• Title/Summary/Keyword: keys

Search Result 1,089, Processing Time 0.028 seconds

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

Development of Universal Reduced Key Braille System (유니버설 단축키 점자시스템 개발)

  • Lee, Jung-Suk;Moon, Byung-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.45-51
    • /
    • 2022
  • In this paper, an universal reduced input system that can represent Korean text message, English alphabet letter, special characters, and numbers is develpoed. The reduced keyboard input system has 5 number keys and 4 special function keys to reduce the complexity of inserting characters for the severely disabled. Also, mobile application is developed for the use of easy communication for the disabled.

Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals (심전도(Electrocardiogram) 신호를 이용한 생체암호시스템 기술 동향)

  • B.H. Chung;H.C. Kwon;J.G. Park
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.5
    • /
    • pp.61-70
    • /
    • 2023
  • We investigated technological trends in an electrocardiogram (ECG)-based biometric cryptosystem that uses physiological features of ECG signals to provide personally identifiable cryptographic key generation and authentication services. The following technical details of the cryptosystem were investigated and analyzed: preprocessing of ECG signals, extraction of personally identifiable features, generation of quantified encryption keys from ECG signals, reproduction of ECG encryption keys under time-varying noise, and new security applications based on ECG signals. The cryptosystem can be used as a security technology to protect users from hacking, information leakage, and malfunctioning attacks in wearable/implantable medical devices, wireless body area networks, and mobile healthcare services.

Construction Method for Forming Concrete Shear Keys at Vertical Construction Joints of Slurry Walls (지하연속벽 수직시공이음부에 콘크리트 전단키를 형성하는 시공기술)

  • Lee, Jeong-Young;Kim, Seung-Weon;Kim, Doo-Kie
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.401-402
    • /
    • 2023
  • The shear connection of the vertical construction joint of a slurry wall by the concrete shear key has excellent structural performance and is economical and eco-friendly. However, technology for forming concrete shear keys in the underground is still underdeveloped. This paper proposes the development of the construction technology required to form a concrete shear key at the vertical construction joint of the slurry wall.

  • PDF

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

Design and Implementation of an Index Manager for a Main Memory DBMS (주기억장치 DBMS를 위한 인덱스 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Yeom, Sang-Min;Kim, Yun-Ho;Lee, Seung-Sun;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.661-674
    • /
    • 2000
  • The main memory DBMS(MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss theexperiences obtained in developing the index manager of the Tachyon, a next-generation MMDBMS. The indexmanager is an essential sub-component of the DBMS used to speed up the retrieval of objects from a largevolume of a database in response to a certain search condition. Previous research efforts on indexing proposed various index structures. However, they hardly dealt with the practical issues occured in implementating an index manager on a target DBMS. In this paper, we touch these issues and present our experiences in developing the index manager on the Tachyon as solutions. The main issues touched are (1) compact representation of an indexentry, (2) support of variable-length keys, (3) support of multiple-attribute keys, (4) support of duplicated keys,(5) definition of external APls, (6) concurrency control, and (7) backup and recovery. We believe that ourcontribution would help MMDBMS developers highly reduce their trial-and-errors.

  • PDF