• Title/Summary/Keyword: Security SoC

Search Result 198, Processing Time 0.027 seconds

Hardware Implementation of Real-Time Blind Watermarking by Substituting Bitplanes of Wavelet DC Coefficients (웨이블릿 DC 계수의 비트평면 치환방법에 의한 실시간 블라인드 워터마킹 및 하드웨어 구현)

  • 서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.398-407
    • /
    • 2004
  • In this paper, a blind watermarking method which is suitable to the video compression using 2-D discrete wavelet transform was proposed and implemented into the hardware using VHDL(VHSIC Hardware Description Language). The goal of the proposed watermarking algorithm is the authentication about the manipulation of the watermark embedded image and the detection of the error positions. Considering the compressed video image, the proposed watermarking scheme is unrelated to the quantization and is able to concurrently embed or extract the watermark. We experimentally verified that the lowest frequency subband(LL4) is not sensitive to the change in the spatial domain, so LL4 subband was selected for the mark space. And the combination of the bitplanes which has the properties of both the minimum degradation of the image and the robustness was chosen as the embedded Point in the mark space in LL4 subband. Since we know the watermark embedded positions and the watermark is embedded by not varying the value but changing the value, the watermark can be extracted without the original image. Also, for the security when exposing the watermark embedded position, we embed the encrypted watermark by the block cipher. The proposed watermark algorithm shows the robustness against the general image manipulation and is easily transplanted into the image or video compressor with the minimal changing in the structure. The designed hardware has 4037 LABs(24%) and 85 ESBs(3%) in APEX20KC EP20K400CF672C7 FPGA of Altera and stably operates in 82MHz clock frequency.

Future Direction of National Health Insurance (국민건강보험 발전방향)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.27 no.4
    • /
    • pp.273-275
    • /
    • 2017
  • It has been forty years since the implementation of National Health Insurance (NHI) in South Korea. Following the 1977 legislature mandating medical insurance for employees and dependents in firms with more than 500 employees, South Korea expanded its health insurance to urban residents in 1989. Resultantly, total expenses of the National Health Insurance Service (NHIS) have greatly increased from 4.5 billion won in 1977 to 50.89 trillion won in 2016. With multiple insurers merging into the NHI system in 2000, a single-payer healthcare system emerged, along with separation policy of prescribing and dispensing. Following such reform, an emerging financial crisis required injections from the National Health Promotion Fund. Forty years following the introduction of the NHI system, both praise and criticism have been drawn. In just 12 years, the NHI achieved the fastest health population coverage in the world. Current medical expenditure is not high relative to the rest of the Organization for Economic Cooperation and Development. The quality of acute care in Korea is one of the best in the world. There is no sign of delayed diagnosis and/or treatment for most diseases. However, the NHI has been under-insured, requiring high-levels of out-of-pocket money from patients and often causing catastrophic medical expenses. Furthermore, the current environmental circumstances of the NHI are threatening its sustainability. Low birth rate decline, as well as slow economic growth, will make sustainment of the current healthcare system difficult in the near future. An aging population will increase the amount of medical expenditure required, especially with the baby-boomer generation of those born between 1955 and 1965. Meanwhile, there is always the problem of unification for the Korean Peninsula, and what role the health insurance system will have to play when it occurs. In the presidential election, health insurance is a main issue; however, there is greater focus on expansion and expenditure than revenue. Many aspects of Korea's NHI system (1977) were modeled after the German (1883) and Japanese (1922) systems. Such systems were created during an era where infections disease control was most urgent and thus, in the current non-communicable disease (NCD) era, must be redesigned. The Korean system, which is already forty years old, must be redesigned completely. Although health insurance benefit expansion is necessary, financial measures, as well as moral hazard control measures, must also be considered. Ultimately, there are three aspects that we must consider when attempting redesign of the system. First, the health security system must be reformed. NHI and Medical Aid must be amalgamated into one system for increased effectiveness and efficiency of the system. Within the single insurer system of the NHI must be an internal market for maximum efficiency. The NHIS must be separated into regions so that regional organizers have greater responsibility over their actions. Although insurance must continue to be imposed nationally, risk-adjustment must be distributed regionally and assessed by different regional systems. Second, as a solution for the decreasing flow of insurance revenue, low premium level must be increased to an appropriate level. Likewise, the national reserve fund (No. 36, National Health Insurance Act) must be enlarged for re-unification preparation. Third, there must be revolutionary reform of benefit package. The current system built a focus on communicable diseases which is inappropriate in this NCD era. Medical benefits must not be one-time events but provide chronic disease management. Chronic care models, accountable care organization, patient-centered medical homes, and other systems that introduce various benefit packages for beneficiaries must be implemented. The reimbursement system of medical costs should be introduced to various systems for different types of care, as is the case with part C (Medicare Advantage Program) of America's Medicare system that substitutes part A and part B. Pay for performance must be expanded so that there is not only improvement in quality of care but also medical costs. Moreover, beneficiaries of the NHI system must be aware of the amount of their expenditure through a deductible payment system so that spending can be profiled and monitored. The Moon Jae-in Government has announced its plans to expand the NHI system; however, it is important that a discussion forum is created so that more accurate analysis of the NHI, its environments, and current status of health care system, can take place for reforming NHI.

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer (Rijndael 알고리즘을 이용한 물리 계층 ATM 셀 보안 기법)

  • Im Sung-Yeal;Chung Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.83-94
    • /
    • 2006
  • This paper describes ATM cell encipherment method using Rijndael Algorithm adopted as an AES(Advanced Encryption Standard) by NIST in 2001. ISO 9160 describes the requirement of physical layer data processing in encryption/decryption. For the description of ATM cell encipherment method, we implemented ATM data encipherment equipment which satisfies the requirements of ISO 9160, and verified the encipherment/decipherment processing at ATM STM-1 rate(155.52Mbps). The DES algorithm can process data in the block size of 64 bits and its key length is 64 bits, but the Rijndael algorithm can process data in the block size of 128 bits and the key length of 128, 192, or 256 bits selectively. So it is more flexible in high bit rate data processing and stronger in encription strength than DES. For tile real time encryption of high bit rate data stream. Rijndael algorithm was implemented in FPGA in this experiment. The boundary of serial UNI cell was detected by the CRC method, and in the case of user data cell the payload of 48 octets (384 bits) is converted in parallel and transferred to 3 Rijndael encipherment module in the block size of 128 bits individually. After completion of encryption, the header stored in buffer is attached to the enciphered payload and retransmitted in the format of cell. At the receiving end, the boundary of ceil is detected by the CRC method and the payload type is decided. n the payload type is the user data cell, the payload of the cell is transferred to the 3-Rijndael decryption module in the block sire of 128 bits for decryption of data. And in the case of maintenance cell, the payload is extracted without decryption processing.

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

Ecological Functions and Losses of Traditional Korean Village Groves

  • Lee, D.-W.;Park, C.-R.
    • The Korean Journal of Quaternary Research
    • /
    • v.18 no.2 s.23
    • /
    • pp.65-66
    • /
    • 2004
  • There have been groves, in many cases, along with hedgerows and remnant forests around a traditional Korean village. A village grove is very closely connected to the life of residents. Sometimes it was a holy place where important village festivals were held, and became a resting place for farmers, especially in sunny summer. As a matter of fact, it is noted that traditional Korean village groves had been fostered for many purpose as religion, Confucianism, scenery, sanitation, traffic guard, public security, agriculture, hunting, and military and public uses were included in Chosun Govemor General(1938). Village groves were usually located at the outlet of watershed inside which a village was built. In addition, village groves used to be established along part of mountain ranges, streams and streets. A unique type of village grove, called bibosoop was fostered especially where the outlet of watershed was largely opened. In other cases, it was placed where a part of mountain range was relatively low, or where village residents were likely to see ugly objects such as a huge cliff, stony upland with an unvegetated area and the like(Kim and Jang 1994). In a sense, a sheltebelt is a sort of bibosoop as it is a landscape element to complement places that are exposed to strong winds. However, it is comparable to other typical bibosoop that is situated at a topographically very specific zone of watershed. In this paper, we will address potential functions of Korean village groves from a perspective of modern landscape ecology and show current status of some remnants, based on preliminary surveys. A village grove functions as barrier or filter of objects such as water, nutrients, and other elements and habitat of wildlife (park et al. 2003, Lee 2004). The village grove slows down the flow of water and air, maintains soil moisture an hinders soil erosion, enabling cultivation of crops and bringing up creatures nearby. It contributes to enhancing biodiversity. Birds rest on shrubby and woody trees of the element. Presumably, other organisms may also inhabit the village groves and take advantage of it when those move from a forest patch to others. Emerging insects acclimate themselves in the shade of the green space before they fly to sunny air. Besides the village grove acts as a component of agroforestry system as leaf litter is shed from a grove to an asjacent agricultural area, and transformed into green manure(Lee 2004). By the way, many of the landscape elements were destroyed or declined in Koea during the past several decades. The losses have been parallel or linked to environmental degradation. Unfortunately, we have a little reliable data as for how many groves have disappeared in Korea until now. There has been no complete census on the village groves in Korea, and the viewpoints of survey were to a degree different depending on surveyors. So, it is difficult to analyze the temporal and spatial change of village groves. Currently, national inventory data of Korean village groves are available in three reports. We reviewed the locations of village groves and arranged those according to the present administrative units, DONG. With the limited data, we found that at least 484 of village groves were recorded in South Korea. Among all provinces, village groves were most in Gyeongsanbuk-Do Province and least in Chungcheongbuk-Do Province(Table 1). This is a preliminary report prepared while some quantitative data regarding functions and lossers of the village groves are being collected. More detailed data will be introduced in the near future.

  • PDF

Status of research on the sweetpotato biotechnology and prospects of the molecular breeding on marginal lands (고구마 생명공학연구 현황과 조건 불리지역 분자육종 전망)

  • Kim, Ho Soo;Yoon, Ung-Han;Lee, Chan-Ju;Kim, So-Eun;Ji, Chang Yoon;Kwak, Sang-Soo
    • Journal of Plant Biotechnology
    • /
    • v.45 no.3
    • /
    • pp.196-206
    • /
    • 2018
  • Dramatic increase in global population accompanied by rapid industrialization in developing countries has led to serious environmental, food, energy, and health problems. The Food and Agriculture Organization of the United Nations has estimated world population will increase to 9.7 billion by 2050 and require approximately 1.7 times more food, and more than 3.5 times energy than that of today. Particularly, sweetpotato is easy to cultivate in unfavorable conditions such as heat, drought, high salt, and marginal lands. In this respect, sweetpotato is an industrially valuable starch crop. To replace crops associated with these food and energy problems, it is necessary to develop new crops with improved nutrients and productivity, that can be grown on marginal lands, including desertification areas using plant biotechnology. For this purpose, exploring useful genes and developing genetically modified crops are essential strategies. Currently, sweetpotato [Ipomoea batatas (L.) Lam.] have been re-evaluated as the best health food and industrial crop that produces starch and low molecular weight antioxidants, such as vitamin A, vitamin E, anthocyanins and carotenoids. This review will focus on the current status of research on sweetpotato biotechnology on omics including genome sequencing, transcriptome, proteomics and molecular breeding. In addition, prospects on molecular breeding of sweetpotato on marginal lands for sustainable development were described.

The Effect of Natural Disaster Safety Education on Young Children's Safety Problem-solving Abilities and Eco-friendly Attitudes (자연재해 안전교육이 유아의 안전문제해결사고 및 환경 친화적 태도에 미치는 영향)

  • Lim, Eun Ok;Kim, Ji Eun
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.4
    • /
    • pp.227-245
    • /
    • 2018
  • Objective: In this study, educational activities were organized to emphasize the importance of natural disaster safety education by reflecting the recent rapid increases in natural disasters. The study focused on story-sharing, art, and game activities to effectively conduct natural disaster safety education for four-year-old children, and in doing so, aimed to improve the children's safety problem-solving abilities and eco-friendly attitude. Methods: Based on the types of natural disasters that are handled by the Ministry of Public Administration and Security and the Chungcheongbuk-do Office of Education, earthquakes, yellow dust, heat waves, floods, typhoons, bolts of lighting, fires, snowstorms, and global warming were included as the study's educational contents, and a total 20 sessions of natural disaster safety education activities were planned. For the subjects, 20 four-year-old children at K Kindergarten attached to a school were selected as an experimental group and 20 four-year-old children at N Kindergarten attached to a school were selected as a control group. Both kindergartens were located in C City, Chungcheongbuk-do. The experimental group was instructed to perform the study's education activities, whereas the control group only carried out general activities based on the Nuri Curriculum's subjects of daily life. Results: As a result, the children in the experimental group, who received the natural disaster safety education, improved their safety problem-solving abilities and eco-friendly attitude when compared to those in the control group. This outcome proved that the natural disaster safety education conducted by the present study offers educational activities that can positively affect improvements in children's safety problem-solving abilities and eco-friendly attitude. Conclusion/Implications: Therefore, the present study is likely to provide concrete information to teachers who plan to conduct natural disaster safety education in the actual early childhood education field.

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.