• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.027 seconds

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

Accelerated aging test procedures for SRAM PUFs (SRAM PUF 가속 노화 시험 절차 수립)

  • Moon-Seok Kim;Seung-Bae Jeon;Jun-Young Park
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.59-65
    • /
    • 2024
  • This research proposes an accelerated aging test procedure for Static Random Access Memory Physically Unclonable Functions (SRAM PUFs). PUFs utilize semiconductor process variations to serve as a hardware security feature, akin to semiconductor device fingerprints. Thus, the proposed accelerated aging test simulates a semiconductor's 10-year lifecycle, enabling the prediction of PUF characteristics after a decade of use, which is crucial for verifying the safety and stability of SRAM PUFs. This research introduces test procedures that simulate 10 years of aging in approximately 9 days by setting temperature and voltage higher than operational environments. These procedures allow for the quantitative evaluation of SRAM PUF characteristics. This research is expected to contribute to the advancement of design and maintenance testing techniques for systems based on SRAM PUFs.

The Applications of Qualitative Inquiry in Security Research Methodology (경호.경비 연구방법론에서 질적 연구의 활용)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.33-55
    • /
    • 2013
  • The purpose of this study is to investigate about exploring diversity of methodology in security research focused on the current status and applications of qualitative inquiry. Expenses to take advantage of a variety of qualitative research techniques in the field is divided, and explore the possibility of applying the security research. Expenses compared to quantitative research, qualitative research on the utilization is very low, and to perform a qualitative study in-depth interviews focused on morphological aspects of research and a paucity of practical deep and lacks specificity. Expense of qualitative research in various fields is presented challenges to Creswell(1998, 2007, 2013) proposed five kinds of qualitative research types narrative research, phenomenological research, grounded theory research, ethnographic research, case study research, look for it in the security field. Expenses theorize that it may lead to practical changes in the security field, causing an in-depth exploration of the changes in the escort industry. Expense opportunity to identify the social and cultural values in security field and security research. Varied and in-depth qualitative research through field and industry and the complementary role of security.

  • PDF

The Effects of Customer Aggression on the Job Stress and Emotional Burnout of Security Guards in Casino (카지노 고객의 공격성이 시큐리티 종사자의 직무스트레스 및 소진에 미치는 영향)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.87-107
    • /
    • 2010
  • The purpose of this study is to examine the effects of customer aggression on the job stress and emotional burnout of security guards in casino. Investigating tools used questionnaire, the sampling was drawn from security guards at 6 casinos which had more than 30 security guards. To this study, the partisans of the study were 269 people. Data for creation for questionnaire is completely computed processing and using SPSS 15.0 Windows that is social studies scholastic mantle command program after imputed encoding according to each purpose. Analyzing techniques to use for analysis of data enforced technology figure analysis, factor analysis, reliability analysis, t-test, one-way ANOVA, multiple regression analysis. Through data analysis by such method and procedure, conclusion that gets in this research is as following. First, exposure that is difference that keep in mind partially as result that verify difference of aggression according to demographical features, job stress and emotional burnout that is security guard's in casino. Second, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in job stress of security guards in casino. Third, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in emotional burnout of security guards in casino.

  • PDF

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

A Study on Identification of the Source of Videos Recorded by Smartphones (스마트폰으로 촬영된 동영상의 출처 식별에 대한 연구)

  • Kim, Hyeon-seung;Choi, Jong-hyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.885-894
    • /
    • 2016
  • As smartphones become more common, anybody can take pictures and record videos easily nowadays. Video files taken from smartphones can be used as important clues and evidence. While you analyze video files taken from smartphones, there are some occasions where you need to prove that a video file was recorded by a specific smartphone. To do this, you can utilize various fingerprint techniques mentioned in existing research. But you might face the situation where you have to strengthen the result of fingerprinting or fingerprint technique can't be used. Therefore forensic investigation of the smartphone must be done before fingerprinting and the database of metadata of video files should be established. The artifacts in a smartphone after video recording and the database mentioned above are discussed in this paper.

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection

  • Kim, Jinsuk;Yoo, Dong-Hoon;Jang, Heejin;Jeong, Kimoon
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.229-238
    • /
    • 2015
  • Web shells are programs that are written for a specific purpose in Web scripting languages, such as PHP, ASP, ASP.NET, JSP, PERL-CGI, etc. Web shells provide a means to communicate with the server's operating system via the interpreter of the web scripting languages. Hence, web shells can execute OS specific commands over HTTP. Usually, web attacks by malicious users are made by uploading one of these web shells to compromise the target web servers. Though there have been several approaches to detect such malicious web shells, no standard dataset has been built to compare various web shell detection techniques. In this paper, we present a collection of web shell files, WebSHArk 1.0, as a standard dataset for current and future studies in malicious web shell detection. To provide baseline results for future studies and for the improvement of current tools, we also present some benchmark results by scanning the WebSHArk dataset directory with three web shell scanning tools that are publicly available on the Internet. The WebSHArk 1.0 dataset is only available upon request via email to one of the authors, due to security and legal issues.

Dummy Data Insert Scheme for Privacy Preserving Frequent Itemset Mining in Data Stream (데이터 스트림 빈발항목 마이닝의 프라이버시 보호를 위한 더미 데이터 삽입 기법)

  • Jung, Jay Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.383-393
    • /
    • 2013
  • Data stream mining is a technique to obtain the useful information by analyzing the data generated in real time. In data stream mining technology, frequent itemset mining is a method to find the frequent itemset while data is transmitting, and these itemsets are used for the purpose of pattern analyze and marketing in various fields. Existing techniques of finding frequent itemset mining are having problems when a malicious attacker sniffing the data, it reveals data provider's real-time information. These problems can be solved by using a method of inserting dummy data. By using this method, a attacker cannot distinguish the original data from the transmitting data. In this paper, we propose a method for privacy preserving frequent itemset mining by using the technique of inserting dummy data. In addition, the proposed method is effective in terms of calculation because it does not require encryption technology or other mathematical operations.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Intranet Security Evaluation Using Hacking Techniques (해킹 기법을 이용한 내부망 보안 평가 방법)

  • Seo, Dong-Il;Choi, Byeong-Choel;Sohn, Sung-Won;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.337-342
    • /
    • 2002
  • In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels ISL1∼ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.