• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.028 seconds

1-out-of-L Electronic Voting System with Ballot-Cancellation (투표-취소가 가능한 1-out-of-L 전자투표 시스템)

  • Yang, Hyung-Kyu;An, Youn-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.86-93
    • /
    • 2007
  • In this paper, we present an electronic voting system based on cryptographic techniques. Recently, some countries have used e-voting systems using an electronic voting device instead of a voting sheet. These e-voting systems are the early stage which is not online voting. Many cryptographers have studied on-line e-voting systems based on cryptographic techniques. The existing 1-out-of-L e-voting systems are based on E1Gamal cryptosystem. To reduce computational complexity, we use r-th residue encryption scheme and compare the computational complexity of our 1-out-of-L e-voting system with that of the 1-out-of-L e-voting system based on E1Gamal cryptosystem. Moreover, we extend the proposed 1-out-of-L e-voting system to ballot-cancellation property The existing e-voting systems had been overlooked the ballot-cancellation property. There is the reason that the ballot is cancelled according to an election law. For our e-voting system with ballot-cancellation property, we extend the homomorphic property based on r-th residue encryption. The extended homomorphic property is used to cancel votes with guaranteeing privacy and universal verifiability.

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

  • Badshah, Gran;Liew, Siau-Chuin;Zain, Jasni Mohamad;Ali, Mushtaq
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.601-615
    • /
    • 2015
  • Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.

Anonymous Fingerprinting Method using the Secret Sharing Scheme (비밀분산법을 이용한 익명성 보장 핑거프린팅 기법)

  • 용승림;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.353-359
    • /
    • 2004
  • The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous fingerprinting schemes, differ from symmetric fingerprinting, prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And the scheme, differ from asymmetric fingerprinting, allows the buyer to purchase goods without revealing her identity to the merchant. In this paper, a new anonymous fingerprinting scheme based on secret sharing is introduced. The merchant finds a sold version that has been distributed, and then he is able to retrieve a buyer's identity and take her to court. And Schnorr's digital signature prevents the buyer from denying the fact he redistributed. The buyer's anonymity relies on the security of discrete logarithm and secure two-party computations.

A Scheme of Identity Authentication and Anomaly Detection using ECG and Beacon-based Blockchain (ECG와 비콘 기반의 블록체인을 이용한 신원 인증 및 이상징후 탐지 기법)

  • Kim, Kyung-Hee;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.69-74
    • /
    • 2021
  • With the recent development of biometric authentication technology, the user authentication techniques using biometric authentication are increasing. Various problems arised in certification techniques that use various existing methods such as ID/PW. Therefore, recently, a method of improving security by introducing biometric authentication as secondary authentication has been used. In this thesis, proposal of the user authentication system that can detect user identification and anomalies using ECGs that are extremely difficult to falsify through the electrical biometric signals from the heart among various biometric authentication devices is studied. The system detects user anomalies by comparing ECG data received from a wrist-mounted wearable device-type ECG measurement tool with identification and ECG data stored in blockchain form on the database and identifying the user's location through a beacon system.

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

Comparison of Rating Methods by Disaster Indicators (사회재난 지표별 등급화 기법 비교: 가축질병을 중심으로)

  • Lee, Hyo Jin;Yun, Hong Sic;Han, Hak
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.319-328
    • /
    • 2021
  • Purpose: Recently, a large social disaster has called for the need to diagnose social disaster safety, and the Ministry of Public Administration and Security calculates and publishes regional safety ratings such as regional safety index and national safety diagnosis every year. The existing safety diagnosis system uses equal intervals or normal distribution to grade risk maps in a uniform manner. Method: However, the equidistant technique can objectively analyze risk ratings, but there is a limit to classifying risk ratings when the distribution is skewed to one side, and the z-score technique has a problem of losing credibility if the population does not follow a normal distribution. Because the distribution of statistical data varies from indicator to indicator, the most appropriate rating should be applied for each data distribution. Result: Therefore, in this paper, we analyze the data of disaster indicators and present a comparison and suitable method for traditional equidistant and natural brake techniques to proceed with optimized grading for each indicator. Conclusion: As a result, three of the six new indicators were applied differently from conventional grading techniques

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.

A Study on Predicting Installation Scale of Photovoltaic Panels and Hydrogen Fuel Storage Facilities to Achieve Net Zero Carbon Emissions Exploiting Idle Sites of Military Bases (군부대 유휴부지를 활용한 탄소 순 배출량 제로 달성을 위한 태양광 패널 및 수소 연료 저장시설의 설치 규모 예측)

  • Donghak Moon;Jiyong Heo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.8-14
    • /
    • 2024
  • In this study, the scale of renewable photovoltaic(PV) panels and hydrogen fuel storage facilities required to achieve "net zero carbon emissions" in military facilities were predicted based on actual electricity consumption. It was set up to expect the appropriate installation size of PV panel and hydrogen fuel storage facility for achieving carbon neutrality, limited to the electricity consumption in the public sector, including national defense and social security administration in Yeongcheon. The experimental results of this paper are largely composed of two parts. First, representative meteorological factors were considered to predict solar power generation in the Yeongcheon area, and solar power generation was estimated through a multiple regression model using deep learning techniques. Second, the size of solar power generation facilities and hydrogen storage facilities in military bases was estimated with the amount of solar power generation and electricity consumption. As a result of this analysis, it was calculated that a site of 155.76×104 m2 for PV panels was needed and a facility capable of storing 27,657 kg of hydrogen gas was required. Through these results, it is meaningful to demonstrated the prospect that military units can lead the achievement of "carbon net zero 2050" by using PV panels and hydrogen fuel storage facilities on idle sites of military bases.

The Critical Factors on Improvement of Medical institution Competitiveness (의료기관 경쟁력 향상에 영향을 미치는 핵심 요인)

  • Yeom, Jae-Kwang;Kang, Chang-Yeol
    • Korea Journal of Hospital Management
    • /
    • v.12 no.1
    • /
    • pp.1-30
    • /
    • 2007
  • The study carried out a survey with employees of hospitals located in Daejeon, Chungnam, and Chungbuk from Sep. 12 to Sep. 30, 2005 in order to derive primary elements that affect the improvement of hospital's competitiveness. The study investigated and analyzed the employees' recognition on the change of competitive environment caused by the change of medical environment. The study also analyzed the elements that affect the hospital's competitiveness and the competitive strategies of the hospitals. The conclusion of this study can be summarized as follows. 1. Summary 1) Most of the employees responded that there is a rival in the competitive environment and the competitive is intense. Especially when the employees are married, live in urban areas, have an education level of university graduate or are managers, they tend to think the competitive is very intense. Also, they said that the competitive is based upon the quality of medical service. They mentioned the element that has the biggest effect on the competitiveness is the element of medical consumer and they recognized that the medical services in university and general hospitals have more competitiveness than the one-department hospitals. 2) It was investigated that the medical technique service has the most effect on the hospital's competitiveness. Also, the external service of medical techniques also has a large effect on the hospital's competitiveness. 3) When they were asked for the factors that affect the patients' decision on selecting a hospital, most of them responded "capability and technique of the medical staffs." Also, they said that "sufficient explanation from doctors" and "special center and clinic" are the factors that have big effects on the patients' decision. 4) In the SWOT analysis, most of them responded that the strength is the hospital's characteristics and the weakness is insufficient and obsolete equipment. They said the opportunity is the demands for professional medical service and the risk is the intense competitive among the hospitals. 5) In the SWOT strategy, they emphasized the strategy that uses the opportunity and the strength and the strategy that uses the opportunity while overcoming the weakness. 6) As for the basic competition strategy, most of them thought of the strategy of professionalizing the medical service most importantly. Next, they focused on the strategy of distinct service and the strategy of lower prime cost. 2. Conclusion 1) Because service competition between hospitals is happening seriously, need competitiveness security through right awareness transfer and satisfaction upgrade about medical consumer. 2) For medical technique service upgrade that equip Hospital's competitiveness but affects most, must solidify the countermeasure because professionalizing the medical service and newest medical technique induction should be achieved first, and compose task force for the external service of medical techniques improvement. 3) To improve SWOT of hospital, opportunity and the strength strategy choice that rescue hospital's characteristics heightening professionalizing the medical service level is fancied. 4) As for the basic competition strategy, will have to try in phase triangular position of hospital which is trusted medical level upgrade and excellent manpower security and finance independence through upgrade. The study was only done with hospitals in Daejeon, Chungnam and Chungbuk. Also, it is a study from the side of suppliers of medical service so there are limitations. However, the significance of the study is to present the basic data for improvement of hospital's competitiveness by examining the importance of medical techniques and external service of medical techniques that are the main effects on the improvement of hospital's competitiveness.

  • PDF