• 제목/요약/키워드: Multimedia encryption

검색결과 150건 처리시간 0.021초

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

뇌파 기반의 인증시스템을 위한 EEG 암호화 기법 (An EEG Encryption Scheme for Authentication System based on Brain Wave)

  • 김정숙;정장영
    • 한국멀티미디어학회논문지
    • /
    • 제18권3호
    • /
    • pp.330-338
    • /
    • 2015
  • Gradually increasing the value of the technology, the techniques of the various security systems to protect the core technology have been developed. The proposed security scheme, which uses both a Password and the various devices, is always open by malicious user. In order to solve that problem, the biometric authentication systems are introduced but they have a problem which is the secondary damage to the user. So, the authentication methods using EEG(Electroencephalography) signals were developed. However, the size of EEG signals is big and it cause a lot of problems for the real-time authentication. And the encryption method is necessary. In this paper, we proposed an efficient real-time authentication system applied encryption scheme with junk data using chaos map on the EEG signals.

An Effective Encryption Algorithm for 3D Printing Model Based on Discrete Cosine Transform

  • Pham, Ngoc-Giao;Moon, Kwnag-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제21권1호
    • /
    • pp.61-68
    • /
    • 2018
  • In this paper, we present an effective encryption algorithm for 3D printing models in the frequency domain of discrete cosine transform to prevent illegal copying, access in the secured storage and transmission. Facet data of 3D printing model is extracted to construct a three by three matrix that is then transformed to the frequency domain of discrete cosine transform. The proposed algorithm is based on encrypting the DC coefficients of matrixes of facets in the frequency domain of discrete cosine transform in order to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm is provide a better method and more security than previous methods.

RTP를 위한 보안 제어 프로토콜 구현 (Implementation of Security Control Protocol for Real-Time Protocol)

  • 홍종준
    • 한국컴퓨터정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.144-149
    • /
    • 2003
  • 멀티미디어 데이터는 실시간 제약을 갖고 있기 때문에 암호화/복호화로 인한 지연이 실시간 제약에 미치는 영향을 최소로 하면서 암호화를 하기 위해서는 네트워크 트래픽과 부하에 적응하여 암호화 알고리즘을 변경하기 위한 방법이 필요하다. 또한 다수가 참여하는 멀티미디어 서비스 진행 중에 서비스 이용을 중지한 사용자는 RTP payload의 암호화 키를 알고 있기 때문에 이 사용자로부터 RTP payload를 보호하기 위해서는 암호화 키를 변경하기 위한 방법이 필요하다. 따라서 본 논문에서는 RTP payload의 암호화를 위해 암호화 알고리즘과 암호화 키를 변경하기 위한 RPT 보안제어 프로토콜을 설계하고 구현하였다.

  • PDF

고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현 (Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography)

  • 유연수;이상곤
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Development of Security Service for Mobile Internet Banking Using Personal Digital Assistants

  • Choo, Young-Yeol;Kim, Jung-In
    • 한국멀티미디어학회논문지
    • /
    • 제7권12호
    • /
    • pp.1719-1728
    • /
    • 2004
  • The fusion of Internet technology and applications with wireless communication provides a new business model and promises to extend the possibilities of commerce to what is popularly called mobile commerce, or m-commerce. In mobile Internet banking service through wireless local area network, security is a most important factor to consider. We describe the development of security service for mobile Internet banking on Personal Digital Assistants (PDAs). Banking Server and Authentication Server were developed to simulate banking business and to support certificate management of authorized clients, respectively. To increase security, we took hybrid approach in implementation: symmetric block encryption and public-key encryption. Hash function and random number generation were exploited to generate a secret key. The data regarding banking service were encrypted with symmetric block encryption, RC4, and the random number sequence was done with public-key encryption. PDAs communicate through IEEE 802.IIb wireless LAN (Local Area Network) to access banking service. Several banking services and graphic user interfaces, which emulatedthe services of real bank, were developed to verity the working of each security service in PDA, the Banking Server, and the Authentication Server.

  • PDF

모바일 멀티미디어 데이타를 위한, 의사난수생성기와 순열 기법을 결합한 효율적인 암호화 기법 (An Efficient Encryption Scheme Combining PRNG and Permutation for Mobile Multimedia Data)

  • 한정규;조유근
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제34권11호
    • /
    • pp.581-588
    • /
    • 2007
  • 디지털 저작권 관리 기법은 계산비용의 경감을 목적으로 컨텐츠 암호화를 위해 대칭 키 암호화 기법을 채택하였으며 데스크탑 환경에서는 강한 보안성과 적절한 암호화 속도를 가지는 AES를 주로 사용하고 있다. 그러나 낮은 성능의 프로세서와 제한된 전력환경에서 동작하는 모바일 기기에서는 더욱 낮은 계산 비용 실현과 에너지 소모 경감을 요구한다. 이에 본 논문에서는 모바일 기기에서 사용 가능한 효율적인 스트림 암호화 기법을 제안한다. 제안 기법은 의사 난수 생성기를 사용하여 원본 키 스트림을 생성한 다음 이에 동적 생성한 순열을 적용하여 확장 키 스트림을 생성한다. 확장 키 스트림을 평문과 논리 합하여 암호문을 생성한다. 순열을 이용하여 키 스트림 생성에 사용되는 의사 난수 생성기의 사용 횟수를 줄였기 때문에 일반 스트림 암호화 기법에 비해 멀티미디어 데이타의 암/복호화 속도가 빠르며 에너지 소모를 줄였다. 특히 제안 기법은 멀티미디어 파일의 임의 접근 시 일반 스트림 암호화 기법에 비해 약 2배의 속도향상을 보인다.

임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법 (A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors)

  • 문대성;정용화;반성범;문기영;김주만
    • 한국멀티미디어학회논문지
    • /
    • 제9권10호
    • /
    • pp.1304-1313
    • /
    • 2006
  • 21세기를 맞이하면서 정보통신기술의 발전과 인터넷 이용 확산 등으로 사용자 인증이 중요한 문제로 대두되고 있으며, 보다 강력한 사용자 인증을 위하여 생체인식 기술의 연구가 활발히 진행되고 있다. 그러나 사용자 인증을 위한 생체정보가 타인에게 도용된다면 패스워드나 PIN과 달리 변경이 불가능하므로 심각한 문제를 일으킨다. 본 논문에서는 센서에서 획득된 지문영상을 클라이언트로 안전하게 전송하는 프로토콜을 제안한다. 특히, 계산능력이 부족한 임베디드 프로세스를 내장한 지문센서에서 지문영상을 실시간으로 암호화하기 위하여 지문영상 전체를 암호화하는 대신, 지문영상의 특정 비트 평면만을 암호화하는 부분암호화 알고리즘을 제안한다. 일반적인 부분암호화 방법에서 사용되어지는 최상위 비트 평면으로 부분암호화를 착 경우 간단한 공격으로 지문의 융선정보를 알 수 있기 때문에 지문인식 시스템에 공격이 가능한 문제점이 있다. 본 논문에서는 이러한 문제를 해결하기 위하여, 최상위 비트정보 대신 최하위 비트정보를 이용하는 개선된 선택적 비트 평면 암호화 방법을 사용하였다. 제안된 알고리즘의 성능을 분석하기 위해 16비트 임베디드 프로세서를 가진 지문센서를 개발하고 부분암호화 방법을 구현한 결과, 기밀성 보장 및 실시간 처리가 가능함을 확인하였다.

  • PDF

New chaotic map development and its application in encrypted color image

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • 제8권2호
    • /
    • pp.131-142
    • /
    • 2021
  • This paper traces the process of constructing a new one-dimensional chaotic map, and will provide a simple application in color image encryption. The use of Sarkovskii's theorem will make it possible to determine the existence of chaos and restrict all conditions to ensure the existence of this new sequence. In addition, the sensitivity to initial conditions will be proved by Lyapunov's index value. Similarly, the performance of this new chaotic map will be illustrated graphically and compared with other chaotic maps most commonly used in cryptography. Finally, a humble color image encryption application will show the power of this new chaotic map.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제17권7호
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.