• Title/Summary/Keyword: 다중 인증

Search Result 303, Processing Time 0.027 seconds

Cryptographic Key Generation Method Using Biometrics and Multiple Classification Model (생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법)

  • Lee, Hyeonseok;Kim, Hyejin;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1427-1437
    • /
    • 2018
  • While biometric authentication system has been in general use, research is ongoing to apply biometric data to public key infrastructure. It is a significant task to generate a cryptographic key from biometrics in setting up a public key of Bio-PKI. Methods for generating the key by quantization of feature vector can cause data loss and degrade the performance of key extraction. In this paper, we suggest a new method for generating a cryptographic key from classification results of biometric data using multiple classifying models. Our proposal does not cause data loss of feature vector so it showed better performance in key extraction. Also, it uses the multiple models to generate key blocks which produce sufficient length of the key.

Copyright Protection of Digital Image Information based on Multiresolution and Adaptive Spectral Watermark (다중 해상도와 적응성 스펙트럼 워터마크를 기반으로 한 디지털 영상 정보의 소유권 보호)

  • 서정희
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.13-19
    • /
    • 2000
  • With the rapid development of the information communication technology, more and more distribution multimedia data and electronic publishing in the web, has created a need for the copyright protection with authentication of digital information. In this paper, we propose a multi-watermarking adding and adaptive spectral watermark algorithm well adaptive frequency domain of each hierarchical using orthogonal forward wavelet transform(FWT. Numerical test results, created watermarking image robustness not only image transform such as low-pass filtering, bluring, sharpen filtering, wavelet compression but also brightness, contrast gamma correction, histogram equalization, cropping.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

A Study on the Factors Effecting Performance and Correlation in Social Enterprises (사회적기업의 성과 영향요인과 상관관계에 관한 연구)

  • Kim, Hee-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.342-349
    • /
    • 2017
  • The purpose of this study is to empirically analyze factors which influence social and economic performance of social enterprises, and to examine the correlation of factors affecting social and economic performance. This study was conducted following the hypothesis that the organizational characteristics(organizational type, certification type, certification year, social service supply type, and external grants) of social enterprises affect social and economic performance, and that significant correlation exists between social and economic performance. This study collected the disclosure materials of 219 social enterprises certified between 2007- 2014 from the directory of the Korean Social Enterprise Promotion Agency. The study results are as follows: First, organizational characteristics affect social performance(i.e. jobs for the vulnerable classes). In addition, certification year and external grants had a positive effect on social performance. Second, the organizational characteristics affect the economic performance(i.e. sales), and certification year and external grants had a positive effect on economic performance. However, organizational type had a negative effect on the economic performance(i.e. sales). Third, analysis found a positive correlation of factors affecting social and economic performance. This study suggests the need to diversify support policies according to the number of authentication years in order to promote self-reliance and sustainability by maximizing the social and economic performance of social enterprises.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Scalable Digital Watermarking Techniques for Optimal Distributed Contents (최적의 분산 컨텐츠를 위한 다중 계층 디지털 워터마킹 기법)

  • Seo Jung-Hee;Park Hung-Bog
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.291-300
    • /
    • 2005
  • We are required to adequately adjust the distributed contents to each device and users' demands on the network and to obtain authentication of ownership for our information to prevent the illegal usage of our digital information by non-owners. In this paper, we propose scalable digital watermarking of contents within a compression domain based on Orthogonal Forward Wavelet Transforms, and the proposed method focuses on robust watermark algorithms that are not visually recognizable to embedded ownership information. Therefore, it proposes a watermark insertion methods based on spread spectrum techniques and Provides a watermark key. As a result, it not only extracted the contained watermark from the intentionally altered images, but also secured the watermark information extraction from partial images and ensure the decrease of BER (Bit Error Rate) in the images containing watermarks even when more watermark inserted images are transmitted.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

A Study on the Perception of Environment-friendly Agricultural Products among Dietitians in the Capital Area (수도권지역 영양사의 친환경 농산물 인식에 관한 연구)

  • Ahn, Sun-Choung
    • Culinary science and hospitality research
    • /
    • v.20 no.4
    • /
    • pp.144-156
    • /
    • 2014
  • The purpose of this study is to improve the quality of school meal and the satisfaction of students through dietitians' awareness and perception of environment-friendly agricultural products by providing the government, etc. with basic data on them. A survey was conducted on dietitians in the capital area to analyze the level of awareness about environment-friendly agricultural products, followed by a factor analysis, a correlation analysis and a multiple regression analysis. The results were as follows: Dietitians had a high level of knowledge about environment-friendly agricultural products, and there were significant differences with respect to age, work experience, the number of people provided with meals and the cost ratio of foods to agricultural products. The perception of environment-friendly agricultural products was found to have a significant influence upon the level of awareness about the certification system for good environment-friendly agricultural products. In conclusion, there is the need to make the dietitians who take charge of school meal have a higher level of perception about environment-friendly agricultural products, to improve the quality of school meal and the satisfaction of students remarkably and, by extension, to change school parents' perception about the use of environment-friendly agricultural products, which requires a further study to be carried out.

실시간 영상에서의 휴먼 검출 및 얼굴 분류

  • Kim, Geon-Woo;Nam, Mi-Young;Han, Jong-Wook
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.48-57
    • /
    • 2010
  • 본 고는 휴먼 객체 검출 및 분류를 위한 것으로서, 입력된 동영상에서 배경 이미지와의 차분 영상을 통해 객체 영역을 검출하고, 검출된 객체 영역에서 얼굴 즉 헤드 영역을 검출하는 방법에 대해서 설명한다. 실시간으로 녹화된 동영상에서 사람이 움직이는 위치와, 크기 등이 아주 다양하며, 또한 한 사람이 아닌 여러 사람 객체를 검출하기 위하여 다중의 사람객체 검출기를 이용한 캐스케이드 사람 객체 추출 방법을 제안한다. 얼굴 크기 등을 고려하여 헤드 영역의 shape 를 기반으로 하여 1차 검출을 수행하고, 검출되지 않은 영역에 대하여 히스토그램 기반의 얼굴 영역을 검출한다. 또한 중복된 영상에 대해 베이지안 얼굴 검출기를 통해 인증함으로써 성능을 향상시킬 수 있다.