• Title/Summary/Keyword: Integrity Check

Search Result 154, Processing Time 0.03 seconds

ASCII data hiding method based on blind video watermarking using minimum modification of motion vectors (움직임벡터의 변경 최소화 기법을 이용한 블라인드 비디오 워터마킹 기반의 문자 정보 은닉 기법)

  • Kang, Kyung-Won;Ryu, Tae-Kyung;Jeong, Tae-Il;Park, Tae-Hee;Kim, Jong-Nam;Moon, Kwang-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.78-85
    • /
    • 2007
  • With the advancement of the digital broadcasting and popularity of the Internet, recently, many studies are making on the digital watermarking for the copyright protection of digital data. This paper proposes the minimum modification method of motion vector to minimize the degradation of video quality, hiding subtitles of many language and information of OST(original sound track), character profiles, etc. as well as the copyright protection. Our proposed algorithm extracts feature vector by comparing motion vector data with watermark data, and minimize the modification of motion vectors by deciding the inversion of bit. Thus the degradation of video quality is minimized comparing to conventional algorithms. This algorithm also can check data integrity, and retrieve embedded hidden data simply and blindly. And our proposed scheme can be useful for conventional MPEG-1, -2 standards without any increment of bit rate in the compressed video domain. The experimental result shows that the proposed scheme obtains better video quality than other previous algorithms by about $0.5{\sim}1.5dB$.

IR Camera Technique Application for Evaluation of Gas Turbine Blades Covering Integrity (가스터빈의 코팅층 건정성 평가를 위한 적외선 열화상 카메라 기법 활용)

  • Kim J.Y.;Yang D.J.;Choi C.J.;Park S.G.;Ahn Y.S.;Jeong G.J.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.192-196
    • /
    • 2005
  • Key part of main equipment in a gas turbine may be likely to be damaged due to operation under high temperature, high pressure, high-speed rotation, etc. Accordingly, the cost for maintenance increases and the damaged parts may cause generation to stop. The number of parts for maintenance also increases, but diagnostics technology fur the maintenance actually does not catch up with the demand. Blades are made of precipitation hardening Ni superalloy IN738 and the like for keeping hot strength. The surface of a blade is thermal-sprayed, using powder with main compositions such as Ni, Cr, Al, etc. in order to inhibit hot oxidation. Conventional regular maintenance of the coating layer of a blade is made by FPI (Fluorescent Penetrant Inspection) and MTP (Magnetic Particle Testing). Such methods, however, are complicated and take long time and also require much cost. In this study, defect diagnostics were tested for the coating layer of an industrial gas turbine blade, using an infraredthermography camera. Since the infrared thermography method can check a temperature distribution on a wide range of area by means of non-contact, it can advantageously save expenses and time as compared to conventional test methods. For the infrared thermography method, however, thermo-load must be applied onto a tested specimen and it is difficult to quantify the measured data. To solve the problems, this essay includes description about producing a specimen of a gas turbine blade (bucket), applying thermo-load onto the produced specimen, photographing thermography images by an infrared thermography camera, analyzing the thermography images, and pre-testing for analyzing defects on the coating layer of the gas turbine blade.

  • PDF

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code

  • Han, Mu;Wang, Yunwen;Ma, Shidian;Wan, Ailan;Liu, Shuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1100-1123
    • /
    • 2019
  • A code-based cryptosystem can resist quantum-computing attacks. However, an original system based on the Goppa code has a large key size, which makes it unpractical in embedded devices with limited sources. Many special error-correcting codes have recently been developed to reduce the key size, and yet these systems are easily broken through side channel attacks, particularly differential power analysis (DPA) attacks, when they are applied to hardware devices. To address this problem, a higher-order masking scheme for a McEliece cryptosystem based on the quasi-dyadic moderate density parity check (QD-MDPC) code has been proposed. The proposed scheme has a small key size and is able to resist DPA attacks. In this paper, a novel McEliece cryptosystem based on the QD-MDPC code is demonstrated. The key size of this novel cryptosystem is reduced by 78 times, which meets the requirements of embedded devices. Further, based on the novel cryptosystem, a higher-order masking scheme was developed by constructing an extension Ishai-Sahai-Wagne (ISW) masking scheme. The authenticity and integrity analysis verify that the proposed scheme has higher security than conventional approaches. Finally, a side channel attack experiment was also conducted to verify that the novel masking system is able to defend against high-order DPA attacks on hardware devices. Based on the experimental validation, it can be concluded that the proposed higher-order masking scheme can be applied as an advanced protection solution for devices with limited resources.

A Study on the Internal Flow Analysis of High-pressure Shut-off Valve for CNG Charging Station Piping System (CNG 충전소 배관시스템용 고압 차단밸브에 대한 내부 유동해석에 관한 연구)

  • Chin, Do-Hun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.773-779
    • /
    • 2021
  • CNG, which has recently been attracting attention as an alternative fuel in the transportation field to reduce emissions caused by global warming, is natural gas with abundant reserves and mainly composed of methane. Being in a gaseous state, natural gas requires the compression and liquefaction processes for transportation. Until now, general shut-off valves for liquid and gas piping have been developed in Korea, but there are few studies on shut-off valves for high pressures of about 200 bar. Currently, research on the flow analysis of valves is being actively conducted around the world. However, there are relatively many studies on large valves such as low-pressure valves or shipbuilding and marine, and the safety factor through structural analysis to check the structural integrity of the valve is checked at the design stage. Since it is necessary to have a fast response speed while minimizing pressure and speed loss due to flow change, basic research was conducted on the flow analysis of the valve to secure design data, and the numerical analysis was performed on high-pressure automatic shut-off valves applied to CNG refueling stations. After securing the basic valve shape through reverse engineering for advanced products, we compared the valve flow coefficient Cv coefficient with advanced products. As a result, it was found that the reverse engineering model was at the level of about 60%. However, we compared the Cv coefficient by modifying the reverse engineering model, and the result showed that it was improved to about 96%.

Appraisal Method for Similarity of Large File Transfer Software (대용량 파일 전송 소프트웨어의 동일성 감정 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.11-16
    • /
    • 2021
  • The importance of software is increasing due to the development of information and communication, and software copyright disputes are also increasing. In this paper, the source of the submitted programs and the files necessary for the execution of the program were taken as the scope of analysis. The large-capacity file transfer solution program to be analyzed provides additional functions such as confidentiality, integrity, user authentication, and non-repudiation functions through digital signature and encryption of data.In this paper, we analyze the program A, program B, and the program C. In order to calculate the program similarity rate, the following contents are analyzed. Analyze the similarity of the package structure, package name, source file name in each package, variable name in source file, function name, function implementation source code, and product environment variable information. It also calculates the overall similarity rate of the program. In order to check the degree of agreement between the package structure and the package name, the similarity was determined by comparing the folder structure. It also analyzes the extent to which the package structure and package name match and the extent to which the source file (class) name within each package matches.

Seismic Performance Evaluation of Dry Precast Concrete Beam-Column Connections with Special Moment Frame Details (특수모멘트골조 상세를 갖는 건식 프리캐스트 콘크리트 보-기둥 접합부의 내진성능평가)

  • Kim, Seon Hoon;Lee, Deuck Hang;Kim, Yong Kyeom;Lee, Sang Won;Yeo, Un Yong;Park, Jung Eun
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.27 no.5
    • /
    • pp.203-211
    • /
    • 2023
  • For fast-built and safe precast concrete (PC) construction, the dry mechanical splicing method is a critical technique that enables a self-sustaining system (SSS) during construction with no temporary support and minimizes onsite jobs. However, due to limited experimental evidence, traditional wet splicing methods are still dominantly adopted in the domestic precast industry. For PC beam-column connections, the current design code requires achieving emulative connection performances and corresponding structural integrity to be comparable with typical reinforced concrete (RC) systems with monolithic connections. To this end, this study conducted the standard material tests on mechanical splices to check their satisfactory performance as the Type 2 mechanical splice specified in the ACI 318 code. Two PC beam-column connection specimens with dry mechanical splices and an RC control specimen as the special moment frame were subsequently fabricated and tested under lateral reversed cyclic loadings. Test results showed that the seismic performances of all the PC specimens were fully comparable to the RC specimen in terms of strength, stiffness, energy dissipation, drift capacity, and failure mode, and their hysteresis responses showed a mitigated pinching effect compared to the control RC specimen. The seismic performances of the PC and RC specimens were evaluated quantitatively based on the ACI 374 report, and it appeared that all the test specimens fully satisfied the seismic performance criteria as a code-compliant special moment frame system.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

Postoperative Imaging of Rotator Cuff Tear (회전근개 파열의 수술 후 영상)

  • Min Hee Lee;Hee Jin Park;Ji Na Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.82 no.6
    • /
    • pp.1388-1401
    • /
    • 2021
  • Postoperative imaging of the rotator cuff may be performed routinely, even if pain or disability develops after surgery or if there are no symptoms. Postoperative images are obtained through MRI or US, and the purpose is to confirm the integrity of the restored tendon in general. Postoperative MRI has a relatively poor diagnostic accuracy compared to that of preoperative images because various materials used in surgeries deteriorate the image quality. US can dynamically check the condition of the restored tendon and avoid artifacts from the surgical instruments used for recovery. Although imaging findings are not always consistent with the clinical symptoms or prognosis, sub-deltoid fluid retention is more important for pain and functional recovery than the thickness of the reconstructed tendon. Strain elastography can also be a useful method for predicting the prognosis.

Visually evoked potential in children with mitochondrial respiratory chain defects (소아 사립체 질환에서 시각 유발전위검사의 유용성)

  • Song, Ji Eun;Kim, He Min;Lee, Sang-Chul;Park, Yoon-Gghil;Byeon, Suk-Ho;Lee, Young-Mock;Lee, Joon-Soo;Kim, Heung-Dong
    • Clinical and Experimental Pediatrics
    • /
    • v.52 no.4
    • /
    • pp.471-475
    • /
    • 2009
  • Purpose : Mitochondrial disorders are a clinical entity characterized by diverse symptoms and signs of involvement of various systems. Furthermore, the disorders are known to show ophthalmologic manifestations as well as neurological findings. Visually evoked potential is a sensitive measure to check the integrity of the visual pathway. In this study, we have investigated the value of visually evoked potential in mitochondrial disorders with respiratory chain defects. Methods : Nineteen patients diagnosed with mitochondrial respiratory chain complex I defect as confirmed by spectrophotometric enzyme assay in muscle samples were enrolled for this study. The patients underwent a visually evoked potential study. We classified the results into four groups and compared these with clinical ophthalmologic findings. Results : Among the 19 patients, 14 showed abnormal visually evoked potential findings. Seven patients showed abnormal clinical ophthalmologic findings. All patients with abnormal ophthalmologic findings showed abnormal visually evoked potential findings. Among the 12 patients with normal ophthalmologic findings, seven showed abnormal results in visually evoked potential. Conclusion : Visually evoked potential study could be used as an effective screening tool for mitochondrial disorders to detect ophthalmologic and neurological abnormalities.