• Title/Summary/Keyword: Protection of trace

Search Result 61, Processing Time 0.025 seconds

Study on RFID tag Design and Privacy Protection (RFID tag 설계 및 프라이버시 보호에 관한 연구)

  • Baek, Hyun-Ok;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.41-49
    • /
    • 2007
  • RFID in which subminiature IC chip with the indentified information is built a core technique that can recognize, trace and manage various information of an object using radio frequency in the age of Ubiquitous. Several pressing matters about an infringement of Privacy and a security of private information should be settled as soon as possible because an information of specific circumstance can be collected and used without any awareness by others as well as a private information. In addition, various algorithms with high level of security, which is normally used in wire, can be hardly applied to RFID tag because of a lot of restrictions of tag. In this report, designed-RFID tag based on the standard of ISO/IEC 18000-6 and the problems which originated from the technical procedure of that design were analyzed, and the algorithm which could be applied to the designed-tag was also investigated.

  • PDF

Development of the Internet-Based Educational Software Package for the Design and Virtual Experiment of the Digital Logic Circuits (디지탈 논리회로 설계 및 모의 실험 실습을 위한 인터넷 기반 교육용 소프트웨어 패키지 개발)

  • Ki Jang-Geun;Ho Won
    • Journal of Engineering Education Research
    • /
    • v.2 no.1
    • /
    • pp.10-16
    • /
    • 1999
  • In this paper, we developed the internet-based educational software package (DVLab) for design and virtual experiment of the digital logic circuits. The DVLab consists of the LogicSim module for design and simulation of digital combinational/sequantial logic circuits, micro-controller application circuits and the BreadBoard module for virtual experiment and the Theory module for lecture and the Report/ReportChecker module and some other utility modules. All developed modules can be run as application programs as well as applets in the Internet. The LogicSim and the BreadBoard support real time clock function, output verification function on the designed circuits, trace function of logic values, copy-protection function of designed circuits and provide various devices including logic gates, TTLs, LED, buzzer, and micro-controller. The educational model of digital logic circuit design and experiment using the DVLab is also presented in this paper.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

Requirements for Reusable Infection Prevention and Control Measures for COVID-19 Response (코로나19 감염병 대응모델의 국제표준화 요건)

  • Ahn, Sun-Ju
    • Health Policy and Management
    • /
    • v.31 no.3
    • /
    • pp.244-254
    • /
    • 2021
  • The management of emerging infectious diseases cannot help but completely depend on non-pharmaceutical interventions in the early stages of the outbreak. Consequently, South Korea has developed and implemented the 3T (test-trace-treat) models, non-pharmaceutical infection prevention and control (IPC) measures, in response to the coronavirus disease 2019 (COVID-19) pandemic. The IPC measures have gained global attention, rendering them to be essential in the development of a shareable, reusable, and applicable protocol for future pandemics. This study was conducted to identify the requirements necessary for standardizing the IPC measures. Three new work items of the 18 3T models were proposed to ISO/TC 304 (International Organization for Standardization/Technical Committee 304; healthcare organization management). Requirements for each IPC measure, identified by participating members (P-members) countries during the ISO ballots, were analyzed in this study. The three new work items were approved by the P-members countries after a 3-month ballot. There was a consensus that the three IPC measure models should be International Standards (IS). Other comments include (1) the models should include not only COVID-19 but also any respiratory pandemic; and (2) keep donning of level D protection at screening sites as an optional protocol, in consideration for the lack of personal protective equipment. Standardization is a systematic process of developing internationally agreed-upon wisdom and knowledge that consider and respect the diversity and universality of each country. It is expected that such standardized applicable IPC measure models contribute to global efforts to rapidly respond to a public health emergency of international concern during its early stages.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

The Improved Method for Precise Determination of Pu Isotope Ratio using MC-ICP-MS (다중검출기유도결합플라즈마질량분석기를 이용한 Pu 동위원소비 정밀 분석법)

  • Yim, Seong-A;Han, Eun-Mi;Chae, Jung-Seok;Yun, Ju-Young
    • Journal of Radiation Protection and Research
    • /
    • v.35 no.3
    • /
    • pp.117-123
    • /
    • 2010
  • Plutonium is by far the most important of the transuranic elements which have been released into the environment due to radio-toxicity and long term radiation effects on humans. And Pu isotope ratio ($^{240}Pu/^{239}Pu$) is of great interest because this ratio is used as a fingerprint for different sources. Mass spectrometry has been used as an useful atom counting technique with several advantages over decay counting techniques for the determination of Pu isotopes. It enables a determination of Pu isotope ratio in the environmental samples with a low detection limit and a short determination time. An ICP-MS is the representative mass spectrometry for Pu determination. In this study, the precision of $^{240}Pu/^{239}Pu$ isotope ratio was improved by using 4 multiple ion counters of MC-ICP-MS. The detection limit of $^{239}Pu$ and $^{240}Pu$ were $0.10\;fg\;ml^{-1}$ ($0.24\;{\mu}Bq\;ml^{-1}$), $0.12\;fg\;ml^{-1}$ ($0.97\;{\mu}Bq\;ml^{-1}$), respectively. The relative standard deviation of $^{240}Pu/^{239}Pu$ isotope ratio was less than 1 % in trace level. The various reference materials (seawater, soil and sediment) were analyzed to verify this method and their analytical results were in good agreement with the certified (or recommended value) value.

A Study and Analysis on Tritium Radioactivity and Environmental Behavior in Domestic NPPs (국내 원전 삼중수소 방사능 배출 및 환경 거동에 대한 분석 및 고찰)

  • Han, Sang Jun;Lee, Kyeong Jin;Yeom, Jeong Min;Shin, Dae Tewn
    • Journal of Radiation Protection and Research
    • /
    • v.40 no.4
    • /
    • pp.267-276
    • /
    • 2015
  • Several analyses on tritium that is the largest release of gas or liquid radioactive waste from domestic PWR and PHWR NPPs were carried out, such as release comparison, directional frequency of wind and tritium behavior changes in environmental samples. First of all, analysis result showed that tritium released from PHWR was more than ten times as gas and double to three times as liquid in comparison to PWR in 2013. Independent release management in NPP units is needed to precisely control and analyze tritium, since there were 2 units of some NPPs having the same amount of release during analysis. In analysis on frequency of wind direction, average range showed 1.7 to 11.5% by 16-point compass. In case of analysis on sampling points by wind direction, Result showed most of the sampling points are right in places. However, There are some areas needed to examine. In analysis on tritium concentration changes in environmental samples, tritium concentration near NPPs was higher than one far away from NPPs. In case of environmental samples far from PWR, a trace of tritium occur. While, tritium concentration near NPPs was more than or equal to one further from PHWR. In conclusion, tritium occurs considerably in PHWR and is lower than standard in samples. but, it is still detected. Therefore, it is needed to strengthen control in system in NPPs and to consistently monitor tritium in environment.

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

A Study on the Landscape Planning and Landscape Architecture Construction Principles by the Type Outside Relics (발굴유적 외부공간의 유형별 경관계획 및 조경시공 원칙 연구)

  • Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.58-69
    • /
    • 2018
  • The purpose of this study was to present specific standards for landscape planning and construction applicable to landscaping areas in various historical sites. The results are as follows: First, the types of historical sites are classified according to their preservation status and processing techniques, and the classification according to their status is divided into those that have been buried underground, such as those that have been exposed to the ground, such as buildings and structures, and those that have a reputation or a record of the sites. The classification according to the wartime processing technique was classified by such techniques as closures that isolate the site, penetration that can be seen on the site, and overlays where a separate protection facility is installed on the site. Second, the principles of landscape planning for display of historical sites are divided into the items that make up the historical site, surface treatment of the sites, tree planting, and installation of facilities. If the site is not a circular space, the area separating the space by different materials between the components is required. In the event that preservation of the historical site is required, it is deemed desirable to use the soil, and to do so, the use of grasses and shrubs is effectively considered to be effective. The introduction of plants and plants should be considered according to the nature of the space. Depending on the area and nature of the monument, the facility is required to take a cautious approach by reviewing its influence on the landscape and the additional excavation of the monument. Third, the readjustment method derived as a result of looking at the landscaping principle in the historical site space was classified as conservation of status, installation of protection facilities, burial, restoration, relocation, and reproduction. Preservation of the status quo is essential for limited landscape planning and should not affect the prototype of existing relics. The protection facility shall be installed where necessary to protect the relics, and when the soil is formed, the surface treatment shall be required to remove trees that could damage the site and prevent soil and soil oil from being lost after the site. The restoration shall establish a landscaping plan according to the circular preservation based on the clues to the circle. The transfer requires a landscaping plan to create an environment similar to the outer space of an existing site and should be able to highlight the value or location of the original site. The reenactment should have a landscaping plan to revive the landscape and atmosphere of the past for the now-defunct remains. Fourth, landscaping can simultaneously satisfy the preservation of excavation sites and the increase in exhibition effects. In order to protect the traces of the past and vitalize the site of the ruins today, specific measures are required, the creation of a park for historical sites that preserve the functions and value of the relics, and the formation of a shape of linked contents can be suggested as alternatives.