• Title/Summary/Keyword: Authenticate

Search Result 291, Processing Time 0.025 seconds

Ensuring Consumer Safety: Molecular Authentication of Eurycoma longifolia Derivative Products in the Wood Science and Technology Industry

  • Arida SUSILOWATI;Henti Hendalastuti RACHMAT;Kusumadewi Sri YULITA;Asep HIDAYAT;Susila SUSILA;Nawwall ARROFAHA;Irsyad KAMAL;Fifi Gus DWIYANTI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.4
    • /
    • pp.343-362
    • /
    • 2024
  • Eurycoma longifolia (pasak bumi) is a popular medicinal plant in Indonesia and is widely used in various products. Its high economic value has caused illegal harvesting and product falsification. Using molecular techniques, the authentication and traceability of E. longifolia derivatives can be controlled to ensure consumer safety. Therefore, this study aimed to authenticate the products and derivatives of E. longifolia (pasak bumi) produced, marketed, and consumed in Indonesia using molecular identification techniques. Genomic DNA from 37 leaf samples collected from the Sumatran mainland and the Riau Islands and six E. longifolia products were amplified and sequenced using trnL-trnF and internal transcribed spacer (ITS) regions. The results revealed that all leaf samples were indeed E. longifolia based on the markers used, with the six products, only the herbal tea product (sample code TCPB) was most likely derived from E. longifolia based on the two regions, suggesting that not all products labelled as E. longifolia in the market are authentic. The results also indicated that several other plants species are used as substitutes or adulterants, including Simaba spp., Simarouba spp., Homalolepis spp., Vernonia gigantea, Elephantopus scaber, Gymnanthemum amygdalinum, Cyanthillium spp., Potentilla lineata, Ailanthus altissima, Geijera paniculata, Hannoa chlorantha, and Dalbergia spp. Klebsiella pneumoniae bacteria were also identified in this study on the outer wooden cup of E. longifolia products. Therefore, this molecular approach is effective in identifying the authenticity of E. longifolia products, with trnL-trnF and ITS as the recommended DNA markers.

Input Certification protocol for Secure Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.103-112
    • /
    • 2024
  • This study was initiated with the aim of authenticating that inputs have not been tampered with without disclosing them in the case of computations where multiple inputs are entered by participants using the same key. In general, in the authentication stage, authentication is performed after the input value is disclosed, but we do not want to reveal the inputs until the end. This is a case of deviating from the traditional security model in which malicious participants exist in cryptography, but it is a malicious attack method that can actually occur enough. Privacy infringement or distortion of calculation results can occur due to malicious manipulation of input values. To prevent this, this study studied a method that can authenticate that the message is not a modified message without disclosing the message using the signature system, zero-knowledge proof, and commitment scheme. In particular, by modifying the ElGamal signature system and combining it with the commitment scheme and zero-knowledge proof, we designed and proved a verification protocol that the input data is not a modified data, and the efficiency was improved by applying batch verification between authentication.

Fast and Secure Handoff Mechanism for IEEE 802.11i System (IEEE 802.11i 환경에서 신속하고 보안성 있는 핸드오프 메커니즘)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.159-167
    • /
    • 2006
  • IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLAN where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a fast and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused before the handoff session terminates. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

Authentication and classification of strawberry varieties by analysis of their leaves using near infrared spectroscopy.

  • Lopez, Mercedes G.
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1617-1617
    • /
    • 2001
  • It is well known now that near infrared spectroscopy (NIRS) is a fast, no destructive, and inexpensive analytical technique that could be used to classify, identify, and authenticate a wide range of foods and food items. Therefore, the main aims of this study were to provide a new insight into the authentication of five strawberry (Fragaria x ananassa) varieties and to correlate them with geographical zones and the propagating methods used. Three weeks plants of five different strawberry varieties (F. x ananassa Duch. cv Camarosa, Seascape, Chandler, F. Chiloensis, and F. Virginiana) were cultivated in vitro first and then transferred to pots with special soil, and grown in a greenhouse at CINVESTAV, all varieties were acquired from California (USA). After 18 months, ten leaves from each variety were collected. Transmission spectra from each leave were recorded over a range of 10, 000-4, 000 cm$-^{1}$, 32 scans of each strawberry leave were collected using a resolution of 4 cm$-^{1}$ with a Paragon IdentiCheck FT-NIR System Spectrometer. Triplicates of each strawberry leave were used. All spectra were analyzed using principal component analysis (PCA) and soft independent modeling class analogy (SIMCA). The optimum number of components to be used in the regression was automatically determined by the software. Camarosa was the only variety grown from the same shoot but propagated by a different method (direct or in vitro). Five different classes (varieties) or clusters were observed among samples, however, larger inter class distances were presented by the two wildtype samples (F. Chiloensis and F. Virginiana). Camarosa direct and Camarosa in vitro displayed a small overlapping region between them. On the other hand, Seascape variety presented the smallest rejection percentage among all varieties (more similarities with the rest of the samples). Therefore, it can be concluded that the application of NIRS technique allowed the authentication of all strawberry varieties and geographical origin as well. It was also possible to form subclasses of the same materials. The results presented here demonstrate that NIRS is a very powerful and promising analytical tool since all materials were authenticated and classified based on their variety, origin, and treatment. This is of a tremendous relevance since the variety and origin of a plant material can be established even before it gives its typical fruit or flower.

  • PDF

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Virtual core point detection and ROI extraction for finger vein recognition (지정맥 인식을 위한 가상 코어점 검출 및 ROI 추출)

  • Lee, Ju-Won;Lee, Byeong-Ro
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.3
    • /
    • pp.249-255
    • /
    • 2017
  • The finger vein recognition technology is a method to acquire a finger vein image by illuminating infrared light to the finger and to authenticate a person through processes such as feature extraction and matching. In order to recognize a finger vein, a 2D mask-based two-dimensional convolution method can be used to detect a finger edge but it takes too much computation time when it is applied to a low cost micro-processor or micro-controller. To solve this problem and improve the recognition rate, this study proposed an extraction method for the region of interest based on virtual core points and moving average filtering based on the threshold and absolute value of difference between pixels without using 2D convolution and 2D masks. To evaluate the performance of the proposed method, 600 finger vein images were used to compare the edge extraction speed and accuracy of ROI extraction between the proposed method and existing methods. The comparison result showed that a processing speed of the proposed method was at least twice faster than those of the existing methods and the accuracy of ROI extraction was 6% higher than those of the existing methods. From the results, the proposed method is expected to have high processing speed and high recognition rate when it is applied to inexpensive microprocessors.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

The Effect of Communication on Marital Adjustment of Cancer Patients and their Spouses - Focusing on the Actor Effect and Partner Effect - (암환자와 배우자의 부부적응에 대한 부부의사소통의 영향 - 자기효과와 상대방효과를 중심으로 -)

  • Lee, In-Jeong
    • Korean Journal of Social Welfare
    • /
    • v.63 no.2
    • /
    • pp.179-205
    • /
    • 2011
  • Recently, problems regarding marital adjustment of cancer patients are recognized as serious matter of concern for it had been reported that these issues have severe negative effects on relationship stability within marriage. It is noteworthy how marital adjustment is found to be critical for the cancer patient's mental stability, healing process and chances of survival as reported in the research. Thus, the ultimate goal of this research is to contribute to improvement of the stable relationship and also to formulate the social service related strategy for marriage adjustment for married cancer patient married couples in Korea. Actor and Partner Interdependence Model was formed in order to observe how the communication of the married couple affects marital adjustment and how this has an actor effect as well as partner effect. In order to authenticate this research model, dyadic data which sample the cancer patient and the spouse as a pair. Survey was conducted as the cancer patients who had been diagnosed with cancer and their respective spouses. The survey was taken from 160 married couples which totals to 320 people all together. Results indicated the cancer patient and the spouse have a significant relationship in marital adjustment. Through this, it had been concluded that marital adjustment is not separated but co-dependent with dynamic relationship. And the mutual constructive communication had proven to have a significant positive effect on one's marital adjustment. In demand-withdrawal communication, its negative effect on the self effect was found to be significant in both the patient and the spouse to both of their marital adjustment. Mutual avoidance communication had shown to only cause significant negative effect on self effect to the patient. In verifying the partner effect, significant negative effect was caused by patient's demand-withdrawal communication in partner effect on the spouse's marital adjustment. The results of this study are discussed in term of their implications for clinical interventions for the betterment of marital adjustment among cancer patients and their spouses. The suggestions for future research are discussed also.

  • PDF