• Title/Summary/Keyword: Authenticity verification

Search Result 31, Processing Time 0.024 seconds

A Basic Study on the Establishment of Evaluation Items for the Resiliency of Planting Landscape in Hahoe and Yangdong of World Cultural Heritage (세계문화유산 하회와 양동의 식생경관 진정성 유지를 위한 평가항목 설정 기초 연구)

  • Lee, Chang-Hun;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.2
    • /
    • pp.21-29
    • /
    • 2018
  • This study was wanted to select a value evaluation item to maintain the authenticity of the Planting Landscape in Hahoe and Yangdong villages. Above all, after checking the suitability of the 43 selected items by the Focus Group Interview, the weight was calculated in the Analytic Hierarchy Process expert questionnaire to establish the importance of the indicators for the development of the assessment items. The expert analysis analyzed the importance of 2 sections, 6 divisions and 11 detailed categories, and summarized the results of the study as follows : First, the comparative importance of each category and selection of the assessment items for the stabilization of the Planting Landscape of Hahoe and Yangdong indicated that cultural values are more important than biological values. In particular, details of the biological values of trees were derived with relatively low estimates, except for the specific characteristics of species and items of type of tree. Second, as a result of verification of the suitability of the 43 items selected by the Focus Group Interview, the source diameter, the collection width, reception, flushing, supersonality, records, memorials, 11 items were selected, Third, the results of the importance evaluation of the value properties for maintaining the resistance of vegetation through the Analytic Hierarchy Process were : specific in biological values (0.187), steady (0.094), and water pipe width (2007). There was relatively little difference in the highest weights, the width of the pipe except for the lowest value received, and the source diameter flushing. Fourth, the results of an evaluation of the importance of a value property aimed at historical values were whether or not the cultural asset was designated (0.134), the record value (0.092), the time (0.088), and the monument (0.063). In terms of the importance of evaluating the historical values of Planting sites consisting of Hahoe and Yangdong, the importance of designation of cultural properties was considered to be relative to the maintenance of the Planting Landscape including culture and history. Based on the assessment items and weighted values of the Planting Landscape of Yangdong Village and the World Cultural Heritage below and below, this study's Analytic Hierarchy Process can be applied to actual criteria for the assessment of the authenticity of trees in the village. Based on the assessment items and weighted values of the Planting Landscape in Hahoe and Yangdong villages, a follow-up study on the assessment standards for the authenticity of trees in the village will be left as a future task.

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks

  • Dai, Hua;Yang, Geng;Huang, Haiping;Xiao, Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2111-2131
    • /
    • 2015
  • Tiered wireless sensor network is a network model of flexibility and robustness, which consists of the traditional resource-limited sensor nodes and the resource-abundant storage nodes. In such architecture, collected data from the sensor nodes are periodically submitted to the nearby storage nodes for archive purpose. When a query is requested, storage nodes also process the query and return qualified data as the result to the base station. The role of the storage nodes leads to an attack prone situation and leaves them more vulnerable in a hostile environment. If any of them is compromised, fake data may be injected into and/or qualified data may be discarded. And the base station would receive incorrect answers incurring malfunction to applications. In this paper, an efficient verifiable top-k query processing scheme called EVTQ is proposed, which is capable of verifying the authentication and completeness of the results. Collected data items with the embedded information of ordering and adjacent relationship through a hashed message authentication coding function, which serves as a validation code, are submitted from the sensor nodes to the storage nodes. Any injected or incomplete data in the returned result from a corresponded storage node is detected by the validation code at the base station. For saving communication cost, two optimized solutions that fuse and compress validation codes are presented. Experiments on communication cost show the proposed method is more efficiency than previous works.

Direct Design of Composite Prestressed Concrete Beams (프리스트레스트 콘크리트 합성(合性)보의 직접설계(直接設計))

  • Kim, Su Man
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.10 no.3
    • /
    • pp.49-56
    • /
    • 1990
  • Todays, design of composite prestressed concrete beams is carried out by calculation of the prestressing force and its eccentricity assuming the sectional properties. However the characteristics of composite section made with a precast prestressed concrete beams and reinforced concrete slab is not reflected, so iteration method has been adopted. But its methed requires much time and labor. Accordingly, an improved design method will be presented. In this study, improved design method is proposed to design composite section directly without iterative calculation. Design examples according to the proposed design method are presented for easy application and verification of its reliability and authenticity. The results match well with the Hatcher's.

  • PDF

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

A Review on Info-Convergence Nanohybrid System (정보 융합 나노하이브리드 시스템의 이해)

  • Jin, Wenji;Park, Dae-Hwan
    • Korean Chemical Engineering Research
    • /
    • v.57 no.3
    • /
    • pp.321-330
    • /
    • 2019
  • With the rapid development trend in multidisciplinary science and convergence technology, digital data storages have been necessary in order to accumulate a huge amount of information with high security. The possibility that biological DNA code system can offer encoding and decoding information has been illustrated by many researchers. In this review, we summarized current issue of info-convergence nanohybrid system, so-called infohybrid. DNA-inorganic nanohybrid materials and devices to achieve DNA-based molecular information system are presented. The possible applications focusing on tracking-and-traceability management, authenticity verification, and nano-forensics are also reviewed with four steps of encoding, encrypting, decrypting and decoding. We also highlighted the potential of smart code system with Nano-Bio-Info-Cogno (NBIC) convergence technology through the recently published case study of Avatar DNA nanohybrid system with smart phone.

Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol

  • Shin, Seong-Han;Kazukuni Kobara;Hideki Imai
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.75-90
    • /
    • 2004
  • At Asiacrypt 2003, Shin et al., have proposed a new class for Authenticated Key Establishment (AKE) protocol named Leakage-Resilient AKE ${(LR-AKE)}^{[1]}$. The authenticity of LR-AKE is based on a user's password and his/her stored secrets in both client side and server side. In their LR-AKE protocol, no TRM(Tamper Resistant Modules) is required and leakage of the stored secrets from $.$my side does not reveal my critical information on the password. This property is useful when the following situation is considered :(1) Stored secrets may leak out ;(2) A user communicates with a lot of servers ;(3) A user remembers only one password. The other AKE protocols, such as SSL/TLS and SSH (based or PKI), Password-Authenticated Key Exchange (PAKE) and Threshold-PAKE (T-PAKE), do not satisfy that property under the above-mentioned situation since their stored secrets (or, verification data on password) in either the client or the servers contain enough information to succeed in retrieving the relatively short password with off-line exhaustive search. As of now, the LR-AKE protocol is the currently horn solution. In this paper, we prove its security of the LR-AKE protocol in the standard model. Our security analysis shows that the LR-AKE Protocol is provably secure under the assumptions that DDH (Decisional Diffie-Hellman) problem is hard and MACs are selectively unforgeable against partially chosen message attacks (which is a weaker notion than being existentially unforgeable against chosen message attacks).

How to Prove the Identity of Artist When Creating Non-fungible Tokens (대체불가능 토큰을 생성할 때 어떻게 예술가의 신원을 증명할까?)

  • Kim, Taekyung;Yang, Ji Yeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.669-676
    • /
    • 2022
  • Non-fungible tokens (NFTs) have the advantage of being able to reliably manage details after minting, but how can ideas be protected before being converted to NFTs? The use of NFTs to increase the value of digital assets is increasing, but the problem of creating and selling NFTs without the consent of the creator is also increasing. Existing methods for protecting creators include a method of using a traditional authentication system and a method of using a social network, but each has limitations. Therefore, in this study, an identity token utilization method is proposed as a way to supplement the existing limitations. When an identity token is used, a certified NFT is issued through an existing identity authentication authority, so the verification of the authenticity of the token becomes clear. In addition, in inheritance and transfer, it becomes possible to respond to legal problems related to the transfer of creative rights.

Configurable Smart Contracts Automation for EVM based Blockchains

  • ZAIN UL ABEDIN;Muhammad Shujat Ali;Ashraf Ali;Sana Ejaz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.147-156
    • /
    • 2023
  • Electronic voting machines (EVMs) are replacing research ballots due to the errors involved in the manual counting process and the lengthy time required to count the votes. Even though these digital recording electronic systems are advancements, they are vulnerable to tampering and electoral fraud. The suspected vulnerabilities in EVMs are the possibility of tampering with the EVM's memory chip or replacing it with a fake one, their simplicity, which allows them to be tampered with without requiring much skill, and the possibility of double voting. The vote data is shared among all network devices, and peer-to-peer verification is performed to ensure the vote data's authenticity. To successfully tamper with the system, all of the data stored in the nodes must be changed. This improves the proposed system's efficiency and dependability. Elections and voting are fundamental components of a democratic system. Various attempts have been made to make modern elections more flexible by utilizing digital technologies. The fundamental characteristics of free and fair elections are intractability, immutability, transparency, and the privacy of the actors involved. This corresponds to a few of the many characteristics of blockchain-like decentralized ownership, such as chain immutability, anonymity, and distributed ledger. This working research attempts to conduct a comparative analysis of various blockchain technologies in development and propose a 'Blockchain-based Electronic Voting System' solution by weighing these technologies based on the need for the proposed solution. The primary goal of this research is to present a robust blockchain-based election mechanism that is not only reliable but also adaptable to current needs.

Development and Verification of and Single Nucleotide Polymorphism Markers toDetermine Country of Origin of Korean and Chinese Scapharca subcrenata (한국산과 중국산 새꼬막(Scapharca subcrenata)의 원산지 판별을 위한 SNP 마커의 개발 및 검증)

  • Seong Seok Choi;Seung Hyun Yoo;Yong Bae Seo;Jong Oh Kim;Ik Jung Kwon;So Hee Bae;Gun Do Kim
    • Journal of Life Science
    • /
    • v.33 no.12
    • /
    • pp.1025-1035
    • /
    • 2023
  • In this study, we analyzed SNPs that appear between Korean and Chinese Scapharca subcrenata using the nucleotide sequence data of S. subcrenata analyzed by genotyping by sequencing (GBS). To distinguish the country of origin for S. subcrenata in Korean and Chinese, we developed a primer set as single nucleotide polymorphism (SNP) markers for quantitative real-time PCR (qPCR) analysis and validated by sequencing SNPs. A total of 180 samples of S. subcrenata were analyzed by genotyping by sequencing, and 15 candidate SNPs were selected. SNP marker selection for country of origin were identified through real-time qPCR. Insertion 1 and SNP 21 markers showed the most distinct separation between the sequence types as well as the country of origin through qPCR, with the observed amplification patterns matching the expected outcomes.. Additionally, in a blind test conducted by mixing samples of S. subcrenata at random, Insertion 1 showed 74% accuracy, 52% sensitivity, and 96% specificity, and SNP 21 showed 86% accuracy, 79% sensitivity, and 93% specificity. Therefore, the two SNP markers developed are expected to be useful in verifying the authenticity of the country of origin of S. subcrenata when used independently or in combination.