• Title/Summary/Keyword: International User

Search Result 1,546, Processing Time 0.022 seconds

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

User Review Mining: An Approach for Software Requirements Evolution

  • Lee, Jee Young
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.124-131
    • /
    • 2020
  • As users of internet-based software applications increase, functional and non-functional problems for software applications are quickly exposed to user reviews. These user reviews are an important source of information for software improvement. User review mining has become an important topic of intelligent software engineering. This study proposes a user review mining method for software improvement. User review data collected by crawling on the app review page is analyzed to check user satisfaction. It analyzes the sentiment of positive and negative that users feel with a machine learning method. And it analyzes user requirement issues through topic analysis based on structural topic modeling. The user review mining process proposed in this study conducted a case study with the a non-face-to-face video conferencing app. Software improvement through user review mining contributes to the user lock-in effect and extending the life cycle of the software. The results of this study will contribute to providing insight on improvement not only for developers, but also for service operators and marketing.

User Experience and Satisfaction of Augmented Reality Applications -Focused on Chinese Fashion Consumers (증강현실 어플리케이션의 사용자 경험과 만족도 연구 -중국의 패션 소비자를 중심으로)

  • Chen, Qian-Qian;Dai, Ming-Yue;Park, Hyun-Jung
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.159-167
    • /
    • 2019
  • This study investigated the factors affecting the satisfaction of augmented reality (AR) fashion application focusing on user experience. The survey was conducted on 280 Chinese users who had used AR fashion applications. The results are summarized as follows. User experience had a significant effect on presence, flow, and satisfaction. Personalization service also increased user satisfaction. Presence influenced flow which enhanced satisfaction, indicating that presence had an indirect effect on satisfaction through flow. The results are expected to provide strategic implications by identifying factors that should be considered to help consumers experience products and improve satisfaction with applications in various industries focusing on augmented reality technology.

A Study on User Experience of Online Education Programs with Elementary Schools and Art Museums in Non-Face-to-Face Era (비대면 시대 미술관 학교 연계 온라인 교육프로그램 사용자 경험 연구)

  • Kim, Na Yeon;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.311-317
    • /
    • 2021
  • This study aims to propose an effective user experience of online class in the non-face-to-face through case analysis, focusing on school-linked education programs with art museums for elementary classes. To analysis domestic and international cases of school-liked education programs with art museum and to measure user experience, we were conducted with task test, in-depth interviews and surveys with experts. As a result, there were the pros and cons about the programs. Based on this, we propose a better method to increase the satisfaction of user experience for children. This study is significant in activating digital technology-based online education. This study expected to used as data on the user experience of a non-face-to-face online art education program in elementary schools in the future.

A Study on User Experience that Provides Psychological Stability during Mobile E-commerce One-touch Payment (모바일 이커머스 페이 원터치 결제 시 심리적 안정감을 제공하는 사용자 경험 연구)

  • Chang, Dah-Hee;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.277-283
    • /
    • 2022
  • The purpose of this study is to study the user experience that provides psychological stability when paying for mobile e-commerce pay one-touch. Through literature and case studies, e-commerce pay one-touch payments were identified, and user experiences were investigated through surveys and in-depth interviews. The survey based on Aaron Walter's model of user needs received a high average of functionality and usability for one-touch payments, but reliability and stability were somewhat low. Afterwards, four design improvement plans were presented to supplement psychological stability by analyzing in-depth interviews conducted based on the User's Eye View of User Experience Design model. This study is expected to be helpful in basic research on the payment experience where you can feel stable when taking one-touch payments.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Cost-Benefit based User Review Selection Method

  • Neung-Hoe Kim;Man-Soo Hwang
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.177-181
    • /
    • 2023
  • User reviews posted in the application market show high relevance with the satisfaction of application users and its significance has been proven from numerous studies. User reviews are also crucial data as they are essential for improving applications after its release. However, as infinite amounts of user reviews are posted per day, application developers are unable to examine every user review and address them. Simply addressing the reviews in a chronological order will not be enough for an adequate user satisfaction given the limited resources of the developers. As such, the following research suggests a systematical method of analyzing user reviews with a cost-benefit analysis, in which the benefit of each user review is quantified based on the number of positive/negative words and the cost of each user review is quantified by using function point, a technique that measures software size.