• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.031 seconds

Phase-based virtual image encryption and decryption system using Joint Transform Correlator

  • Seo, Dong-Hoan;Cho, Kyu-Bo;Park, Se-Joon;Cho, Woong-Ho;Noh, Duck-Soo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.450-453
    • /
    • 2002
  • In this paper a Phase-based virtual image encryption and decryption techniques based on a joint transform correlator (JTC) are proposed. In this method, an encrypted image is obtained by multiplying a phase-encoded virtual image that contains no information from the decrypted image with a random phase. Even if this encryption process converts a virtual image into a white-noise-like image, the unauthorized users can permit a counterfeiting of the encrypted image by analyzing the random phase mask using some phase-contrast technique. However, they cannot reconstruct the required image because the virtual image protects the original image from counterfeiting and unauthorized access. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. In addition, the reconstructed data can be directly transmitted to a digital system for real-time processing. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF

Secure Multiplication Method against Side Channel Attack on ARM Cortex-M3 (ARM Cortex-M3 상에서 부채널 공격에 강인한 곱셈 연산 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.943-949
    • /
    • 2017
  • Cryptography implementation over lightweight Internet of Things (IoT) device needs to provide an accurate and fast execution for high service availability. However, adversaries can extract the secret information from the lightweight device by analyzing the unique features of computation in the device. In particular, modern ARM Cortex-M3 processors perform the multiplication in different execution timings when the input values are varied. In this paper, we analyze previous multiplication methods over ARM Cortex-M3 and provide optimized techniques to accelerate the performance. The proposed method successfully accelerates the performance by up-to 28.4% than previous works.

Program Slicing for Binary code Deobfuscation (역난독화를 위한 바이너리 프로그램 슬라이싱)

  • Mok, Seong-Kyun;Jeon, Hyeon-gu;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.59-66
    • /
    • 2017
  • Hackers have obfuscated their malware to avoid being analyzed. Recently, obfuscation tools translate original codes into bytecodes to use virtualized-obfuscation, so that bytecodes are executed by virtual machines. In such cases, malware analysts fail to know about the malware before execution of the codes. We found that program slicing is one of promising program analysis techniques to solve this problem. The main concepts of program slice include slicing criteria given by analysts and sliced statements according to the slicing criteria. This paper proposes a deobfuscation method based on program slicing technique.

A Study on the Establishment of Evaluation Criterion for the Housing Information Related Internet Web Sites (주거 관련 정보 사이트의 평가기준 설정에 관한 연구)

  • Park, Hyun-Ok
    • Korean Journal of Human Ecology
    • /
    • v.10 no.1
    • /
    • pp.83-91
    • /
    • 2001
  • Currently, obtaining information about the housing studies through the internet web sites is one of the outstanding mediums. Those are of the housings, architecture, interior design, furniture products, hotels and its journals, etc., and out of all those informations are the highly expected value of use. But. it may causes the public users to experience a negative effect, because many of those informations provided on the internet web sites related to the housing studies/informations are not providing an equal quality of information. And measuring the quality is also not easy. This study focuses on the establishment of evaluation criterion for the housing information-related internet web sites. In such a vein, it proposes a clear model to evaluate the information qualities with the 43 questionnaires / examining items. To test the questionnaires/rating items, the analysis has been implemented which has shown the reciprocal effect between the 2 major factors. One major factor with 4 variables on the information searches are (1) the accuracy/reliability of contents and techniques, (2) the design of a picture and communication, (3) the readability and security, and (4) the security of private information, and the other factor with 3variables on the additional services are (1) the diversities of contents and ease of orderings, (2) the abilities of search and e-mail, and (3) the events and after services. This study/rating model will provide the users with a fundamental material in evaluating the quality of housing information on the internet web sites.

  • PDF

Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing

  • Feng, Jingyu;Lu, Guangyue;Chang, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1321-1336
    • /
    • 2015
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. However, current CSS schemes focus on ensuring an efficient cooperation among secondary users (SUs), but ignoring their competition. At the same time when several SUs want to a vacant band, how to win this pop vacant band for an SU becomes more and more important. Inspired by the idea that an SU who always behaves well will win a pop vacant band more easily, we propose a competition scheme called BehaveWell (BW) in this paper. By analyzing the main threats against CSS, competitive coefficient is introduced to evaluate each SU's past behaviors in CSS. A higher competitive coefficient is very helpful for an SU to win a pop vacant band. This BW scheme can not only enhance a healthy competition among SUs, but also improve the security of CSS. Simulations verify the effectiveness of the proposed scheme.

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Service Quality Perception and Customer Satisfaction in Islamic Banks of Oman

  • ALAM, Naushad;AL-AMRI, Hanin Abdulrhman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.499-504
    • /
    • 2020
  • Service quality of any institution is a pull factor for attracting and retaining the customer. The present study examines the customer satisfaction level toward the quality of service offered by the Islamic banks in Oman. It also aims to find out which dimension influences customer satisfaction more concerning the other dimension chosen for the study. To fulfil the need of the study, a structured questionnaire is distributed amongst 100 customers of Islamic banks. The random stratified sampling technique is used for the collection of the data. The collected data is analyzed using the correlation and the multiple linear regression techniques. The result of the study indicates that timely service provided by the banking personnel has a mean score of 4.57, bank staff readiness to serve the customer has a mean score of 4.36, and the security of the banking operation has a mean score of 4.37 occupies the highest rank in their respective dimension chosen for the study. The study reveals that all three dimensions of quality of service represented by Services Reliability, Services Responsiveness and Services Security have a positive and significant correlation with customer satisfaction. The regression results also indicate that all three dimensions influence customer satisfaction of the Islamic banks.

A Study on the Possible New Fusion between Mobile and Healthcare Service (모바일과 의료서비스 간의 새로운 융합 가능성에 관한 연구)

  • Shin, Yong Jae;Kim, Jin Hwa;Lee, Jea Beom
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.27-39
    • /
    • 2012
  • As many applications are possible now in mobile environment with the trend of mobile convergence, diverse applications in healthcare industry are also possible in mobile devices. Though lots of researches on mobile and health services are introduced, they are limited to specific area or techniques. This study shows possible directions of fusion between mobile technologies and health services in the future using a data mining technique called association rule analysis. The data used in this study is collected from web pages containing key words related to mobile technologies and health services. The analysis shows that current cases of fusion between monitoring based telemedicine and patients. It also shows another case of fusion between mobile hospital and medical screen charts. These show that fusion between mobile technologies and health services already began in industry. Association rules are found between well-being, city, diet, and sleep. The association rules containing security and privacy, though their associations are not so strong, also show that security and privacy of patient information should be protected in the future. The results show that the fusion of mobile technologies and health services is expected to provide health services to more users and larger areas. It is also expected to create new diverse business models in the future.

An Hybrid Probe Detection Model using FCM and Self-Adaptive Module (자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.19-25
    • /
    • 2017
  • Nowadays, networked computer systems play an increasingly important role in our society and its economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is the reason computer security has become an essential concern for network administrators. Recently, a number of Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of intrusion. Therefore, probe detection has become a major security protection technology to detection potential attacks. Probe detection needs to take into account a variety of factors ant the relationship between the various factors to reduce false negative & positive error. It is necessary to develop new technology of probe detection that can find new pattern of probe. In this paper, we propose an hybrid probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) in dynamic environment such as Cloud and IoT. Also, in order to verify the proposed method, experiments about measuring detection rate in dynamic environments and possibility of countermeasure against intrusion were performed. From experimental results, decrease of false detection and the possibilities of countermeasures against intrusions were confirmed.