• Title/Summary/Keyword: Content Authentication

Search Result 133, Processing Time 0.024 seconds

A Study on the Establishment of a Security and Customs Cooperation System for Reinforcement of the International Air Cargo Supply Chain Security (국제항공화물 공급망 보안 강화를 위한 보안과 세관의 협조체계 구축방안에 관한 연구)

  • Park, Man-Hui;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.142-152
    • /
    • 2021
  • The International Civil Aviation Organization (ICAO) and the World Customs Organization (WCO) emphasize securing supply chain security through mutual cooperation between aviation security and customs by establishing a standardized security system by regulations, procedures and practices of international air cargo. Accordingly, in accordance with the Aviation Security Act, the known consignors system aims to secure cargo security before loading air cargo into the aircraft, while the customs AEO system is a public-private cooperation program that focuses on simplification of customs clearance procedures. These systems basically have the same purpose of effectively identifying high-risk cargo through a risk-based approach in international air cargo transportation and preventing risks in advance, and the content that a common basic standard for cargo security must be established is also similar. Therefore, it is necessary to establish a cooperation system by simplifying problems such as cumbersome and redundant authentication procedures and on-site verification through coordination of security requirements for mutual recognition between the two systems. As a result, it is necessary to establish a process for coordinating security and customs' supply chain security program and maximize the effect of harmonizing supply chain security by strengthening the linkage between known consignors and AEO.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

MPEG2-TS to RTP Transformation and Application system (MPEG2-TS의 RTP 변환 및 적용 시스템)

  • Im, Sung-Jin;Kim, Ho-Kyom;Hong, Jin-Woo;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.643-645
    • /
    • 2010
  • The Internet-based multimedia services such as IPTV is being expanded with the development of technology to support the convergence of broadcasting and telecommunications technology for the control seems to be growing larger. Especially for the real-time TV broadcast multicast control technology to support the authentication and resource control, in addition to the technology services that enhance the value of technology for a variety of services in both directions seems to be developed. And, Internet-based transmission system transmit the video content for the video content delivery using RTP(Real Time Transport Protocol). Standardization body, IETF(Internet Engineering Task Force) within the RTP, according to a variety of audio and video formats only transmission format(RTP Payload Format) Establish a separate standard and scalable video content "RTP Payload Format for SVC(Switched Virtual Connection) Video" the standardization is currently processing. In this paper we are improving the quality of broadcasting and telecommunication systems, so that the upper layer by the application can react adaptively to the existing MPEG2-TS and RTP who are provided by a variety of content applied to a variety of devices consumers ETE(End- to-End) QoS(Quality of Service) for enhance the system who was designed and implemented.

  • PDF

Characterizing a full spectrum of physico-chemical properties of (20S)-and (20R)-ginsenoside Rg3 to be proposed as standard reference materials

  • Kim, Il-Woung;Sun, Won Suk;Yun, Bong-Sik;Kim, Na-Ri;Min, Dongsun;Kim, Si-Kwan
    • Journal of Ginseng Research
    • /
    • v.37 no.1
    • /
    • pp.124-134
    • /
    • 2013
  • The authentication of the physico-chemical properties of ginsenosides reference materials as well as qualitative and quantitative batch analytical data based on validated analytical procedures is a prerequisite for certifying good manufacturing practice (GMP). Ginsenoside Rb1 and Rg1, representing protopanaxadiol and protopanaxatriol ginsenosides, respectively, are accepted as marker substances in quality control standards worldwide. However, the current analytical methods for these two compounds recommended by Korean, Chinese, European, and Japanese pharmacopoeia do not apply to red ginseng preparations, particularly the extract, because of the relatively low content of the two agents in red ginseng compared to white ginseng. In manufacturing fresh ginseng into red ginseng products, ginseng roots are exposed to a high temperature for many hours, and the naturally occurring ginsenoside Rb1 and Rg1 are converted to artifact ginsenosides such as Rg3, Rg5, Rh1, and Rh2 during the heating process. The analysis of ginsenosides in commercially available ginseng products in Korea led us to propose the inclusion of the (20S)- and (20R)-ginsenoside Rg3, including ginsenoside Rb1 and Rg1, as additional reference materials for ginseng preparations. (20S)- and (20R)-ginsenoside Rg3 were isolated by Diaion HP-20 adsorption chromatography, silica gel flash chromatography, recrystallization, and preparative HPLC. HPLC fractions corresponding to those two ginsenosides were recrystallized in appropriate solvents for the analysis of physico-chemical properties. Documentation of those isolated ginsenosides was achieved according to the method proposed by Gaedcke and Steinhoff. The ginsenosides were subjected to analyses of their general characteristics, identification, purity, content quantification, and mass balance tests. The isolated ginsenosides showed 100% purity when determined by the three HPLC systems. Also, the water content was found to be 0.534% for (20S)-Rg3 and 0.920% for (20R)-Rg3, meaning that the net mass balances for (20S)-Rg3 and (20R)-Rg3 were 99.466% and 99.080%, respectively. From these results, we could assess and propose a full spectrum of physico-chemical properties of (20S)- and (20R)-ginsenoside Rg3 as standard reference materials for GMP-based quality control.

DNA fingerprinting analysis for soybean (Glycine max) varieties in Korea using a core set of microsatellite marker (핵심 Microsatellite 마커를 이용한 한국 콩 품종에 대한 Fingerprinting 분석)

  • Kwon, Yong-Sham
    • Journal of Plant Biotechnology
    • /
    • v.43 no.4
    • /
    • pp.457-465
    • /
    • 2016
  • Microsatellites are one of the most suitable markers for identification of variety, as they have the capability to discriminate between narrow genetic variations. The polymorphism level between 120 microsatellite primer pairs and 148 soybean varieties was investigated through the fluorescence based automatic detection system. A set of 16 primer pairs showed highly reproducible polymorphism in these varieties. A total of 204 alleles were detected using the 16 microsatellite markers. The number of alleles per locus ranged from 6 to 28, with an average of 12.75 alleles per locus. The average polymorphism information content (PIC) was 0.86, ranging from 0.75 to 0.95. The unweighted pair group method using the arithmetic averages (UPGMA) cluster analysis for 148 varieties were divided into five distinctive groups, reflecting the varietal types and pedigree information. All the varieties were perfectly discriminated by marker genotypes. These markers may be useful to complement a morphological assessment of candidate varieties in the DUS (distinctness, uniformity and stability) test, intervening of seed disputes relating to variety authentication, and testing of genetic purity in soybean varieties.

Positive and Negative Effects of IT on Cancer Registries

  • Mohammadzadeh, Niloofar;Safdari, Reza;Rahimi, Azin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.7
    • /
    • pp.4455-4457
    • /
    • 2013
  • In the new millennium people are facing serious challenges in health care, especially with increasing non-communicable diseases (NCD). One of the most common NCDs is cancer which is the leading cause of death in developed countries and in developing countries is the second cause of death after heart diseases. Cancer registry can make possible the analysis, comparison and development of national and international cancer strategies and planning. Information technology has a vital role in quality improvement and facility of cancer registries. With the use of IT, in addition to gaining general benefits such as monitoring rates of cancer incidence and identifying planning priorities we can also gain specific advantages such as collecting information for a lifetime, creating tele medical records, possibility of access to information by patient, patient empowerment, and decreasing medical errors. In spite of the powerful role of IT, we confront various challenges such as general problems, like privacy of the patient, and specific problems, including possibility of violating patients rights through misrepresentation, omission of human relationships, and decrease in face to face communication between doctors and patients. By implementing appropriate strategies, such as identifying authentication levels, controlling approaches, coding data, and considering technical and content standards, we can optimize the use of IT. The aim of this paper is to emphasize the need for identifying positive and negative effects of modern IT on cancer registry in general and specific aspects as an approach to cancer care management.

IPMP(Intellectual Property Management and Protection) Service Interfaces based on MPEG Multimedia (MPEG 멀티미디어 미들웨어에 기반한 보호관리 서비스 인터페이스)

  • Choo, Hyon-Gon;Bang, Gun;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.325-334
    • /
    • 2007
  • In order to increase the promotion of multimedia processing techniques in MPEG standard, MPEG Multimedia Middleware (M3W) which supports middleware interface for multimedia processing is set up. In this paper, multimedia protection and management service interfaces based on MPEG Multimedia Middleware (M3W) are introduced. The service interfaces are based on component models of M3W and support normative IPMP messages. The proposed interfaces are composed of Tool interfaces and Trust management interfaces: Tool interfaces provide the functionality supporting terminal and tool based on the governed decoder model and Trust management interfaces provide the supporting functionality such as license managing and authentication required in DRM devices. As an application of the proposed interfaces, a JAVA based player simulator is shown. The proposed interfaces can be easily implemented under various device and application environments as an ISO/IEC 23004-2 standard middleware platform.

  • PDF

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

Vector Data Hashing Using Line Curve Curvature (라인 곡선 곡률 기반의 벡터 데이터 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.65-77
    • /
    • 2011
  • With the rapid expansion of application fields of vector data model such as CAD design drawing and GIS digital map, the security technique for vector data model has been issued. This paper presents the vector data hashing for the authentication and copy protection of vector data model. The proposed hashing groups polylines in main layers of a vector data model and generates the group coefficients by the line curve curvatures of the first and second type of all poly lines. Then we calculate the feature coefficients by projecting the group coefficients onto the random pattern and generate finally the binary hash from the binarization of the feature coefficients. From experimental results using a number of CAD drawings and GIS digital maps, we verified that the proposed hashing has the robustness against various attacks and the uniqueness and security by the random key.

Legal Issues of Electronic Commerce Chapters of the Korea·US FTA and Tasks of the Digital Contents Industry (한·미 FTA 전자상거래 협정문의 주요쟁점과 디지털콘텐츠 산업의 활성화 과제)

  • Kwon, Soon-Koog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.21-29
    • /
    • 2015
  • The emergence of the internet causes the electronic trade of movies, music, software and other digital content products to be an eminent share of international commerce. The purpose of this study is to examine legal issues of electronic commerce chapters of the Korea US FTA and tasks of the digital contents industry. Results of the study show that several implications based on the industry are offered. The Korean government needs to do the following: settle of classification issue in digital contents, settle of customs issue in digital contents, settle of issue of non-discrimination principle in digital contents, settle of exclusion issue in audiovisual services, improve of global competitiveness, unify of export support system, establish of overseas expansion strategy in genre and regional contents, train of global experts and protect of intellectual property in digital contents.