• Title/Summary/Keyword: Image Privacy

Search Result 100, Processing Time 0.028 seconds

CCTV Cooperation Authentication Model Using Block Chain (블록체인을 이용한 CCTV 협력 검증 모델)

  • Kwon, Yong-Been;An, Kyu-Hwang;Kwon, Hyeok-Dong;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.462-469
    • /
    • 2019
  • According to the survey of Ministry of the Interior and Safety in Korea, The number of public and private CCTV reached over ten million and is still increasing. Also with improving Image Processing Technology, it is possible to obtain diverse information. Recently, various services using CCTV are being provided. Therefore it is necessary to ensure CCTV image integrity. However there is no system to prove events in film yet. In this paper, we suggest system model that can manage, use and authenticate CCTV. This model allows a CCTV film to be verified by other nearby CCTVs' data. This model ensures film's integrity by using blockchain. And also, It addresses privacy problem in CCTV and file size problem in blockchain by using not large film data but much smaller analyzed data.

Emerging Internet Technology & Service toward Korean Government 3.0

  • Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.540-546
    • /
    • 2014
  • Recently a new government has announced an action plan known as the government 3.0, which aims to provide customized services for individual people, generate more jobs and support creative economy. Leading on from previous similar initiatives, the new scheme seeks to focus on open, share, communicate, and collaborate. In promoting Government 3.0, the crucial factor might be how to align the core services and policies of Government 3.0 with correspoding technologies. The paper describes the concepts and features of Government 3.0, identifies emerging Internet-based technologies and services toward the initiative, and finally provides improvement plans for Government 3.0. As a result, 10 issues to be brought together include: Smart Phone Applications and Service, Mobile Internet Computing and Application, Wireless and Sensor Network, Security & Privacy in Internet, Energy-efficient Computing & Smart Grid, Multimedia & Image Processing, Data Mining and Big Data, Software Engineering, Internet Business related Policy, and Management of Internet Application.

Development of Ward for multi-patients through Ethnographic Field Study (현장연구를 통한 다인용 병실 모델 개발)

  • Kwon, Young-Mi;Chung, Yean-Kang
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.1 no.1
    • /
    • pp.33-41
    • /
    • 1995
  • The purpose of this study is to heighten the reusing rate of hospital making its good image ultimately and giving a feeling of satisfaction to the patients, and to suggest more pleasant and comfortable environment to the wards which the patients are spending 24 hours a day from the view of nurse. The field study was in medical ward of the C University Hospital in Seoul through ethnographic method. The data were collected through observation and interview. On the basis of the results, the ward model for 4 patients was developed so as to be able to have their own area in consideration of privacy and improvement of life level & consciousness level of patients.

  • PDF

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

A Rolling Image based Virtual Keyboard Resilient to Spyware on Smartphones (스마트폰 환경에서 스파이웨어에 저항하는 동적 이미지 기반 가상 키보드 기법)

  • Na, Sarang;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1219-1223
    • /
    • 2013
  • Due to the fundamental features of smartphones, such as openness and mobility, a great deal of malicious software including spyware can be installed more easily. Since spyware can steal user's sensitive information and invade privacy, it is necessary to provide proper security mechanisms like secure virtual keyboards. In this paper, we propose a novel password input system to resist spyware and show how effectively it can reduce the threats.

Estimation and Watermarking of Motion Parameters in Model Based Image Coding

  • Park, Min-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1264-1267
    • /
    • 2002
  • In order to achieve an advanced human-computer interface system, it is necessary to analyze and synthesize facial motions just as they are in an interactive way, and to protect them from unwanted use and/or illegal use for their privacy, various uses in applications and the costs of obtaining motion parameters. To estimate facial motion, a method of using skin color distribution, luminance, and geometrical information of a face is employed. Digital watermarks are embedded into facial motion parameters and then these parameters are scrambled so that it cannot be understood. Experimental results show high accuracy and efficiency of the proposed estimation method and the usefulness of the proposed watermarking method.

  • PDF

Changeable Biometrics for PCA based Face recognition (주성분 분석 기반의 얼굴 인식을 위한 가변 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chul-Han;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.331-332
    • /
    • 2006
  • To enhance security and privacy in biometrics, changeable (or cancelable) biometrics have recently been introduced. The idea is to transform a biometric signal or feature into a new one for enrollment and matching. In this paper, we proposed changeable biometrics for face recognition using on PCA based approach. PCA coefficient vector extracted from an input face image. The vector is scrambled randomly and removed. When a transformed template is compromised, it is replaced by a new scrambling rule. In our experiment, we compared the performance between when PCA coefficient vectors are used for verification and when the transformed coefficient vectors are used for verification.

  • PDF

Relationships Among User Group, Gender and Self-disclosure in Social Media

  • Jang, Phil-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.25-31
    • /
    • 2018
  • In recent years the privacy issue on social media is often being discussed. The purpose of this study is to explore the relationships among user gender, user group according to user activity level (highly active vs less active) and self-disclosure in social media. We collected a total of 180 million tweets issued by 13 million twitter users for 12 months and investigated attributes of tweet (user's profile, profile image, description, geographic information, URL) which are related to self-disclosure and boundary impermeability. The results show there are significant (p<0.001) interactions between user gender, user group and each attribute of tweet that are related to self-disclosure and show that the patterns of self-disclosure are different across attributes. The results also show that the mean self-disclosure scores and boundary impermeability of top 10% highly active users are significantly higher than other less active users for all genders.

Decoding the Branded App Engagement Process: A Grounded Theory Approach

  • Harish Kumar;Nikhita Tuli
    • Asia pacific journal of information systems
    • /
    • v.31 no.4
    • /
    • pp.582-605
    • /
    • 2021
  • The study aims to explore the nature, drivers of BAE. In particular, how and why consumers engage with branded mobile apps. Since consumer engagement is a multi-dimensional and complex phenomenon, the authors took an interpretivist paradigm and used a grounded theory approach by interviewing 24 participants. The findings reveal that branded app engagement (BAE) is triggered by mainly three aspects, i.e., media characteristics (Privacy and security, customization, and convenience), brand-related aspects (brand image and product/service quality), and benefits sought (inherent and derived). More importantly, we uncover the underlying mechanism for each factor. Furthermore, the study explains the BAE process in its entirety from an app-centric perspective rather the brand powering the app. Thus, the study offers a fresh perspective and novel insights into the BAE process.

An Implementation of Federated Learning based on Blockchain (블록체인 기반의 연합학습 구현)

  • Park, June Beom;Park, Jong Sou
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.89-96
    • /
    • 2020
  • Deep learning using an artificial neural network has been recently researched and developed in various fields such as image recognition, big data and data analysis. However, federated learning has emerged to solve issues of data privacy invasion and problems that increase the cost and time required to learn. Federated learning presented learning techniques that would bring the benefits of distributed processing system while solving the problems of existing deep learning, but there were still problems with server-client system and motivations for providing learning data. So, we replaced the role of the server with a blockchain system in federated learning, and conducted research to solve the privacy and security problems that are associated with federated learning. In addition, we have implemented a blockchain-based system that motivates users by paying compensation for data provided by users, and requires less maintenance costs while maintaining the same accuracy as existing learning. In this paper, we present the experimental results to show the validity of the blockchain-based system, and compare the results of the existing federated learning with the blockchain-based federated learning. In addition, as a future study, we ended the thesis by presenting solutions to security problems and applicable business fields.