• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.029 seconds

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

Effectiveness and Market Friendly Activation of Restricted Stock Units (RSUs) in the Early-Stage Startup Ecosystem: A Focus Group Interview (FGI) Approach (초기창업생태계를 위한 양도제한조건부주식(RSU)의 시장친화적인 활성화 방안: 전문가 포커스그룹인터뷰(이하 FGI)중심으로)

  • Hwangbo, Yun;Yang, Youngseok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.4
    • /
    • pp.1-12
    • /
    • 2024
  • This paper aims to examine the effectiveness of Restricted Stock Units (RSUs) in attracting and retaining top talent for startups and venture companies in the context of their implementation in July 2024. The study investigates whether RSUs align with their original intent and identifies additional measures to enhance their effectiveness. Additionally, the paper explores strategies to actively adopt and revitalize RSUs in the business field from the perspectives of experts representing key market participants within the early-stage startup ecosystem in Korea. The study employs a three-pronged approach. First, a pre-study examines how RSUs overcome the limitations of existing stock compensation schemes, the benefits they offer, and the key conditions for ensuring market-friendly effectiveness. Second, experts involved in the RSU bill's early stages identify five issues that need to be addressed to ensure the bill's market-friendly effectiveness: RSU vesting conditions, RSU vesting targets, RSU vesting scope, RSU vesting timing, and RSU vesting-related tax benefits. Third, the study conducts an FGI with experts representing key market players in the early-stage startup ecosystem to examine the effectiveness and activation measures of the proposed RSU scheme, RSU adoption within the early-stage startup ecosystem minimizing conflict of interests with existing shareholders such as venture capital investor. Finally, experts emphasize the importance of clearly defining and communicating RSU benefits to businesses for effective RSU activation. This study's significance lies in its derivation of various insights from FGI research on the effective adoption and activation of RSUs within the early-stage startup ecosystem. Moreover, it is expected to provide a methodology for gauging opinion-gathering procedures for new bills introduced to foster startup and venture company growth.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

Evaluation of the applicability of the surface wave method to rock fill dams (사력댐에서의 표면파 기법 적용성 평가 연구)

  • Kim, Jong-Tae;Kim, Dong-Soo;Park, Heon-Joon;Bang, Eun-Seok;Kim, Sung-Woo
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.1
    • /
    • pp.9-23
    • /
    • 2010
  • In current design practice, the shear wave velocity (Vs) of the core and rock-fill zone of a dam, one of the characteristics essential for seismic response design, is seldom determined by field tests. This is because the borehole seismic method is often restricted in application, due to stabilisation activities and concern for the security of the dam structure, and surface wave methods are limited by unfavourable in-situ site conditions. Consequently, seismic response design for a dam may be performed using Vs values that are assumed, or empirically determined. To estimate Vs for the core and rock-fill zone, and to find a reliable method for measuring Vs, seismic surface wave methods have been applied on the crest and sloping surface of the existing 'M' dam. Numerical analysis was also performed to verify the applicability of the surface wave method to a rock-fill dam. Through this numerical analysis and comparison with other test results, the applicability of the surface wave method to rock-fill dams was verified.

Rock Mechanics Modeling of the Site for the 2nd Step Construction of the KAERI Underground Research Tunnel (KURT) (KURT 2단계 건설부지에 대한 암석역학모델 설정)

  • Jang, Hyun-Sic;Ko, Chi-Hye;Bae, Dae-Seok;Kim, Geon-Young;Jang, Bo-An
    • The Journal of Engineering Geology
    • /
    • v.24 no.2
    • /
    • pp.247-260
    • /
    • 2014
  • Rock masses at the site for the $2^{nd}$ step construction of the KAERI Underground Research Tunnel (KURT) are divided into six units to establish a rock mechanics model that is dependent on the geological characteristics and degree of joint development. The site primarily consists of three granitic units (G1, G2, and G3), two dykes (D1 and D3), and a fault zone of poor rock mass quality (F3). The F3 unit crosses the tunnel at the beginning of the site of $2^{nd}$ step construction. The rock masses of each unit are classified by RMR (Rock Mass Rating), Q-system, and RMi (Rock Mass Index), all based on borehole logging data. The deformation modulus, rock mass strength, cohesion, and friction angle for each unit are calculated using established empirical relationships. The representative rock mass classification and geotechnical parameters for the rock mass units are established, and a rock mechanics model for the site is proposed, which will be useful in the design and stability analysis of the $2^{nd}$ step construction of KURT.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

The Implementation Status of Dental Treatment Infection Control Standards of Dental Hygienists (치과위생사의 치과진료 감염방지기준에 관한 연구)

  • Yoo, Ha-Na;Kang, Kyung-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.649-656
    • /
    • 2013
  • This study was conducted to find out about the implementation status of dental treatment infection control standards of dental hygienists. The subjects of research were the dental hygienists working at dentist offices in Chungnam, Cheonan-si using self-input method from July 25th, 2012 to August 1st 2012. The collected data was analyzed after computerized statistical processing using SPSS 18.0. For hepatitis B vaccination, the results were high with 75.0% of answers being 'yes' or auto-active immunity, but for the latest hepatitis vaccination period showed highest results in '5 years or more ago' with 48.0%. Although 93.0% answered that vaccination was important, the percentage of replies that they had vaccination education was relatively low with 41.0%. For the use of personal protection tools the use of protective goggles was low compared to the use of masks and medical gloves. The percentage of subjects that answered that they always wash their hands before treatment was relatively low with 56.0% compared to 82.0% of subjects that answered that they always washed their hands after treatment. Dental treatment equipment washing before sterilization, use of packing and re-sterilization of tools with damaged packing showed high results for 'yes', but the ratio of subjects that answered 'no' to water line management was low with 39%.

Vertical Upward Air-Water Two-Phase Flow Regime Identification (수직상향류 공기-물 이상유동영역 판별)

  • Lee, Ba-Ro;Jang, Young-Jun;Ko, Min-Seok;Lee, Bo-An;Lee, Yeon-Gun;Kim, Sin
    • Journal of Energy Engineering
    • /
    • v.22 no.4
    • /
    • pp.362-369
    • /
    • 2013
  • Two-phase flow is frequently observed in many industries such as nuclear power plants and oil transportation. Two-phase flow regime depends on the flow rates, the fluid properties and the structure of flow channels. Since the identification of the flow regime is of great importance in the system design and the safety analysis, a number of theoretical and experimental investigations have been performed. This paper presents a basic research on the characteristics of each flow regime and transition boundary in the two-phase flows. The flow regime of the upward air-water flow in the vertical tube, 30 mm in the inner diameter, is distinguished by using the high-speed camera and the Wire-mesh sensor(WMS). The identified experimental data are compared with the flow regime maps proposed by Taitel et al, Mishima and Ishii. Even though there is slight difference in the transition boundary, the experimental data show general agreement with these flow regime maps.