• Title/Summary/Keyword: 위.변조

Search Result 476, Processing Time 0.045 seconds

Secure Implementation of Flash Game Using ARM TrustZone (ARM TrustZone을 이용한 안전한 플래시 게임 구현)

  • Ji-Hyeon Yoon;Ae-Rin Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.192-193
    • /
    • 2023
  • 게임 산업의 성장에 맞춰 그에 따른 게임시스템 보안, 무결성 보장의 중요성 또한 커지고 있다. 본 논문에서는 게임 시스템과 TrustZone을 결합시켜 TrustZone의 Normal World와 Secure World 영역과 그 기능을 활용하여 게임 내 주요 데이터의 위·변조를 방지하여 시스템의 무결성을 보다 높은 수준에서 보장하는 방식을 탐구해보고자 한다.

Optical Design of a Subminiature Catadioptric Omnidirectional Optical System with an LED Illumination System for a Capsule Endoscope (LED 조명계를 결합한 캡슐내시경용 초소형 반사굴절식 전방위 광학계의 설계)

  • Moon, Tae Sung;Jo, Jae Heung
    • Korean Journal of Optics and Photonics
    • /
    • v.32 no.2
    • /
    • pp.68-78
    • /
    • 2021
  • A subminiature catadioptric omnidirectional optical system (SCOOS) with 2 mirrors, 6 plastic aspherical lenses, and an illumination system of 6 light emitting diodes, to observe the 360° panoramic image of the inner intestine, is optically designed and evaluated for a capsule endoscope. The total length, overall length, half field of view (HFOV), and F-number of the SCOOS are 14.3 mm, 8.93 mm, 51°~120°, and 3.5, respectively. The optical system has a complementary metal-oxide-semiconductor sensor with 0.1 megapixels, and an illumination system of 6 light-emitting diodes (LEDs) with 0.25 lm to illuminate on the 360° side view of the intestine along the optical axis. As a result, the spatial frequency at the modulation transfer function (MTF) of 0.3, the depth of focus, and the cumulative probability of tolerance at the Nyquist frequency of 44 lp/mm and MTF of 0.3 of the optimized optical system are obtained as 130 lp/mm, -0.097 mm to +0.076 mm, and 90.5%, respectively. Additionally, the simulated illuminance of the LED illumination system at the inner surface of the intestine within HFOV, at a distance of 15.0 mm from the optical axis, is from a minimum of 315 lx to a maximum of 725 lx, which is a sufficient illumination and visibility.

Optical Design of a Reflecting Omnidirectional Vision System for Long-wavelength Infrared Light (원적외선용 반사식 전방위 비전 시스템의 광학 설계)

  • Ju, Yun Jae;Jo, Jae Heung;Ryu, Jae Myung
    • Korean Journal of Optics and Photonics
    • /
    • v.30 no.2
    • /
    • pp.37-47
    • /
    • 2019
  • A reflecting omnidirectional optical system with four spherical and aspherical mirrors, for use with long-wavelength infrared light (LWIR) for night surveillance, is proposed. It is designed to include a collecting pseudo-Cassegrain reflector and an imaging inverse pseudo-Cassegrain reflector, and the design process and performance analysis is reported in detail. The half-field of view (HFOV) and F-number of this optical system are $40-110^{\circ}$ and 1.56, respectively. To use the LWIR imaging, the size of the image must be similar to that of the microbolometer sensor for LWIR. As a result, the size of the image must be $5.9mm{\times}5.9mm$ if possible. The image size ratio for an HFOV range of $40^{\circ}$ to $110^{\circ}$ after optimizing the design is 48.86%. At a spatial frequency of 20 lp/mm when the HFOV is $110^{\circ}$, the modulation transfer function (MTF) for LWIR is 0.381. Additionally, the cumulative probability of tolerance for the LWIR at a spatial frequency of 20 lp/mm is 99.75%. As a result of athermalization analysis in the temperature range of $-32^{\circ}C$ to $+55^{\circ}C$, we find that the secondary mirror of the inverse pseudo-Cassegrain reflector can function as a compensator, to alleviate MTF degradation with rising temperature.

Optical Design of a Modified Catadioptric Omnidirectional Optical System for a Capsule Endoscope to Image Simultaneously Front and Side Views on a RGB/NIR CMOS Sensor (RGB/NIR CMOS 센서에서 정면 영상과 측면 영상을 동시에 결상하는 캡슐 내시경용 개선된 반사굴절식 전방위 광학계의 광학 설계)

  • Hong, Young-Gee;Jo, Jae Heung
    • Korean Journal of Optics and Photonics
    • /
    • v.32 no.6
    • /
    • pp.286-295
    • /
    • 2021
  • A modified catadioptric omnidirectional optical system (MCOOS) using an RGB/NIR CMOS sensor is optically designed for a capsule endoscope with the front field of view (FOV) in visible light (RGB) and side FOV in visible and near-infrared (NIR) light. The front image is captured by the front imaging lens system of the MCOOS, which consists of an additional three lenses arranged behind the secondary mirror of the catadioptric omnidirectional optical system (COOS) and the imaging lens system of the COOS. The side image is properly formed by the COOS. The Nyquist frequencies of the sensor in the RGB and NIR spectra are 90 lp/mm and 180 lp/mm, respectively. The overall length of 12 mm, F-number of 3.5, and two half-angles of front and side half FOV of 70° and 50°-120° of the MCOOS are determined by the design specifications. As a result, a spatial frequency of 154 lp/mm at a modulation transfer function (MTF) of 0.3, a depth of focus (DOF) of -0.051-+0.052 mm, and a cumulative probability of tolerance (CPT) of 99% are obtained from the COOS. Also, the spatial frequency at MTF of 170 lp/mm, DOF of -0.035-0.051 mm, and CPT of 99.9% are attained from the front-imaging lens system of the optimized MCOOS.

The Secure Hybrid Authentication message protocol (안전한 하이브리드 인증 메시지 프로토콜)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.77-85
    • /
    • 2007
  • Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.

  • PDF

A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems (저전력 RFID 시스템을 위한 해시 체인 기반의 경량화 된 상호 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.560-566
    • /
    • 2009
  • A low-power Radio Frequency Identification (RFID) system is an auto-identification technology that reads and writes an information of things without physical contacts using radio frequency. It is unescapable against unlawful modification, eavesdropping, tracking, or privacy of individuals because RFID systems use the radio frequency and RFID tags. Therefore we create a key using hash chain between database and tag and this process can prevent above attacks. Also we support the efficiency of proposed protocol using hash function to abate computation.

Understanding and Applications of Blockchain-based Decentralized Identitiy (블록체인 기반 분산신원증명의 이해와 서비스 적용 사례)

  • Kwon, Jun-Woo;Seo, Seung-Hyun;Lee, Kang-Hyo;Park, So-Hyeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.309-312
    • /
    • 2021
  • 최근 사회는 디지털기술을 기반으로 비대면전환이 빠르게 이루어지고 있다. 이에 디지털 신분증과 디지털 신원인증에 대한 관심이 증가하고 있다. 기존 오프라인에서 사용되고 있는 플라스틱 신분증은 분실 및 위·변조의 위험성이 존재한. 또한 현재 온라인에서 널리 사용되고 잇는 신원인증 모델들을 데이터의 주권이 사용자가 아닌 서비스 제공자에게 있다는 문제점이 있다. 위와 같은 문제들을 해결하고 사용자의 신원정보를 효과적으로 관리하기 위해 분산신원증명의 필요성이 제기되었다. 본 논문에서는 분산신원증명의 구조와 서비스 적용 사례에 대해 살펴본다.

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.355-364
    • /
    • 2011
  • In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.