• Title/Summary/Keyword: 보안 제어

Search Result 1,534, Processing Time 0.032 seconds

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

Active Object Tracking System based on Stereo Vision (스테레오 비젼 기반의 능동형 물체 추적 시스템)

  • Ko, Jung-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.159-166
    • /
    • 2016
  • In this paper, an active object tracking system basing on the pan/tilt-embedded stereo camera system is suggested and implemented. In the proposed system, once the face area of a target is detected from the input stereo image by using a YCbCr color model and phase-type correlation scheme and then, using this data as well as the geometric information of the tracking system, the distance and 3D information of the target are effectively extracted in real-time. Basing on these extracted data the pan/tilted-embedded stereo camera system is adaptively controlled and as a result, the proposed system can track the target adaptively under the various circumstance of the target. From some experiments using 480 frames of the test input stereo image, it is analyzed that a standard variation between the measured and computed the estimated target's height and an error ratio between the measured and computed 3D coordinate values of the target is also kept to be very low value of 1.03 and 1.18% on average, respectively. From these good experimental results a possibility of implementing a new real-time intelligent stereo target tracking and surveillance system using the proposed scheme is finally suggested.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

A Study of Partial Preview Control Method of ePUB-based eBook DRM (ePUB 기반 전자책 DRM의 부분열람 제어 방법에 관한 연구)

  • Kim, Eun-Bum;Kim, Kyung-Il;Kim, Tae-Hyun;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.249-256
    • /
    • 2012
  • ePUB is one of the most pervasive eBook formats since it was announced as a 2009 standard in IDPF(International Digital Publishing Forum). ePUB is compressed as a ZIP Archive format and structured as a standard format of OCF. Domestically and internationally, eBook services applying DRM into ePUB have currently been active, while it does not satisfy various needs from business because it does not support preview service which is due to the encryption of the whole ePUB as a single key. This study suggests a way to apply diverse business models by providing eBook content based on ePUB multiple key encryption method, not by encrypting it simply as a single key. The encryption method which applies a multiple key encryption method is suggested as a practically appliable form together with licence issuing and delivery method and decryption method in eBook readers. The multiple key encryption method suggested in this study will make it possible to support partial preview services of ePUB based eBook content. It will be applied to diverse service models and enhance the security level better then single key based encryption method.

A Key Management Scheme without Re-encryption for Home-domain Contents Distribution in Open IPTV Environments (Open IPTV 환경에서 재암호화 과정 없는 댁내 컨텐츠 분배를 위한 키관리 기법)

  • Jung, Seo-Hyun;Roh, Hyo-Sun;Lee, Hyun-Woo;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.57-66
    • /
    • 2010
  • Due to the advancement of IPTV technologies, open IPTV services are a step closer to becoming reality. In such service environment, users are able to enjoy IPTV services using a variety of devices available at their home domain. However, it is impossible to get such flexible services at their convenience unless each of devices is individually connected to Set-Top-Box (STB) because of Conditional Access System (CAS) or service providers otherwise allow STB to freely distribute decoded contents to every user devices attached to STB. In this paper, we propose a key management scheme for securely distributing contents from STB to multiple user devices at home domain. The proposed scheme also makes the service providers be able to control the access rights to each of user devices without installing individual STBs. It is achieved by computationally dividing a private key of RSA signature scheme into three parts and thus makes possible to distribute the contents scrambled through a underlying CAS mechanism without re-encrypting them that the existing scheme should employ. It improves significantly computation and communication complexities, maintaining it as secure as the existing schemes. Additionally, it prevents misbehaving users from illegally distributing the contents from STB to their devices available at home domain.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

An Evaluation Technique for the Path-following Control Performance of Autonomous Surface Ships (자율운항선박의 항로추정성능 평가기법 개발에 관한 연구)

  • Daejeong Kim;ChunKi Lee;Jeongbin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.1
    • /
    • pp.10-17
    • /
    • 2023
  • A series of studies on the development of autonomous surface ships have been promoted in domestic and foreign countries. One of the main technologies for the development of autonomous ships is path-following control, which is closely related to securing the safety of ships at sea. In this regard, the path-following performance of an autonomous ship should be first evaluated at the design stage. The main aim of this study was to develop a visual and quantitative evaluation method for the path-following control performance of an autonomous ship at the design stage. This evaluation technique was developed using a computational fluid dynamics (CFD)-based path-following control model together with a line-of-sight (LOS) guidance algorithm. CFD software was utilized to visualize waves around the ship, performing path-following control for visual evaluation. In addition, a quantitative evaluation was carried out using the difference between the desired and estimated yaw angles, as well as the distance difference between the planned and estimated trajectories. The results demonstrated that the ship experienced large deviations from the planned path near the waypoints while changing its course. It was also found that the fluid phenomena around the ship could be easily identified by visualizing the flow generated by the ship. It is expected that the evaluation method proposed in this study will contribute to the visual and quantitative evaluation of the path-following performance of autonomous ships at the design stage.