• 제목/요약/키워드: Visual Security

검색결과 251건 처리시간 0.027초

Image Deduplication Based on Hashing and Clustering in Cloud Storage

  • Chen, Lu;Xiang, Feng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권4호
    • /
    • pp.1448-1463
    • /
    • 2021
  • With the continuous development of cloud storage, plenty of redundant data exists in cloud storage, especially multimedia data such as images and videos. Data deduplication is a data reduction technology that significantly reduces storage requirements and increases bandwidth efficiency. To ensure data security, users typically encrypt data before uploading it. However, there is a contradiction between data encryption and deduplication. Existing deduplication methods for regular files cannot be applied to image deduplication because images need to be detected based on visual content. In this paper, we propose a secure image deduplication scheme based on hashing and clustering, which combines a novel perceptual hash algorithm based on Local Binary Pattern. In this scheme, the hash value of the image is used as the fingerprint to perform deduplication, and the image is transmitted in an encrypted form. Images are clustered to reduce the time complexity of deduplication. The proposed scheme can ensure the security of images and improve deduplication accuracy. The comparison with other image deduplication schemes demonstrates that our scheme has somewhat better performance.

드론 원격 식별 규정 및 표준화 동향 분석 (Analysis of Regulation and Standardization Trends for Drone Remote ID)

  • 김희욱;강군석;김대호
    • 전자통신동향분석
    • /
    • 제36권6호
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

Means of Visualization in Teaching Ukrainian as a Foreign Language to Modern Students with Clip Way of Thinking

  • Kushnir, Iryna;Zozulia, Iryna;Hrytsenko, Olha;Uvarova, Tetiana;Kosenko, Iuliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.55-60
    • /
    • 2022
  • Acceleration of the pace of life, increasing the amount of information, the emergence of "clip way of thinking" as a phenomenon has led to the problem of choosing forms of presentation of educational materials to students. One of the ways to solve this problem is to use the means of visualization of information flow, forasmuch as the thinking of modern youth is more effective in perceiving visual images than verbal means. The purpose of the research is to prove the effectiveness of the use of visualization in the process of teaching Ukrainian as a foreign language to students with clip way of thinking. The following methods have been used, namely: analysis, synthesis, comparison, systematization and generalization of scientific literature; testing and surveys; pedagogical experiment; quantitative and qualitative analysis of data, interpretation and generalization of the research results. The essence of visualization means has been revealed; the expediency of their use in the methodology of teaching foreign students the Ukrainian language has been substantiated. It has been proven that the role of Ukrainian teachers lies in taking into account all new trends in teaching, integrating computer perception of information by foreign students into teaching technology and using cognitive visualization in order to intensify the learning process.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

Sorting Instagram Hashtags all the Way throw Mass Tagging using HITS Algorithm

  • D.Vishnu Vardhan;Dr.CH.Aparna
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.93-98
    • /
    • 2023
  • Instagram is one of the fastest-growing online photo social web services where users share their life images and videos with other users. Image tagging is an essential step for developing Automatic Image Annotation (AIA) methods that are based on the learning by example paradigm. Hashtags can be used on just about any social media platform, but they're most popular on Twitter and Instagram. Using hashtags is essentially a way to group together conversations or content around a certain topic, making it easy for people to find content that interests them. Practically on average, 20% of the Instagram hashtags are related to the actual visual content of the image they accompany, i.e., they are descriptive hashtags, while there are many irrelevant hashtags, i.e., stophashtags, that are used across totally different images just for gathering clicks and for search ability enhancement. Hence in this work, Sorting instagram hashtags all the way through mass tagging using HITS (Hyperlink-Induced Topic Search) algorithm is presented. The hashtags can sorted to several groups according to Jensen-Shannon divergence between any two hashtags. This approach provides an effective and consistent way for finding pairs of Instagram images and hashtags, which lead to representative and noise-free training sets for content-based image retrieval. The HITS algorithm is first used to rank the annotators in terms of their effectiveness in the crowd tagging task and then to identify the right hashtags per image.

TPS Analysis, Performance Indicator of Public Blockchain Scalability

  • Hyug-Jun Ko;Seong-Soo Han
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.85-92
    • /
    • 2024
  • In recent years, Bitcoin and Ethereum have witnessed a surge in trading activity, driven by venture capital investment and funding through initial coin offerings (ICOs) and initial exchange offerings (IEOs). This heightened interest has led to kickstarting a vibrant ecosystem for blockchain development. The total number of cryptocurrencies listed on CoinMarketCap.com has reached 2,274 highlights how dynamic and wide blockchain development landscape has grown. In blockchain development, new blockchain projects are being created by forking blockchains inspired by major cryptocurrencies such as Bitcoin and Ethereum. These projects aim to address the perceived shortcomings and improve existing technologies. Altcoins, representing these alternative cryptocurrencies, are an ongoing industry effort to improve performance and security with enhancement proposals such as Bitcoin Improvement Proposals (BIP), Ethereum Improvement Proposals (EIP), and EOSIO Enhancement Proposals (EEP). With competitive attempts to improve blockchain performance and security, an ongoing performance race between various blockchains has taken shape, each claiming its own performance advantages. In this paper, we describe the transactions contained in the blocks of each representative blockchain, and find the factors that affect the transactions per second (TPS) through transaction processing and block generation processes, and suggest their relationship with scalability.

BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법 (Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data)

  • 최소미;김선영;이재연;고장혁;권구형;주재걸
    • 인터넷정보학회논문지
    • /
    • 제23권5호
    • /
    • pp.135-143
    • /
    • 2022
  • 지난 2020년부터 세계는 COVID-19 확산으로 인해 사회적 거리두기와 재택근무를 시행함에 따라 인터넷을 활용한 비디오 및 음성 관련 콘텐츠 서비스와 클라우드 컴퓨팅 활성화로 인터넷에 대한 의존도가 늘어나면서 라우팅 프로토콜 기반 실시간 스트리밍 세션이 증가하고 있다. BGP는 가장 많이 사용되는 라우팅 프로토콜로써 보안성을 향상시키기 위해 많은 연구들이 지속되고 있으나 분석의 실시간성과 알고리즘의 오탐을 판단하기 위한 시각적 분석이 부족하다. 본 논문은 정상 및 이상으로 분류된 BGP 데이터를 수집 및 전처리 후 통계적 기법과 Rule-based 기법을 융합한 이상징후 감지 알고리즘을 활용하여 실 데이터 기반으로 분석한다. 더불어 지도 및 Sankey Chart 기반 시각화 기법으로 알고리즘의 분석 결과와 직관적인 시각화 방안으로 인터랙티브한 시공간 분석 방안을 제시한다.

A Novel Two-Stage Training Method for Unbiased Scene Graph Generation via Distribution Alignment

  • Dongdong Jia;Meili Zhou;Wei WEI;Dong Wang;Zongwen Bai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권12호
    • /
    • pp.3383-3397
    • /
    • 2023
  • Scene graphs serve as semantic abstractions of images and play a crucial role in enhancing visual comprehension and reasoning. However, the performance of Scene Graph Generation is often compromised when working with biased data in real-world situations. While many existing systems focus on a single stage of learning for both feature extraction and classification, some employ Class-Balancing strategies, such as Re-weighting, Data Resampling, and Transfer Learning from head to tail. In this paper, we propose a novel approach that decouples the feature extraction and classification phases of the scene graph generation process. For feature extraction, we leverage a transformer-based architecture and design an adaptive calibration function specifically for predicate classification. This function enables us to dynamically adjust the classification scores for each predicate category. Additionally, we introduce a Distribution Alignment technique that effectively balances the class distribution after the feature extraction phase reaches a stable state, thereby facilitating the retraining of the classification head. Importantly, our Distribution Alignment strategy is model-independent and does not require additional supervision, making it applicable to a wide range of SGG models. Using the scene graph diagnostic toolkit on Visual Genome and several popular models, we achieved significant improvements over the previous state-of-the-art methods with our model. Compared to the TDE model, our model improved mR@100 by 70.5% for PredCls, by 84.0% for SGCls, and by 97.6% for SGDet tasks.

경부안정화 운동이 민간 경비원의 목통증, 경부장애지수, 관절가동범위에 미치는 효과 (Effects of Cervical Spinal Stabilization Training in Private Security on Chronic Neck Pain and Cervical Function, Neck Pain, ROM)

  • 김성호;권봉안;이완희
    • 시큐리티연구
    • /
    • 제25호
    • /
    • pp.89-107
    • /
    • 2010
  • 이 연구는 만성 경부통을 가진 민간 경비원들을 대상으로 경부 안정화 운동을 실시하여, 목통증, 경부장애지수, 관절가동범위, 근육통증, 재위치감각 변화에 미치는 영향을 비교 분석 하고자 실시하였다. 연구 대상자는 경기 지역 민간경비업체에 종사하는 직원 중 만성 경부통을 호소하는 21명을 대상으로 경부 안정화 운동그룹, 자세교정 운동그룹으로 무선 할당하여, 주3회, 8주간 운동을 실시하였다. 실험 전 후 설문지를 이용하여 목통증과 경부장애지수를 조사하였으며, 관절가동범위, 근육통증, 재위치감각 검사를 실시하여 실험 전 후 변화된 값을 비교 측정하여 다음과 같은 결과를 얻었다. 통증강도와 경부장애지수는 경부 안정화 운동그룹이 실험 후 유의하게 감소하였으며(p<0.05), 관절가동범위, 근육통증, 재위치감각은 경부 안정화 운동그룹에서 실험 후 유의한 향상이 있었으나, 자세교정 운동그룹은 유의한 차이가 없는 것으로 나타났으며(p>0.05), 그룹 간 비교에서도 경부 안정화 운동그룹이 통증, 경부장애지수, 관절가동범위, 근육통증, 재위치감각에서 유의한 향상이 있었다(p<0.05). 본 연구 결과를 볼 때, 만성 경부통을 호소하는 민간 경비원들을 대상으로 경장근과 다열근과 같은 심부근육 강화에 초점을 둔 경부안정화 운동프로그램이 일반적인 자세교정 운동프로그램보다 통증 및 목 기능개선에 효과적인 것으로 나타났다. 따라서 경부 안정화 운동이 만성 경부통을 가진 민간 경비원들의 목 통증 감소와 기능 회복에 효과적이라고 할 수 있겠다.

  • PDF

척추안정화 운동이 민간 경호.경비원들의 허리통증에 미치는 영향 (Effects of spinal stabilization training on Chronic Low Back Pain in Private Guard and Security)

  • 김성호;이완희
    • 시큐리티연구
    • /
    • 제20호
    • /
    • pp.71-93
    • /
    • 2009
  • 이 연구는 만성요통을 가진 민간 경호 경비원들을 대상으로 척추안정화 운동을 실시하여, 허리통증, 일상생활제한, 척추심부근육의 근단면적 변화에 미치는 영향을 비교 분석하고자 실시하였다. 연구 대상자는 서울 경기 지역 경호 경비업체에 종사하는 직원 중 만성요통(3개월 이상)을 호소하는 42명을 대상으로 일반적인 척추강화운동그룹, 척추안정화 운동 그룹으로 21명씩 무선 할당하여, 주 3회, 10주간 운동을 실시하였다. 실험 전 후 설문지를 이용하여 허리통증과 요통장애지수를 조사하였으며, 컴퓨터 단층촬영(CT)을 실시하여 다열근과 대요근의 근단면적을 측정하였으며, 실험 전 후 변화된 값을 비교 측정하여 다음과 같은 결과를 얻었다. 1. 통증강도와 요통장애지수는 두 그룹 모두 통계학적으로 유의하게 감소한 것으로 나타났다(p<0.01). 그룹 간 비교에서는 척추안정화 운동그룹이 일반적인 척추강화 운동그룹에 비하여 통증 및 일상생활제한의 감소폭이 더 큰 것으로 나타났다(p<0.05). 2. 두 그룹 간 다열근과 대요근의 근단면적 변화는 척추안정화 운동그룹이 일반적인 척추강화 운동그룹 보다 통계학적으로 유의하게 증가하였다(p<0.05). 이 연구 결과를 볼 때, 만성요통을 호소하는 민간 경호 경비원들을 대상으로 다열근과 대요근과 같은 심부근육 강화에 초점을 둔 척추안정화 운동프로그램이 일반적인 척추강화 운동프로그램 보다 통증 및 요통장애지수 감소와 심부근육의 근력 증가(근단면적)에 더 효과적인 것으로 나타났다. 따라서 척추안정화 운동이 만성요통 민간 경호 경비원들의 요통감소와 기능 회복에 효과적이라고 할 수 있겠다.

  • PDF