• Title/Summary/Keyword: 신뢰 군사 영역

Search Result 14, Processing Time 0.028 seconds

The High-Reliable Image Authentication Technique using Histogram Compensation (히스토그램 보정을 이용한 고신뢰성 영상 인증 기법)

  • Kim, Hyo-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1088-1094
    • /
    • 2010
  • Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.

Dynamically Acquired Point Cloud Compression Method based on Video based Point Cloud Compression (V - PCC 기반 동적 획득 포인트 클라우드 압축 방안)

  • Kim, Junsik;Im, Jiheon;Kim, Kyuheon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.185-188
    • /
    • 2019
  • 3D 영상 데이터 중 하나인, 포인트 클라우드는 3 차원 데이터를 정밀하게 획득 할 수 있다는 장점으로 인해 군사, 교육, 의료, 건축 등의 다양한 분야에서 사용되고 있다. 특히, 자율 주행 분야에서 사용되는 동적 획득 포인트 클라우드는 광범위한 영역을 표현하므로 방대한 양의 데이터를 갖고 있어, 효율적인 압축이 필수적이다. 비디오 코덱을 활용하여 3 차원 데이터 압축을 진행하는 V - PCC 의 경우, 신뢰성과 범용성이 높다는 장점이 있으나, 2D 비디오 영상을 활용하기 때문에 대용량 및 광범위한 데이터의 압축이 불가능하다는 한계를 지니고 있다. 따라서, 본 논문에서는 V- PCC 의 한계를 극복하고, 광범위한 영역의 정보를 표현하는 동적 획득 포인트를 압축하기 위해 포인트 클라우드를 분할 및 양자화하는 방안을 제시하였다.

  • PDF

Analysis on North Korea Information Research Trend in Korea (최근 북한정보 연구동향에 대한 분석)

  • MYUNG, JAE JIN;LEE, HAN TAE
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.3-27
    • /
    • 2015
  • The purpose of this research is to analyze research trend of 400 north korea information studies from 2010 to 2014 in korea. The research has narrowed the scope of analysis in five fields : political diplomacy, economy, the military, social culture, human rights in north korea. The result of this research shows that each field evenly counts for 20% of the entire research. According to the types of publications, not only research papers but also graduate theses and books comprise a large proportion of the north korea information study. In the past, the north korea information study focused on political diplomacy and the military, but this research revealed different outcome. Now the study of north korea information has wide variety of subject, but it requires a qualitative growth. It remains still the problem of credibility in research data.

Application of Multi-agent Based Simulation for Improving the Credibility of Combat Effectiveness Analysis (전투효과분석 신뢰성 향상을 위한 다중에이전트 시뮬레이션 적용방안)

  • Lee, Jaeyeong;Shin, Sunwoo;Kim, Chongman;Shin, Seungjung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.107-114
    • /
    • 2017
  • In general, credibility for some analysis results is very important to most decision makers. Especially, it is even more critical for military commander to choose the best course of action by using the simulation results when he want to decide to allocate his available weapon system assets. Therefore, improving the credibility of simulation output is one of the key issues in military research fields. In this paper, we proposed a new simulation framework to improve the credibility of weapon's effectiveness analysis results. Multi-agent based simulation tool is applied and compare current process to the proposed framework. We also showed an example case when a communication repeaters are installed to expand the commanding area scope. The example clearly tells why this new simulation framework is more efficient and improve the credibility of simulation results.

IC Package 기술개발 동향

  • O, Haeng-Seok;Jeong, Cheol-O;Jo, Jin-Ho;Sin, Seong-Mun
    • Electronics and Telecommunications Trends
    • /
    • v.4 no.4
    • /
    • pp.17-33
    • /
    • 1989
  • Hermetic 패키지는 재질 특성상 Plastic 패키지보다 환경내구성이 우수하고 수명이 긴 장점이 있으나, 가격이 높고 사용자의 주문에 의한 수작업으로 수급이 어려운 단점이 있다. 한편 Plastic 패키지는 가격이 낮고 수급이 용이한 반면 환경 특히 습기로 인한 고장으로 Hermetic 패키지보다 신뢰도가 낮아서 고신뢰도를 요구하는 군사용 및 산업용기기에서의 사용은 기피되어 왔다. 그러나 최근 Plastic 패키지의 단점을 개선하려는 노력으로 반도체칩의 수율 향상과 더불어 습기에 강한 재료가 개발되고 웨이퍼 제조기술이 발전됨에 따라 Plastic 패키지의 신뢰도가 향상되어 통신기기등 산업용 기기에까지 사용영역을 확대해 가고 있다. 또한 국내의 통신시장 개방에 따라 통신시스팀의 성능개선 및 신뢰성 제고를 통한 대외 경쟁력이 요구되어 통신시스팀에 Plastic 패키지 사용에 대한 인식이 증대하는 추세이다. 본고에서는 IC 패키지(Hermetic, Plastic)의 특성 및 성능을 비교 분석하고 이와 병행하여 Plastic 패키지의 최근 기술동향을 파악함으로써 통신시스팀에 사용하는 IC 패키지에 대한 고려사항을 제시하였다.

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.

Analysis of the Causes of Israel's Failure to Deter war and Implications for Korea's Security Strategy (이스라엘의 전쟁억제 실패원인과 한국의 안보전략적 함의)

  • Il Soo Bae;Hee Tae Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.31-35
    • /
    • 2024
  • On October 7, 2023, Hamas launched a large-scale surprise attack against Israel and war broke out. On this day, in addition to supplying rockets, they directly invaded Israeli territory in multiple areas using parariders and motorcycles. Considering the security situation on the Korean Peninsula, it is meaningful to consider why Israel allowed Hamas to attack and why it failed to deter the war in advance. Deterrence can only be successful if it is supported by capability, will, communication, and credibility. Although the capability and will were sufficient, and the communication through punitive deterrence had been sufficiently communicated, the failure to deter this war was problematic in terms of credibility. In order to increase deterrence against North Korea's threat, we need to improve customized extended deterrence, convey the will of both Korea and the United States to deter, and increase credibility in deterrence capabilities and execution ability.

ASIT for Efficient energy management of Sensor node In Wireless Sensor Networks (무선 센서 네트워크에서 센서 노드의 효율적 에너지 관리를 위한 ASIT)

  • Lee, Jong-Seung;Doo, Kyoung-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.369-372
    • /
    • 2008
  • 무선 센서 네트워크(WSN)는 소규모, 저비용, 저전력 지능형의 센서 노드로 구성되고, 원격 환경 감시와 군사작전 및 재난 상황 등에 응용 될 수 있는 기술이다. 이러한 센서 네트워크에서 구성된 노드의 에너지 공급은 독립된 소형배터리를 통해 이루어진다. 따라서 각 노드에서의 에너지의 효율적인 관리가 무선 센서 네트워크의 최대 쟁점이 되고 있다. 본 논문에서는 이러한 노드의 제한된 배터리 자원을 보다 효율적으로 유지 관리하기 위한 방법으로 ASIT(Advanced Sensing Interval Time) 알고리즘을 제안한다. 제안된 ASIT란 입력된 센싱 값의 변화와 센서 노드의 에너지 잔여량에 따라 센싱 주기를 제어 관리하는 방법으로 이에 대한 모델링을 수립하고, 실제 노드 관리 결과와 모델링 된 결과의 오차를 관찰하여 적중율을 향상하는 기법을 제안한 것이다. 제안된 ASIT의 알고리즘으로부터 센서 노드의 수명을 향상 시켜 궁극적으로는 무선 센서 네트워크 전체의 망 접속의 신뢰성과 노드 관리 수명을 연장시키며, 망의 토폴로지 구성의 측면에서는 전체적인 영역의 커버리지를 향상시키는 동시에 제한된 배터리 자원을 효율적으로 관리 할 수 있는 걸과를 얻게 된다.

  • PDF

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

A Self-Deployment Scheme Using Improved Potential Field in Mobile Sensor Networks (이동 센서 네트워크에서 개선된 포텐셜 필드를 사용한 자율 배치 방법)

  • Lee, Heon-Jong;Kim, Yong-Hwan;Han, Youn-Hee;Jeong, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.106-116
    • /
    • 2010
  • Sensor deployment makes an effect on not only covering of the interesting area but also reliable data acquisition and efficient resource management of sensor, so that sensors must be deployed at their better place. In traditional static wireless sensor networks, however, it is impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. Therefore, if each sensor has locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon is efficient for extending the coverage area. In this paper, we present an improved potential-field-based sensor self-deployment scheme by combining the centroid of Voronoi polygon with the traditional potential-field scheme. Simulation results show that our scheme can achieve higher coverage in shorter time and less movement than the traditional potential-field scheme.