• Title/Summary/Keyword: 안전마크

Search Result 165, Processing Time 0.024 seconds

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

A Study on the Marine Traffic Congestion by Analysis of Ship's Domain (선박 점용영역 분석을 통한 해상교통혼잡도 고찰)

  • Park, Young-Soo;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.5
    • /
    • pp.535-542
    • /
    • 2014
  • This research concluded that the area is most sensitively affected by the maritime traffic congestion rather than other factors including the ship's speed and fairway width. We performed a literature review for the area used in Japan, Denmark, and Shanghai ports, and analyzed by comparing with the area in Jinhae, Korea through the observation survey of marine traffic. The result of sensitivity analysis concluded that the congestion is affected by amount of 10% by changing 1 knot of the ship's speed, 18% of 100m of the fairway width, and 34%~43% of 1L of ship's length. By applying the result into the current audit system using $8L{\times}3.2L$, $6L{\times}1.6L$, we found that there is big difference with $3.5L{\times}1.5L$ in Japan, $5.9L{\times}2.2L$ in Shanghai, $4L{\times}5B$ in Denmark, and $3L{\times}2L$ in Jinhae, Korea. For this reason, further studies should be carried out in near future to the area mostly affected by congestion.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

Development of Low Sodium Doenjang Using Saltness Boosting Ingredient (염미증강소재를 활용한 저염된장의 개발 -경북지역 발효식품산학연협력사업단 상용화 실적을 중심으로-)

  • Kim, Mi-Yeon;Kim, Sun-Hwa;Kwon, Joong-Ho
    • Food Industry And Nutrition
    • /
    • v.20 no.2
    • /
    • pp.13-17
    • /
    • 2015
  • 국내 상위 10개 업체가 국내 장류시장의 70% 이상을 차지하고 있으나 최근 들어 귀농인구의 증가로 소규모 농가형 장류 생산업체가 급격히 증가하고 있고, 전통식품인증마크 획득 등으로 전통장류 생산업체들은 지역 특산품으로 생산하여 공장형 장류와 차별화를 하고 있다. 이러한 취지에서 경북발효식품산학연협력사업단은 가내 수공업 형태로 군 단위의 지역에 산재해 있는 발효식품 업체를 클러스터 형태로 집적화하고 지역 원료의 활용을 극대화 방향으로 추진하여 전략적 발효산업으로 육성 발전시키며, 발효식품 전문제조업체를 발굴 육성하여 지역 업체의 매출 증대 및 수출 증대에 기여하고자 염미강화 및 보완소재 개발로 고부가가치 저염제품으로 발효식품에의 상용화 기반을 구축하고 있다. 경북지역 재래된장 및 개량된장 업체의 지원을 통해 저염된장을 출시함으로써 연구에 취약한 소규모 전통장류 업체의 매출 증대에 기여하고 정부시책에 발맞추어 국민의 나트륨 섭취를 줄이는데 도움이 되는 고부가가치 저염 발효가공품으로 경쟁력을 강화하고자 노력하고 있다. 앞으로 장류시장의 세계화를 이루기 위해서는 저염 상태에서 발현될 수 있는 이종 미생물 독소, 식중독균 등 오염원균으로부터의 안전성 확보 기술을 가져야 할 것이다.

  • PDF

Satellite Image Watermarking Perspective Distance Decision using Information Tagging of GPS (GPS 정보태깅을 이용한 원근거리 판별 기반의 위성영상 워터마킹)

  • Ahn, Young-Ho;Kim, Jun-Hee;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.837-846
    • /
    • 2012
  • This paper presents a watermarking scheme based on the perspective distance for the secure mash-up service. The proposed scheme embeds the watermark of the location information of satellite image and the user information using edge color histogram, which is dissimilar to general digital image. Therefore, this scheme can trace the illegal distributor and can protect private information of user through the watermarking scheme that is adaptive to satellite image. Experimental results verified that our scheme has the invisibility and also the robustness against geometric attacks of rotation and translation.

Comparison of DBMS Performance for processing Small Scale Database (소용량 데이터베이스 처리를 위한 DBMS의 성능 비교)

  • Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.139-142
    • /
    • 2008
  • While a lot of comparisons of DBMS performance for processing large scale database are given as results of bench-mark tests, there are few comparisons of DBMS performance for processing small scale database. Therefore, in this study, we compared and analyzed on the performance of commercial DBMS and public DBMS for small scale database. Analysis results show that while Oracle has low performance on the operations of update and insert due to the overhead of rollback for data safety, MySQL and MS-SQL have good performance without additional overhead.

  • PDF

Tunable Static Analysis Framework for JavaScript Applications (확장성을 조절할 수 있는 자바스크립트 앱 정적 분석 프레임워크)

  • Ko, Yoonseok;Ryu, Sukyoung
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1404-1409
    • /
    • 2015
  • In this paper, we present a novel approach to analyzing large-scale JavaScript applications statically by tuning the analysis scalability, possibly sacrificing soundness. For a given sound static baseline analysis of JavaScript programs, our framework allows users to define a sound approximation of selected executions that they wish to analyze, and it derives a tuned static analysis that can analyze the selected executions practically. The selected executions serve as parameters of the framework by taking a trade-off between the scalability and the soundness of the derived analyses. We formally describe our framework in the abstract interpretation setting and present two instances of the framework.

Comparison of DBMS Performance for processing Small Scale Database (소용량 데이터베이스 처리를 위한 DBMS의 성능 비교)

  • Jang, Si-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1999-2004
    • /
    • 2008
  • While a lot of comparisons of DBMS performance for processing large scale database are given as results of bench-mark tests, there are few comparisons of DBMS performance for processing small scale database. Therefore, in this study, we compared and analyzed on the performance of commercial DBMS and public DBMS for small scale database. Analysis results show that while Oracle has low performance on the operations of update and insert due to the overhead of rollback for data safely, MySQL and MS-SOL have good performance without additional overhead.

An Watermarking Algorithm for Multimodal Biometric Systems (다중 생체인식 시스템에 적합한 워터마킹 알고리즘)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.93-100
    • /
    • 2005
  • In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarking image.

A Secure Digital Watermarking Scheme based on RSA Function (RSA 함수에 기반한 안전한 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.220-228
    • /
    • 2001
  • Digital watermarking is a technique for the purpose of protecting the ownership of the image by embedding invisible watermarks in a digital imnge. To guarantee the security of the digital watermarking scheme for copyright protection, it is required to satisfy some requirements robustness and perceptual invisibility which provided by the location of embedded bits, the public watermarking algorithm, and the hidden use of the key, which can protect unauthorized accesses from illegal users. For this, in this paper we propose a new copyright watermarking scheme, which is based on one-way hash functions using RSA functions and modular operations. RSA functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(Jeast significant bit) attacks and gamma corresction attack, and is also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments.

  • PDF