• 제목/요약/키워드: Database security

검색결과 646건 처리시간 0.024초

웨이브렛변환을 이용한 영상으로의 서명데이터 삽입 (Embedding a Signature to Pictures under Wavelet Transformation)

  • 도재수
    • 융합보안논문지
    • /
    • 제7권1호
    • /
    • pp.83-89
    • /
    • 2007
  • 본 논문에서는 영상을 다중 해상도로 표현하는 직교 웨이브렛변환에서, 비밀스럽게 서명데이터를 영상에 삽입하는 방법을 제안한다. 그 원리는 영상의 다중해상도표현에 있어서 차분출력에 편중(집중)이 있음에 주목하여, 그 특징을 이용하여 서명비트계열을 화상에 삽입한다. 이 때, $256{\times}256$화소로 되는 농담화상으로 대략 6K바이트 정도의 문자정보를 합성할 수 있다. 이 방법은 영상의 저작권을 표시하는 서명데이터뿐만 아니라, 영상의 저자나 사용조건, 또는 영상 그 자체의 속성정보를 포함할 수 있어, 영상데이터베이스의 검색 등에 있어서도 유사영상의 식별을 용이하게 할 수 있는 등의 응용을 고려할 수 있다.

  • PDF

XML 문서저장에 관한 민군겸용 데이터베이스 관리체계의 성능비교 (Performance Comparison of Database Management Methods on XML Document Storage Functions for both Commerce and Military Applications)

  • 강석훈;이재윤;이말순
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.237-260
    • /
    • 2004
  • As the research work about XML based on the development of Internet and according to the information exchange standard is being carried out, the need of discovering new methods to store XML documents and manage them efficiently according to the frequency of large-capacity XML documents increases. Consequently, as a kind of back-end database system, XML storage systems such as RDBMS, OODBMS and Native XML DBMS etc. are coming forth in order to save XML documents. It is an urgent task to make comparisons among usage expense, function comparison storage, inquiry, and manage dimension for each DBMS. This paper makes an analysis and comparison of DTD-independent XML document access methods in RDBMS, OODBMS and Native XML DBMS for XML storage and management. After analyzing the advantages and disadvantages of each access method and comparing the function of typical commerce DBMS such as Oracle 8i, eXcelon and Tamino for finding the possibility of military applications, an another appropriate method to save XML documents is proposed as to find an implementation approach to save structural XML documents.

  • PDF

A Study on a Distributed Data Fabric-based Platform in a Multi-Cloud Environment

  • Moon, Seok-Jae;Kang, Seong-Beom;Park, Byung-Joon
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.321-326
    • /
    • 2021
  • In a multi-cloud environment, it is necessary to minimize physical movement for efficient interoperability of distributed source data without building a data warehouse or data lake. And there is a need for a data platform that can easily access data anywhere in a multi-cloud environment. In this paper, we propose a new platform based on data fabric centered on a distributed platform suitable for cloud environments that overcomes the limitations of legacy systems. This platform applies the knowledge graph database technique to the physical linkage of source data for interoperability of distributed data. And by integrating all data into one scalable platform in a multi-cloud environment, it uses the holochain technique so that companies can easily access and move data with security and authority guaranteed regardless of where the data is stored. The knowledge graph database mitigates the problem of heterogeneous conflicts of data interoperability in a decentralized environment, and Holochain accelerates the memory and security processing process on traditional blockchains. In this way, data access and sharing of more distributed data interoperability becomes flexible, and metadata matching flexibility is effectively handled.

Improved Feature Selection Techniques for Image Retrieval based on Metaheuristic Optimization

  • Johari, Punit Kumar;Gupta, Rajendra Kumar
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.40-48
    • /
    • 2021
  • Content-Based Image Retrieval (CBIR) system plays a vital role to retrieve the relevant images as per the user perception from the huge database is a challenging task. Images are represented is to employ a combination of low-level features as per their visual content to form a feature vector. To reduce the search time of a large database while retrieving images, a novel image retrieval technique based on feature dimensionality reduction is being proposed with the exploit of metaheuristic optimization techniques based on Genetic Algorithm (GA), Extended Binary Cuckoo Search (EBCS) and Whale Optimization Algorithm (WOA). Each image in the database is indexed using a feature vector comprising of fuzzified based color histogram descriptor for color and Median binary pattern were derived in the color space from HSI for texture feature variants respectively. Finally, results are being compared in terms of Precision, Recall, F-measure, Accuracy, and error rate with benchmark classification algorithms (Linear discriminant analysis, CatBoost, Extra Trees, Random Forest, Naive Bayes, light gradient boosting, Extreme gradient boosting, k-NN, and Ridge) to validate the efficiency of the proposed approach. Finally, a ranking of the techniques using TOPSIS has been considered choosing the best feature selection technique based on different model parameters.

델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구 (A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server)

  • 정명규;박만곤
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

장애물이 존재하는 검색공간에서 역최대근접질의 처리방법에 관한 연구 (The Processing Method for a Reverse Nearest Neighbor Queries in a Search Space with the Presence of Obstacles)

  • 선휘준;김홍기
    • 융합보안논문지
    • /
    • 제17권2호
    • /
    • pp.81-88
    • /
    • 2017
  • 암호화된 공간데이터베이스와 같은 최근의 여러 응용에서는 질의 기준이 최대근접객체가 되는 객체들을 찾는 역최대 근접질의가 자주 발생한다. 실세계의 검색공간에는 강, 호수 그리고 고속도로 등과 같은 다양한 장애물이 존재하며, 이러한 환경에서 검색성능을 높이기 위해서는 장애물을 고려한 검색거리 측도가 반드시 필요하다. 본 연구에서는 장애물이 존재하는 검색공간에서 역최대근접질의 처리를 최적화하기 위한 검색거리 측도들과 질의처리 알고리즘을 제시한다.

3-tier 시스템 환경에서 비 에이전트 방식의 데이터베이스 사용자 식별 방안 (A Non-Agent based Identification Scheme for Identifying Database Users in 3-tier System Environments)

  • 한정상;신동천
    • Journal of Information Technology Applications and Management
    • /
    • 제25권2호
    • /
    • pp.147-159
    • /
    • 2018
  • The changes of internet environment have made services through web application server (WAS) popular. Accordingly, technical difficulties in identifying users who access databases through WAS were incurred. In order to solve these problems, many companies adopt an agent-based approach for identifying users by installing additional software on WAS. However, this approach must submit to some disadvantages in terms of cost, maintenance, and development process. In this paper, we devise an non-agent based approach for identifying database users in 3-tier environments.

해시 함수를 이용한 효율적인 RFID 인증 (Effective RFID Authentication Using Hash Function)

  • 신효영;정계동
    • 한국정보통신학회논문지
    • /
    • 제14권5호
    • /
    • pp.1171-1177
    • /
    • 2010
  • 최근 RFID 시스템은 유통, 의료, 군사 등 다양한 영역에서 활용하는 기술로 등장하고 있다. RFID 시스템을 여러가지 응용 서비스에 적용하려면 개인정보를 보호하기 위한 기술이 개발되어야한다. 본 논문에서는 해시 함수를 이용하여 RFID 태그와 데이터베이스간의 상호 인증을 효율적으로 수행할 수 있는 프로토콜을 제안하였다. 제안한 프로토콜은 상호 인증, 익명성, 비밀성, 무결성, 재전송 공격, 위치 추적 등 여러 가지 보안 요구 사항을 만족시키면서, 데이터베이스에서의 해시 연산 횟수를 줄여 전체 인증 시간을 줄일 수 있다.

Database of Navigational Environment Parameters (Water Depth, Sediment Type and Marine Managed Areas) to Support Ships in an Emergency

  • Kim, Tae-Ho;Yang, Chan-Su
    • 한국항해항만학회지
    • /
    • 제43권5호
    • /
    • pp.302-309
    • /
    • 2019
  • This study introduces the navigational environment database(DB) compiling water depth, sediment type and marine managed areas (MMAs) in coastal waters of South Korea. The water depth and sediment data were constructed by combining their sparse points of electronic navigation chart and survey data with high spatial resolution using the inverse distance weighting and natural neighbor interpolation method included in ArcGIS. The MMAs were integrated based on all shapefiles provided by several government agencies using ArcGIS because the areas should be used in an emergency case of ship. To test the validity of the constructed DB, we conducted a test application for grounding and anchoring zones using a ship accident case. The result revealed each area of possible grounding candidates and anchorages is calculated and displayed properly, excluding obstacle places.

EFFICIENT OPEN SOURCE DISTRIBUTED ERP SYSTEM FOR LARGE SCALE ENTERPRISE

  • ELMASSRY, MOHAMED;AL-AHAMADI, SAAD
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.280-292
    • /
    • 2021
  • Enterprise Resource Planning (ERP) is a software that manages and automate the internal processes of an organization. Process speed and quality can be increased, and cost reduced by process automation. Odoo is an open source ERP platform including more than 15000 apps. ERP systems such as Odoo are all-in-one management systems. Odoo can be suitable for small and medium organizations, but duo to efficiency limitations, Odoo is not suitable for the large ones. Furthermore, Odoo can be implemented on both local or public servers in which each has some advantages and disadvantages such as; the speed of internet, synced data or anywhere access. In many cases, there is a persistent need to have more than one synchronized Odoo instance in several physical places. We modified Odoo to support this kind of requirements and improve its efficiency by replacing its standard database with a distributed one, namely CockroachDB.