• Title/Summary/Keyword: 검출키

Search Result 152, Processing Time 0.027 seconds

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

Optical Image Encryption Based on Characteristics of Square Law Detector (세기검출기를 이용한 광 영상 암호화)

  • Lee, Eung-Dae;Park, Se-Jun;Lee, Ha-Un;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.34-40
    • /
    • 2002
  • In this paper, a new encryption method for a binary image using Phase modulation and Fourier transform is proposed. For decryption we use the characteristics of square law detector. In encryption process, a key image is obtained by phase modulation of 256 level random pattern and its Fourier transformation, and input image is encrypted by Fourier transforming the multiplication of the phase modulated random pattern and phase modulated input image. The encrypted image and key image have only phase information, so they can not be copied or counterfeited and the original image can not be decrypted without the key image. To reconstruct the original image, each phase mask of the key image and the encrypted image must be placed on each path of the Mach-Zehnder interferometry with Fourier transform lens and the output image is obtained in the form of intensity in the CCD(Charge Coupled Device) camera. The real-time decryption is possible in the proposed system by use of a LCD as a phase modulator and a CCD camera as an intensity detector. The proposed method shows a good performance in the computer simulation and optical experiment as an encryption scheme.

Correlation Power Analysis Attack on Lightweight Block Cipher LEA and Countermeasures by Masking (경량 블록암호 LEA에 대한 상관관계 전력분석 공격 및 마스킹 대응 기법)

  • An, Hyo-Sik;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1276-1284
    • /
    • 2017
  • Lightweight Encryption Algorithm (LEA) that was standardized as a lightweight block cipher was implemented with 8-bit data path, and the vulnerability of LEA encryption processor to correlation power analysis (CPA) attack was analyzed. The CPA used in this paper detects correct round keys by analyzing correlation coefficient between the Hamming distance of the computed data by applying hypothesized keys and the power dissipated in LEA crypto-processor. As a result of CPA attack, correct round keys were detected, which have maximum correlation coefficients of 0.6937, 0.5507, and this experimental result shows that block cipher LEA is vulnerable to power analysis attacks. A masking method based on TRNG was proposed as a countermeasure to CPA attack. By applying masking method that adds random values obtained from TRNG to the intermediate data of encryption, incorrect round keys having maximum correlation coefficients of 0.1293, 0.1190 were analyzed. It means that the proposed masking method is an effective countermeasure to CPA attack.

Ultrasonic Flaw Detection in Turbine Rotor Disc Keyway Using Neural Network (신경회로망을 이용한 터빈로타 디스크 키웨이의 결함 검출)

  • Son, Young-Ho;Lee, Jong-O;Yoon, Woon-Ha;Lee, Byung-Woo;Seo, Won-Chan;Lee, Jong-Kyu
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.1
    • /
    • pp.45-52
    • /
    • 2003
  • A number of stress corrosion cracks in turbine rotor disk keyway in power plants have been found and the necessity has been raised to detect and evaluate the cracks prior to the catastrophic failure of turbine disk. By ultrasonic RF signal analysis and using a neural network based on bark-propagation algorithm, we tried to evaluate the location, size and orientation of cracks around keyway. Because RF signals received from each reflector have a number of peaks, they were processed to have a single peak for each reflector. Using the processed RF signals, scan data that contain the information on the position of transducer and the arrival time of reflected waves from each reflector were obtained. The time difference between each reflector and the position of transducer extracted from the scan data were then applied to the back-propagation neural network. As a result, the neural network was found useful to evaluate the location, size and orientation of cracks initiated from keyway.

The MPEG-7 based Video Database (MPEG-7에 기반한 동영상 데이터베이스)

  • Lee, Soon-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.2
    • /
    • pp.103-106
    • /
    • 2007
  • In order to construct a Video Database, shot change detection should be made first. But, because these processes are not automated perfectly, we need a lot of time and efforts now. And, there are many shot change detection algorithms, which can't always insure the perfect result because of the editing effects such as cut, wipe, and dissolves used in film production. Therefore, in order to receive the exact shot change, It needs the verification and correction by manual processing at any cost. Spatiotemporal slice is a simple image condensing method for the content changes of video. The editing effects are expressed on the Spatiotemporal slice in the visually noticed form of vertical line, diagonal line, curved line and gradual color changes, etc. Accordingly the parts doubted as a shot change can be easily detected by the change of the Spatiotemporal slice without replaying the video. The system proposed in this study makes it possible to delete the false detected key frames, and create the undetected key frames on the Spatiotemporal slice.

  • PDF

Detecting Method of Video Caption Frame on News Data (뉴스 데이터에서 자막프레임 검출방법)

  • Nam, Yun-Seong;Bae, Jong-Sik;Choi, Hyung-Jin
    • Annual Conference of KIPS
    • /
    • 2003.11a
    • /
    • pp.505-508
    • /
    • 2003
  • 디지털 영상 자천가 대중화됨에 따라 방대한 양의 자료를 효과적으로 이용 및 검색하기 하기 위해 영상 데이터의 색인과정이 필수적이다. 뉴스 데이터에서 자막 프레임은 뉴스의 내용을 한 눈에 파악할 수 있는 중요한 정보이다. 따라서 본 논문에서는 뉴스 데이터에서 색인과정을 위해 우선 자막 프레임을 검출하는 기법을 제안하고자 한다. 자막이 있는 프레임을 검출하기 위해 가변길이 프레임 생략법을 이용하여 키프레임을 검출한다. 영상보정을 위한 전처리 작업으로 BC(Brightness & Contrast) 필터기법을 제안하고 자막영역을 대상으로 IT(Invers & Threshold) 기법을 적용하여 자막프레임을 검출하는 방법을 제안한다.

  • PDF

SEMANTIC EVENT DETECTION FOR CONTENT-BASED HIGHLIGHT SUMMARY (내용 기반 하이라이트 요약을 위한 의미 있는 이벤트 검출)

  • Kim, Cheon-Seog;Bae, Beet-Nara;Thanh, Nguyen-Ngoc;Ro, Yong-Man
    • Annual Conference of KIPS
    • /
    • 2002.11a
    • /
    • pp.73-76
    • /
    • 2002
  • 비디오 하이라이트 요약을 위해 내용기반에 의한 의미 있는 이벤트의 검출 방법에 대해 논하였다. 제안된 방법은 비디오 파싱을 포함한 5개의 단계로 구성 되었고, 다수의 기술자가 하위 레벨 특징들의 추출과 정확한 이벤트 검출을 위해 사용 되었다. 특징의 추출에 사용하는 샷과 키 프레임은 이벤트 검출에 힌트가 되는 부분만 사용함으로써 계산 복잡도를 줄였다. 각 샷은 사전에 정의된 추론 방법에 의해 요소가 부여되고, 이들 샷들의 의미를 통합하여 하나의 이벤트가 구성 된다.

  • PDF

Some Characteristics of the Performance in Comparison with Indexing techniques for File Organization (화일조직을 위한 인덱싱 기법의 성능 특성 비교)

  • Lee, Gu-Nam
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.49-59
    • /
    • 1997
  • In this thesis, To provide the base of effective data access methods, performance of some indexing techniques used gent-Tally are compared. They are classified as primary key and multikey. For primary key method, made a comparative analysis on Static index. Dynamic index and Hashing. For multikey indexing method K-d tree, K-d-B tree, Inverted file and Grid file of which characteristics are compared. In many applications, multikey indexings are more requested, but are not supplied enough. So, to satisfy users' request - more fast, more exact and to be applied according to the trend of being huge database systems, it is requested more study about multikey data access methods.

  • PDF

Rule-Based Anchor Shot Detection Method in News Video: KBS and MBC 9 Hour News Cases (규칙기반 뉴스 비디오 앵커 TIT 검출방법: KBS와 MBC 9시 뉴스를 중심으로)

  • Yoo, Hun-Woo;Lee, Myung-Eui
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.50-59
    • /
    • 2007
  • In this paper, an anchor shot detection method, which is a basic technology for managing news videos for index and retrieval purposes is proposed. To do that, two most popular news program such as 'KBS 9 Hour News' and 'MBC 9 Hour News' are analyzed and 4-step rule based detection method is proposed First, in the preprocessing, video shot boundaries are detected and the 1st frame of each shot is extracted as a key frame. Then, the detected shot is declared as an anchor shot, if all the following 4 conditions are satisfied. 1) There is an anchor face in the key frame of a shot. 2) Spatial distribution of edges in the key frame is adequate. 3) Background color information of the key frame is similar to the color information of an anchor model. 4) Motion rate in the shot is low. In order to show the validity of the proposed method, three 'KBS 9 Hour News' and three 'MBC 9 Hour News', which have total running time of 108 in minute and are broadcasted at different days, are used for experiments. Average detection rates showed 0.97 in precision, 1.0 in recall, and 0.98 in F-measure.

  • PDF

Video Browsing Using An Efficient Scene Change Detection in Telematics (텔레매틱스에서 효율적인 장면전환 검출기법을 이용한 비디오 브라우징)

  • Shin Seong-Yoon;Pyo Seong-Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.147-154
    • /
    • 2006
  • Effective and efficient representation of color features of multiple video frames is an important vet challenging task for visual information management systems. This paper Proposes a Video Browsing Service(VBS) that provides both the video content retrieval and the video browsing by the real-time user interface on Web. For the scene segmentation and key frame extraction of video sequence, we proposes an efficient scene change detection method that combine the RGB color histogram with the X2 (Chi Square) histogram. Resulting key frames are linked by both physical and logical indexing. This system involves the video editing and retrieval function of a VCR's. Three elements that are the date, the need and the subject are used for video browsing. A Video Browsing Service is implemented with MySQL, PHP and JMF under Apache Web Server.

  • PDF