• Title/Summary/Keyword: 정보복제

Search Result 783, Processing Time 0.028 seconds

PUF-based Secure FANET Routing Protocol for Multi-Drone

  • Park, Yoon-Gil;Lee, Soo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.81-90
    • /
    • 2020
  • In order to operate multi drone efficiently, existing control methods must be improved, and drones must be able to construct communication networks autonomously. FANET(Flying Ad-Hoc Network), which is being considered as an alternative to solving these problems, is based on ad hoc network technology and can be exposed to a variety of security vulnerabilities. However, due to the limited computational power and memory of FANET nodes, and rapid and frequent changes in network topology, it is not easy to apply the existing security measures to FANET without modification. Thus, this paper proposes lightweight security measures applicable to FANET, which have distinct characteristics from existing ad hoc networks by utilizing PUF technology. The proposed security measures utilize unique values generated by non-replicable PUFs to increase the safety of AODV, FANET's reactive routing protocol, and are resistant to various attacks.

Performance Enhancement and Evaluation of AES Cryptography using OpenCL on Embedded GPGPU (OpenCL을 이용한 임베디드 GPGPU환경에서의 AES 암호화 성능 개선과 평가)

  • Lee, Minhak;Kang, Woochul
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.303-309
    • /
    • 2016
  • Recently, an increasing number of embedded processors such as ARM Mali begin to support GPGPU programming frameworks, such as OpenCL. Thus, GPGPU technologies that have been used in PC and server environments are beginning to be applied to the embedded systems. However, many embedded systems have different architectural characteristics compare to traditional PCs and low-power consumption and real-time performance are also important performance metrics in these systems. In this paper, we implement a parallel AES cryptographic algorithm for a modern embedded GPU using OpenCL, a standard parallel computing framework, and compare performance against various baselines. Experimental results show that the parallel GPU AES implementation can reduce the response time by about 1/150 and the energy consumption by approximately 1/290 compare to OpenMP implementation when 1000KB input data is applied. Furthermore, an additional 100 % performance improvement of the parallel AES algorithm was achieved by exploiting the characteristics of embedded GPUs such as removing copying data between GPU and host memory. Our results also demonstrate that higher performance improvement can be achieved with larger size of input data.

Development of Digital Watermarking Technology to Protect Cadastral Map Information

  • Kim, Jung-Yeop;Lee, Hyun-Joon;Hong, Sung-Eon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.57-65
    • /
    • 2010
  • This research aimed to prevent illegal distribution and reproduction of digital cadastral map information using digital watermarking. To this end, a digital watermarking was developed in consideration of the properties of cadastral maps and based on watermarking methods, after which its performance was evaluated. A watermark key and a one-way function was used to compensate for the algorithm and, therefore, watermarking security, based on the existing research results. In these ways, the present method meets the requirements for fidelity, robustness, false positive rate and the maintenance of consistent topology. The advanced techniques suggested in this paper were devised so as to be suitable for vector data such as GIS and navigation data as well as cadastral maps. Moreover, if the existing methodology is further improved, it could be expected to be used even more widely.

Language-generating-Power of HRNCE Grammars (HRNCE 문법의 언어 생성력)

  • Jeong, Tae-Ui;Park, Dong-Seon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1659-1668
    • /
    • 1996
  • Graph grammars generate graph languages while string grammars generate string languages which are the subset of graph languages. One of the most successful graph grammars models is the NLC grammars, which gen-erate graphs by replacing a node by a node by a graph through node labels. For grammars generating hypergraphs which are the superset of graphs, there are CFHG grammars, which replace a hyperedge by a hypergraph through their preidentified gluing points, an extension of CFHG grammars called HH grammars, which replace a handle by a hypergraph through the rewriting mechanism that can also duplicate or delete the hyperedges surrounding the replaced handle, and finally HRNCE grammars, which replace a handle by a hypergraph through an eNCE way of rewriting, In this paper, we compare the language-generating power of HRNCE grammars with that a graph grammars mentioned above by comparing graph langrages generated by them, respecti vely.

  • PDF

MissCW:Multiuser Interactive System for Synchronous Collaborative Writing (MissCW:다중 사용자 동기적 공동 저작 시스템)

  • Seong, Mi-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1697-1706
    • /
    • 1996
  • This paper presents the design and the implementation of a MissCW(Multi user Interactive System for Synchronous Collaborative Writing). The document model DMDA(Distributed Multimedia Document Architecture) of MissCW consists of the logical structure, presentation style object, and mark object. The windows. The collaborative editor of this system proposes a structure oriented editing mechanism to combine distrbuted objects into one document. The middleware SOM(Shared Object Manager) maintains shared objects consistently and helps application programs use objects efficiently. The infrastructure of this system is a hybrid structure of replicated and centralized architectures, that is to maintain shared objects consistently inside of SOM and to reduce the overhead of network traffic. The central part is a virtual node which corresponds to the Object Controller of SOMwith the SOT(Shared Objet Table).

  • PDF

How Protect Terrestrial Broadcast Contents? KBS' Systematic Strategy to Restrict Illegal Use (지상파 방송프로그램 어떻게 보호할 것인가? KBS의 방송프로그램 보호 전략)

  • Kim, Byung-Sun;Cho, In-Joon;Hahm, Sang-Jin;Lee, Keun-Sik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.208-211
    • /
    • 2010
  • 2012년 지상파 방송은 아날로그 송출을 종료하고 디지털 방송으로 전환된다. 이렇게 전환되는 지상파 디지털 방송은 무료로 누구나 시청할 수 있는 보편적 서비스를 지향하기 때문에, 케이블TV, 위성TV, IPTV 등의 다른 매체와는 달리 기술적 보호조치 없이 방송되고 있다. 또한 DTV 방송프로그램은 원본과 똑같은 화질로 개인이 쉽게 저장할 수 있고 인터넷을 통하여 누구나 쉽게 접근이 가능하기 때문에, DTV 방송프로그램의 무단복제와 인터넷을 통한 불법재배포는 큰 문제점으로 대두되고 있다. 이러한 불법 대량배포는 방송프로그램의 저작권을 심각히 침해할 뿐만 아니라, 방송사의 고품질의 방송프로그램을 제작환경을 더욱 열악하게 만들고 있다. 또한 일반 사용자는 인식하지 못하는 사이에 인터넷을 통해 불법 콘텐츠를 사용하게 되는 악순환에 빠지게 된다. 이에 본 논문은 KBS에서 추진하고 있는 여러 콘텐츠 보호 기술들을 하나의 보호 고리로 연결하는 KBS 보호기술 체계를 소개하고자 한다. 이를 위하여 KBS는 아래의 3가지 보호 기술을 개발하여 체계적으로 연결하여 적용하고 있다. 첫째, 프로그램의 저작권과 배포 정보를 나타내는 프로그램 보호신호(PPI, Program Protection Information)와 워터마크를 방송 신호에 삽입하여 수신기에서의 프로그램 보호를 추진한다, 둘째, 인터넷 OSP(Online Service Provider)와의 제휴를 통하여 콘텐츠 필터링 기술을 도입하여 프로그램 불법 업로드, 다운로드를 방지한다. 셋째, KBS 저작물 인터넷 모니터링 시스템을 개발하여 인터넷 상의 불법 프로그램 배포정보를 획득하여 불법배포가 진행되는 사이트에 보호를 요청한다.

  • PDF

Zero-Watermarking based on Chaotic Side Match Vector Quantization (무질저한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyung-Do;Park, Chan-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.37-44
    • /
    • 2009
  • Digital watermarking is a technology for preventing illegal copying, for protecting intellectual property rights and copyrights, and for suggesting grounds of the ownership by inserting watermarks into digital contents. Generally speaking, watermarking techniques cannot escape from data distortion and quality degradation due to the watermark insertion. In order to overcome the shortcoming, zero-watermarking techniques which do not change the original data have been proposed recently. This paper proposes CSMVQ(Chaotic SMVQ), a zero-watermarking system for SMVQ(Side Match Vector Quantization) which shows better compression ratio and quality and less blocking effect than VQ(Vector Quantization). In SMVQ, compression progresses from left top to right bottom in order to use the information of the two neighbor blocks, so it is impossible to insert watermarks chaotically. In the process of encoding, CSMVQ dynamically considers the information of the (1 to 4) neighbor blocks already encoded. Therefore, watermark can be inserted into digital contents in chaotic way. Experimental results show that the image quality compressed by CSMVQ is better than that of SMVQ and the inserted watermark is robust against some common attacks.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.

A Mobile Multimedia Auction System (모바일 멀티미디어 경매 시스템)

  • Ahn, Hoo-Young;Ryu, Ki-Young;Park, Young-Ho;Ha, Sun-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.320-332
    • /
    • 2007
  • Recently, new interests on digital contents and UCC(User Created Content)s are growing fast through the development of internet. However, there have been many side-effects on those interests. The representative problems are perversing illegal copies and the distributions for personal valuable digital contents to unauthorized anonymous users. These decrease creation of good digital contents by interfering with the growth of information technology industry and the content provider#s creative will. To resolve these problems, in the paper, we propose a novel auction system for multimedia contents and bidding processes. The system applies the concept of used goods onto digital contents. Especially, the auction system is based on mobile environment. Finally, the performance evaluation shows that those main auction process algorithms indicate the time complexity of logarithm scale for insertions and searches. Therefore, the performance of the system is not significantly influenced by the amount of contents even though the volume of contents in the system is increasing.

A Interoperable Digital Content Protection System Based on DMP (DMP 기반의 상호운용 가능한 디지털 콘텐츠 보호 시스템)

  • Hao, Ri-Ming;Choi, Bong-Kyu;Yoon, Hwa-Mok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.626-629
    • /
    • 2007
  • The digital content was supplied quickly with advancement of video compressive technique and the network. Simultaneously illegal copy and diffuse via Internet, it was caused to necessitate the intellectual property right protection of the digital content. With this background, Various standardization groups and content provision enterprises developed the solution for a digital content protection. But the problem which lack interoperability is appeared, cause of independent development among other equipment. To find solution about this, MPEG(Moving Picture Experts Group) has progressed standardization against IPMP (Intellectual Property Management and Protection) techniques which are possible interoperability. In spite of it, with reason why insufficient function, DMP(Digital Media Project) standard was presented with the alternative against this. In this paper, we analyze MPEG IPMP standards and DMP ToolPack concepts to compare between them, and through these, designed and implemented digital content protection system which possible interoperability.

  • PDF