• Title/Summary/Keyword: 데이터 소유권

Search Result 101, Processing Time 0.03 seconds

Wavelet-based Digital watermarking Using Multiple threshold (다중 임계치를 적용한 웨이브릿 기반 디지털 워터마킹 기법)

  • Kim, Jae-Won;Nam, Jae-Yeal
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.419-428
    • /
    • 2003
  • Recently, digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data. A robust wavelet-based watermark casting scheme and a watermark retrieval technique are suggested in this paper. We present a method which can add the watermark to the significant coefficients in the DWT domain, and does not require the original image in the detection process. In adaptive watermark casting method is developed to select perceptually significant coefficients for each subband using multiple threshold. In the proposed method, an adaptive multiple threshold scheme is used to reflect characteristics of each subband and complexity of image. The watermark is adaptively weighted in different subbands to achieve robustness as well as high perceptual quality. The watermark, Gaussian random sequence is added to the large coefficients but not in the lowest subband in the DWT domain. Experimental results show that the proposed algorithm produced visually very good watermarked image which has good invisibility to human eyes and very robust against various image processing and compression attacks.

Zero-Watermarking based on Chaotic Side Match Vector Quantization (무질저한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyung-Do;Park, Chan-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.37-44
    • /
    • 2009
  • Digital watermarking is a technology for preventing illegal copying, for protecting intellectual property rights and copyrights, and for suggesting grounds of the ownership by inserting watermarks into digital contents. Generally speaking, watermarking techniques cannot escape from data distortion and quality degradation due to the watermark insertion. In order to overcome the shortcoming, zero-watermarking techniques which do not change the original data have been proposed recently. This paper proposes CSMVQ(Chaotic SMVQ), a zero-watermarking system for SMVQ(Side Match Vector Quantization) which shows better compression ratio and quality and less blocking effect than VQ(Vector Quantization). In SMVQ, compression progresses from left top to right bottom in order to use the information of the two neighbor blocks, so it is impossible to insert watermarks chaotically. In the process of encoding, CSMVQ dynamically considers the information of the (1 to 4) neighbor blocks already encoded. Therefore, watermark can be inserted into digital contents in chaotic way. Experimental results show that the image quality compressed by CSMVQ is better than that of SMVQ and the inserted watermark is robust against some common attacks.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Robust Blind Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 블라인드 워터마킹 기법)

  • 김태호;남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.241-246
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of properity of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to several attack.

  • PDF

Development for establishing Big Data-based alley commercial area (빅데이터 기반 골목상권 영역설정 방법론 개발)

  • Hwang, Dong-Hyun;Ko, Kyeong-Seok;Park, Sang-June;Kim, Wan-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.784-792
    • /
    • 2018
  • In this study, we designed the area except the development market and the traditional market, where large scale shops were concentrated by realizing the real estate center of the alley commercial area. In addition, we have developed an area setting method for the alley area where reliability and rationality can be ensured by utilizing the actual data such as the business statistics, the survey data of the business, and the store business DB, which are managed by the local government or the state. The alley commercial areas were classified into five groups according to density. It is thought that users can distinguish the commercial areas from dense commercial areas to the commercial areas in order to utilize various commercial areas.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

A Study on Generating a Coastal Flood Hazard Map (국내 적합한 연안침수지도제작에 관한 연구)

  • 원대희;김계현;박태옥;최현우;곽태식
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2004.03a
    • /
    • pp.435-440
    • /
    • 2004
  • 연안침수지도는 태풍이나 해일에 의한 연안침수 발생 시 방조제의 월류 및 붕괴로 인한 예상 침수구역을 강우빈도(200년)별로 나타내고, 침수면적과 깊이를 표현한 지도로서 국외 선진국에서 방재형 국토관리 정책결정과 침수피해에 대한 대민 홍보의 수단으로 활용되고 있다. 국내에서도 연안침수에 의한 피해가 나날이 커지고 국토의 개발에 따른 자연 재해가 많아짐에 따라 보다 방재형 국토개발로 국민의 안전과 복리를 증진하고, 연안침수에 의한 피해를 최소화하기 위한 노력의 일환으로 연안침수지도의 제작 필요성이 증대되고 있다. 본 연구의 시범지역인 대부도 남부지역의 GIS 데이터베이스 구축은 문헌조사 및 기구축 데이터 확보, 지역의 특성에 맞는 신규 GIS 데이터베이스 구축 방법을 제시하였다. 침수구역을 예측하기 위한 모델링을 지원하기 위한 정확도와 경제성, 객관성, 현실성이 높은 지형공간자료의 효율적인 구축이 강조되었다. 구축한 데이터베이스의 세부 유형은 침수위험구역, 침수경계구역, 침수량 화살표이며, 기존에 구축된 데이터를 활용한 레이어는 해안선, 도로, 건물, 등고선, 등심선, 연안 표고점 측량데이터이다. 연안침수지도는 효율적인 재난관리를 위하여 다양하게 활용될 수 있을 것으로 사료되며 나아가 주민의 침수에 대한 경각심 고취와 사전 교육, 지방자치단체의 침수위험 관리업무의 활용이 가능할 것으로 사료된다. 본 연구에서 제작된 연안침수지도는 지자체 주민들을 위해 보기 쉽고 다양한 정보를 얻을 수 있도록 제작되었으며, 이를 위해 사진과 삽화를 추가하여 주민들에게 침수피해에 대한 경각심과 이해를 높이는데 중점을 두었다. 유지관리 후 활용체계 정비의 중요성’을 점검하고, ‘변동자료 발생원인의 분석’, ‘명확한 변동자료 입력 근거의 확보’, ‘갱신주체별 역할의 정의 및 유지관리 기준의 설정’, ‘분야별업무 특성을 고려한 관련 기준의 마련 및 타 시스템과 연계되는 항목을 고려한 절차 정의’ 등에 대한 다양한 접근을 시도하였다. 본 연구에서 제시하는 유지관리 모델을 기반으로 각 지자체별로 적절한 컨설팅이 진행되고 이에 따라 담당자의 실천이 이루어진다면 지자체 GIS의 투자대비 효과에 대한 기대는 이상이 아닌 현실로 다가오게 될 것이다.가오게 될 것이다. 동일하게 25%의 소유권을 가지고 있다. ?스굴 시추사업은 2008년까지 수행될 계획이며, 시추작업은 2005년까지 완료될 계획이다. 연구 진행과 관련하여, 공동연구의 명분을 높이고 분석의 효율성을 높이기 위해서 시료채취 및 기초자료 획득은 4개국의 연구원이 모여 공동으로 수행한 후의 결과물을 서로 공유하고, 자세한 전문분야 연구는 각 국의 대표기관이 독립적으로 수행하는 방식을 택하였다 ?스굴에 대한 제1차 시추작업은 2004년 3월 말에 실시하였다. 시추작업 결과, 약 80m의 시추 코아가 성공적으로 회수되어 현재 러시아 이르쿠츠크 지구화학연구소에 보관중이다. 이 시추코아는 2004년 8월 중순경에 4개국 연구팀원들에 의해 공동으로 기재된 후에 분할될 계획이다. 분할된 시료는 국내로 운반되어 다양한 전문분야별 연구에 이용될 것이다. 한편, 제2차 시추작업은 2004년 12월에서 2005년 2월 사이에 실시될 계획이다. 수백만년에 이르는 장기간에 걸쳐 지구환경변화 기록이 보존되어 있는

  • PDF

Design of a Personal-Led Health Data Management Framework Based on Distributed Ledger (분산 원장 기반의 개인 주도적 건강 데이터 관리 프레임워크 설계)

  • Moon, Junho;Kim, Dongsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.73-86
    • /
    • 2019
  • After the 4th industrial revolution, the healthcare industry is striving to find new business models through new technologies. Among them, blockchain technology is one of the technologies that have great interest in the healthcare industry. Most providers of personal health record systems have difficulty in securing marketability due to various problems. Therefore, they try to integrate blockchain technology to develop new systems and gain marketability. However, blockchain has limitations in solving the problems of the personal health record system. In this study, we have designed a personalized health data management framework that enables information subjects to acquire full ownership rights of individual's health data, based on distributed ledger technology. For the framework design, we refer to the structure of R3 Corda. It was designed with a different network structure than the existing blockchain systems so that the node can be operated on the personal user's mobile device. This allows information subjects to directly store and manage their own data and share data with authorized network members. Through the proposed system, the information utilization of the healthcare industry can be improved and the public health promotion and medical technology development can be realized.

Analysis of the Kind of Cadastral Non-coincidence Complaints in Gyeongnam (경남지역의 지적불부합지 민원 유형분석)

  • Kim, Gyu Cheol;Kim, Yung Jong;Choi, Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.spc4_2
    • /
    • pp.387-392
    • /
    • 2014
  • Prior to start the business of Cadastral Non-Coincidence, there is a difficulty in the boundary setting due to the border dispute between the business owners, because of inconvenient land using and problems and the exercise of the ownership about their shared land. Expected that the cooperation of the residents admission can be used as countermeasures, which lead to conclude in the agreement by converging various opinions, such as about preceding business promotion, property rights and stable boundary, into one submission. Consequently, the national stength can be competitive by the efficient land management; the land portion of utilized area would be increasing as well as the boundary would be more convenient and accurate. In this study, the Cadastral Resurvey is planned to be analyzed the complaints based on complaint resolution cases and problems associated with the Cadastral Non-Coincidence. Following to the result, we want to use it to analyze the actual situation of Cadastral Non-Coincidence in Gyeongnam, so as generated by the Cadastral Resurvey business in the future for efficiency in the business.

Development of Materials Strength Database (재료강도특성(材料强度特性) 데이터베이스 구축(構築))

  • Kim, Ik-Cheol
    • Journal of Information Management
    • /
    • v.23 no.1
    • /
    • pp.1-21
    • /
    • 1992
  • The importance of factual database is becoming larger and larger as the application of computer in design and processing is increasing. To follow up and support this demand and tendency, construction of factual database is necessary. The goal of this research project is to construct a factual database about the creep properties of high temperature materials. A factual database on the creep properties of 25 kinds of high temperature materials was constructed. Domestically produced data which were appeared in journals, theses, reports, etc., were collected and used as a input data source. Evaluation on these collected data will be done during the 2nd year of this project. In addition to this database construction, an experimental facility to produce creep crack propagation data was set up.

  • PDF