• Title/Summary/Keyword: 총격

Search Result 18, Processing Time 0.027 seconds

Improvement of Image Scrambling Scheme Using DPSS(Discrete Prolate Spheroidal Sequence) and Digital Watermarking Application (DPSS(Discrete Prolate Spheroidal Sequence)를 이용한 영상 스크램블링 방식의 개선 및 디지털 워터마킹 응용)

  • Lee, Hye-Joo;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1417-1426
    • /
    • 2007
  • As one of schemes to protect multimedia content. it is the selective encryption scheme to encrypt partially multimedia content. Compared AES(advanced encryption standard) of traditional encryption, the selective encryption scheme provides low security but is applicable to applications of multimedia content not to require high secrecy. In this paper, we improve the image scrambling scheme proposed by Van De Ville which scrambles an image without bandwidth expansion using DPSS(discrete prolate spheroidal sequence) to make it more secure based on Shujun's research which verifies the secrecy of Van De Ville's scheme. The proposed method utilizes an orthonormalized random matrix instead of Hadamard matrix for secret matrix and to add it for providing high secrecy against statistical attack or known-plaintext attack using some statistical property or estimate of secret matrix from a scrambled image. The experimental results show that the proposed method is more secure than the existing scheme. In addition, we show that the proposed method can be applied to access control or copy control of watermarking application.

  • PDF

Password-Authenticated Key Exchange between Clients with Different Passwords (서로 다른 패스워드를 가진 사용자간의 패스워드 인증 키 교환 프로토콜)

  • 변지욱;정익래;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.27-38
    • /
    • 2003
  • Most password-authenticated key exchange schemes in the literature provide an authenticated key exchange between a client and a server based on a pre-shared password. With a rapid change in modem communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated ky exchange between clients based only on their two different Passwords without my Pre-shared secret, so called Client-to-Client Password-Authenticated Key Exchange(C2C-PAKE). Security notions and types of possible attacks are newly defined according to the new framework We prove our scheme is secure against all types of attacks considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm setting and the other in a single-sorrel setting.

Lie Puzzle Dressed up as the Real---Analysis of Reversal Narrative in Hong Kong Film "Project Gutenberg" (거짓으로 진실을 은폐한 거짓 미스터리 - 홍콩영화<무쌍>의 반전서사 분석)

  • Liu, Ruobing
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.1
    • /
    • pp.107-116
    • /
    • 2020
  • The Hong Kong film "Project Gutenberg" has obtained the great achievements at the box office and public reputation due to such multiple factors as realistic counterfeit banknote production process, breathtaking gunfight scenes, brain-burning plot, unexpected reversal ending, personal charm of Chow Yun-Fat and so on. In terms of film narrative, the director utilized the narrator, Li Wen, to guide the police and audience in the limited angle of perspective into the scheme, and make the symbolic meaning image of the actor Chow Yun-Fat stengthen the audience's confirmation for the imagination of "painter", with the introduction of multiple narratives and flashback of different characters and scenes, and then finally, used the narrative structure with multiple lines and layers to uncover the truth. There are three great reversals in the film, each of which is overthrow for the film plot, and every overthrow is a disavowal of the audience's cognition for the previous story; therefore it brings the greatly emotional tension, making the audience get complete release and relief in the process of the psychological game of cognition, identification and decision-making at the end.

A Research of Security Measures in Soft Target against Terrorist Attacks (국내 다중이용시설 테러안전관리 실태 및 개선방안 연구)

  • Oh, Hangil;Ahn, Kyewon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.137-138
    • /
    • 2022
  • 2022년 7월 8일 일본 전 총리 아베는 나라현의 야마토사이다이지 역에서 야마가미 데스야의 사제총격에 심각한 총상을 입고 과다출혈로 사망하였다. 다중이용시설에서의 테러안전관리 미흡으로 인해 발생한 본 사건은 다중이용시설 테러안전관리의 중요성을 보여주는 대표적인 테러사례이다. 국내와 유사한 테러환경을 갖춘 인접국가 일본 발생한 테러사건이므로, 국내 다중이용시설 테러안전관리에 대한 경각심을 일깨워 주고 있다. 대한민국은 세계적으로 높은 인구밀도와 원스톱 서비스의 선호 욕구로 인해 대부분의 다중이용시설들은 운송·판매·문화 및 집회 등의 기능이 다양하게 복합된 시설로 발전해 가고 있어, 테러리스트의 테러대상 선정의 3가지 요건인 접근성(Easy-Access), 상징성(symbolism), 미디어 집중성(Media Attention)을 갖춘 매력적인 테러대상시설이 되어 가고 있다. 또한, 최근 국제테러 동향을 살펴보면, 국가중요시설, 군사시설과 같은 하드 타겟(Hard Target)보다 엔터테인먼트, 문화, 관람, 카지노, 시장, 플라자, 광장, 소매점, 대형마트 등의 판매·문화 및 집회시설인 소프트 타겟(Soft Target)에서 고 위험성의 테러가 높은 빈도로 발생하고 있는 추세로 다중이용시설은 테러안전관리가 절대적으로 필요해져 가고 있다. 이에 반해, 국내 다중이용시설 테러안전관리를 위한 지도·점검 및 시설 취약요인 사전제거 활동 등 대부분의 대테러 활동이 미흡한 실정이다. 국내에서 소프트 타겟은 『테러방지법 제25조 시행령』(테러대상시설 및 테러이용수단 안전 대책 수립)과 『테러대상시설 및 테러이용수단 시설의 안전대책에 관한 규정』에 따라 정부에서는 대테러 활동을 매년 상시적으로 하고 있지만, 아직까지 부족한 실정이다. 따라서 본 연구에서는 현 다중이용시설의 테러안전관리 문제점과 취약점을 살펴보고, 이에 대한 개선방안을 제시하고자 하였다.

  • PDF

A study on possibility of soft target terrorism by ISIS in South Korea (자국내 IS테러단체에 의한 소프트타깃 테러발생 가능성에 대한 연구)

  • Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.85-117
    • /
    • 2016
  • These days, ISIS terrorists have been expanding not only to european countries, but also to asian countries so South Korea is no longer safe from terrorists' attacks. Especially, 'soft target terrorism' makes many people maximizing fear of terrorism because it is caused by small groups - those who are armed with small arms and light weapons - and they are able to carry out hit and run attacks on civilian targets. It poses even more dangerous to kill massively. That is why November 2015 Paris attacks and January 2016 Jakarta attacks killed and injured many people because of 'soft target terrorism.' Therefore, the South Korea has also recognized the seriousness of terrorism by ISIS. The study has shown the precautionary measures about 'soft target terrorism' and how to defend against 'soft target terrorism' by looking through overseas examples. It is for the possibilities of 'soft terrorism' in South Korea because of the expansion of ISIS. As a result, 'soft target terrorism', caused by ISIS, could happen in South Korea. The counterplan is as in the following. First of all, 'soft target terrorism', which is collaborated with ISIS and domestic terrorists, could be caused by negative awareness of foreign residents and xenophobia so the public should change stereotypes about the foreign residents and there should be legislation about racial discrimination enacted by parliament and the government must practice the law. Second, the Korean anti-terrorism laws should be modified to minimize violations of human rights, related to the Korean citizens' personal information, and to stop the concentration of power into the hands of one law enforcement. Third, the government has to develop and to initiate the refuge&evacuation simulation, which prepares for 'soft target terrorism' and minimizes the damages if terrorists attack hot spots like central commercial areas or event halls.

  • PDF

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A study on the risks of terrorism raids in domestic occurring through of the Islamic State of IS terrorist groups (IS테러단체의 공습확대에 따른 자국 내 테러발생 위험성에 관한 연구)

  • Oh, Sei-Youen;Yun, Gyeng-Hui
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.277-308
    • /
    • 2015
  • Recently the Japanese hostage crisis with Syria, the stake of the pilots IS of the terror group's affiliates like Kim incident occurred while urinarado IS not an exception anymore in connection with terrorism will not be able to do. In addition, particularly against terrorist groups worldwide, IS being a hero has been marginalized and wants uncritical drugs aimed at teens, such as dialog or game IS through SNS joined nationals as well as other countries, while recommending domestic complaints until the people power or luck, put the older brother can sign up for any terror group IS the terrorist group's terrorist acts while making the environment a national mark by foreigners or immigrants can be caused by the situation. Therefore, in this study, this IS serious for the terrorist acts of the terrorist group, IS due to the expansion of the domestic terrorist group caused the terror raids of about the dangers of foreign countries to review the case, and the incident has sought ways to prevent and respond to the rapporteur. The result IS due to the expansion of the domestic terrorist group caused the terror raids of the dangers of sex exists and that causes a response to the implements are as follows. First of all, IS brokering for the site of the terrorist group's approach to counter-terrorism Act will be a, and the next, each agency and terror for the information exchange and cooperation and serves as a reexamination of terror occurred through the quick and appropriate measures should be the language. Finally, the duties related to terrorism for teens, especially education and strengthen the safety program development and against terrorism should be carried out.

  • PDF

Homograft Aortic Root Replacement (동종이식편을 이용한 대동맥 근부 치환술)

  • Kim Jae Hyun;Oh Sam Sae;Lee Chang-Ha;Baek Man Jong;Kim Chong Whan;Na Chan-Young
    • Journal of Chest Surgery
    • /
    • v.38 no.3 s.248
    • /
    • pp.197-203
    • /
    • 2005
  • Homograft aortic valve replacement (AVR) has many advantages such as excellent hemodynamic performance, faster left ventricular hypertrophy regression, resistance to infection and excellent freedom of thromboembolism. To find out the results of homograft AVR, we reviewed our surgical experiences. Material and Method: Eighteen patients (male female=16 : 2, mean age=39.3$\pm$16.2 years, range: 14$\~$68 years) who underwent homo-graft aortic valve replacement between May 1995 and May 2004 were reviewed. The number of homografts was 20 (17 aortic and 3 pulmonic homografts) including two re-operations. Ten patients had a history of previous aortic valve surgery. Indications for the use of a homograft were native valve endocarditis (n=7), prosthetic valve endocarditis (n=5), or Behcet's disease (n=8). The homograft had been implanted predominantly as a full root except in one patient in the subcoronary position. Result: Mean follow-up was 41.3 $\pm$ 26.2 months. There was one operative mortality. Postoperative complications included postoperative bleeding in 3 patients, and wound infection in 1. There was no late death. Three patients underwent redo-AVR. The etiology of the three reoperated patients was Behcet's disease (p=0.025). Freedom from reoperation was $87.5\pm8.3\%$, $78.8\pm11.2\%$ at 1, 5 years respectively, In patients with infective endocarditis, there was no recurrence of endocarditis. There was no thromboembolic complication. Conclusion: Although longer term follow-up with larger numbers of patients is necessary, the operative and mid-term results for homograft AVR was good when we took into account the operative risks of Behcet's disease or infective endocarditis. Behest's disease was a risk factor for reoperation after the homograft AVR. We think homograft AVR is the procedure of choice, particularly in patients with infective endocarditis.