• 제목/요약/키워드: sensitive information

검색결과 2,333건 처리시간 0.036초

웹페이지의 피싱 차단 탐지 기술에 대한 분석 (Analyses of Detection and Protection for Phishing on Web page)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

An Improved Saliency Detection for Different Light Conditions

  • Ren, Yongfeng;Zhou, Jingbo;Wang, Zhijian;Yan, Yunyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1155-1172
    • /
    • 2015
  • In this paper, we propose a novel saliency detection framework based on illumination invariant features to improve the accuracy of the saliency detection under the different light conditions. The proposed algorithm is divided into three steps. First, we extract the illuminant invariant features to reduce the effect of the illumination based on the local sensitive histograms. Second, a preliminary saliency map is obtained in the CIE Lab color space. Last, we use the region growing method to fuse the illuminant invariant features and the preliminary saliency map into a new framework. In addition, we integrate the information of spatial distinctness since the saliency objects are usually compact. The experiments on the benchmark dataset show that the proposed saliency detection framework outperforms the state-of-the-art algorithms in terms of different illuminants in the images.

Development of Energy-sensitive Cluster Formation and Cluster Head Selection Technique for Large and Randomly Deployed WSNs

  • Sagun Subedi;Sang Il Lee
    • Journal of information and communication convergence engineering
    • /
    • 제22권1호
    • /
    • pp.1-6
    • /
    • 2024
  • Energy efficiency in wireless sensor networks (WSNs) is a critical issue because batteries are used for operation and communication. In terms of scalability, energy efficiency, data integration, and resilience, WSN-cluster-based routing algorithms often outperform routing algorithms without clustering. Low-energy adaptive clustering hierarchy (LEACH) is a cluster-based routing protocol with a high transmission efficiency to the base station. In this paper, we propose an energy consumption model for LEACH and compare it with the existing LEACH, advanced LEACH (ALEACH), and power-efficient gathering in sensor information systems (PEGASIS) algorithms in terms of network lifetime. The energy consumption model comprises energy-sensitive cluster formation and a cluster head selection technique. The setup and steady-state phases of the proposed model are discussed based on the cluster head selection. The simulation results demonstrated that a low-energy-consumption network was introduced, modeled, and validated for LEACH.

체내 삽입장치를 위한 위임장 기반의 인증 프로토콜 (Authentication Protocol based on Credential for Implantable Medical Device)

  • 정윤수
    • 디지털융복합연구
    • /
    • 제12권4호
    • /
    • pp.259-264
    • /
    • 2014
  • 최근 센서 기술의 발달로 인하여 체내삽입장치를 부착한 환자가 언제, 어디서나 의료 서비스를 받을 수 있는 환경으로 변화하고 있다. 그러나, 체내삽입장치를 부착한 환자의 생체정보가 병원관계자(의사, 간호사, 약사 등)에게 전달할 때, 환자의 정보가 제 3자에게 쉽게 노출되어 악용될 수 있는 문제점이 발생되고 있다. 본 논문에서는 제3자가 환자로 위장하여 병원관계자로부터 환자 정보를 쉽게 획득할 수 없도록 유헬스케어 서비스 센터로부터 환자의 위임장을 병원관계자가 전달받는 위임장 기반의 서명 인증 프로토콜을 제안한다. 제안 프로토콜은 환자의 민감한 정보를 제 3자에게 노출시키지 않도록 환자의 민감한 정보를 유헬스케어 서비스 센터와 환자가 생성한 랜덤수로 해쉬한 서명키로 환자의 민감한 정보를 암호화한다. 또한 제 3자로부터 환자 정보가 불법적으로 악용되는 것을 예방하기 위해서 환자와 병원관계자 사이의 동기화를 유지함으로써 환자의 생체 정보 유출을 예방할 수 있다.

An Efficient Built-in Self-Test Algorithm for Neighborhood Pattern- and Bit-Line-Sensitive Faults in High-Density Memories

  • Kang, Dong-Chual;Park, Sung-Min;Cho, Sang-Bock
    • ETRI Journal
    • /
    • 제26권6호
    • /
    • pp.520-534
    • /
    • 2004
  • As the density of memories increases, unwanted interference between cells and the coupling noise between bit-lines become significant, requiring parallel testing. Testing high-density memories for a high degree of fault coverage requires either a relatively large number of test vectors or a significant amount of additional test circuitry. This paper proposes a new tiling method and an efficient built-in self-test (BIST) algorithm for neighborhood pattern-sensitive faults (NPSFs) and new neighborhood bit-line sensitive faults (NBLSFs). Instead of the conventional five-cell and nine-cell physical neighborhood layouts to test memory cells, a four-cell layout is utilized. This four-cell layout needs smaller test vectors, provides easier hardware implementation, and is more appropriate for both NPSFs and NBLSFs detection. A CMOS column decoder and the parallel comparator proposed by P. Mazumder are modified to implement the test procedure. Consequently, these reduce the number of transistors used for a BIST circuit. Also, we present algorithm properties such as the capability to detect stuck-at faults, transition faults, conventional pattern-sensitive faults, and neighborhood bit-line sensitive faults.

  • PDF

민감한 빈발항목집합을 숨기기 위한 경계기반 HSFI 알고리즘 (Border-based HSFI Algorithm for Hiding Sensitive Frequent Itemsets)

  • 이단영;안형근;고재진
    • 한국멀티미디어학회논문지
    • /
    • 제14권10호
    • /
    • pp.1323-1334
    • /
    • 2011
  • 민감한 정보 숨기기 알고리즘은 민감한 정보를 보호하기 위하여 트랜잭션 데이터베이스를 삭제한다. 데이터 변경은 삭제 접근 방법들 중 하나이다. 민감한 정보를 숨기는 이전 연구들은 결과 데이터베이스의 품질을 유지하기 위해 서로 다른 휴리스틱 알고리즘을 적용했다. 그러나 민감한 정보를 숨기는 과정에서 변경되는 항목집합에 대한 영향을 평가하거나 숨겨지는 항목을 감소시키는 연구들은 미흡하였다. 본 논문에서는 민감한 빈발 항목집합을 숨기기 위하여 경계기반의 HSFI(Hiding Sensitive Frequent Itemsets) 알고리즘을 제안한다. 본 알고리즘에서 FP-Tree의 노드 정보는 기존과는 다르게 빈발 항목집합 생성단계에서 트랜잭션 정보와 민감 정보, 경계 정보를 모두 구성하며, 숨기는 과정에서 비민감한 빈발 항목집합의 영향을 줄이기 위하여 경계를 사용하였다. 본 논문의 예시 트랜잭션 데이터베이스에 HSFI를 적용한 결과, 손실 항목을 크게 감소시킴으로써 기존 방법들에 비해 효과적임을 증명하였고, 보다 개선된 데이터베이스의 품질을 유지할 수가 있었다.

음성/데이터 통합 이동통신시스템에서의 서비스 품질을 고려한 가격결정모델 (Pricing Decisions to Control Quality-of-Service in Integrated Voice/Data Mobile Communication System)

  • 김환선
    • 한국통신학회논문지
    • /
    • 제29권10B호
    • /
    • pp.866-879
    • /
    • 2004
  • 본 연구논문에서는 소비자의 서비스 품질에 따른 지불의사를 고려하여 음성/데이터 통합 이동통신서비스 제공업자의 수익을 극대화시키는 최적 가격을 결정하는 모델을 제시한다. 특히 고려되는 음성서비스 및 데이터서비스의 가격방식은 현재 우리나라 이동통신서비스의 회선요금제와 패킷요금제를 각각 적용한다. 이 모델은 소비자들이 핸드오프도중 발생하는 통화단절에 매우 민감하게 반응한다는 가정하에, 기지국이 무선채널을 할당함에 있어서 핸드오프 트래픽만이 독점사용할 수 있는 가드채널을 할당하는 방안을 고려하며, 더불어 서비스제공업자가 통화단절율의 서비스 품질을 소비자군에게 보장하는 경우를 고려한다. 궁극적으로 이 모델은 단기적으로 가격전략 및 무선채널 할당정책에 의존하여 서비스 품질을 개선$.$보장할 수 있는 방안을 제시하며, 그 결과 시스템자원의 확충없이는 수익과 서비스 품질의 개선$.$보장간에 상충관계가 존재함을 보여준다.

폭염이 일사망자수에 미치는 영향에 관한 연구 (A Study on the Influence of Extreme Heat on Daily Mortality)

  • 박종길;정우식;김은별
    • 한국대기환경학회지
    • /
    • 제24권5호
    • /
    • pp.523-537
    • /
    • 2008
  • In Korea, the global warming leads to more frequent high temperature region. increasing the need for research into physical damage caused by high temperature. We therefore analyzed the differences of mortality, caused by extreme heat, among gender and age. We also examined the trend of mortality from high temperature-sensitive diseases. Women are more affected by exposure to high temperature than are men; People over 65 years old have higher mortality rate (1.5 times) than under 65. As for high temperature-related diseases, cerebrovascular disease was the number one cause of death, and chronic lower respiratory disease and cardiovascular disease followed.

The Design and fabrication of food waste system

  • Yeo, Seok-ki;Kim, Gye-Kuk;Seo, Chang Ok
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.101-105
    • /
    • 2016
  • After a weight-rate disposal system for food waste has been implemented we have to install the food waste system at all apartment. In this paper, we supplied electric energy to the food waste system using solar heat panels. The weight of the food waste is displayed on the LCD panel, and its price is calculated based on its weight. Since there would be some cases that touch-typed card can't be well recognized if it is contaminated by foreign material, we designed a recognition device by no-touch sensitive card reader to embody the food waste system. The food waste system was designed using a GUI(graphical user interface) so that users can easily understand it.

Privacy Protection Model for Location-Based Services

  • Ni, Lihao;Liu, Yanshen;Liu, Yi
    • Journal of Information Processing Systems
    • /
    • 제16권1호
    • /
    • pp.96-112
    • /
    • 2020
  • Solving the disclosure problem of sensitive information with the k-nearest neighbor query, location dummy technique, or interfering data in location-based services (LBSs) is a new research topic. Although they reduced security threats, previous studies will be ineffective in the case of sparse users or K-successive privacy, and additional calculations will deteriorate the performance of LBS application systems. Therefore, a model is proposed herein, which is based on geohash-encoding technology instead of latitude and longitude, memcached server cluster, encryption and decryption, and authentication. Simulation results based on PHP and MySQL show that the model offers approximately 10× speedup over the conventional approach. Two problems are solved using the model: sensitive information in LBS application is not disclosed, and the relationship between an individual and a track is not leaked.