• Title/Summary/Keyword: Authenticate

Search Result 289, Processing Time 0.027 seconds

Analysis and Verification of Ancient DNA (고대 DNA의 분석과 검증)

  • Jee, Sang-hyun;Seo, Min-seok
    • Korean Journal of Heritage: History & Science
    • /
    • v.40
    • /
    • pp.387-411
    • /
    • 2007
  • The analysis of ancient DNA (aDNA) has become increasingly considerable anthropological, archaeological, biological and public interest. Although this approach is complicated by the natural damage and exogenous contamination of a DNA, archaeologists and biologists have attempted to understand issues such as human evolutionary history, migration and social organization, funeral custom and disease, and even evolutionary phylogeny of extinct animals. Polymerase chain reaction(PCR) is powerful technique that analyzes DNA sequences from a little extract of an ancient specimen. However, deamination and fragmentation are common molecular damages of aDNA and cause enzymatic inhibition in PCR for DNA amplification. Besides, the deamination of a cytosine residue yielded an uracil residue in the ancient template, and results in the misincorporation of an adenine residue in PCR. This promotes a consistent substitution (cytosine thymine, guanine adenine) to original nucleotide sequences. Contamination with exogenous DNA is a major problem in aDNA analysis, and causes oversight as erroneous conclusion. This report represents serious problems that DNA modification and contamination are the main issues in result validation of aDNA analysis. Now, we introduce several criterions suggested to authenticate reliance of aDNA analysis by many researchers in this field.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A Semi-fragile Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (쾌속조형 시스템의 무결성 인증을 위한 3차원 메쉬 모델의 Semi-fragile 워터마킹)

  • Chi, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.131-142
    • /
    • 2007
  • In this paper, semi-fragile watermarking algorithm was proposed for the application to RP(Rapid Prototyping) system. In the case of the perceptual change or distortion of the original one, the prototype product will be affected from the process because the RP system requires the high precision measure. Therefore, the geometrical transformations like translation, rotation and scaling, the mesh order change and the file format change are used in the RP system because they do not change the basic shapes of the 3D models, but, the decimation and the smoothing are not used because they change the models. The proposed algorithm which is called semi-fragile watermarking is robust against to these kinds of manipulations which preserve the original shapes because it considers the limitations of the RP system, but fragile against to the other manipulations which change the original shapes. This algorithm does not change the model shapes after embedding the watermark information, that is, there is no shape difference between the original model and the watermarked model. so, it will be useful to authenticate the data integrity and hide the information in the field of mechanical engineering which requires the high precision measure.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.

Authentication of Hempseed Oil from Different Commercial Oils Using Simple UV-Vis Spectrophotomety (UV-Vis spectrophotometry법을 이용한 다양한 유지류로부터 헴프씨드 오일의 진위 판별법)

  • Lee, Yun-Jin;Kang, Deok-Gyeong;Kim, Young-Min;Sohn, Ho-Yong
    • Journal of Life Science
    • /
    • v.32 no.5
    • /
    • pp.362-367
    • /
    • 2022
  • Hempseed, a dehulled Cannabis fructus, has high nutraceutical potential. It has plenty of essential amino acids, vitamins, and essential polyunsaturated fatty acids, including α- and γ-linolenic acid. Increased exercise capacity, cognitive function, and ameliorative effects against hypercholesterolemia, neuro-inflammation, thrombus formation, and learning and memory impairment were reported in hemp-seed oil-administered models. Therefore, the market prices of hempseed oil are 45~140-fold higher than the other plant-derived oils, such as soy, corn, olive, canola, or linseed oil. In this study, instead of FTIR (Fourier Transform Infrared Spectroscopy) or FTIR-Raman spectroscopy, a simple UV-Vis spectrophotometry method was developed to authenticate the hempseed oil. Measurements of absorbance at 245, 305, and 415 nm of oils and calculations of 245/415 and 315/415 nm provided that the ratios of 245/415 and 315/415 nm of authentic hempseed oils were 12.9 and 9.6, respectively. The 245/415 and 315/415 nm of soy oil, corn oil, canola oil, and linseed oil were 35.4~61.8 and 29.7~50.8, respectively. This simple UV-Vis spectrophotometry method could also be applied to differentiate hempseed oil from blended oil products in markets.

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.

Health Assessment for Glass Fibre Landfill at Gozan-dong, Inchon (인천시 고잔동에서 제기된 유리섬유에 의한 건강피해 역학 조사)

  • Cho, Soo-Hun;Ju, Yeong-Su;Kim, Kyung-Ryul;Lee, Kang-Kun;Hong, Kug-Sun;Eun, Hee-Chul;Song, Dong-Bin;Hong, Jae-Woong;Kwon, Ho-Jang;Ha, Mi-Na;Han, Sang-Hwan;Seong, Joo-Heon;Kang, Jong-Won
    • Journal of Preventive Medicine and Public Health
    • /
    • v.30 no.1 s.56
    • /
    • pp.77-101
    • /
    • 1997
  • In September 1994, residents of Gozan-dong, Incheon City, made a petition to the government about their health problems which might be caused by previous glass fibre landfill nearby 'H' company. In february 1995, at regular academic meeting of occupational and environmental medicine, a research team of 'D' University presented that they had found glass fibres in groundwater of the area through their survey. They were suspicious of probable association between ingestion of groundwater contaminated with glass fibres and skin tumors among residents. A joint research team was formed and carried out the survey of environment concerning groundwater and its glass fibre existence, and health assessment of residents in the area and industrial workers of 'H' company during May to November, 1995. Analysis of groundwater flow system indicates that the flow lines from the glass fibre landfill pass through or terminate at the 6 houses around the landfill. This means that the groundwater of the 6 houses around the glass fibre landfill could be affected by some possible contaminants from the landfill, but the groundwater quality of the other houses was irrelevant to the landfill. The qualitative and qualitative analyses for glass fibres in 54 groundwater samples including those from the nearby 6 houses, were carried out using SEM equipped with EDS, resulting in no evidence for the presence of glass fibres in the waters. Major precipitates, formed in waters while boiling, were identified as calcium carbonates, in particulary, aragonites in needle form. The results of health assessments of 889 residents in Gozan-dong, participated in this study, showed statistically significant differences in past medical histories of skin tumor and respiratory disease between the exposed group (31 persons who inhabited in 6 houses around the landfill) and the control group, but no significant differences in past medical histories of other diseases, such as cancer mortality, current gastroscopic findings, current skin diseases and respiratory diseases, etc. Also, we could not prove any glass fibres in excised specimens of 9 skin tumors in both groups and there were no health problems possibly associated with glass fibres in employees of the 'H' company. After all, we could not authenticate the association, raised by prior investigators, between groundwater streams, assumedly contaminated with glass fibres or not, and specific disease morbidities or common disease/symptom prevalences. That is, we could not find any glass fibres in groundwater as the only exposure factor of this study hypothesis, and there were not enough certain evidences such as increasing disease prevalences, for examples, skin, respiratory and gastrointestinal diseases etc, possibly related to glass fibre exposure, in exposed group. As a matter of course, the conditions for confirming causal association, for example, strength of the association, consistency of the association, specificity of the association, temporality of the association and dose-response relationship etc, have not been satisfied. In conclusion, we were not able to certify the hypothesis that contamination of groundwater with glass fibres might cause any hazardous health effects in residents who used it for drinking.

  • PDF

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF