• 제목/요약/키워드: digital privacy

검색결과 377건 처리시간 0.029초

Estimation and Watermarking of Motion Parameters in Model Based Image Coding

  • Park, Min-Chul
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.1264-1267
    • /
    • 2002
  • In order to achieve an advanced human-computer interface system, it is necessary to analyze and synthesize facial motions just as they are in an interactive way, and to protect them from unwanted use and/or illegal use for their privacy, various uses in applications and the costs of obtaining motion parameters. To estimate facial motion, a method of using skin color distribution, luminance, and geometrical information of a face is employed. Digital watermarks are embedded into facial motion parameters and then these parameters are scrambled so that it cannot be understood. Experimental results show high accuracy and efficiency of the proposed estimation method and the usefulness of the proposed watermarking method.

  • PDF

Study on the current direction of our country in accordance with the basic conditions for the commercialization of the UAV

  • Jo, Jong Deok;Lee, Chang Hee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.58-62
    • /
    • 2016
  • Shipping related services is attracting attention as a UAV (Unmanned Aerial Vehicle) application with the recent economy has been generally accepted drones. UAV of the existing military-driven logistics delivery, aerial photography, wireless Internet connection, broadcasting, disaster research, digital maps, transportation, advertising, meteorological, border surveillance, agricultural use, such as hobbies range of uses from up military are diverse and growing. The advantage of delivery drones seems to be an important feature of delivery of the goods, including labor-saving, long-distance transportation in cold weather. UAV is demanded by competitive performance development for commercialization. Privacy issues that may arise during the drone operation, ensuring marketability issues, control system, regulations, operational standards and specifications, etc. should be addressed. Development direction of Korea UAV based in current technology, regulation, and growth potential presented by deriving from the idea of 'GIF 2016 Gang-won Hackathon.

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • 반도체디스플레이기술학회지
    • /
    • 제6권2호
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Fast Implementation of a 128bit AES Block Cipher Algorithm OCB Mode Using a High Performance DSP

  • Kim, Hyo-Won;Kim, Su-Hyun;Kang, Sun;Chang, Tae-Joo
    • Journal of Ubiquitous Convergence Technology
    • /
    • 제2권1호
    • /
    • pp.12-17
    • /
    • 2008
  • In this paper, the 128bit AES block cipher algorithm OCB (Offset Code Book) mode for privacy and authenticity of high speed packet data was efficiently designed in C language level and was optimized to support the required capacity of contents server using high performance DSP. It is known that OCB mode is about two times faster than CBC-MAC mode. As an experimental result, the encryption / decryption speed of the implemented block cipher was 308Mbps, 311 Mbps respectively at 1GHz clock speed, which is 50% faster than a general design with 3.5% more memory usage.

  • PDF

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

대구경북 서비스 콘텐츠 활성화를 위한 애니메이션 콘텐츠가 학습성과의 연관관계 연구: 개인정보보안을 중심으로 (Utilizing animation contents for e-learning performance enhancement: focus on private information security)

  • 정재은
    • 한국정보통신학회논문지
    • /
    • 제15권2호
    • /
    • pp.471-476
    • /
    • 2011
  • 본 연구는 이러닝을 실시하는데 있어 플래시와 같은 애니메이션 콘텐츠가 미치는 영향에 대하여 알아보았다. 보다 구체적으로 애니메이션 콘텐츠의 어떠한 속성들이 개인정보보안 관련 이러닝 학습에 긍정적인 영향을 미치는지 알아보고자 하였다. 그 결과 플래시 애니메이션의 속성인 캐릭터와 스토리가 학습자들의 이러닝 학습 효과를 높이는데 긍정적인 영향을 미치는 것을 알 수 있었다.

The Current State of Cyber-Readiness of Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.256-274
    • /
    • 2022
  • The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.

빅데이터의 위험 요소에 대한 고찰 (A Study on Risks of Big Data)

  • 천윤수;박재경
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2023년도 제68차 하계학술대회논문집 31권2호
    • /
    • pp.631-633
    • /
    • 2023
  • 본 논문에서는 빅데이터의 활용이 확산되는 현대 사회에서 빅데이터의 수집, 관리, 이용 등에서 나타날 수 있는 문제를 확인하고 그 문제에 대한 기존의 대응 방법과 보완점을 시사한다. 빅데이터의 위험성은 개인 정보유출, 디지털 디바이드, 편향성과 신뢰성, 의존성과 통제 가능성 등이 있다. 해당 문제는 빅데이터의 보편화가 가중될수록 큰 규모의 사회적 문제로 대두될 가능성이 높다. 이를 보완하기 위한 대응 방법을 크게 기술적 대응, 법적 대응, 사회적 대응으로 나누어 알아보고 각 부분의 취약점을 분석하여 개선의 방향을 제시한다.

  • PDF

Network Security Practices through Anonymity

  • Smitha, G R;Suprith C Shekar;Ujwal Mirji
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.155-162
    • /
    • 2024
  • Anonymity online has been an ever so fundamental topic among journalists, experts, cybersecurity professionals, corporate whistleblowers. Highest degree of anonymity online can be obtained by mimicking a normal everyday user of the internet. Without raising any flags of suspicion and perfectly merging with the masses of public users. Online Security is a very diverse topic, with new exploits, malwares, ransomwares, zero-day attacks, breaches occurring every day, staying updated with the latest security measures against them is quite expensive and resource intensive. Network security through anonymity focuses on being unidentifiable by disguising or blending into the public to become invisible to the targeted attacks. By following strict digital discipline, we can avoid all the malicious attacks as a whole. In this paper we have demonstrated a proof of concept and feasibility of securing yourself on a network by being anonymous.

재난관리시스템의 개인정보보호 취약성 분석 (The Vulnerability Analysis of the Personal Privacy Security in the Disaster Management System)

  • 정진호;김현석;김주배;최진영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 추계학술발표대회
    • /
    • pp.1242-1245
    • /
    • 2007
  • 국가 재난관리 시스템(National Disaster Management System: NDMS)은 개발 및 운용상의 여러 이유로 인해 개인정보의 수집을 필요로 한다. 그러나 이렇게 수집된 개인정보는 수집단계에서부터 소멸단계까지 인가/비인가 관리자에 의한 악용 또는 침해우려가 높다. 본 논문에서는 이러한 개인정보들의 관리 및 보호를 위해 재난관리시스템을 대상으로 보호대상 개인정보를 분석하고, 도출된 개인정보에 대하여 재난관리 업무상의 보호/통제를 평가하며, 개인정보 Life Cycle 별 위협 요소 및 잠재 위험 분석을 통한 영향평가를 수행하여 개인정보보호를 위한 관리적, 기술적, 물리적 대응방안을 제시하고자 한다.