• Title/Summary/Keyword: secure communications

Search Result 489, Processing Time 0.027 seconds

A Novel Digital Image Protection using Cellular Automata Transform (셀룰라 오토마타 변환을 이용한 정지영상 보호 방법)

  • Shin, Jin-Wook;Yoon, Sook;Yoo, Hyuck-Min;Park, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8C
    • /
    • pp.689-696
    • /
    • 2010
  • The goal of this paper is to present a novel method for protecting digital image using 2-D cellular automata transform (CAT). A copyright and transform coefficients are used to generate a new content-based copyright and an original digital image is distributed without any hidden copyright. The parameter, which is called gateway value, for 2-D CAT is consisted of rule number, initial configuration, lattice length, number of neighbors, and etc. Since 2-D CAT has various gateway values, it is more secure than conventional methods. The proposed algorithm is verified using attacked images such as filtering, cropping, JPEG compression, and rotation for robustness.

Multidimensional Networking Application of Ship Black Box and Forensic Data Extraction (다차원 네트워킹을 적용한 선박 블랙박스에서 Forensic자료 생성)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.387-390
    • /
    • 2009
  • Digital devices that apply Ubiquitous-IT Convergence in ship manufacture are used as ship automation device. Need sailing data recording of ship black box that equip integrity and consecutiveness as legal confesser fare that inquire responsibility whereabouts of disaster such as fire of ship. It is research that create Forensic data from ship black box using Multidimensional networking that use ZigBee radio short distance communications division Wireless LAN with short distance RFID sensor that is used in ship in this treatise, UWB communication, GPS and artificial satellite. Sailing recording of shipping that is recorded to black box is transmited, and stores doubly by real time on ship insurance company and ship administration recording membrane using SHA-1 hash function and secure consecutiveness and integrity as Forensic data through artificial satellite encoding by 3DES 1024bit.

  • PDF

A Study on Stability of Internet Information Resources for Academic Communications in LIS Domain of Korea (학술 커뮤니케이션을 위한 인터넷 정보자원의 안정성에 대한 연구 - 국내 문헌정보학 분야를 중심으로 -)

  • Kim, Sungwon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.3
    • /
    • pp.45-62
    • /
    • 2019
  • Rapid development and dissemination of ICT have brought about vast change in people's lives, including academic research and communication. Considering that the purpose of constructing Internet was to facilitate information exchange among research institutions and to secure stability through distributed preservation of critical information of the countries, increase in utilizing Internet resources for academic research seems to be natural consequences. This study examines the stability of Internet information resources by analyzing the following four factors. First, monitoring whether there is a change in accessibility to information resource as time passes. Second, examining various factors affecting the accessibility. Third, checking if there is a change in the content of information, if still accessible. Lastly verifying if any alternative access path is provided in case of original resource is no longer accessible.

Study on Frequency Selection Method Using Case-Based Reasoning for Cognitive Radio (사례기반 추론 기법을 이용한 인지 라디오 주파수 선택 방법 연구)

  • Park, Jae-Hoon;Choi, Jeung Won;Um, Soo-Bin;Lee, Won-Cheol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.58-71
    • /
    • 2019
  • This paper proposes architecture of a cognitive radio engine platform and the allowable frequency channel reasoning method that enables acquisition of the allowable channels for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary radio frequency to ensure that multiple wireless networks for different military wireless devices coexist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper presents the allowable frequency channel reasoning method based on cognitive radio engine for realizing DSA(Dynamic Spectrum Access) as an optimal available frequency channel. To this end, a case-based allowable frequency channel reasoning method for cognitive radio devices is proposed through modeling of primary user's traffic status and calculation of channel occupancy probability. Also through the simulation of the performance analysis, changing rate of collision probability between the primary users' occupancy channel and the available channel acquisition information that can be used by the cognitive radio device was analysed.

Medical Image Encryption based on C-MLCA and 1D CAT (C-MLCA와 1차원 CAT를 이용한 의료 영상 암호화)

  • Jeong, Hyun-Soo;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.439-446
    • /
    • 2019
  • In this paper, we propose a encryption method using C-MLCA and 1D CAT to secure medical image for efficiently. First, we generate a state transition matrix using a Wolfram rule and create a sequence of maximum length. By operating the complemented vector, it converts an existing sequence to a more complex sequence. Then, we multiply the two sequences by rows and columns to generate C-MLCA basis images of the original image size and go through a XOR operation. Finally, we will get the encrypted image to operate the 1D CAT basis function created by setting the gateway values and the image which is calculated by transform coefficients. By comparing the encrypted image with the original image, we evaluate to analyze the histogram and PSNR. Also, by analyzing NPCR and key space, we confirmed that the proposed encryption method has a high level of stability and security.

An Analysis of the Secret Routing Algorithm for Secure Communications (안전한 통신을 위한 비밀 경로 알고리즘의 분석)

  • Yongkeun Bae;Ilyong Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.105-116
    • /
    • 1997
  • Routing security is related to the confidentiality of the route taken by the data transmitted over the network. If the route is detected by the adversary, the probability is higher that the data are lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to the destination node using the shortest path. Furthermore, if we use a number of secret routes from the starting node to the destination node, data security is much stronger since we can transmit partial data rather than the entire data along a secret route. In this paper, the routing algorithm for multiple secret paths on MRNS(Mixed Radix Number System) Network, which requires O(1) for the time complexity where is the number of links on a node, is presented employing the HCLS(Hamiltonian Circuit Latin Square) and is analyzed in terms of entropy.

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous (안전한 유비쿼터스를 위한 확장성 있는 블루투스 피코넷에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.13-24
    • /
    • 2005
  • Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new wars of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, we applied a security service and resolved the vulnerabilities of the current piconet by configuring an expanded form of the current tree-shaped structure.

Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data (영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구)

  • In-Jun Song;Cha-Jong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.1
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.