• Title/Summary/Keyword: smartphone security

Search Result 345, Processing Time 0.021 seconds

Enhancing Document Security with Computer Generated Hologram Encryption: Comprehensive Solution for Mobile Verification and Offline Decryption

  • Leehwan Hwang;Seunghyun Lee;Jongsung Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.169-175
    • /
    • 2024
  • In this paper, we introduce a novel approach to enhance document security by integrating Computer Generated Hologram(CGH) encryption technology with a system for document encryption, printing, and subsequent verification using a smartphone application. The proposed system enables the encryption of documents using CGH technology and their printing on the edges of the document, simplifying document verification and validation through a smartphone application. Furthermore, the system leverages high-resolution smartphone cameras to perform online verification of the original document and supports offline document decryption, ensuring tamper detection even in environments without internet connectivity. This research contributes to the development of a comprehensive and versatile solution for document security and integrity, with applications in various domains.

The Relationship Analysis of Online Security, Social Network Service, and Smartphone Expenses (보안 우려, 소셜네트워크서비스, 스마트폰 지출과의 관계분석: 잠재성장모형을 중심으로)

  • Noh, Mijin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.648-659
    • /
    • 2019
  • The social network services have spread rapidly with new issues in terms of the security. The purpose of this study is to longitudinally verify the influence of relationships among online security, social network service, and smartphone expense. The analyses were conducted on panel data of SNS users from 2015 to 2017 based on the SEM methodologies. The results indicated that anxiety of online security had an effect on the SNS usage. In addition, The results showed that anxiety of online security and SNS usage had a significant influence on the smartphone expenses. This study could provide useful guidelines for researchers and company managers, and an opportunity to develop an understanding of social network trends.

Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface

  • Song, Seok-Jeong;Nam, Hyoungsik
    • Current Optics and Photonics
    • /
    • v.1 no.2
    • /
    • pp.90-94
    • /
    • 2017
  • Visible light identification (VLID) is a user identification system for a door lock application using smartphone that adopts visible light communication (VLC) technology with the objective of high security, small form factor, and cost effectiveness. The user is verified by the identification application program of a smartphone via fingerprint recognition or password entry. If the authentication succeeds, the corresponding encoded visible light signals are transmitted by a light emitting diode (LED) camera flash. Then, only a small size and low cost photodiode as an outdoor interface converts the light signal to the digital data along with a comparator, and runs the authentication process, and releases the lock. VLID can utilize powerful state-of-the-art hardware and software of smartphones. Furthermore, the door lock system is allowed to be easily upgraded with advanced technologies without its modification and replacement. It can be upgraded by just update the software of smartphone application or replacing the smartphone with the latest one. Additionally, wireless connection between a smartphone and a smart home hub is established automatically via Bluetooth for updating the password and controlling the home devices. In this paper, we demonstrate a prototype VLID door lock system that is built up with LEGO blocks, a photodiode, a comparator circuit, Bluetooth module, and FPGA board.

The Effects of millitary lesson students' self-control and stress coping behavior are related to the level of smartphone addiction. (군사학과 학생의 자기 통제력과 스트레스 대처방식이 스마트폰 중독수준에 미치는 영향)

  • Jung, Sun-cheol;Lee, Young-sun
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.63-74
    • /
    • 2015
  • The purpose of this study was to determine the status using the smartphone targeting millitary lesson students, and self-control and coping investigate the influence on smartphone addiction level. The results were also analyzed were to affect this age of smartphones college hours per day using a smartphone to an hour or more self-important 95.3% in individual daily levels of smartphone addiction to sex differences. Smartphone addiction levels showed a higher female than male students, the higher the self-control and self-control over the smartphone results of analyzing the relationship between addiction smartphone addiction has been analyzed to be lowered. In addition, even between coping and smartphone addiction emerged as significant results. In conclusion, the self-control necessary for use in smartphones and use time period, and this was demonstrated that coping problem-oriented coping strategies are required. Were discussing the implications of the study on the basis of these findings, we discuss the future research challenges and limitations.

Factors Affecting Smartphone Dependency and Digital Dementia

  • Ahn, Joong-Seok;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.35-54
    • /
    • 2015
  • Smartphone is affecting not only our everyday life but also our business, directly causing diverse side-effects. But up until now, many researches that have been conducted on smartphone were focused on continuance intention for smartphone use and user satisfaction. Thus, the objective of this research is to investigate the effects that smartphone dependency has on digital dementia which is one of negative effects of smartphone. For the purpose, we have reviewed studies that are related to perceived characteristics of existing smartphones. As perceived characteristics variables, we have adopted perceived ease of use and perceived usefulness. And to present our research model, we have adopted smartphone dependency as psychological attitude variable and digital dementia as consequence variable. To implement an empirical analysis of our research model, we have conducted a survey with college student groups as research target who use smartphone most.

Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices (스마트 기기 잠금을 위한 상황인지 위험도기반의 지속인증기법)

  • Kim, Jihwan;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1259-1269
    • /
    • 2016
  • In order to block the access of the information in the smartphone of a user by other users, it is checked if the current user is the owner or not in the smartphone authentication process, whenever a user begins to use a smartphone. This makes smartphone users in front of frequent smartphone authentications, which leads significant inconvenience to them. Because of such inconvenience, users tend not to use the smartphone authentication anymore. Finally, their smartphones become very vulnerable against malicious access. This paper proposes a progressive authentication method on the android-platform in order to solve the problem described above. With the proposed method, smartphones can identify relevant risks based on users' past experiences and determine whether an authentication is needed. Because authentication occurs only when the identified risk level is high, it can achieve both a high-level of security in the high-level risk situation and user convenience in the low-level risk situation.

Creating Covert Channel by Harnessing Shapley Values from Smartphone Sensor Data

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.10-16
    • /
    • 2021
  • In this paper, we devise a Shapley-value-based covert channel in smartphones. More specifically, unlike ordinary use of Shapley value in cooperative game, we make use of a series of Shapley values, which are computed from sensor data collected from smartphones, in order to create a covert channel between encoding smartphone and decoding smartphone. To the best of our knowledge, we are the first to contrive covert channel based on Shapley values. We evaluate the encoding process of our proposed covert channel through simulation and present our evaluation results.

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices (안드로이드 단말에서의 상황별 위험도 분석 및 상황별 위험도 기반 지속인증 기법)

  • Kim, Jihwan;Kim, SeungHyun;Kim, Soo-Hyung;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1154-1164
    • /
    • 2016
  • To prevent the use of one's smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone's security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.

Study on Problem and Improvement of Legal and Policy Framework for Smartphone Electronic Finance Transaction - Focused on Electronic Financial Transaction Act - (스마트폰 전자금융거래 보호를 위한 법제적 문제점 분석 - 전자금융거래법(안)을 중심으로 -)

  • Choi, Seung-Hyeon;Kim, Kang-Seok;Seol, Hee-Kyung;Yang, Dae-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.67-81
    • /
    • 2010
  • As wide propagation of smartphones, e-commerce with smartphones increases rapidly. Such as transfer or stock trade systems. It has prospect that most of financial companies going to offer e-commerce systems via smartphones. And e-commerce via smartphones will be increased, hence the nature of smartphone that can be used whenever, wherever. However, legislation of e-commerce in Korea does not reflect these characteristics of smartphones, because it has set standards in regular PC. So that this study is security threat and feature of smartphones considering that the current legal system will use Certificate constraints, ensuring the safety of e-commerce and install security programs for protection of users, e-commerce responsible for the accident analysis has focused on the issues presented for this improvement.