• Title/Summary/Keyword: Image Privacy

Search Result 101, Processing Time 0.024 seconds

Determinants of U.S. Buyer Loyalty toward Gobizkorea.com: A Study Focused on Country Image, E-Service Quality, and Satisfaction (미국 바이어의 고비즈코리아에 대한 충성도 결정요인: 국가이미지, 서비스 품질 및 만족도를 중심으로)

  • Chung, Jae-Eun;Oh, Jeong Suk;Jeong, So Won
    • Korea Trade Review
    • /
    • v.43 no.5
    • /
    • pp.203-232
    • /
    • 2018
  • Gobizkorea is an online B2B matching platform operated by the Small & Medium Business Corporation. Gobizkorea provides an opportunity for resource-poor SMEs to promote their products and exploit new market opportunities at low cost. The successful operation of Gobizkorea will contribute to the increased exports of Korean SMEs. Accordingly, the present study examined determinants of foreign buyer loyalty toward Gobizkorea.com focusing on country image, e-service quality, and satisfaction. One hundred two survey questionnaires were collected from U.S. buyers registered with Gobizkorea.com. Exploratory and confirmatory factor analysis confirmed three dimensions of e-service quality including information & efficiency, reliability & privacy, and prompt communication & delivery. The path analysis results showed that the country image of Korea significantly and positively affected these three dimensions of e-service quality. Information & efficiency and reliability & privacy positively influenced buyer satisfaction. Reliability & privacy and satisfaction had a positive impact on buyer loyalty. This study enhances the understanding of the foreign buyers use of the domestic e-market platform by examining of determinants of U.S. buyer loyalty toward Gobizkorea.

Privacy-Preserving Facial Image Authentication Framework for Drones (드론을 위한 암호화된 얼굴 이미지 인증 프레임워크 제안)

  • Hyun-A Noh;Joohee Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.229-230
    • /
    • 2024
  • 최근 드론으로 극한 환경에서 범죄 수배자 및 실종자를 탐색하는 시도가 활발하다. 이때 생체 인증 기술인 얼굴 인증 기술을 사용하면 탐색 효율이 높아지지만, 암호화되지 않은 인증 프로토콜 적용 시 생체 정보 유출의 위험이 있다. 본 논문에서는 드론이 수집한 얼굴 이미지 템플릿을 암호화하여 안전하게 인증할 수 있는 효율적인 생체 인증 프레임워크인 DF-PPHDM(Privacy-Preserving Hamming Distance biometric Matching for Drone-collected Facial images)을 제안한다. 수집된 얼굴 이미지는 암호문 형태로 서버에 전달되며 서버는 기존 등록된 암호화된 템플릿과의 Hamming distance 분석을 통해 검증한다. 제안한 DF-PPHDM을 RaspberryPI 4B 환경에서 직접 실험하여 분석한 결과, 한정된 리소스를 소유한 드론에서 효율적인 구현이 가능하며, 인증 단계에서 7.83~155.03 ㎲ (microseconds)가 소요된다는 것을 입증하였다. 더불어 서버는 드론이 전송한 암호문으로부터 생체 정보를 복구할 수 없으므로 프라이버시 침해 문제를 예방할 수 있다. 향후 DF-PPHDM에 AI(Artificial Intelligence)를 결합하여 자동화 기능을 추가하고 코드 최적화를 통해 성능을 향상시킬 예정이다.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

A Study of Generation for Changeable Face Template (가변 얼굴 생체템플릿 생성 방법에 대한 연구)

  • Jeong, Min-Yi;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.391-392
    • /
    • 2007
  • Changeable biometries has been suggested as a solution to the problems of enhancing privacy. In this paper, we proposed changeable biometrics for face recognition using on ICA based approach. ICA coefficient vector extracted from an input face image. The vector is scrambled randomly and a new face template is generated by addition of a couple of scrambled coefficients. When a transformed template is compromised, it is replaced by a new scrambling rule and addition.

  • PDF

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Right to delete and Right to be forgotten -Discuss on the condition of the right to delete (기사삭제 요구권과 잊혀질 권리 - 기사삭제의 인정기준에 관한 논의)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.13-22
    • /
    • 2014
  • The right to be forgotten is a world-wide issue after the decision of the European Court of Justice which accepted that right. This essay discusses about the guide lines for protecting the right to delete, a category of the right to be forgotten. I classified those guide lines as follows : (1) sensitiveness of the personal information, (2) offensiveness to reasonable and ordinary people, (3) intention of writing the article, (4) value of historical record, (5) importance of privacy comparing with right to know with time flow, (6) public figure, (7) article based on fact or opinion. To effectively protect right to be forgotten and delete, we have to consider Privacy Impact Assessment, using blind system, unification of multiple institutions, and reforming press arbitration system.

Argument on the right to be forgotten and the freedom of expression-focused on the reforming the press arbitration system (잊혀질 권리와 표현의 자유를 둘러싼 논의 - 언론중재제도의 개선과 관련하여)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.1-11
    • /
    • 2014
  • With the drastic development of technology for almost eternally saving digital information, cases for giving sufferings to a person who deserves to enjoy privacy have increased. So I study the right to be forgotten focusing on the collision between that right and freedom of expression. I also study the concept of the right to be forgotten and its legal basis for the protection of that right. That right can be protected mainly by the self-decision making right under the Article 10, and secondly the privacy right under the Article 17 of the Constitutional Law. The Press Arbitration Law can be applied to protect the right to be forgotten, but that Law needs the revision of time-limit clause for complain, protection clause for the right to ask to delete factual past article, and the clause of staleness doctrine for the consent of giving personal information.

How the Strength of Parent Brand Associations Influences the User Acceptance of Extended brand: Internet of Things Perspective (사용자의 확장브랜드 수용과 모브랜드의 영향력: 사물인터넷을 중심으로)

  • Lim, Hyun A;Kwon, Hyuk-Jun;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.49-65
    • /
    • 2018
  • The purpose of the research is to identify the effects of brand evidence, brand personality and negative factors on extended brand trust and customer purchase intention in IoT (Internet of Things) service. Negative factors include scarcity marketing and privacy concern. To achieve this objective, we analyzed the 269 respondents who had used Xiaomi products at least more than once. The results of this study are as follows: First, it was found that core service, self-image congruence of brand evidence and brand personality has a positive influence on extended brand trust. But, perceived price of brand evidence is not related to extended brand trust. Secondly, Scarcity marketing influenced extended brand trust. But, Privacy concern is not related to extended brand trust. Consumers did not realize privacy because of technological innovation of IoT. Thus, the research has a different significance from antecedent research.