• Title/Summary/Keyword: Data leakage protection

Search Result 117, Processing Time 0.03 seconds

Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data (영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구)

  • In-Jun Song;Cha-Jong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.1
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

Role of Muscle Free Flap in the Salvage of Complicated Scalp Wounds and Infected Prosthetic Dura

  • Han, Dae Hee;Park, Myong Chul;Park, Dong Ha;Song, Hyunsuk;Lee, Il Jae
    • Archives of Plastic Surgery
    • /
    • v.40 no.6
    • /
    • pp.735-741
    • /
    • 2013
  • Background The prosthetic dura is an essential element in the protection of the cranial parenchyma and prevention of cerebrospinal fluid leakage. Although prosthetic dura are widely used in neurosurgery, they occasionally provoke infection, which can be a major concern after neurosurgical treatment. However, removal of the prosthetic dura carries a risk of brain parenchyma injury and cerebrospinal fluid leakage. The salvage of infected prosthetic dural material has not been adequately addressed in the literature. In this study, we demonstrate the value of the combination of a meticulous surgical debridement of necrotic tissue and simultaneous muscle free flap for intractable postoperative epidural abscess without removal of the infected prosthetic dura. Methods Between 2010 and 2012, we reviewed the data of 11 patients with persistent infection on the prosthetic dura. The epidural infections each occurred after a neurosurgical procedure, and there was soft tissue necrosis with the disclosure of the underlying prosthetic dura and dead bone around the scalp wound. To salvage the infected prosthetic dura, meticulous debridement and a muscle free flap were performed. Results All 11 patients experienced complete recovery from the complicated wound problem without the need for further surgical intervention. No signs of prosthetic dural infection were observed during the mean follow-up period of 11 months. Conclusions The combination of a meticulous surgical debridement and coverage with a muscle free flap is an effective treatment for salvage of infected prosthetic dura.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Radiation Shielding Analysis for the X-ray Facility (X-선 발생장치 시설의 방사선 차폐 해석)

  • Kwon, Seog-Guen;Choi, Ho-Sin;Moon, Philip-S.;Yook, Jong-Chul
    • Journal of Radiation Protection and Research
    • /
    • v.12 no.1
    • /
    • pp.34-39
    • /
    • 1987
  • Radiation shielding analysis for a 6MeV X-ray facility was carried out. The primary and leakage radiation for the facility can be evaluated based on the methodology in NCRP No. 49 and 51. The present study deals with radiation scattering analysis for the outside and inside door of the facility based on the albedo concept. The calculated dose rates were compared with the results of MORSE-CG code calculation and the measured data, resulting in a good agreement, even though there existed some deviation for the inside door. These results can be utilized to the radiation shielding design of the medical and industrial X and gamma ray facilities, and to the safety evaluation of these facilities.

  • PDF

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Development of a Novel Real-Time Monitoring System Algorithm for Fire Prevention (화재예방을 위한 실시간 모니터링 시스템의 알고리즘 개발)

  • Kim, Byeong-Jo;Kim, Jae-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.5
    • /
    • pp.47-53
    • /
    • 2014
  • Despite the automatic fire alarm system, according to the national fire data system of national emergency management agency, the fires account for 40,932 incidents, 2,184 injuries and about 430 billion won in property losses in 2013. Since the conventional automatic fire alarm system has several weaknesses related to electrical signal such as noise, surge, lighting, etc. Most fires are mainly caused by electrical faults, mechanical problem, chemical, carelessness and natural. The electrical faults such as line to ground fault, line to line fault, electrical leakage and arc are one of the major problems in fire. This paper describes the development of a novel real-time fire monitoring system algorithm including fault detection function which puts the existing optic smoke and heat detectors for fire detection with current and voltage sensors in order to utility fault monitoring using high accuracy DAQ measurement system with LabVIEW program. The fire detection and electrical fault monitoring with a proposed a new detection algorithm are implemented under several test. The fire detection and monitoring system operates according to the proposed algorithm well.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.