of the attacks against CRNs, a Primary User Emulation (PUE) attack compromises the spectrum sensing of CR, where an attacker monopolizes the spectrum holes by impersonating the Primary User (PU) to prevent SUs from accessing the idle frequency bands. Energy detection is often used to sense the spectrum in CRNs, but the presence of PUE attack has not been considered. This study examined the effect of PUE attack on the performance of energy detection-based spectrum sensing technique. In the proposed protocol, the stationary helper nodes (HNs) are deployed in multiple stages and distributed over the coverage area of the PUs to deliver spectrum status information to the next stage of HNs and to SUs. On the other hand, the first stage of HNs is also responsible for inferring the existence of the PU based on the energy detection technique. In addition, this system provides the detection threshold under the constraints imposed on the probabilities of a miss detection and false alarm.

  • PDF