• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.035 seconds

A Fast Iris Feature Extraction Method For Embedded System (Embedded 시스템을 위한 고속의 홍채특징 추출 방법)

  • Choi, Chang-Soo;Min, Man-Gi;Jun, Byoung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.128-134
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, using iris information is used in many fields such as access control and information security. But Perform complex operations to extract features of the iris. because High-end hardware for real-time iris recognition is required. This paper is appropriate for the embedded environment using local gradient histogram embedded system using iris feature extraction methods have implement. Experimental results show that the performance of proposed method is comparable to existing methods using Gabor transform noticeably improves recognition performance and it is noted that the processing time of the local gradient histogram transform is much faster than that of the existing method and rotation was also a strong attribute.

Problems of Mobile Voting and System Requirements for the Solutions: Literature Review and Internet Survey (모바일 투표의 문제점 및 이를 극복하기 위한 모바일 투표 시스템 요구사항 - 문헌 사례 연구와 인터넷 설문 중심으로)

  • Choi, Jong Myung;Kim, Na Young;Ha, Sang Bok;Im, Yang June;Son, Young Woo;Kho, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2013
  • Mobile voting has been considered as a promising technology, but it has not been used widely or popular enough in the world. We think this situation is caused by immature technologies of mobile voting and no agreement among people in our society. In this paper, we reviewed literature on electronic voting systems in order to find out technical issues on mobile voting system, and we also surveyed people's opinions via the Internet in order to understand what they worry about mobile voting. From the literature review, we understand that the existing electronic voting systems did not consider security, robustness, and reliability issues enough. From the survey, we also get to know that people worry about "manipulation of the result of mobile voting" mostly. Our work can help researchers on mobile voting to consider the ways or technologies that convince people of the reliability of mobile voting.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

A Study on the Improving Operation Efficiency of the Back-door type Private Network (백도어형 사설망의 작업효율 개선에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.199-206
    • /
    • 2006
  • In this paper, we analyzed the weakness of the Back-door type private network which was effective method of system security and transmission speed in the same area without firewall system, and presented the solution to improve it. To prove the effect of this solution, Windows based systems and UNIX based systems are set up in same area, data transmission was tried. According to the result, this solution can maintain the advantage of the Back-door type private network and can have the advantage of removing file server and increasing operation efficiency by reducing the number of operation.

Distributed PNC Election Scheme with Guaranteeing QoS in WPANs (WPAN에서 QoS를 보장하는 분산적인 PNC 선출 방법)

  • Jeong, Soon-Gyu;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.133-142
    • /
    • 2007
  • WPANs are formed in relatively small area and a PNC that serves as a central control device plays an important role in the operation and organization of a piconet. Typical applications of WPANs are security system and health monitoring system. In these type of systems, guaranteeing realtime service is very important, and communications cannot take place when the PNC malfunctions. Thus, in this situation, it is necessary to elect a new PNC as soon as possible. For this reason, we propose distributed PNC election scheme that considers not only QoS support but also network connectivity to avoid possible network partition. Simulation results show proposed mechanism can select PNC with guaranteeing QoS and connectivity for a limited period.

A Study on Selection Factors of Personal Cloud Storage Service Using AHP (AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구)

  • Jo, Hyeon;Cho, Hyegyeong;Kim, Younghee;Kim, Hayan;Jeon, Hyeon-Jeong;Lee, Jae Kwang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

A Design and Implementation of Java Library for Multiple Access Control Models (다중 접근제어 모델을 위한 Java 라이브러리의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1394-1401
    • /
    • 2007
  • Secure access control is a hot issue of large-scale organizations or information systems, because they have numerous users and information objects. In many cases, system developers should implement an access control module as a part of application. This way induces difficult modification of the module and repeated implementation for new applications. In this paper we implement a Java API library for access control to support system developers who use Java. They can easily build up access control module using our library. Our library supports typical access control models, and it can offer new types of access control. Furthermore, it is able to run multiple access control models at the same time.

  • PDF

OTP Authentication Protocol Using Stream Cipher with Clock-Counter (클럭 카운트를 이용한 스트림 암호의 OTP 인증 프로토콜)

  • Cho, Sang-Il;Lee, Hoon-Jae;Lee, Sang-Gon;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2113-2120
    • /
    • 2009
  • User authentication has been one of the most important part of the network system. OTP(One-Time Password) has been developed and applied to the existing authentication system. OTP makes a different password and abrogates used password each time when user is authenticated by the server. Those systems prevent stolen-key-problems which is caused by using the same key every log-in trial. Yet, OTP still has vulnerabilities. In this paper, an advanced protocol which is using clock-count method to apply a stream cipher algorithm to OTP protocols and to solve problems of existing OTP protocols is proposed.

Improvement of Okamoto-Uchiyama Probabilistic Public Key Cryptosystem (Okamoto-Uchiyama 확률 공개키 암호 방식의 효율성 개선)

  • Choi, Duk-Hwan;Kim, Hyun-Jue;Choi, Seung-Bok;Won, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.346-351
    • /
    • 2002
  • We improve a new probabilistic public key cryptosystem, in which the one wav function was defined only on the discrete logarithmic functions, proposed by Okamoto and Uchiyama. The plaintexts are calculated from the modular product of two these functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a well-chosen public key assuming an unit element 1 as the fixed function value. Because it is possible to reduce the number of operations at the decryption. Also the concrete method for a public key of our improved scheme is suggested.

The Design and Analysis of Secure DRM Systems using Steganography (스테가노그래피를 이용한 안전한 DRM 시스템 설계 및 분석)

  • Do Kyoung-Hwa;Jun Moon-Seog
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.21-29
    • /
    • 2003
  • Transferring the contents for multimedia shows recently very activity, So this fact ailows the contents for multimedia to be commercialized. These contents, however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method, This paper proposes the Secure DRM system which protects the contents for multimedia steganography methods. The DRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques, We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through DRM systems.

  • PDF