• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.037 seconds

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Development strategy for an information exchange subsystem as a part of Construction Project Lifecycle Management System(CPLMS) (건설 프로젝트 생애주기 관리를 위한 정보교환 서브시스템 개발방안)

  • You, Seok-Joon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.77-82
    • /
    • 2007
  • This paper discusses on implementation methods for providing data exchange capability of the Construction Project Lifecycle Management System (CPLM). Because most information media currently used in the construction industry are computer files, the system must be capable of handling various file types; however, The goals of PLM cannot be achieved if the contents of the files are communicated freely, which can only be achieved using a standardized information model that has comprehensive coverage of all information produced within the projects (i.e., a BlM). Several methods of adopting the model are investigated here, and a transitional implementation method for K-IFC is suggested, in which a file-based exchange backed by the BlM can evolve into object-level transactions of the BIM with not only advanced data integrity and security, but also improved communications between the project participants.

  • PDF

Developing for Embedded-based Multidimensional Location Information Data Extraction and Storage system (임베디드 기반의 다차원 위치정보 추출 및 저장시스템 개발)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2586-2592
    • /
    • 2014
  • Lost fishing gears become a major cause of marine pollution, and many policy and technical efforts have been conducted for that. For efficient retrieving lost fishing gears in underwater, It is important to know the current position. Using GPS in the sub-sea environment is impossible and localization requires the use of special systems, and mobility due to water currents for underwater localization also has to be considered. In this paper, described with respect to the system for a self-generated location informations without using an external signal, such as a GPS and Sonar and storing them. Using the characteristics of the geomagnetic and INS principle, proposed informations and a way for estimating self position during movement. Embedded based system suggested and implemented in this study is tested for validating it's functionality.

Wide FOV Panorama Image Acquisition Method (광각 파노라마 영상획득 방법)

  • Kim, Soon-Cheol;Yi, Soo-Yeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2117-2122
    • /
    • 2015
  • Wide FOV(Field-of-View) is required to contain much more visual information in a single image. The wide FOV imaging system has many industrial applications such as surveillance, security, tele-conference, and mobile robots. In order to obtain a wide FOV panorama image, an imaging system with hyperbolic cylinder mirror is proposed in this paper. Because the horizontal FOV is more important than the vertical FOV in general, a hyperbolic cylinder mirror is designed in this paper, that has a hyperbolic curve in the horizontal surface and is the same as a planar mirror in the vertical axis. Imaging model of the proposed imaging system is presented by ray tracing method and the hyperbolic cylinder mirror is implemented. The imaging performance of wide FOV is verified by experiments in this paper. This imaging system is cost-effective and is possible to acquire a wide panorama image having 210 degree horizontal FOV in real-time without an extra image processing.

Fully Phase-based Optical Encryption System Using Computer Holography and Fresnel Diffraction (컴퓨터 홀로그래피와 프레넬 회절을 이용한 위상 영상 광 암호화 시스템)

  • 윤경효;신창목;조규보;김수중;김철수;서동환
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.11
    • /
    • pp.43-51
    • /
    • 2004
  • In this paper, we propose a high-level optical encryption system, which is tolerant with noises and cropping, by encrypting the phase-encoded CGH pattern of original image with the phase-encoded Fresnel diffraction pattern of random key images. For encryption, the phase-encoded CGH pattern of original image is multiplied by conjugate components which are the phase-encoded Fresnel diffraction patterns of random key images. The original information can be reconstructed by multiplying encrypted image by phase-encoded Fresnel diffraction pattern of random key images and performing Fourier transform of the multiplication result. The proposed system is robust to noises and cropping due to characteristics of CGH pattern and can guarantee high-level encryption by using Fresnel diffraction information. We verified the validity of proposed system by computer simulations, numerical analysis of noises and cropping effect and optical experiment.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

Development of Safety Equipment Database for Effective Management in Wooden Cultural Heritage (효율적 목조 문화재 방재관리를 위한 방재설비 데이터베이스구축)

  • Kim, Donghyun;Lee, Ji-hee;Yi, Myungsun
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.46-53
    • /
    • 2016
  • Wooden cultural heritage is vulnerable to fire, flooding and other hazards. Therefore, an effective disaster prevention and mitigation strategy for them should include preventive measures in a full range of management. These were used to construct a disaster safety system for 508 wooden cultural heritage items by the Cultural Heritage Administration. According to the type of ownership and administration, national and public heritage is controlled by personal management or commissional management. Among them, it is arranged with the safety security institute for important cultural properties. In addition, they have problems of field management with no computerization about the management information for a disaster facility system. Therefore, this study aimed to develop a DB platform that can share information with many users who need to manage cultural heritage. Through a field survey, it is feasible to develop a disaster facility system to provide the information, such as the main data, quantity and location.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.