• 제목/요약/키워드: personal broadcasting

Search Result 319, Processing Time 0.021 seconds

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.

A Study on the Automated Design of Business Card for Personal Information Leakage Prevention Using IT-based Convergent Service

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.25-30
    • /
    • 2018
  • When producing a business card, there is always a risk for exposing personal information as the information from the business card application is saved in the computer of the printing agency. The information that goes into the business card application file, such as name, mobile phone number, and e-mail address is not encrypted, which makes it easy to access. This study was conducted in order to find a way to automatize the business card application process by encrypting the information entered into the business card application file, simplifying the business card application process, minimizing the workload and by directly linking to the print shop to remove the print file after completing the printing of the business card.

Testing the Mediating Role of Perceived Risk of COVID-19 and the Moderating Role of Age in the Relationship between COVID-19 related Information Sensitivity and Personal Preventive Behaviors

  • Hong, Kyung-Wan;Kim, Hyeon-Cheol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • The influence of information sensitivity during the COVID-19 pandemic on perceived risk and personal preventive behaviors of consumers in China had been investigated. The participants were Chinese individuals experiencing the pandemic as it happened. Participants voluntarily completed an online questionnaire to provide their COVID-19 information sensitivity, their perceived COVID-19 risk, preventive behavior and their respective age. Our study discovered that COVID-19 information sensitivity positively influence perceived risk and preventive behavior. Moreover, young individuals show higher levels of online information sensitivity, which influenced their personal protective behavior when compared to that of middle-aged and elderly participants. Furthermore, Perceived risk significantly affected preventive behaviors. The results of this study may assist the government and marketeers in comprehending information sensitivity which can affect consumers' protective behavior toward reducing COVID-19 infections.

Agent-Based Intelligent Multimedia Broadcasting within MPEG-21 Multimedia Framework

  • Kim, Mun-Churl;Lim, Jeong-Yeon;Kang, Kyeong-Ok;Kim, Jin-Woong
    • ETRI Journal
    • /
    • v.26 no.2
    • /
    • pp.136-148
    • /
    • 2004
  • It is expected that an intelligent broadcasting service (IBS) will be able to provide broadcast programs based on user preference and program-associated information (metadata) in order to assist users in easy navigation of the program content being broadcast. In this way, users will be able to access program content anytime, anywhere, and in the manner they wish. This type of IBS will be a basis for future broadcasting services such as customized broadcasting or personal casting. In this paper, we introduce an agent-based multimedia broadcasting framework using the Foundation for Intelligent Physical Agents (FIPA) and MPEG-7 technologies within MPEG-21. We use a FIPA implementation called FIPA open source as a platform for exchanging user preferences and program information as FIPA messages between a server and its clients. The user preference is modeled as the User Preference description scheme in MPEG-7 multimedia description schemes. We discuss a framework structure and implementation for the IBS.

  • PDF

A Study on Analysis of Personal Information Risk Using Importance-Performance Analysis (IPA를 이용한 개인정보 위험도 분석 연구)

  • Jeong, Su-Jin;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.267-273
    • /
    • 2015
  • For newly incoming technologies owing to the advancements in information and communications technology, the new form of information occurs due to the combination form of personal information. In turn, personal information which is combination with existing personal information is on the increase. It is difficult to equalize the method in order to analysis the degree of risk for personal information because it is qualitative method which is defined on the current Personal Information Protection Law. This dissertation presents the model to assess the degree of risk by using the IPA(Importance-Performance Analysis) after measuring the importance and the weighted value for the personal information based on the existing the method of risk assessment. Through the model suggested in this dissertation, the subjective judgement can be excluded, the combination of personal information can be assessed and the standard criteria which is used as the objective indicators from the quantitative degree of risk can be suggested.

Personalized Interstitial Content Service for Second TV (Second TV를 위한 맞춤형 광고 서비스)

  • Lee, Jong-Seol;Shin, Sa-Im;Lim, Tae-Beom;Lee, Seok-Pil
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.229-234
    • /
    • 2008
  • The 'Anytime, Anywhere' services have been the biggest topic in the recent digital broadcasting research area. The related applications for the Anytime and Anywhere Services are as follows: the personalized broadcasting based on the PVR (Personal Video Recorder) for the Anytime Services, and the DMB (Digital Multimedia Broadcasting), the mobile devices supporting the wireless network and the Second TV and so on for the anywhere services. The personalized broadcasting has been researched on the one of the killer applications in the various broadcasting environment - the ground wave broadcasting, the satellite broadcasting, IPTV and CATV broadcasting suchlike. The applied contents of the personalized broadcasting have advanced from the main contents for the broadcasting to the interstitial contents like advertisements and coupons, the personalized interstitial broadcasting needs to develop the technology about the generation, storing and management of the interstitial metadata. but, the personalized broadcasting has the limitation that the TV environment is somewhat difficult to support the personalized broadcasting individually, because all family usually share the main TV at home. The Second TV is possible to solve the environmental limitation. This paper designs and develops the static set top box at home, the Second TV and their multimedia streaming techniques for the personalized broadcasting of the contents including the interstitial contents.

  • PDF

Improvement of Shop Music Broadcasting Services Using Music Lists and User Experience (방송목록과 사용자 경험 정보를 이용한 매장 음원 방송 서비스의 개선)

  • Kang, Sun-Mee;Kim, Hyun-Deuc;Chang, Moon-Soo
    • Speech Sciences
    • /
    • v.15 no.4
    • /
    • pp.121-130
    • /
    • 2008
  • This paper proposes the way of improvement and system build-up for shop music broadcasting services provided by the Internet. Comparing the shop music broadcasting services and personal music broadcasting services, we propose the way of shop music broadcasting services customers prefer to. That is, such a function is provided that a user can control the broadcasting music lists a specialist provides according to the current circumstance of shop. This paper proposes the whole system such a service is possible and verifies the efficiency by experiments.

  • PDF

A Study on Security Reference Model in Personal Health Lifelog Services (개인 건강 라이프로그 서비스에서 보안 참조 모델에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.109-115
    • /
    • 2016
  • Life log started with the simple purpose of recording or sharing mainly data regarding one's personal life, but with the introduction of advanced specialized analytic methods by many corporations, a new type of business based on the life log recently emerged, with an aim of improving the quality of people's personal lives. In spite of the indispensable advantages, however, personal health lifelog service brings critical challenges that cannot be avoided from user side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the revitalization of personal health lifelog services. In this paper, we propose an information security reference model for the personal health lifelog services. Our proposal can contribute to increase the related industry to cultivate new market by suggesting the clear announcement of the guidelines using privacy protection reference model for user-specific healthcare services which uses personal lifelog.