• Title/Summary/Keyword: 콘텐츠 전송

Search Result 964, Processing Time 0.02 seconds

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

A Study on the Evaluation of Nepal's Inclusive Business Solution: Focusing on the Application of OECD DAC Evaluation Criteria (네팔의 포용적 비즈니스 프로그램 평가에 관한 연구: 경제협력개발기구 개발원조위원회 평가기준 적용을 중심으로)

  • Kim, Yeon-Hong;Lee, Sung-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.177-192
    • /
    • 2021
  • The Development Assistance Committee of the Organization for Economic Cooperation and Development discusses the reorganization of the five evaluation criteria of the Public Development Assistance Committee, which are used internationally, and the five evaluation criteria including adequacy, efficiency, effectiveness, impact, and sustainability when assessing public development assistance in 1991. This study is to derive alternatives by applying the evaluation criteria of the Development Assistance Committee of the Organization for Economic Cooperation and Development in the evaluation of the inclusive business program being implemented in Nepal since 2019. As a result of the study, the adequacy of Nepal's inclusive business program was consistent with continuous employment and job creation for vulnerable groups such as disabled and orphan women. Efficiency can be said to be efficient in that processes such as work order and work confirmation are made with an electronic management tool, and delivery of the result is transmitted online, saving time and cost compared to other industries. The effectiveness of this project can be said to be an effective program in that it provides high-quality jobs such as providing specialized computer graphics education for the vulnerable, such as disabled and orphan women in Nepal, and hiring graduates as employees. Sustainability is the point that KOICA's inclusive business program has enabled vulnerable groups in the existing fields of agriculture and manufacturing to engage in the computer graphics industry, and the scalability of movies, characters, education businesses, and role models in other countries.However, considering that the scale of public development assistance will continue to increase in the future, it is necessary to establish a systematic monitoring system and a recirculation system so that the project between the donor and recipient countries can continue.