• 제목/요약/키워드: Information Security

검색결과 17,385건 처리시간 0.053초

휴대인터넷망을 이용한 VoIP 서비스 구현 (VoIP Service Implementation over IEEE 802.16e Broadband Wireless Access System)

  • 김윤식;정미영;정현민;이성춘
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.359-360
    • /
    • 2008
  • As broadband wireless access systems are widely accepted, VoIP service over the wireless network is being requested. Because previous VoIP implementations are designed to provide service over wired network, they does not consider security problem sufficiently that is one of the most vulnerable aspects of wireless communication. Therefore, this paper describes how to implement secure VoIP service over wireless network with minimum overhead.

  • PDF

ID 도난 시나리오에 강인한 불변 홍채 키 생성 방법 (Invariant Iris Key Generation Method Robust To Stolen Token Scenario)

  • 이연주;김재희
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.959-960
    • /
    • 2008
  • Recently, biometric authentication mechanism has been used to provide high level of security in cryptographic systems. In this paper, we propose an efficient method of generating invariant iris key to be applied in cryptographic systems. In order to generate iris key and improve the performance at the stolen token scenario, multiple random projection technique was combined with multiple linear transformation methods. From the experimental results, we proved that invariant iris keys were generated and the proposed method was robust to stolen token scenario.

  • PDF

단일 라운드 프로세스 방식의 IDEA 암호 알고리즘의 하드웨어 설계 (A VLSI Design of IDEA Cipher Algorithm Based On a Single Iterative Round Method)

  • 최영민;권용진
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(2)
    • /
    • pp.144-147
    • /
    • 2000
  • Data security is an important issue in today's computer networks. In order to construct a safe infra in the open communication network, a cryptography is necessarily applied to several communication application fields like a high-speed networking system supporting real-time operation. A cryptography which has already realized by a software is designed by using a hardware to improve a throughput. In this paper, we design hardware architecture of IDEA by using a single iterative round method to improve a encryption throughput. In addition, we intend to develop a hardware design methodology that a specific cryptography operate with high-speed. The hardware model is described in VHDL and synthesized by the Samsung KG 80 Library in the Synopsys development software tool. With a system clock frequency 20MHz, this hardware permits a data conversion rate of more than 116 Mbit/s.

  • PDF

구조화된 에지정합을 통한 영상 열에서의 이동물체 에지검출 (Moving Object Edge Extraction from Sequence Image Based on the Structured Edge Matching)

  • 안기옥;채옥삼
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 신호처리소사이어티 추계학술대회 논문집
    • /
    • pp.425-428
    • /
    • 2003
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algorithm from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

  • PDF

정보보호시스템 공통평가기준 기술동향 (The Technology Trend of Common Criteria for Information Security System)

  • 김광식;남택용
    • 전자통신동향분석
    • /
    • 제17권5호통권77호
    • /
    • pp.89-101
    • /
    • 2002
  • 이제 공통평가기준(CC)의 도입은 거를 수 없는 대세로 자리 잡고 있으며, 국내에서도 CC를 도입하기 위해 인증기관과 평가기관들이 도입을 위한 준비를 서두르고 있으나 개발자 입장에서는 아직 미흡한 실정이다. 따라서, 본 고에서는 CC를 고려하여 정보보호시스템을 개발하고자 하는 연구기관 및 업체에서 개발전략을 수립하는 데 도움이 될 수 있는 CC 관련 기술동향을 살펴보았다. 먼저, 기존 정보보호시스템 평가기준인 TCSEC과 ITSEC에 대해 간략히 살펴본 후, 국제간에 상호 인증을 받을 수 있는 정보보호시스템 공통평가기준에 대해 CC 출현 배경, CC 표준 규격, PP와 ST 개발동향, CC의 최근 표준화동향 관점에서 살펴본다. 그리고, 연구개발을 추진하는 개발자 입장에서 연구개발체계에 CC를 어떻게 적용할 것인가에 대한 방안을 제시한다. 이를 위해 먼저, CC 관련 주요 이슈에 대해 ICCC’2002를 통해 알게 된 내용을 위주로 살펴보고, 연구개발체계에 CC 도입시 개발자들이 고려해야 할 개발 보증 증거물들에 대해 살펴본다.

일본의 3D 연구개발 정책동향 (Trends of 3D R&D Policy in Japan)

  • 김방룡
    • 전자통신동향분석
    • /
    • 제27권2호
    • /
    • pp.149-157
    • /
    • 2012
  • 최근까지 정체 국면에 있던 3D 산업이 2012년부터는 런던 올림픽과 여수 EXPO 등 글로벌 이벤트 발생으로 관련 산업이 활성화될 것으로 전망되고 있다. BBC 등 글로벌 미디어들도 3D 방송을 본격화할 예정이어서 3D 콘텐츠 시장이 국내외적으로 급성장할 것으로 기대된다. 우리나라는 아직까지 3D 산업이 초기 시장이기 때문에 향후 3D 산업을 육성 발전시키기 위해서는 정부의 역할이 중요하다고 할 수 있다. 본고의 목적은 정부 주도로 연구개발을 수행하면서 3D 연구개발 분야에서 세계를 선도하고 있는 일본의 3D 연구개발 정책동향을 살펴보고, 우리나라에 주는 시사점을 발굴하는 것이다. 이러한 목적을 달성하기 위하여 본고에서는 'UNS(Universal Communications, New Generation Networks, Security and Safety for the Ubiquitous Network Society) 전략 프로그램 II'를 중심으로 일본의 3D 기술개발 관련 주요 전략을 살펴 보았으며, 3D 기술개발을 위한 R&D 조직인 NICT(National Institute of Information and Communication Technology) 및 URCF(Ultra-Realistic Communications Forum)의 역할을 소개하는 한편, 일본의 3차원 영상기술에 의한 초현장감 커뮤니케이션 기술개발의 현황과 전망을 고찰하였다.

  • PDF

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • 제42권3호
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

An Exploration of the Changes in Consumption Expenditure of the Retired Households in South Korea

  • Jun, Sangmin;Kim, So-Yun
    • International Journal of Human Ecology
    • /
    • 제14권2호
    • /
    • pp.69-78
    • /
    • 2013
  • This study analyzed the changes in household consumption expenditure of retired households using Korean panel data. We compared the pre and post retirement-consumption levels in different consumption categories using panel data. Paired t-test showed that changes in the consumption patterns before and after retirement were not significant except for the households in the third net worth quartile. Analyzing the effect of retirement on the level of household consumption expenditure, this study found that the effect of retirement was not significant in overall, although retirement had a negative effect on the level of consumption expenditure among households in the lowest net worth distribution. Understanding changes in consumption patterns of retiring households provides important information to design social security policies.

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제26권5_6호
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

라체트 휠의 자동설계와 유한요소해석을 이용한 최적화에 관한 연구 (A Study on the Optimum Design using Finite Element Analysis and Automatic Design of Lachet Wheel)

  • 박진형;이승수;김민주;김태호;전언찬
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2001년도 춘계학술대회 논문집(한국공작기계학회)
    • /
    • pp.3-8
    • /
    • 2001
  • This study is an investigation for the ADS optimum design by using FEA. We write out program which express ADS perfectly and reduce the required time for correcting of model to the minimum in solution and manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we correct model by feedback date obtaining in solution process, repeat course following stress solution again and do modeling rachet wheel for optimum forming. That is our aim. In rachet wheel, greatest equivalence stress originates in key groove corner and KS standard is proved the design for security.

  • PDF