• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.029 seconds

A Study on the Utilization of Private Security for Park Safety (공원안전관리를 위한 민간경비 활용방안 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.7-32
    • /
    • 2013
  • The idea of this study was derived from awareness of local governments and police's limitation on attempts to 'creating safe park'. The purpose of this study is to examine current political measures of preventing various types of possible crimes in the park and the limitation of those policies. Furthermore, this study aims to suggest possible explanations to utilize Private Security Sector for the effective and continuous way of managing park safety by considering legal and practical solutions and its expectations. The methods of analysis used in this study are, first, literature review of current park safety management policies. Second, this article examined implications of strategies of those policies throughout the case study of the USA's park safety policy. Third, this study suggested plans of action and role of Private Security Sector to improve park safety. The results present several arguments for the park safety. First, legislation of mandatory crime preventing programme in the early stages of designing park is required. Introducing the 'park special judicial police system' to the major parks for a immediate response to the crime can be one of suggestions. Moreover, proactive police response systems, such as one of the Seoul Metropolitan Police's policies- 'returning safe parks to a citizen' are required. Second, the case study of the USA regarding park safety confirmed that major parks in the USA have rigorous and detailed park regulations. It also showed that those parks take not only preventing measures, but also follow-up measures against crimes. Third, the results suggest creating human resources by contracting out Park Managers and Private Security Sector that have specialized experiences and techniques to prevent crimes and public disorders. Overall in this study, increased citizen's satisfaction level, control of continuous and systematic crimes, the spread of joint-production of public safety, and increased fields of the Private Security Sector are expected from the findings.

  • PDF

FPGA Implementation and Power Analysis Attack of Versatile Elliptic Curve Crypto-processor (가변 타원곡선 암호 프로세서의 FPGA 구현 및 전력분석 공격)

  • Jang, Su-Hyuk;Lee, Dong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.521-524
    • /
    • 2004
  • For implementation of Cryptographic algorithms, security against implementation attacks such as side-channel attacks as well as the speed and the size of the circuit is important. Power Analysis attacks are powerful techniques of side-channel attacks to exploit secret information of crypto-processors. In this thesis the FPGA implementation of versatile elliptic crypto-processor is described. Explain the analysis of power consumption of ALTERA FPGA(FLEX10KE) that is used in our hand made board. Conclusively this thesis presents clear proof that implementations of Elliptic Curve Crypto-systems are vulnerable to Differential Power Analysis attacks as well as Simple Power Analysis attacks.

  • PDF

ACA Based Image Steganography

  • Sarkar, Anindita;Nag, Amitava;Biswas, Sushanta;Sarkar, Partha Pratim
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.266-276
    • /
    • 2013
  • LSB-based steganography is a simple and well known information hiding technique. In most LSB based techniques, a secret message is embedded into a specific position of LSB in the cover pixels. On the other hand, the main threat of LSB-based steganography is steganalysis. This paper proposes an asynchronous-cellular-automata(ACA)-based steganographic method, where secret bits are embedded into the selected position inside the cover pixel by ACA rule 51 and a secret key. As a result, it is very difficult for malicious users to retrieve a secret message from a cover image without knowing the secret key, even if the extraction algorithm is known. In addition, another layer of security is provided by almost random (rule-based) selection of a cover pixel for embedding using ACA and a different secret key. Finally, the experimental results show that the proposed method can be secured against the well-known steganalysis RS-attack.

  • PDF

Analytic Model for Optimal Checkpoints in Mobile Real-time Systems

  • Lim, Sung-Hwa;Lee, Byoung-Hoon;Kim, Jai-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3689-3700
    • /
    • 2016
  • It is not practically feasible to apply hardware-based fault-tolerant schemes, such as hardware replication, in mobile devices. Therefore, software-based fault-tolerance techniques, such as checkpoint and rollback schemes, are required. In checkpoint and rollback schemes, the optimal checkpoint interval should be applied to obtain the best performance. Most previous studies focused on minimizing the expected execution time or response time for completing a given task. Currently, most mobile applications run in real-time environments. Therefore, it is extremely essential for mobile devices to employ optimal checkpoint intervals as determined by the real-time constraints of tasks. In this study, we tackle the problem of determining the optimal inter-checkpoint interval of checkpoint and rollback schemes to maximize the deadline meet ratio in real-time systems and to build a probabilistic cost model. From this cost model, we can numerically find the optimal checkpoint interval using mathematical tools. The performance of the proposed solution is evaluated using analytical estimates.

A Comparative Study of Phishing Websites Classification Based on Classifier Ensemble

  • Tama, Bayu Adhi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.617-625
    • /
    • 2018
  • Phishing website has become a crucial concern in cyber security applications. It is performed by fraudulently deceiving users with the aim of obtaining their sensitive information such as bank account information, credit card, username, and password. The threat has led to huge losses to online retailers, e-business platform, financial institutions, and to name but a few. One way to build anti-phishing detection mechanism is to construct classification algorithm based on machine learning techniques. The objective of this paper is to compare different classifier ensemble approaches, i.e. random forest, rotation forest, gradient boosted machine, and extreme gradient boosting against single classifiers, i.e. decision tree, classification and regression tree, and credal decision tree in the case of website phishing. Area under ROC curve (AUC) is employed as a performance metric, whilst statistical tests are used as baseline indicator of significance evaluation among classifiers. The paper contributes the existing literature on making a benchmark of classifier ensembles for web phishing detection.

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

Development of Access Protocol of GPS-based Radio Buoy System (GPS 기능을 갖는 Radio Buoy 용 Protocol 개발)

  • Moon, Soon-Ki;Kwon, Won-Hyun;Shin, Dong-Guyn;Lee, Chun-Geum;Oh, Chang-Seog
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.550-552
    • /
    • 2004
  • In this paper, access protocol is proposed that can optimally control the radio buoy system used for inshore and deep sea fishery. Proposed protocol can minimize the power consumption of radio buoy and can ensure high security from burglary and loss, and it enable a mother ship to control remotely more than 150 radio buoys simultaneously. GPS technology and remote control techniques are used to monitor the exact location and status of the radio buoy system in real time.

  • PDF

Motion Detection using Adaptive Background Image and Pixel Space (적응적 배경영상과 픽셀 간격을 이용한 움직임 검출)

  • 지정규;이창수;오해석
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2003
  • Security system with web camera remarkably has been developed at an Internet era. Using transmitted images from remote camera, the system can recognize current situation and take a proper action through web. Existing motion detection methods use simply difference image, background image techniques or block matching algorithm which establish initial block by set search area and find similar block. But these methods are difficult to detect exact motion because of useless noise. In this paper, the proposed method is updating changed background image as much as $N{\times}M$pixel mask as time goes on after get a difference between imput image and first background image. And checking image pixel can efficiently detect motion by computing fixed distance pixel instead of operate all pixel.

  • PDF

A Robust Method for Speech Replay Attack Detection

  • Lin, Lang;Wang, Rangding;Yan, Diqun;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.168-182
    • /
    • 2020
  • Spoofing attacks, especially replay attacks, pose great security challenges to automatic speaker verification (ASV) systems. Current works on replay attacks detection primarily focused on either developing new features or improving classifier performance, ignoring the effects of feature variability, e.g., the channel variability. In this paper, we first establish a mathematical model for replay speech and introduce a method for eliminating the negative interference of the channel. Then a novel feature is proposed to detect the replay attacks. To further boost the detection performance, four post-processing methods using normalization techniques are investigated. We evaluate our proposed method on the ASVspoof 2017 dataset. The experimental results show that our approach outperforms the competing methods in terms of detection accuracy. More interestingly, we find that the proposed normalization strategy could also improve the performance of the existing algorithms.

Survey of Security Techniques for Android Platform (안드로이드 플랫폼을 위한 보안 기법 연구)

  • Park, Ji-Yeon;Min, Hong;Jang, Joon-Hyouk;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.52-54
    • /
    • 2011
  • 급속하게 성장하고 있는 스마트폰 시장에서 사용자의 수가 늘어감에 따라 다양한 이슈들이 대두되고 있다. 특히 스마트폰에는 많은 개인정보들이 저장되어 있어, 분실 또는 악성 코드로 인한 정보 유출로 막대한 금전적 피해를 야기할 수 있기 때문에 보안 기법에 대한 연구 필요성이 강조되고 있다. 개방형플랫폼을 지향하고 있는 모바일 운영체제 안드로이드는 다른 폐쇄형 플랫폼보다 보안 취약점이 노출 될 가능성이 높고 실제로 이로 인한 피해 사례들이 보고되고 있다. 본 논문에서는 안드로이드를 플랫폼에서 보안을 강화하기 위해 연구된 여러 보안 기법들을 살펴보고 특징에 따라 분류해본다.