• Title/Summary/Keyword: data authenticity

Search Result 179, Processing Time 0.019 seconds

Fast Implementation of a 128bit AES Block Cipher Algorithm OCB Mode Using a High Performance DSP

  • Kim, Hyo-Won;Kim, Su-Hyun;Kang, Sun;Chang, Tae-Joo
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.12-17
    • /
    • 2008
  • In this paper, the 128bit AES block cipher algorithm OCB (Offset Code Book) mode for privacy and authenticity of high speed packet data was efficiently designed in C language level and was optimized to support the required capacity of contents server using high performance DSP. It is known that OCB mode is about two times faster than CBC-MAC mode. As an experimental result, the encryption / decryption speed of the implemented block cipher was 308Mbps, 311 Mbps respectively at 1GHz clock speed, which is 50% faster than a general design with 3.5% more memory usage.

  • PDF

Development and Evaluation of Nutrition Education Media for Breast Cancer (유방암 환자를 위한 영양교육매체 개발 및 평가)

  • Park, Sang-Hyun;Joo, Na-Mi
    • Korean Journal of Community Nutrition
    • /
    • v.13 no.4
    • /
    • pp.510-519
    • /
    • 2008
  • This study was conducted to develop and evaluate nutrition education media for breast cancer. The booklet was developed and consisted of breast cancer and diet, breast cancer and nutrition, breast cancer and food safety and Ingredients and recipes for breast cancer. The questionnaire requested information related to demographics, importance and satisfaction of evaluation for nutrition education media, evaluation of each chapter, and satisfaction of educational media. The data were analyzed using SPSS for Windows(version 12.0). The results were summarized as follows. The importance score for nutrition education media was higher than the satisfaction score. As a result of IPA analysis, quadrant I included 'comprehension', 'appropriateness of media', 'emphasis of the point'. Quadrant II classified with 'appropriateness of terms', 'interest', 'authenticity', 'appropriateness of illustrations'. Quadrant III included 'appropriateness of color and calligraphy', 'simplicity'. Quadrant IV classified with 'appropriateness of examples', 'concreteness'.

Consumer Behaviour Towards Purchasing Feng Shui Goods: An Empirical Study from Vietnam

  • NGHIEM-PHU, Binh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.83-92
    • /
    • 2022
  • Religions and beliefs can affect the shopping behaviors of its followers and practitioners. However, the knowledge about the factors that motivate, facilitate and even constrain customers' purchase of spiritual goods, such as feng shui items, is limited. Therefore, in this study, I examined the reasons, facilitators, and constraints of purchasing spiritual goods from the buyers' perspective. Two research questions directed the examination process, including (1) why users buy spiritual goods? And (2) what factors may facilitate or constrain the purchase and use of spiritual goods? Using Vietnam's feng shui market as the context, I applied the autoethnographic and ethnographic methods to collect and analyze the data. I found that the two main reasons to purchase the feng shui items were the products' meaning and beauty. In addition, I observed three groups of factors that could facilitate or constrain the purchase and use of feng shui items, including information about the products and their sellers, disposable income and life stage of the buyers, and price and authenticity of the products. Finally, based on these findings, I discussed the practical implications for managing the spiritual goods market in Vietnam.

Determining the Authenticity of Labeled Traceability Information by DNA Identity Test for Hanwoo Meats Distributed in Seoul, Korea (DNA 동일성 검사를 통한 서울지역 유통 한우육의 표시 이력정보 진위 판별)

  • Yeon-jae Bak;Mi-ae Park;Su-min Lee;Hyung-suk Park
    • Journal of Food Hygiene and Safety
    • /
    • v.38 no.1
    • /
    • pp.12-18
    • /
    • 2023
  • Beef traceability systems help prevent the distribution of Hanwoo (Korean native cattle) meat as imported beef. In particular, assigning a traceability number to each cattle can provide all information regarding the purchased Hanwoo meat to the consumers. In the present study, a DNA identity test was conducted on 344 samples of Hanwoo meat from large livestock product stores in Seoul between 2021 and 2022 to determine the authenticity of important label information, such as the traceability number. Traceability number mismatch was confirmed in 45 cases (13.1%). The mismatch rate decreased to 11.3% in 2022 from 14.7% in 2021, and the mismatch rate was higher in the northern region (16.9%) than in the southern region (10.2%). In addition, of the six brands, B and D showed satisfactory traceability system management, whereas E and A showed poor traceability system management, with significant differences (P<0.001). The actual traceability number confirmation rate was only 53.9% among the mismatch samples. However, examination of the authenticity of label information of the samples within the identified range revealed false marking in the order of the traceability number (13.1%), sex (2.9%), slaughterhouse name (2.2%), and grade (1.6%); no false marking of breed (Hanwoo) was noted. To prevent the distribution of erroneously marked livestock products, the authenticity of label information must be determined promptly. Therefore, a legal basis must be established mandating the filling of a daily work sheet, including the traceability number of beef, in partial meat subdivisions. Our findings can be used as reference data to guide the management direction of traceability systems for ensuring transparency in the distribution of livestock products.

Video Integrity Checking Scheme by Using Merkle Tree (머클트리를 활용한 영상무결성 검사 기법 )

  • Yun-Hee Kang;Eun-Young CHANG;Taeun Kwonk
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.

Enhancing the Reliability of OTT Viewing Data in the Golden Age of Streaming: A Small Sample AHP Analysis and In-Depth Interview

  • Seung-Chul Yoo;Yoontaek Sung;Hye-Min Byeon;Yoonmo Sang;Diana Piscarac
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.140-148
    • /
    • 2023
  • With the OTT media market growing rapidly, the significance of trustworthy data verification and certification cannot be emphasized enough. This study delves into the crucial need for such measures in South Korea, exploring the steps involved, the technological and policy-related considerations, and the challenges that may arise once these measures are put into place. Drawing on in-depth interviews and the analytical hierarchy process (AHP), this study surveyed various stakeholder groups, both directly and indirectly related to OTT data authentication and certification. By assessing the severity of OTT data-related issues and identifying the requirements for reliability-improvement policies, participants shared their valuable insights and opinions on this pressing matter. The survey results clearly indicate a divided opinion among stakeholders and industry experts on the reliability of OTT data, with some expressing trust while others remain skeptical. However, there was a consensus that advertising-based AVOD is more reliable than SVOD. By analyzing the priorities of authentication and verification, this study paves the way for the establishment and operation of a Korean MRC (KMRC), centered on the OTT media industry. The KMRC will serve as a vital platform for ensuring the authenticity and accuracy of OTT data in South Korea, providing businesses and industry players with a reliable source of information for informed decision-making. This study highlights the pressing need for reliable data authentication and certification in the rapidly growing OTT media market, and provides a persuasive case for the establishment of a KMRC in South Korea to meet this critical need.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

Corporate Patent Management and its Relationship with Creating Commercial Value

  • SUNG, Ikkyung
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.3
    • /
    • pp.101-112
    • /
    • 2021
  • Purpose - Corporate patent management refers to an organization belonging to the government or an intergovernmental organization that plays a bigger role in controlling patents. The purpose of the present study is to investigate and suggest brief solutions regarding how companies should manage their patents, maximizing their commercial values. Research design, Data, and methodology - Since the current researcher needed to optimize authenticity, the datasets were used primarily for collecting data from various sources examined by peers. This research used a claim from PRISMA (preferred reporting items for systematic reviews and meta-analysis) to identify prior studies within the limits of the sample. Result - The results revealed that corporate patent management is faced with different problems in the course of its operations. It faces many different critics from the outside world; therefore, a need to solve those problems. This study strongly suggests there are seven solutions to manage companies' patents. Conclusion - The conclusion of this study points out that The prolonged period has given some business organizations a competitive advantage over others especially that belong to industries that have a lower propensity to adopt patent rights. As a result, some business organizations have grown relatively faster than others within the long period they remain as patent rights members.