• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.03 seconds

Zero-Watermarking based on Chaotic Side Match Vector Quantization (무질저한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyung-Do;Park, Chan-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.37-44
    • /
    • 2009
  • Digital watermarking is a technology for preventing illegal copying, for protecting intellectual property rights and copyrights, and for suggesting grounds of the ownership by inserting watermarks into digital contents. Generally speaking, watermarking techniques cannot escape from data distortion and quality degradation due to the watermark insertion. In order to overcome the shortcoming, zero-watermarking techniques which do not change the original data have been proposed recently. This paper proposes CSMVQ(Chaotic SMVQ), a zero-watermarking system for SMVQ(Side Match Vector Quantization) which shows better compression ratio and quality and less blocking effect than VQ(Vector Quantization). In SMVQ, compression progresses from left top to right bottom in order to use the information of the two neighbor blocks, so it is impossible to insert watermarks chaotically. In the process of encoding, CSMVQ dynamically considers the information of the (1 to 4) neighbor blocks already encoded. Therefore, watermark can be inserted into digital contents in chaotic way. Experimental results show that the image quality compressed by CSMVQ is better than that of SMVQ and the inserted watermark is robust against some common attacks.

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

App-based 2-channel User Authentication Scheme for Multiple Application Systems (다중 응용시스템용 앱기반 2-채널 사용자 인증방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.141-148
    • /
    • 2018
  • Currently, the user authentication technology used by users to access multiple applications within an organization is being applied with ID/PW-based SSO technology. These user authentication methods have the fundamental disadvantages of ID/PW and SSO. This means that security vulnerabilities in ID/PW can lead to periodic changes in PWs and limits on the number of incorrect PW inputs, and SSO adds high cost of the SSO server, which centrally stores the authentication information, etc. There is also a fundamental vulnerability that allows others to freely use other people's applications when they leave the portal application screen with SSO. In this paper, we proposed an app-based 2-channel authentication scheme to fundamentally eliminate problems with existing ID/PW-based SSO user authentication technologies. To this end, it distributed centralized user authentication information that is stored on SSO server to each individual's smartphone. In addition, when users access a particular application, they are required to be authenticated through their own smartphone apps.

A Cluster Group Head Selection using Trajectory Clustering Technique (궤적 클러스터링 기법을 이용한 클러스터 그룹 헤드 선정)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5865-5872
    • /
    • 2011
  • Multi-hop communication in clustering system is the technique that forms the cluster to aggregate the sensing data and transmit them to base station through midway cluster head. Cluster head around base station send more packet than that of far from base station. Because of this hot spot problem occurs and cluster head around base station increases energy consumption. In this paper, I propose a cluster group head selection using trajectory clustering technique(CHST). CHST select cluster head and group head using trajectory clustering technique and fitness function and it increases the energy efficiency. Hot spot problem can be solved by selection of cluster group with multi layer and balanced energy consumption using it's fitness function. I also show that proposed CHST is better than previous clustering method at the point of network energy efficiency.

Design of Learning Model using Triz for PBL(Project-based Learning) in IoT Environment (사물인터넷환경에서 프로젝트중심학습에 Triz를 이용한 학습 모델 설계)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2019
  • It is changing to the 4th Industrial Revolution rapidly as the information age through the Internet is changing, and it is rapidly changing to the era of the IoT using all things. In education, with the change to the Internet of Things, interest in education for the 4th Industrial Revolution is increasing. It is necessary to change from NetPBL method using Internet to T-PBL using Triz. In this paper, we focus on the task-based learning (T-PBL) method using Triz and examine the necessity and importance of its use. We propose a teaching model using Triz as a tool for T-PBL. Triz is being used as a tool to solve problems in creative ways. We will design a model applying Triz to the blockchain system security class related to the IoT.

A Study on the Construction of an Ideal Internet Fashion Cyber Mall Focused on Web Design, Merchandising and Management

  • Hong, In-Sook;Ryu, Jin-Kyeung;Park, Eun-Jung;Lee, Kyung-Ah;Lee, Keum-Hee;Kim, Moon-Sook
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.201-211
    • /
    • 2000
  • The purpose of this study is to pinpoint currently arising issues concerning cyber fashion mall by analysing present status and contents of its web design, management and planning within the limits o business to customer (B2C) commerce, and to suggest a direction for building an ideal fashion mall on the internet. As for the study method, conceptual definitions were given based on previous studies. And a positive study was implemented, in which the cases of 23 chosen cyber fashion malls among 60 or so domestic and foreign malls selling fashion products were found by internet search engines and analysed. Results of the case analysis of cyber fashion malls are as follows : 1) cybermall must provide customers with an integrated service as well as e-commerce. 2) various products assortment and price differentiation must be developed, 3) the techniques of graphics, coloring and texturing, and layout design must be adopted to process and express product information, 4) the legislative system is needed to deal with the security, and 5) design and management of customer oriented interface are needed to process and express product information matter of electronic payment and customer protection. Considering the issues in internet fashion cybermalls, are suggested the important factors that are necessary or web design, planning and management to build an ideal cyber fashion mall. These results will contribute to the development of fashion e-commerce.

  • PDF

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

A Study on the Web Service Quality and User Satisfaction at Open Market (오픈마켓의 웹서비스 품질과 사용자 만족)

  • Son, Yong-Shim;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.113-127
    • /
    • 2013
  • The open market are expanding service quality which was used as rating scale in the field of marketing. In accordance with open market, they convert it to e-service quality and use it. Udo et al.[6] suggested web service quality combining e-SEVQUAL[2] and extended Information Success Model[7]. This study suggests four influence factors of e-service quality in the open market; website privacy and security, web site contents, web site convenience, and images of the open market companies. The study conducted survey on 301 college students and life long education center students in Busan. The study found that all four influence factors have positive effects on the web service quality and ultimately web service quality has beneficial effects on the satisfaction in open market users' information system.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

Factors Influencing Mobile Commerce Adoption and the Moderating Effect of Gender: Focused on Shanghai and Guangzhou (중국 소비자의 성별 모바일커머스 수용의도에 미치는 요인에 관한 연구: 광저우.상하이지역 소비자를 중심으로)

  • Lee, Jungsae
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.25-50
    • /
    • 2014
  • This study is to identify the factors and explore the moderating effects of gender in influencing customer behavioral intention to adopt mobile commerce in Shanghai and Guangzhou in China. An extended study based on TRA, TPB and TAM, UTAUT, technology adoption model is applied for designing on this study model of behavioral intention to adopt mobile commerce focused on emotional variables and cross-gender differences. The results of analysis reveal that the effects of perceived risk, personal innovativeness, individual familarity and social influence on behavioral intentions to adopt mobile commerce as well as to differ across gender. Differences cross gender is specially the perceived risk and social influence. Findings imply that mobile commerce operators need to be communicated to female consumers, the risk-free quality including security, payment and certification system along with the social influence of using mobile commerce. When targeting female consumers in China, the word of mouth marketing strategic approach and improvement of communications of mobile commerce should be focused.

  • PDF