• 제목/요약/키워드: Integrity Protection

검색결과 260건 처리시간 0.022초

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제17권11호
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

The Instruction Explanation Obligation - Focusing on Cases - (지도설명의무 - 판례 경향을 중심으로 -)

  • Lee, Jung Sun
    • The Korean Society of Law and Medicine
    • /
    • 제14권2호
    • /
    • pp.143-172
    • /
    • 2013
  • In order to achieve the purpose of treatment for patients by a doctor, the instruction explanation obligation, which means that he should give patients the description in more details to prepare for postoperative sequelae or complications, is common with the advice explanation obligation as a doctor should ex-plain some information to patients. Since the advice explanation obligation is the benefit and protection of the law for self determination right, but the instruction explanation obligation is one for the integrity of body and life, one can be distinct from the other. Judgments giving the instruction on the concept of instruction explanation obligation, specific methods of implementation and a range of compensation for damage are recently being made by courts at all levels including the Supreme Court. It is the time to systematize them. The contents which have been mainly discussed so far include the essence of above mentioned instruction explanation obligation. However, when the tendency of practice is considered, the efforts are required to admit the organic relevance between instruction explanation obligation and advice explanation obligation and to explain the relationship without any contradiction. For whereabouts of li-ability of proof, patients theoretically demonstrate the failure to implement it. However, when the theoretical consistency is maintained, it is likely to fail the intent to recognize the instruction explanation obligation and it may ask patients to prove something impossible to be proven. Thus, these things should be considered. Moreover, as the instruction explanation obligation is associated with medicine instruction obligation of a pharmacist and the coverage is being extended, it is the time to require the systematic study on the theoretical limit.

  • PDF

Critical Cleaning Requirements for Flip Chip Packages

  • Bixenman, Mike;Miller, Erik
    • Proceedings of the International Microelectronics And Packaging Society Conference
    • /
    • 한국마이크로전자및패키징학회 2000년도 Proceedings of 5th International Joint Symposium on Microeletronics and Packaging
    • /
    • pp.43-55
    • /
    • 2000
  • In traditional electronic packages the die and the substrate are interconnected with fine wire. Wire bonding technology is limited to bond pads around the peripheral of the die. As the demand for I/O increases, there will be limitations with wire bonding technology. Flip chip technology eliminates the need for wire bonding by redistributing the bond pads over the entire surface of the die. Instead of wires, the die is attached to the substrate utilizing a direct solder connection. Although several steps and processes are eliminated when utilizing flip chip technology, there are several new problems that must be overcome. The main issue is the mismatch in the coefficient of thermal expansion (CTE) of the silicon die and the substrate. This mismatch will cause premature solder Joint failure. This issue can be compensated for by the use of an underfill material between the die and the substrate. Underfill helps to extend the working life of the device by providing environmental protection and structural integrity. Flux residues may interfere with the flow of underfill encapsulants causing gross solder voids and premature failure of the solder connection. Furthermore, flux residues may chemically react with the underfill polymer causing a change in its mechanical and thermal properties. As flip chip packages decrease in size, cleaning becomes more challenging. While package size continues to decrease, the total number of 1/0 continue to increase. As the I/O increases, the array density of the package increases and as the array density increases, the pitch decreases. If the pitch is decreasing, the standoff is also decreasing. This paper will present the keys to successful flip chip cleaning processes. Process parameters such as time, temperature, solvency, and impingement energy required for successful cleaning will be addressed. Flip chip packages will be cleaned and subjected to JEDEC level 3 testing, followed by accelerated stress testing. The devices will then be analyzed using acoustic microscopy and the results and conclusions reported.

  • PDF

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • 제49권4호
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

Physicochemical tolerance ranges and ecological characteristics in two different populations of Carassius auratus and Cyprinus carpio

  • Kang, Seung Gu;Choi, Ji-Woong;An, Kwang-Guk
    • Journal of Ecology and Environment
    • /
    • 제38권2호
    • /
    • pp.195-211
    • /
    • 2015
  • The objectives of this research were to determine mean and maximum tolerance ranges of Carassius auratus ($C_a$) and Cyprinus carpio ($C_c$) populations on various physico-chemical parameters and ecological indicator metrics. Little is known about chemical tolerance ranges of the two species, even though these species are widely distributed species in aquatic ecosystems. Maximum tolerance ranges of $C_a$-population to total nitrogen (TN) and total phosphorus (TP) were $20.3mgL^{-1}$ and $2.0mgL^{-1}$, respectively. Optimal ranges of TN and TP in the $C_a$-population were $1.7-5.0mgL^{-1}$ and $0.06-0.30mgL^{-1}$, respectively. Such nutrient regimes of the $C_a$-population were evaluated as hypereutrophy, indicating high tolerance limits. The $C_c$-population had similar ecological characteristics to $C_a$-population, but the mean tolerance ranges of TN, TP, BOD, and COD were significantly (p < 0.05) greater than the $C_a$-population. Ecological patterns of trophic composition and tolerance guilds in the $C_a$-population were similar to those of the $C_c$-population. The model value of Index of Biological Integrity (IBI) of the habitat where C. auratus and C. carpio co-occurred averaged $15.0{\pm}4.3$ and $12.9{\pm}3.6$, respectively. Based on the modified criteria of the United States Environmental Protection Agency (Klemm et al. 1993), it indicated poor ecological health of both species. These results suggest that both species are highly tolerant to chemical and physical habitat conditions of waterbodies, and that the chemical tolerance range of $C_c$-population was higher than $C_a$-population.

Performance evaluation on Fault Current Controller System for the Applications of Smart Grid

  • Jang, Jae-Young;Lee, Woo-Seung;Lee, Ji-Ho;Hwang, Young-Jin;Jo, Hyun-Chul;Ahn, Min-Cheol;Hur, Kyeon;Ko, Tae-Kuk
    • Progress in Superconductivity and Cryogenics
    • /
    • 제14권2호
    • /
    • pp.12-15
    • /
    • 2012
  • This paper presents simulation and small-scale experimental tests of a fault current controller. Smart fault controller as proposed and proven conceptually in our previous work is promising technology for the smart power grid where distributed and even stochastic generation sources are prevalent and grid operations are more dynamic. Existing protection schemes simply limiting the fault current to the pre-determined set values may not show best performance and even lead to coordination failures, potentially leading to catastrophic failure. Thus, this paper designs fault current controller with a full bridge thyristor rectifier, embedding a superconducting coil for which the controller is electrically invisible during normal operation because the loss due to the coil is near-zero. When a fault occurs and the resulting current through the superconducting coil exceeds a certain value set intelligently based on the current operating condition of the grid, the magnitude of the fault current is controlled to this desired value by adjusting the firing angles of thyristors such that the overall system integrity is successfully maintained. Detailed time-domain simulations are performed and lab-scale testing circuits are built to demonstrate the desired functionality and efficacy of the proposed fault current controller.

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • 제9권10호
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • 제10C권1호
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • 제2권1호
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Fish Species Compositions and the Application of Ecological Assessment Models to Bekjae Weir, Keum-River Watershed (금강 수계 백제보에서 어류의 종 특성 평가 및 생태평가모델 적용)

  • Moon, Seong-Dae;Han, Jeong-Ho;An, Kwang-Guk
    • Journal of Environmental Science International
    • /
    • 제24권6호
    • /
    • pp.731-741
    • /
    • 2015
  • The objectives of study were to evaluate fish species compositions of trophic guilds and tolerance guilds and apply ecological fish assessment (EFA) models to Bekjae Weir, Keum-River Watershed. The EFA models were Stream Index of Biological Integrity (SIBI) used frequently for running water and Lentic Ecosystem Health Assessment (LEHA) used for assessments of stagnant water. The region of Bekjae Weir as a "four major river project" was originally a lotic ecosystem before the weir construction (2010, $B_{WC}$) but became more like lentic-lotic hybrid system after the construction (2011, $A_{WC}$). In the analysis of species composition and ecological bioindicator (fish), fish species with a preference of running water showed significant decreases (p < 0.05), whereas the species with a preference of stagnant water showed significant increases (p < 0.05). After the weir construction, relative abundances of tolerant species increased, and the proportion of insectivores decreased. This phenomenon indicated the changes of biotic compositions in the system by the weir construction. Applications of SIBI and LEHA models to the system showed that the two model values decreased at the same time after the weir construction ($A_{WC}$), and the region became more like lentic-lotic hybrid system, indicating the degradation of ecosystem health. The model values of SIBI were 19 and 16, respectively, in the BWC and AWC, and the health conditions were both "C-rank". In the mean time, the LEHA model analysis showed that the values was 28 in the BWC and 24 in the AWC, thus the health was turned to be "B-Rank" in the BWC and "C-Rank" in the AWC. indicating a degradation of ecological heath after the weir construction.