• Title/Summary/Keyword: Interface Security

Search Result 374, Processing Time 0.022 seconds

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Analysis and Design of Security Policy Server Applied Security Management Interface (보안관리 인터페이스를 적용한 보안정책 서버 분석 및 설계)

  • Choi, Byoung-Son;Lee, Seoung-Hyeon;Lee, Won-Gu;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1755-1758
    • /
    • 2003
  • 본 논문에서는 리눅스 상에 효율적인 보안 정책 관리를 위한 보안 정책 서버를 분석하고, 보안 정책 변경을 위한 인터페이스를 설계하였다. 리눅스는 소스가 공개된 운영체제이기 때문에, 보안상의 취약점을 이용하여 수많은 공격을 당하게 된다. 이러한 보안상의 문제를 해결하기 위하여 본 논문에서는 효율적인 정책 서버를 분석하여 리눅스에 적용함으로써, 리눅스가 가지는 보안상의 취약점을 해결하고자 하였다. 또한 관리자가 쉽게 정책을 적용할 수 있도록 보안 정책 적용을 위한 인터페이스를 설계하였다. 설계된 보안 정책 서버를 통하여 기존 리눅스 커널의 수정을 최소화하면서, 다른 접근제어 모델을 사용한 때에는 관련 모듈만 교체만 하면 되기 때문에 이미 설정된 보안 정책을 손쉽게 변화 할 수 있다

  • PDF

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (익명 통신로를 이용한 Escrow 전자화폐)

  • 김춘수;박춘식;전희종
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.29-46
    • /
    • 1999
  • Most of the previous researches for the electronic cash system guarantee unconditional untraceability for the purpose of individual privacy. Such untraceable electronic cash system that only focuses on untraceability, however, has side effect such as money laundering, criminal activities. We present a escrow cash model using anonymous channel that supports not only untaceability but also crime prevention, and prove the efficiency of our scheme relative to previous escrow cash systems.

Modernization of Education in the Context of Informatization and Automation

  • Moroz, Liudmyla;Shabelnyk, Tetiana;Zelinska-Liubchenko, Kateryna;Varakuta, Volodymyr;Push, Olena;Vysochan, Lesia;Blahun, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.41-46
    • /
    • 2021
  • The article studies the implementation of automation in the education process as a convenient interface of a document management system, on the one hand, which makes it easy to navigate the program, requiring from the user only a small amount of any special skills in working with electronic computers, on the other hand, it provides to the user operational information about all the data of interest to him, taking into account the access rights given to this or that information, stored in the enterprise database.

Advanced Real time IoT Eco-Driving Assistant System

  • Jouini, Anis;Cherif, Adnane;Hasnaoui, Salem
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.237-244
    • /
    • 2022
  • Eco-driving of vehicles today presents an advantage that aims to reduce energy consumption and limit CO2 emissions. The application for this option is possible to older vehicles. In this paper, we propose an efficient implementation for IoT (Internet of Things) system for controlling vehicle components that affect the quality of driving (acceleration, braking, clutch, gear change) via Smartphone using Wi-Fi and BLE as communication protocol. The user can see in real-time data from sensors that control driver action on vehicle driving systems such as acceleration, braking, and vehicle shifting through a web interface. Thanks to this communication, the user can control his driving quality and, hence, eco-driving can be achieved

A Novel Black Box Approach For Component Adaptation Technique

  • Jalender, B.;Govardhan, Dr. A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.81-90
    • /
    • 2022
  • There are several ways to improve software performance by using existing software. So, the developments of some programs are the most promising ways. However, traditional part programming studies usually assume that the components are recycled "as is". Existing models of component objects only provide limited support for partial adjustments, namely white box technologies ( copy-paste & inheritance) and the black-box methods (such as mixing and encapsulation). These technologies have problems related to recovery, efficiency, implementation of indirect costs, or their own problems. This paper suggests as JALTREE, The Black Box adaptation technology, which allows us for the implementation of previous components, but we need configurable the interface types, for measuring the adaptability. In this article we discussed the types of adjustments including component interfaces and component composition. An example of customizing JALTREE and component can be illustrated in several examples

Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image (어깨너머 공격에 강한 PIN과 패턴 이미지 기반의 사용자 인증 방법)

  • Kim, Young-Sam;Kim, Soo-Hyung;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1138-1141
    • /
    • 2010
  • 모바일 기기나 ATM에서의 사용자 인증에는 PIN(Personal Identification Number)이 주로 사용된다. 그 이유는, PIN은 사용자가 외우기 쉽고 단순한 UI(User Interface)로 구현이 가능하다는 장점이 있기 때문이다. 하지만 PIN은 어깨너머 공격에 취약하다는 단점이 있다. 기존의 연구들은 이미지 기반, 인식 기반, PIN과 이미지의 혼합방식을 이용한 다양한 사용자 인증 방법들을 제안하였다. 하지만 이들 연구는 모바일의 작은 화면을 고려하지 않아 구현이 어렵거나, 어깨너머 공격에 취약하거나, 사용자에게 기억에 대한 부담을 증가시키는 등의 문제점이 있다. 본 논문에서는 PIN과 패턴 이미지를 결합하여 모바일 기기에 적합하면서, 어깨너머 공격에 대해 기존의 방법들에 비해 안전하고 사용자가 외워야 하는 기호(숫자, 이미지 등)가 적은 사용자 인증 방법을 제안한다.

Impact and Challenges of IOT in Web Development

  • Dushyant H.Bodkhey;Kumudini Manwar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.55-58
    • /
    • 2024
  • IoT is a technology that unites the digital world by changing how people and machines interact with one another on the user interface. The Internet of Things has now entered the field of web development and increases user interaction with websites. And establish a clever and important position in the field of development. A web application is a piece of software that works via the Internet using web technology and web browsers to carry out particular tasks or functions. IoT is playing a bigger part in web development and designers are feeling more pressure to produce well-defined online outcomes.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.