• Title/Summary/Keyword: 검출키

Search Result 152, Processing Time 0.028 seconds

Simultaneous determination of Phlomis umbrosa and Dipsacus asperoides in foods using LC-MS/MS methods (LC-MS/MS를 이용한 식품 중 천속단과 한속단 지표성분 동시분석)

  • Yun, Jisuk;Kim, Jinyoung;Choi, Jangduck;Kwon, Kisung;Jo, Cheon-Ho
    • Korean Journal of Food Science and Technology
    • /
    • v.48 no.6
    • /
    • pp.531-535
    • /
    • 2016
  • Phlomis umbrosa and Dipsacus asperoides are distinct species, even though they have a similar appearance. Dipsacus asperoides is used as a Chinese medicinal plant for and has bone strengthening and fracture healing but Phlomis umbrosa has no effect on bone growth. Recently, these plants were used in children's food to improve their bone growth, without distinction in food. Intakes of Dipsacus asperoides in food may be dangerous, because it has never been used in food and its safety has never been tested in humans. We developed liquid chromatography with tandem mass spectrometry method to distinguish these plants in food. The method was validated for linearity, limits of detection, limits of quantification, accuracy and precision. In 5 of 17 samples, we identified Dipsacus asperoides, containing loganin $0.19-14.45{\mu}g/mL$, sweroside $0.13-4.61{\mu}g/mL$ and akebia saponin D $0.59-19.29{\mu}g/mL$. The developed method might be useful to identify Dipsacus asperoides in adulterated food.

A Study on the Digital Video Frame Obfuscation Method for Intellectual Property Protection (저작권 보호를 위한 디지털 비디오 화면 모호화 기법에 관한 연구)

  • Boo, Hee-Hyung;Kim, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we propose the digital video frame obfuscation method for intellectual property protection using the DC component of the intra frame and the motion vector of the inter frame at digital video encoding. The proposed method considers characteristics of the HVS (human visual system) which is sensitive at the low frequency and the middle frequency. This method makes the signal distorted as operating XOR between authentication signal and the DC coefficient of the intra frame including main information and the sign of the motion vector including edge motion, so that the video is normally displayed only when suitable authentication signal is applied.

Automatic Summary Method of Linguistic Educational Video Using Multiple Visual Features (다중 비주얼 특징을 이용한 어학 교육 비디오의 자동 요약 방법)

  • Han Hee-Jun;Kim Cheon-Seog;Choo Jin-Ho;Ro Yong-Man
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1452-1463
    • /
    • 2004
  • The requirement of automatic video summary is increasing as bi-directional broadcasting contents and various user requests and preferences for the bi -directional broadcast environment are increasing. Automatic video summary is needed for an efficient management and usage of many contents in service provider as well. In this paper, we propose a method to generate a content-based summary of linguistic educational videos automatically. First, shot-boundaries and keyframes are generated from linguistic educational video and then multiple(low-level) visual features are extracted. Next, the semantic parts (Explanation part, Dialog part, Text-based part) of the linguistic educational video are generated using extracted visual features. Lastly the XMI- document describing summary information is made based on HieraTchical Summary architecture oi MPEG-7 MDS (Multimedia I)escription Scheme). Experimental results show that our proposed algorithm provides reasonable performance for automatic summary of linguistic educational videos. We verified that the proposed method is useful ior video summary system to provide various services as well as management of educational contents.

  • PDF

Mobile 3D Contents Watermarking Technique Based on Buyer-Seller Watermarking Protocol (Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Bae, Sung-Ho;Park, Jae-Bum;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.788-799
    • /
    • 2007
  • This paper presents a watermarking method for copyright protection and illegal copy prevention of mobile 3D contents. The proposed method embeds copyright information and user's phone number into spatial domain and encryption domain of mobile animation data based on Buyer-Seller watermarking protocol. Furthermore, we insert user's operation key so that only authorized user can play 3D animation game in mobile device. We implemented the proposed method by using mobile animation tool, G3-SDK. From experimental results, we verified that the proposed method is capable of copyright protection and illegal copy prevention since the watermark can be well extracted against geometrical attacks, such as noise addition, data accuracy variableness and data up/down scaling.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Expression of Attacin-like Antibacterial Protein NUECIN in Pleurotus ostreatus

  • Kim, Beom-Gi;Yun, Eun-Young;Yoo, Youngbok
    • Journal of Mushroom
    • /
    • v.9 no.3
    • /
    • pp.91-95
    • /
    • 2011
  • Pleurotus ostreatus, the oyster mushroom, is one of the most important edible mushrooms. It is especially susceptible to bacterial blotch disease, which is caused by Pseudomonas tolaasii. In order to develop bacterial blotch disease-resistant transgenic mushroom, NUECIN cDNA, a gene for an antibacterial peptide cloned from Bombyx mori, was overexpressed in Pleurotus ostreatus. NUECIN cDNA was fused to the ${\beta}$-TUBULIN promoter of oyster mushroom and co-transformed with the pTRura3-2 vector into the uracil auxotrophic mutant strain. Twelve transformants containing the NUECIN gene were identified by genomic PCR and Southern blot analysis. NUECIN gene expression was confirmed by Northern blot analysis. Three transformants showed the transcriptional expression of the gene. However, we could not detect expression of the protein in the transformants. This study showed the possibility of transgenic mushroom development for disease resistance.

A Study on Sound Synchronized Out-Focusing Techniques for 3D Animation (음원 데이터를 활용한 3D 애니메이션 카메라 아웃포커싱 표현 연구)

  • Lee, Junsang;Lee, Imgeun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.57-65
    • /
    • 2014
  • The role of sound in producing 3D animation clip is one of the important factor to maximize the immersive effects of the scene. Especially interaction between video and sound makes the scene expressions more apparent, which is diversely applied in video production. One of these interaction techniques, the out-focussing technique is frequently used in both real video and 3D animation field. But in 3D animation, out-focussing is not easily implemented as in music videos or explosion scenes in real video shots. This paper analyzes the sound data to synchronize the depth of field with it. The novel out-focussing technique is proposed, where the object's field of depth is controlled by beat rhythm in the sound data.

Video Indexing and Retrieval of MPEG Video using Motion and DCT Coefficients in Compressed Domain (움직임과 DCT 계수를 이용한 압축영역에서 MPEG 비디오의 인덱싱과 검색)

  • 박한엽;최연성;김무영;강진석;장경훈;송왕철;김장형
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.121-132
    • /
    • 2000
  • Most of video indexing applications depend on fast and efficient archiving, browsing, retrieval techniques. A number of techniques have been approached about only pixel domain analysis until now. Those approaches brought about the costly overhead of decompressing because the most of multimedia data is typically stored in compressed format. But with a compressed video data, if we can analyze the compressed data directly. then we avoid the costly overhead such as in pixel domain. In this paper, we analyze the information of compressed video stream directly, and then extract the available features for video indexing. We have derived the technique for cut detection using these features, and the stream is divided into shots. Also we propose a new brief key frame selection technique and an efficient video indexing method using the spatial informations(DT coefficients) and also the temporal informations(motion vectors).

  • PDF

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU (Performance Counter Monitor를 이용한 머신 러닝 기반 캐시 부채널 공격 탐지)

  • Hwang, Jongbae;Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1237-1246
    • /
    • 2020
  • Recently, several cache side channel attacks have been proposed to extract secret information by exploiting design flaws of the microarchitecture. The Flush+Reload attack, one of the cache side channel attack, can be applied to malicious application attacks due to its properties of high resolution and low noise. In this paper, we proposed a detection system, which detects the cache-based attacks using the PCM(Performance Counter Monitor) for monitoring CPU cache activity. Especially, we observed the variation of each counter value of PCM in case of two kinds of attacks, Spectre attack and secret recovering attack during AES encryption. As a result, we found that four hardware counters were sensitive to cache side channel attacks. Our detector based on machine learning including SVM(Support Vector Machine), RF(Random Forest) and MLP(Multi Level Perceptron) can detect the cache side channel attacks with high detection accuracy.