• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.026 seconds

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

Analytical fault tolerant navigation system for an aerospace launch vehicle using sliding mode observer

  • Hasani, Mahdi;Roshanian, Jafar;Khoshnooda, A. Majid
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.1
    • /
    • pp.53-64
    • /
    • 2017
  • Aerospace Launch Vehicles (ALV) are generally designed with high reliability to operate in complete security through fault avoidance practices. However, in spite of such precaution, fault occurring is inevitable. Hence, there is a requirement for on-board fault recovery without significant degradation in the ALV performance. The present study develops an advanced fault recovery strategy to improve the reliability of an Aerospace Launch Vehicle (ALV) navigation system. The proposed strategy contains fault detection features and can reconfigure the system against common faults in the ALV navigation system. For this purpose, fault recovery system is constructed to detect and reconfigure normal navigation faults based on the sliding mode observer (SMO) theory. In the face of pitch channel sensor failure, the original gyro faults are reconstructed using SMO theory and by correcting the faulty measurement, the pitch-rate gyroscope output is constructed to provide fault tolerant navigation solution. The novel aspect of the paper is employing SMO as an online tuning of analytical fault recovery solution against unforeseen variations due to its hardware/software property. In this regard, a nonlinear model of the ALV is simulated using specific navigation failures and the results verified the feasibility of the proposed system. Simulation results and sensitivity analysis show that the proposed techniques can produce more effective estimation results than those of the previous techniques, against sensor failures.

Accuracy Evaluation and Terrain Model Automation of Reservoir Using Unmanned Aerial Vehicle System (무인항공시스템을 활용한 저수지 지형모델 생성 및 정확도 평가)

  • Kim, Jungmeyon;Park, Sungsik;Kim, Jaehwi;Ahn, Seungwoo;Park, Sungyong;Kim, Yongseong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.57-67
    • /
    • 2017
  • This study examines methods for creating terrain models of reservoirs and techniques for verifying the accuracy. Such methods and techniques use unmanned aerial vehicles which are capable of capturing high-resolution images repetitively, are highly economic, and capable of surveying wide areas. In addition, this study suggests methods of acquiring data for reservoir safety management, the methods which also employ the unmanned aerial vehicles. Therefore, this study helps solving problems that can arise when National Disaster Management System rebuilds a reservoir management database, such as a shortage of local government manpower. This study also contributes to providing element technology necessary for advancing the database.

Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection

  • Le, Thi-Thu-Huong;Kim, Jihyun;Kim, Howon
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.91-96
    • /
    • 2016
  • Network security is an interesting area in Information Technology. It has an important role for the manager monitor and control operating of the network. There are many techniques to help us prevent anomaly or malicious activities such as firewall configuration etc. Intrusion Detection System (IDS) is one of effective method help us reduce the cost to build. The more attacks occur, the more necessary intrusion detection needs. IDS is a software or hardware systems, even though is a combination of them. Its major role is detecting malicious activity. In recently, there are many researchers proposed techniques or algorithms to build a tool in this field. In this paper, we improve the performance of IDS. We explore and analyze the impact of activation functions applying to recurrent neural network model. We use to KDD cup dataset for our experiment. By our experimental results, we verify that our new tool of IDS is really significant in this field.

A Study on the Real Power Optimization Using Interior-Point Method (IP법을 이용한 유효전력제어에 관한 연구)

  • Jung, Soon-Young;Jung, Jai-Kil;Lee, In-Yong;Jung, In-Hak;Hyun, Seung-Bum
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.99-101
    • /
    • 2000
  • Different optimization algorithms have been proposed to solve real and reactive power optimization problems. Most of all, linear programming techniques that employed a simplex method have been extensively used. But, the growth in the size of power systems demands faster and more reliable optimization techniques. An Interior Point(IP) mehod is based on an interior point approach to aim the solution trajectory toward the optimal point and is converged to the solution faster than the simplex method. This paper deals with the use of Successive Linear Programming(SLP) for the solution of the Security Constrained Economic Dispatch(SCED) problem. This problem is solved using the IP method. A comparison with simplex method shows that the interior point technique is reliable and faster than the simplex algorithm.

  • PDF

Taint Inference for Cross-Site Scripting in Context of URL Rewriting and HTML Sanitization

  • Pan, Jinkun;Mao, Xiaoguang;Li, Weishi
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.376-386
    • /
    • 2016
  • Currently, web applications are gaining in prevalence. In a web application, an input may not be appropriately validated, making the web application susceptible to cross-site scripting (XSS), which poses serious security problems for Internet users and websites to whom such trusted web pages belong. A taint inference is a type of information flow analysis technique that is useful in detecting XSS on the client side. However, in existing techniques, two current practical issues have yet to be handled properly. One is URL rewriting, which transforms a standard URL into a clearer and more manageable form. Another is HTML sanitization, which filters an input against blacklists or whitelists of HTML tags or attributes. In this paper, we make an analogy between the taint inference problem and the molecule sequence alignment problem in bioinformatics, and transfer two techniques related to the latter over to the former to solve the aforementioned yet-to-be-handled-properly practical issues. In particular, in our method, URL rewriting is addressed using local sequence alignment and HTML sanitization is modeled by introducing a removal gap penalty. Empirical results demonstrate the effectiveness and efficiency of our method.

Sound Based Machine Fault Diagnosis System Using Pattern Recognition Techniques

  • Vununu, Caleb;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.134-143
    • /
    • 2017
  • Machine fault diagnosis recovers all the studies that aim to detect automatically faults or damages on machines. Generally, it is very difficult to diagnose a machine fault by conventional methods based on mathematical models because of the complexity of the real world systems and the obvious existence of nonlinear factors. This study develops an automatic machine fault diagnosis system that uses pattern recognition techniques such as principal component analysis (PCA) and artificial neural networks (ANN). The sounds emitted by the operating machine, a drill in this case, are obtained and analyzed for the different operating conditions. The specific machine conditions considered in this research are the undamaged drill and the defected drill with wear. Principal component analysis is first used to reduce the dimensionality of the original sound data. The first principal components are then used as the inputs of a neural network based classifier to separate normal and defected drill sound data. The results show that the proposed PCA-ANN method can be used for the sounds based automated diagnosis system.

A DRM Scheme for Multi-CMSs Interoperability Based on Integrated Metadata (다중 CMS 상호운영을 위한 통합메타데이터기반의 DRM기법)

  • Li, Yong-Zhen;Cho, Young-Bok;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9C
    • /
    • pp.676-682
    • /
    • 2008
  • With the coming of information times, digital contents are widely applied in various fields of the society. Along with this, scholars provided many techniques and research approaches related to digital contents management and copyright protection. But till now, most proposed techniques and approaches are based on single system. The independency and separation among management systems causes the problems such as application across systems are limited, and resources sharing can't be available, etc. In this paper, for the application cross systems and contents sharing, we propose the cross-systems DRM approach based on unified metadata. This approach can be applied for the incorporation of multiple congeneric or heterogeneous CMSs, in the same time, solve the copyright problem cross digital content systems.

A Study on Image Noise Reduction Technique for Low Light Level Environment (저조도 환경의 영상 잡음제거 기술에 관한 연구)

  • Lee, Ho-Cheol;Namgung, Jae-Chan;Lee, Seong-Won
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.3
    • /
    • pp.283-289
    • /
    • 2010
  • Recent advance of digital camera results in that image signal processing techniques are widely adopted to railroad security management. However, due to the nature of railroad management many images are acquired in low light level environment such as night scenes. The lack of light causes lots of noise in the image, which degrades image quality and causes errors in the next processes. 3D noise reducing techniques produce better results by using consecutive sequence of images. On the other hand, they cause degradation such as motion blur if there are motions in the sequence. In this paper, we use an adaptive weight filter to estimate more accurate motions and use the result of the adaptive filter to 3D result to improve objective and subjective mage quality.