• Title/Summary/Keyword: protection technique.

Search Result 902, Processing Time 0.026 seconds

Wavelet based Watermarking Technique for the Digital Contents Protection (지적재산권 보호를 위한 웨이블릿 기반 워터마킹 기술)

  • 송학현;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.912-917
    • /
    • 2004
  • The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyber-space. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we propose a wavelet based watermarking method which is used for implementing in the frequency domain.

Invisibility Improvement of Watermarking Image Based on Wavelet (웨이브릿 기반의 워터마킹 영상의 비가시성 개선)

  • Kim Hyeong-Gyun;Kim Yong-Ho;Lee Sang-Beom;Bae Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.717-720
    • /
    • 2006
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. for the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

  • PDF

RF protection technique of antenna tuning switch in all-off condition (전차단 상태에서 동작하는 안테나 튜닝스위치의 RF 보호기술)

  • Jhon, Heesauk;Lee, Sanghun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1567-1570
    • /
    • 2022
  • This paper, we presents a RF protection technique of antenna switch by improving the power handling capability in worst case environment mode for mobile phone applications without critical payment of circuit performances such as insertion loss, isolation and ACBV (AC breakdown voltage). By applying a additional capacitive path located in front of the antenna in cell-phone, it performs the effective reduction of input power in high voltage standing wave ratio (VSWR) condition. Under the all-path off condition which causes a high VSWR, it achieved 37.7dBm power handling level as high as 5.7dB compared to that of conventional one at 2GHz. In addition, insertion loss and isolation performances were 0.31dB and 42.72dB at 2 GHz, respectively which were almost similar to that of the conventional circuit. The proposed antenna switch was fabricated in 130nm CMOS SOI technology.

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.

Filtered Randomized Response Technique

  • Choi, Kyoung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.13 no.2
    • /
    • pp.319-326
    • /
    • 2006
  • Randomized response technique is a survey technique for eliminating evasive answer bias. This technique is popular in social survey for sensitive issues. In this paper we present a simple and obvious procedure for estimating the population proportion of a sensitive group. Here, we shows the weak point in the method of Kim and Warde (2005). Also, it is found that the proposed procedure is more efficient than the ones of Warner (1965) and Kim and Warde (2005). Lastly we discuss the conditions that the suggested method will be more efficienct.

A Study on the Analysis and Improvement of Current Fire Protection Standard for Buildings (현행소방시설설치기준의 분석과 개선방안에 관한 연구)

  • 정병재;이경회
    • Fire Science and Engineering
    • /
    • v.4 no.2
    • /
    • pp.3-13
    • /
    • 1990
  • Fire Protection System is facilities that Control the fire by mechanic means. Buildings Over a Certain Scale is required this system. As the small from the fire extinguisher as the large to the sprinkler system of automatic fire extinguishing equipment the kinds are various. With the development of architecture technique while modern higher buildings are increased. As fire is a first product that human make, it performed many profits and services for our mankind. Sometimes as it is profitable fire or harmful fire, it takes charge of human's life culture. Therefore fire protection system is facilities that control the ]after fire by mechanic means Building over a certain scale is required this system. As the small from the fire extinguisher as the large to the sprinkler system of automatic fire extinguishing equipment, the kinds are various. With the development of architecture technique while modern Higher buildings are increased high level and fire prevent facilities aren't reached to that level. The object of this study is present the problem which appear from the analysis of place standard for fire protection facility. This study described as a following order. First. We are going to look history of the fire protection system and change course of that with the year and facility. Second, We say the frame system and special nature of the foreign fire prevent Act. Third. We understand the control reality of fire protection system. Fourth. We took out the merit of foreign fire prevent law and the problem of our current domestic system. The placing standard of proper fire protection facilities that be presented from this study are followed next. 1) We have reinforce sprinkler system placing standard for the fire extinguishing and check the spread of fire. 2) We must to be ruled the standard for keeping fire prevention system that are received reality and people's idea. 3) We should prepare lawful basis which can be place fire prevention center. 4) We have to correct the standard of use about complex building without mainuse and we take increase the real effectiveness of this. 5) We ought to match the use of current fire prevention act and the use of architecture law.

  • PDF

Part II A Study on the Analysis and Improvement of Current Fire Protection Standard for Buildings (현행소방시설설치기준의 분석과 개선방안에 관한 연구II)

  • 정병재;이경회
    • Fire Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.5-14
    • /
    • 1991
  • Fire Protection System is facilities that Control the fire by mechanic means. Buildings Over a Certain Scale is required this system. As the small from the fire extinguisher as the large to the sprinkler system of automatic fire extinguishing equipment the kinds are various. With the development of architecture technique while modern higher buildings are increased. As fire is a first product that human make, it performed many profits and services for our mankind. Sometimes as it Is profitable fire or harmful fire, it takes charge of human's life culture. Therefore fire protection system is facilities that control the latter fire by mechanic means Building over a certain scale is required this system. As the small from the fire extinguisher as the large to the sprinkler system of automatic fire extinguishing equipment, the kinds are various. With the development of architecture technique while modern higher buildings are increased high level and fire prevent facilities aren't reached to that level. The object of this study is present the problem which appear from the analysis of place standard for fire protection facility. This study described as a following order. First, We are going to look history of the fire protection system and change course of that with the year and facility. Second. We say the frame system and special nature of the foreign fire prevent Act. Third. We understand the control reality of fire protection system. Fourth. We took out the merit of foreign fire prevent law and the problem of our current domestic system. The placing standard of proper fire protection facilities that be presented from this study are followed next. 1) We have to reinforce sprinkler system placing standard for the fire extinguishing and check the spread of fire. 2) We must to be ruled the standard for keeping fire prevention system that are received reality and people's idea. 3) We should prepare lawful basis which can be place fire prevention center. 4) We have to correct the standard of use count about complex building without mainuse and we take increase the real effectiveness of this. 5) We ought to match the use of current fire prevention act and the use of architecture law.

  • PDF

Application of Electro-deposition Method for Crack Closing and Surface Improvement of Reinforced Concrete (철근콘크리트의 균열폐색 및 표면개선을 위한 전착의 응용)

  • 문한영;류재석
    • Journal of the Korea Concrete Institute
    • /
    • v.11 no.6
    • /
    • pp.79-88
    • /
    • 1999
  • In this paper, the electro-deposition method for the rehabilitation of cracked concrete, based on the electro-chemical technique, is presented. The main purpose of this paper is to apply this technique to reinforced concrete members on land. After cracking with a specified load(crack width 0.5mm), 10$\times$10$\times$20cm concrete specimens with embedded steel bars were immersed in several solutions, then a constant current density between the embedded steel in concrete and an electrode in the solution was applied for 4~20 weeks. The results indicate that electro-deposits formed in this process are able to close concrete cracks and to coat the concrete surface and that formation of these electro-deposits is confirmed to have an effect of protection against detrimental materials. Therefore, it is demonstrated that the electro-deposition method can be usefully applied for the rehabilitation technique of concrete.

Protecting Deregistration Attack in SIP Using Delayed Deregistration (지연된 등록 취소를 이용한 SIP 등록 취소 공격 방어)

  • Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.18-23
    • /
    • 2015
  • This paper proposes a new protection technique against deregistration attack in SIP. Although it is caused by simple spoofing the REGISTER message of a legitimate SIP UA, its impact is serious. This new protection technique identifies and protects the deregistration attack by removing a binding form the location server after delaying a certain period of time instead of removing the binding immediately after receiving deregistration message. Therefore, this technique makes it possible to establish a secure SIP environment defending the deregistraion attack without any additional overhead such as an encryption or authentication.

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.