• Title/Summary/Keyword: Media Security

Search Result 734, Processing Time 0.029 seconds

Information Needs and Behavior of North Korean Refugees (북한이탈주민의 정보요구와 정보행태에 관한 연구 - 부산지역 거주자를 중심으로 -)

  • Cho Yong-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.121-149
    • /
    • 2006
  • In recent days North Korean refugees. who hope to move into and settle in South Korea, have been rapidly increasing. However their adaptation to South Korea is reported to have not been so much successful as they expected. Considering such situations, this study attempts to investigate their information needs and behavior. North Korean refugees have various and strong information needs for settlement and daily life. The strongest were information needs related to economic Problem, specifically job and business related information needs. It was followed by information needs related to social welfare, health and security child care and education, and North Korean situation In order to meet their information needs. North Korean refugees were heavily dependent on informal interpersonal information sources such as their family members. friends. and their own neighborhoods. as compared to such formal interpersonal information sources as Public officers. social welfare agents, and NGOs members. Meanwhile. their usage of mass media such as TV. newspapers, and internet as information sources was also heavy However the overall information environment surrounding them appeared to be relatively inferior to that of average South Koreans.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

Smart Card Based User Authentication Scheme Secure Against Password Guessing Attack

  • Joo, Young-Do
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.182-188
    • /
    • 2011
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, this paper proposes the improved user authentication scheme based on the hash functin and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the proposed scheme is more secure and efficient than Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

A Comparative Study on the Safety and Health Education System between Korea and other Countries (한국과 주요 외국의 안전보건교육제도에 관한 비교 연구)

  • Jung, Seung Rae;Park, Hyun Jin;Chang, Seong Rok
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • After the Se-wol ferry disaster in Korea, the safety issue was highly spotlighted in a number of media, and consequently the ministry of public safety and security was newly established under the public attention. In addition to this, a recent earthquake in Gyeonju suggested the training issues for public such as evacuation and public safety. Regarding the industry, one of significant reasons causing the accidents were inadequate training, in execution of safety manual or inexperienced first response. Although the engineering or scientific study provided a basis of the industry safety and health in Korea a study focusing on the safety and health education system should be highlighted in that the law is the only way to execute the policy. In this manner, the goal of current study was to compare the safety and health education system in Korea to other countries including America, England and Germany. Especially, the law for training method, contents, supervision and punishment was analyzed. Result showed (1) lack of a structured training course for educating safety and health education trainer, (2) no training system of safety and health education to public or workers, and (3) less specific law for supervision and punishment as compared to the America, England and Germany.

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

Object Tracking in HEVC Bitstreams (HEVC 스트림 상에서의 객체 추적 방법)

  • Park, Dongmin;Lee, Dongkyu;Oh, Seoung-Jun
    • Journal of Broadcast Engineering
    • /
    • v.20 no.3
    • /
    • pp.449-463
    • /
    • 2015
  • Video object tracking is important for variety of applications, such as security, video indexing and retrieval, video surveillance, communication, and compression. This paper proposes an object tracking method in HEVC bitstreams. Without pixel reconstruction, motion vector (MV) and size of prediction unit in the bitstream are employed in an Spatio-Temporal Markov Random Fields (ST-MRF) model which represents the spatial and temporal aspects of the object's motion. Coefficient-based object shape adjustment is proposed to solve the over-segmentation and the error propagation problems caused in other methods. In the experimental results, the proposed method provides on average precision of 86.4%, recall of 79.8% and F-measure of 81.1%. The proposed method achieves an F-measure improvement of up to 9% for over-segmented results in the other method even though it provides only average F-measure improvement of 0.2% with respect to the other method. The total processing time is 5.4ms per frame, allowing the algorithm to be applied in real-time applications.