• Title/Summary/Keyword: information security product

Search Result 310, Processing Time 0.029 seconds

Shift and Noise Tolerance Encryption System Using a Joint Transform Correlator (결합 변환 상관기를 이용한 잡음 및 변이에 강한 암호화 시스템)

  • 서동환;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.7
    • /
    • pp.499-506
    • /
    • 2003
  • In this paper, we propose the shift and noise tolerance method using a virtual phase image and a joint transform correlator (JTC) architecture that can alleviate the need for an accurate optical axis alignment. An encrypted image is obtained by the Fourier transform of the product of a phase- encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. We demonstrate the robustness to noise, to data loss and to shift of the encrypted image using a JTC in the proposed description technique.

Improvement of Okamoto-Uchiyama Probabilistic Public Key Cryptosystem (Okamoto-Uchiyama 확률 공개키 암호 방식의 효율성 개선)

  • Choi, Duk-Hwan;Kim, Hyun-Jue;Choi, Seung-Bok;Won, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.346-351
    • /
    • 2002
  • We improve a new probabilistic public key cryptosystem, in which the one wav function was defined only on the discrete logarithmic functions, proposed by Okamoto and Uchiyama. The plaintexts are calculated from the modular product of two these functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a well-chosen public key assuming an unit element 1 as the fixed function value. Because it is possible to reduce the number of operations at the decryption. Also the concrete method for a public key of our improved scheme is suggested.

Study on Measures to Improve Fresh Food Sales at Military Commissaries (PX)

  • Kim, Saehoon;Lee, Hwansoo
    • Agribusiness and Information Management
    • /
    • v.10 no.2
    • /
    • pp.18-27
    • /
    • 2018
  • This study aims to confirm the appropriateness of fruit and vegetable sales at military commissaries, with the purpose of enhancing the physical health and morale of military personnel. In order to achieve this objective, we examined the actual conditions of fruit and vegetable sales at military commissaries and analyzed the soldiers' awareness of fruit and vegetable sales through questionnaire surveys. The conclusions of this study are as follows: Firstly, fresh fruits and vegetables were not sold at military commissaries. Secondly, soldiers acknowledged the need for the consumption of fruits and vegetables and strongly expressed the desire for these fresh food products to be sold at military commissaries. Although the ROK Navy privatized military commissaries for the purposes of increasing management efficiency of national defense and strengthening combat power by transferring PX salesclerk soldiers to join combat personnel, this effort produced a negative effect of price increase. The following are proposals for improving this condition: fruit and vegetable products should be introduced to military commissaries through military welfare funds; fresh food markets should be established by closely cooperating with the local community's agricultural producers; processed fruit and vegetable product (dry, frozen, airtight packaged, etc.) sales should be increased; and the privatization of the navy commissaries should be abolished.

A Study on Methods for the Domestic Diffusion of Intelligent Security Project : With a Focus on the Case of Smart City Integrated Platform (지능형 방범 사업의 국내 확산 방안 연구 : 스마트시티 통합플랫폼을 대상으로)

  • Shin, Young-Seob;Han, Sun-Hee;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.474-484
    • /
    • 2019
  • In this age, where the social environment is changing rapidly and unpredictably, interest in safety from crime is increasing in Korean society. As the desire to live a life free from the fear of crime increases, interest in the construction of safe cities is also rising nationwide. To meet the national demand, the Korean government is promoting a project to link public disaster safety systems by involving municipalities, 112, 119, and other emergency services and institutions through the Smart City Integrated Platform in order to construct a smart safety net. This study investigates the linking of theSmart City Integrated Platform and theIntelligent Security Project. The results are as follows. 1. The linkage's objective is clear. 2. The system sector can provide information to accident-related organizations. 3. The scenario area can be expanded to a crime-prevention sector, and a long-term urban information integration infrastructure can be created. 4. Product testing is enabled by a smart city road map and through continuous consultation with relevant organizations. 5. Project diffusion to other local governments can be promoted with the continued addition of commercial products.

Performance Comparison of Wave Information Retrieval Algorithms Based on 3D Image Analysis Using VTS Sensor (VTS 센서를 이용한 3D영상 분석에 기초한 파랑 정보 추출 알고리즘 성능 비교)

  • Ryu, Joong-seon;Lim, Dong-hee;Kim, Jin-soo;Lee, Byung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.519-526
    • /
    • 2016
  • As marine accidents happen frequently, it is required to establish a marine traffic monitoring system, which is designed to improve the safety and efficiency of navigation in VTS (Vessel Traffic Service). For this aim, recently, X-band marine radar is used for extracting the sea surface information and, it is necessary to retrieve wave information correctly and provide for the safe and efficient movement of vessel traffic within the VTS area. In this paper, three different current estimation algorithms including the classical least-squares (LS) fitting, a modified iterative least-square fitting routine and a normalized scalar product of variable current velocities are compared with buoy data and then, the iterative least-square method is modified to estimate wave information by improving the initial current velocity. Through several simulations with radar signals, it is shown that the proposed method is effective in retrieving the wave information compared to the conventional methods.

A Study on the Status Quo and the Improvements of Blue Tourism Websites in the Context of Electronic Commerce (해양관광 사이트의 전자상거래 지원지능에 대한 실태 및 개선방안)

  • 김진백
    • The Journal of Fisheries Business Administration
    • /
    • v.35 no.1
    • /
    • pp.57-85
    • /
    • 2004
  • To develop an blue tourism website(BTW) for electronic commerce(EC), information requirements of BTW are defined firstly. We defined information requirements of BTW from two aspects, i.e., front office and back office. Information requirements for front office were derived by consumer purchasing decision process. And information requirements for back office were derived by tourism value chain. Total 29 functions are identified as critical EC related functions of BTW. Among them, 25 functions were investigated into BTW. BTWs were searched by search engines - Yahoo and Empas - to Korean websites. There are 12 specialized BTWs, except one cyber museum website. For 12 websites, 25 functions were probed. By the results, in need recognition stage of blue tourism, only weather information was provided in most websites. In information search stage of blue tourism, package recommendation and various contents were provided in most websites. In consumption stage of blue tourism, traffic information were provided in most websites. And in after - sales service stage of blue tourism, bulletin board function was implemented in most websites. The rest of the functions were scarcely implemented. On the whole, it was concluded that most EC related functions of BTW in Korea were not implemented properly. To improve the status quo, it is expected in the dimension of individual website, that marketing planning, customized service, intelligent service, reinforcing purchasing assistance functions, customer relationship management, and escrow service etc. need to be implemented. And it is expected in the dimension of blue tourism industry, that standardizing product catalog, security assistance policy, information sharing by industrial database, finding referral model of BTW, elevating information mind, revising related laws etc. are needed.

  • PDF

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

A Study on the Consumer Disputes and Protection Measures of the Digital Healthcare Market and O2O Service (디지털헬스케어 시장과 O2O서비스 소비자분쟁 및 보호방안)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.121-138
    • /
    • 2020
  • The O2O services in the healthcare sector have only been in full swing for about three years, and unlike existing O2O consumer goods, the scale and scope of the dispute are more complicated due to restrictions on medical treatment. In this study, O2O service platform operators and medical institutions' roles and responsibilities were redefined as a countermeasure for resolving disputes in healthcare O2O services and the laws for changing the transaction environment. A change in institutional mechanisms was proposed. This study looked at the types of consumer disputes related to healthcare O2O services as insufficient information problems, problems in the course of medical service implementation, problems with immunity provisions for platform operators, cancellations, and non-compliance with refunds. All the information generated during transactions in the healthcare sector was extensive in scale and included the most sensitive information among personal information, stressing the importance of ensuring security. The area that started in the O2O range before the medical institution visit also proposed a plan to establish a system for the delivery of proven information as a pre-medical person. The scale and growth will grow faster, given that consumers can experience the information they want anytime, anywhere they want. However, the platform broker's role, a link player, will become more important because consumers who use the service will have their first meeting with non-face-to-face product providers. On the other hand, service providers may have side effects of misleading consumers by providing false information or misleading consumers through exaggerated advertisements. The O2O service market is expected to expand beyond distribution and dining out to the entire industry. However, since it is challenging to check accurate statistics on the detailed market, various disputes and consumer protection measures will be required for each detailed market, and comprehensive leading solutions will be essential in the future.

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.