• Title/Summary/Keyword: Code Security

검색결과 975건 처리시간 0.026초

Three-dimensional QR Code Using Integral Imaging (집적 영상을 활용한 3차원 QR code)

  • Kim, Youngjun;Cho, Ki-Ok;Han, Jaeseung;Cho, Myungjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제20권12호
    • /
    • pp.2363-2369
    • /
    • 2016
  • In this paper, we propose three-dimensional (3D) quick-response (QR) code generation technique using passive 3D integral imaging and computational integral imaging reconstruction technique. In our proposed method, we divide 2D QR code into 4 planes with different reconstruction depths and then we generate 3D QR code using synthetic aperture integral imaging and computational reconstruction. In this 3D QR code generation process, we use integral imaging which is one of 3D imaging technologies. Finally, 3D QR code can be scanned by reconstructing and merging 3D QR codes at 4 different planes with computational reconstruction. Therefore, the security level for QR code scanning may be enhanced when QR code is scanned. To show that our proposed method can improve the security level for QR code scanning, in this paper, we carry out the optical experiments and computational reconstruction. In addition, we show that 3D QR code can be scanned when reconstruction depths are known.

A study on Technology for Performance of Network Configuration Management (네트워크 구성관리 성능 향상을 위한 기법 연구)

  • Kang, Hyun Joong;Han, Jeong-Soo
    • Convergence Security Journal
    • /
    • 제4권3호
    • /
    • pp.47-55
    • /
    • 2004
  • Currently used to manage a whole bunch of networks is the Client/Server Network Management Technique in which a central manager system supports a number of managed ones. Unfortunately it has a big drawback: wasting network resources, most of all bandwidth, which is mainly caused by too much traffic between the central manager system and the managed ones. In a way to overcome this weak point, we have designed a new type of system, a Configuration Management System (CMS), based on code mobility which has been used in distributed network management systems. In this thesis we have compared the CMS with the currently used network management system, identified class to make Mobile Code, and analyzed the techniques of other network management systems in order to verify the validity of the new system.

  • PDF

Design of RCNC(Random Connection Node Convolutional) Code with Security Property (비화 특성을 가진 RCNC(Random Connection Node Convolutional) 부호 기법의 설계)

  • Kong, Hyung-Yun;Cho, Sang-Bock;Lee, Chang-Hee
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권12호
    • /
    • pp.3944-3951
    • /
    • 2000
  • In this paper, we propose the new FEC(Forward Error Correction) code method, so called RCNC(Random Connection Node Convolutional) code with security property. Recently, many wireless communication systems, which can prouide integrated semices of various media types and hil rales, are required to haue the ability of secreting information and error correclion. This code system is a kind qf conuolulional code, but it Ius various code formats as each node is connected differently. And systems hy using RCNC codes haue all. ability of error correction as well as information protection. We describe the principle of operating RCNC codes, including operation examples. In this paper, we also show the peiformance of BER(Bit Error Rate) and verify authority of network system with computer simulation.

  • PDF

A Study on LDP Code Design to includes Facial Color Information (얼굴색 정보를 포함하기 위한 LDP 코드 설계에 관한 연구)

  • Jung, Woong Kyung;Lee, Tae Hwan;Ahn, Yong Hak;Chae, Ok Sam
    • Convergence Security Journal
    • /
    • 제14권7호
    • /
    • pp.9-15
    • /
    • 2014
  • In this paper, we proposed a new LDP code to solve a previous LDP code's problem and can include a face-color information. To include the face-color information, we developed various methods reducing the existing LDP code and analyzed the results. A new LDP code is represented by 6-bits different from the previous LDP code To adapt to a noise and environmental changes effectively and include 2-bits face-color information. The result shows better recognition rates of face and facial-expression than the existing methods effectively.

Reverse engineering of data abstractions on fragmented binary code (단편화된 실행파일을 위한 데이터 구조 역공학 기법)

  • Lee, Jong-Hyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권3호
    • /
    • pp.615-619
    • /
    • 2012
  • Reverse engineering via static analysis is an essential step in software security and it focuses on reconstructing code structures and data abstractions. In particular, reverse engineering of data abstractions is critical to understand software but the previous scheme, VSA, is not suitable for applying to fragmented binaries. This paper proposes an enhanced method through dynamic region assignment.

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Rahman, Rizal;Zakaria, Mohd Sophian
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.52-56
    • /
    • 2021
  • There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

Machine Learning Algorithm Accuracy for Code-Switching Analytics in Detecting Mood

  • Latib, Latifah Abd;Subramaniam, Hema;Ramli, Siti Khadijah;Ali, Affezah;Yulia, Astri;Shahdan, Tengku Shahrom Tengku;Zulkefly, Nor Sheereen
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.334-342
    • /
    • 2022
  • Nowadays, as we can notice on social media, most users choose to use more than one language in their online postings. Thus, social media analytics needs reviewing as code-switching analytics instead of traditional analytics. This paper aims to present evidence comparable to the accuracy of code-switching analytics techniques in analysing the mood state of social media users. We conducted a systematic literature review (SLR) to study the social media analytics that examined the effectiveness of code-switching analytics techniques. One primary question and three sub-questions have been raised for this purpose. The study investigates the computational models used to detect and measures emotional well-being. The study primarily focuses on online postings text, including the extended text analysis, analysing and predicting using past experiences, and classifying the mood upon analysis. We used thirty-two (32) papers for our evidence synthesis and identified four main task classifications that can be used potentially in code-switching analytics. The tasks include determining analytics algorithms, classification techniques, mood classes, and analytics flow. Results showed that CNN-BiLSTM was the machine learning algorithm that affected code-switching analytics accuracy the most with 83.21%. In addition, the analytics accuracy when using the code-mixing emotion corpus could enhance by about 20% compared to when performing with one language. Our meta-analyses showed that code-mixing emotion corpus was effective in improving the mood analytics accuracy level. This SLR result has pointed to two apparent gaps in the research field: i) lack of studies that focus on Malay-English code-mixing analytics and ii) lack of studies investigating various mood classes via the code-mixing approach.

QR Code Based Mobile Dual Transmission OTP System (QR 코드를 이용한 모바일 이중 전송 OTP 시스템)

  • Seo, Se Hyeon;Choi, Chang Yeol;Lee, Goo Yeon;Choi, Hwang Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제38B권5호
    • /
    • pp.377-384
    • /
    • 2013
  • In order to improve the security strength in the password based user authentication, in which the security vulnerability is increased while the same password is repeatedly used, the OTP(One-Time Password) system has been introduced. In the OTP systems, however, the user account information and OTP value may be hacked if the user PC is infected by the malicious codes, because the user types the OTP value, which is generated by the mobile device synchronized with the server, directly onto the user PC. In this paper, we propose a new method, called DTOTP(Dual Transmission OTP), to solve this security problem. The DTOTP system is an improved two-factor authentication method by using the dual transmission, in which the user performs the server authentication by typing the user account and password information onto the PC, and then for the OTP authentication the mobile device scans the QR code displayed on the PC and the OTP value is sent to the server directly. The proposed system provides more improved security strength than that of the existing OTP system, and also can adopt the existing OTP algorithm without any modification. As a result, the proposed system can be safely applied to various security services such like banking, portal, and game services.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • 제14권2호
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.