• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.033 seconds

A Study on the Effective Method of Generating the Dynamic Web Documents in the Multi-user System (다중-사용자 시스템에서의 효과적인 동적 웹 문서 발생 방법에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.478-485
    • /
    • 2006
  • In this paper, we analyze the conditions of generating the dynamic Web documents in multi-user server and propose effective method for it. PSSI technique leads to replace the complex process of modifying a CGI source program by simply correcting the HTML Web document in the external file form. This technique has the strong points of CGI, flexibility and security of programming as well as those of SSI, easiness of modifying Web documents. Due to the characteristics of PSSI that Web source documents are in the form of external file, we show that with a single CGI program an individual user can design and modify his own Web documents in his directory. This means that PSSI technique has more advantage in managing the server than the CGI method which requires CGI program to be set up whenever that service is needed.

Three channel Skin-Detection Algorithm for considering all constituent in YCbCr color space (YCbCr 색 좌표계의 모든 요소를 고려한 3-channel 피부 검출 알고리즘)

  • Shin, Sun-Mi;Im, Jeong-Uk;Jang, Won-Woo;Kwak, Boo-Dong;Kang, Bong-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.127-130
    • /
    • 2007
  • Skin detection research is important role in the 3G of mobile phone for video telephony and security system by using face recognition. We propose skin detection algorithm as preprocessing to the face recognition, and use YCbCr color space. In existing skin detection algorithm using CbCr, skin colors that is brightened by camera flash or sunlight at outdoor in images doesn't acknowledged the skin region. In order to detect skin region accuracy into any circumstance, this paper proposes 3-channel skin detection algorithm.

  • PDF

Transmission Methods Using RS Codes to Improve Spatial Relationship of Images in Reversible Data Hiding Systems (가역적 데이터 은닉 시스템에서 RS 부호를 사용한 이미지 공간상관 관계 향상을 위한 전송 기법)

  • Kim, Taesoo;Jang, Min-Ho;Kim, Sunghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1477-1484
    • /
    • 2015
  • In this paper, a novel reversible data hiding by using Reed-Solomon (RS) code is proposed for efficient transmission in encryption image. To increase the recovery of data from encrypted image, RS codes are used to encode messages, and then the codewords can be embedded into encrypted image according to encryption key. After receiving encrypted image which embeds the codewords, the receiver firstly decryptes the encrypted image using the encryption key and get metric about codewords containing messages. According to recovery capability of RS codes, better estimation of message is done in data hiding system. Simulation results about two images and two RS codes show that the performances of the proposed schemes are better than ones of the reference scheme.

A Study on the Legislation Directions of FRAMEWORK ACT ON KOREA COAST GUARD(tentative name) ((가칭) 해양경찰기본법 입법방향에 관한 연구)

  • Son, Yeongtae
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.396-407
    • /
    • 2014
  • In 19th May 2014, the government announced that KCG(Korea Coast Guard) is dissolved regarding responsibility for recently accident which is Sewol ferry disaster. But KCG, a central administrative agency is responsible for protecting maritime sovereignty of South Korea; the most basic and indispensable organization. Furthermore, The purpose of KCG is to provide the safety of the public and keeping of public order by prescribing matters necessary for the securement of maritime security, maintenance of public order and protection of marine resources & facilities. Therefore, In this article, I would like to suggest tentatively named FRAMEWORK ACT ON KOREA COAST GUARD's management plan which could reflect the scope of functions. It means we examine the current state of KCG, and would like to signpost for the most ideal way of legal system in Korea Coast Guard. Finally, this treatise is expected that this research can be a guideline contribute to improving Korea Coast Guard relevant laws even a little.

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

A Study on the Public Safety Long Term Evolution Disaster Communication Network (PS-LTE 재난안전통신망에 관한 정책 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.43-51
    • /
    • 2015
  • South Korea decided to use the public safety long term evolution (PS-LTE) method to build a wireless communications network for national disaster. The move will allow all disaster management agencies, including police, firefighters and the military to use multimedia information, including videos, in addition to voice to carry out rescue operations from 2017. The Ministry of Science, ICT and Future Planning said Thursday that it adopted PS-LTE as the technology method for national disaster management system following a national policy coordination meeting last month. PS-LTE is a method integrating group communication, direction communication between terminals and independent base station function with existing LTE technology. Until now, disaster management agencies used technology that only allowed voice communication. However, transmission of multimedia information is possible using PS-LTE.

An Effect on the Project and Organization Performance by PMO Service (PMO 서비스가 프로젝트 및 조직 성과에 미치는 영향 연구)

  • Lee, Seong-Mong;Kim, Hyunsoo;Kim, Eun-Hong
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.53-79
    • /
    • 2012
  • According to Electronic Times(2012. 1. 3), "PMO was introduced from 1950s in the USA and as of 2010, PMO participated in 84% of project ordered by public and private sector." And Ministry of public administration and security announced that the Ministry will organize Task Force for arranging "standard for introduction and operation of PMO" for support of project implementation and strengthening specialty of ordering organization, and then, actively launch the Task Force from February, 2012. Thus, necessity of PMO is regarded as natural in some aspect but thesis for doctoral degree written by Kim Gi-yeong(2007) suggested, "performance of several projects begun at the same time cannot be interpreted as high according to whether PMO team exists or not." Martin et al.(2005) asserted, "according to whether PMO team exists or not, but there is no significant difference in other factor." In the contradictory situation, it is necessary to perform more various approaches for performance and necessity of PMO in the academic aspect.

  • PDF

Biometrics System Technology Trends Based on Biosignal (생체신호 기반 바이오인식 시스템 기술 동향)

  • Choi, Gyu-Ho;Moon, Hae-Min;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.381-391
    • /
    • 2017
  • Biometric technology is a technology for authenticating a user using the physical or behavioral features of the inherent characteristics of the individual. With the necessity and efficiency of the technology in the fields of finance, security, access control, medical welfare, inspection, and entertainment, the service range has been expanding. Biometrics using biometric information such as fingerprints and faces have been exposed to counterfeit and disguised threats and become a social problem. Recent studies using a bio-signal from the inside of the body other than the bio-information of the external body are being developed. This paper analyzes the recent research and technology of biometric systems using bio-signals, ECG, heart sounds, EEG, and EMG to present the skills needed for the development direction. In the future, utilizing the deep learning to build and analyze database to manage bio-signal based big data for the complex condition of individuals, biometrics technologies suitable for real time environment are expected to be researched.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF