• Title/Summary/Keyword: Information code

Search Result 6,012, Processing Time 0.032 seconds

Secure and Efficient Code Encryption Scheme Based on Indexed Table

  • Cho, Sung-Kyu;Shin, Dong-Hwi;Jo, Hea-Suk;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • ETRI Journal
    • /
    • v.33 no.1
    • /
    • pp.60-70
    • /
    • 2011
  • Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Navigation Signals Based on Orthogonal Tiered Polyphase Code

  • Lee, Jewon;Kim, Jeong-been;Kim, Kap-jin;Song, Ki-won;Ahn, Jae Min
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.3
    • /
    • pp.97-105
    • /
    • 2015
  • A navigation signal based on orthogonal tiered polyphase code was proposed. For the proposed signal, tiered polyphase code was used as the code of a pilot channel. Tiered polyphase code is a complex number type code, and thus the pilot channel and data channel were separated using the Walsh code which makes the correlation between different codes become 0. The results of the simulation indicated that the correlation characteristics and signal acquisition performance of the proposed signal were identical to those of tiered polyphase code, and that the disadvantage of tiered polyphase code could be supplemented through a data channel in terms of signal tracking.

Building Code Typology and Application for Open BIM based Code Checking (개방형BIM기반의 건축법규검토를 위한 법규유형화 및 적용방안)

  • Kim, Inhan;Kim, Yongha;Choi, Jungsik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.19 no.3
    • /
    • pp.224-235
    • /
    • 2014
  • Recently, Productivity of the construction industry has been decreasing than other industries. Because of this, BIM is being spread in the construction industry. However, quality criteria for BIM data is insufficient. Regulation information is an important factor for initial architectural design evaluations. However, building code and related regulation are numerous. National building code structure in Korea is much more complex than other countries. The purpose of this study is to suggest the typology method of building code and apply to real regulations. To achieve this purpose, the authors have extracted required information to from original regulation for code checking and suggested mapping methods between extracted information and information of IFC scheme. In addition, the authors have represented EXPRESS-G diagram for extracting information from IFC scheme and suggested code checking method through stair case. Output of this study can be used as a base line data for automated code checking system based on open BIM. Automated code checking system will be utilized in architectural design evaluations and supported to increase design quality. It can be used to mount in SEUMTER that is the construction administration system of Ministry of Land, Infrastructure and Transport (MOLIT).

Implementation of Information Access Embedded System for the Blind People (시각 장애인을 위한 정보접근 임베디드 시스템의 구현)

  • Kim, Si-Woo;Lee, Jae-Kyun;Lee, Chae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.167-172
    • /
    • 2008
  • Since a 2-dimensional (2D) bar code can retrieve data and information quickly, it is widely used and recognized as a useful tool for many industrial applications. However, the information capacity of the 2D bar code is still limited. Recently the analog-digital code (AD code), which has the largest storage capacity yet contained in a code, has been developed, thereby expanding the bar code's application range because it overcomes the limitation of data capacity. In this paper, we present the AD code and implement an effective embedded system which can transform text information into voice using the 2D AD code and Text To Speech (TTS). This voice information can also be transmitted to blind people as well as the old by capturing the AD code on paper or in books.

Image Enhancement for Two-dimension bar code PDF417

  • Park, Ji-Hue;Woo, Hong-Chae
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.69-72
    • /
    • 2005
  • As life style becomes to be complicated, lots of support technologies were developed. The bar code technology is one of them. It was renovating approach to goods industry. However, data storage ability in one dimension bar code came in limit because of industry growth. Two-dimension bar code was proposed to overcome one-dimension bar code. PDF417 bar code most commonly used in standard two-dimension bar codes is well defined at data decoding and error correction area. More works could be done in bar code image acquisition process. Applying various image enhancement algorithms, the recognition rate of PDF417 bar code is improved.

  • PDF

Development of Pre-Specification for BIM-based Automated Building Code Checking (BIM 기반 건축법규 자동검토를 위한 사전정의서 개발)

  • Kim, Inhan;Jang, Jaemoon;Choi, Jungsik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.1
    • /
    • pp.31-41
    • /
    • 2016
  • Building Information Modeling (BIM) has been adopted in variety domain of construction industry. In this circumstances, interest of BIM model quality has been increased. In many countries, automated building code checking system by Industry Foundation Classes (IFC) has been developed and studied to use web based building permission systems. IFC is international standard of BIM format. However, the data structure of IFC does not include all of objects and properties about national building codes. In this paper, we developed the information specification between IFC data structure and national building code to increase interoperability. First, we drew the criteria from literature review to analyze the building code. And then, we analyzed building code and sorted objects and properties for automated building code checking. After that we made mapping table between the sorted data and IFC specification. Using the mapping table, we developed pre-specification about building codes information that does not exist in IFC specification. And the defined information can be used to develop the BIM modeling guide and national building permission system. The pre-specification support increasing the interoperability between user and automated building code checking system. Increasing thee interoperability makes improvement accuracy and reliability about result of automated building code checking.

Two Messages out of One 2D Matrix Bar Code

  • Cvitic, Filip;Pavcevic, Mario Osvin;Pibernik, Jesenka
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1105-1120
    • /
    • 2015
  • With the proposed principle of two-dimensional matrix bar code design based on masks, the whole surface of a 2D bar code is used for creating graphic patterns. Masks are a method of overlaying certain information with complete preservation of encoded information. In order to ensure suitable mask performance, it is essential to create a set of masks (mask folder) which are similar to each other. This ultimately allows additional error correction on the whole code level which is proven mathematically through an academic example of a QR code with a matrix of size $9{\times}9$. In order to create a mask folder, this article will investigate parameters based on Weber's law. With the parameters founded in the research, this principle shows how QR codes, or any other 2D bar code, can be designed to display two different messages. This ultimately enables a better description of a 2D bar code, which will improve users' visual recognition of 2D bar code purpose, and therefore users' greater enjoyment and involvement.

Implementation of information access embedded system using two-dimensional bar code and TTS (2D 바코드와 TTS를 활용한 정보접근 임베디드 시스템 구현)

  • Lee, Jae-Kyun;Kim, Si-Woo;Lee, Chae-Wook;Lee, Dong-In
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.31-36
    • /
    • 2006
  • As two dimensional bar code can collect data and information quickly, it is used and recognized as a useful tool for the many industrial application field. But the information capacity of two dimensional bar code is still limited. Recently, the two dimensional AD bar code (analog-digital code) that can increase its application range and overcome capacity limitation is developed. In this paper, we implement an effective system which can transform text information into voice using two dimensional AD bar code and TTS(Text To Speech). It can be transmitted to blind people by capturing the AD bar code on the papers or the books.

  • PDF

A Study on Reconstruction Vulnerability of Daugman's Iriscode

  • Youn, Soung-Jo;Anusha, B.V.S;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.35-40
    • /
    • 2019
  • In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.