Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.6 No.2 (68건)
No
61

Analysis of Urban Transit Environment for Video Analytics Application and Processing Scenarios

Kwang-Young Park, Goo-Man Park

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.427-430

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to apply the video analytic algorithms in metro railway system, the input images should be classified according to the camera installation environment and its role to handle corresponding events. Before we implement the integrated surveillance system at subway stations, we investigated the required camera’s role at each location to employ the video analytics. Resultantly, desirable event processing scenarios are suggested.

62

Information Hiding Scheme with Reversibility Using Difference Segmentation and Histogram Adjustment

Yung-Chen Chou, Chun-Yi Huang, Yu-Chen Hu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.431-436

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Secret data delivery is a most important activity in the modern life. Steganography technique uses a cover medium to carry secret data and deliver it to right receivers over public computer networks. Because a stego medium is easier to cheat an unexpected user's observation, Steganography technique is more suitable for delivering secret data. Histogram adjustment is a good way for concealing secret data into a cover image with small distortion. Luo et al. use the pixel interpolation technique and histogram shifting to conceal secret data into a grayscale image. Visual quality and embedding capacity are two most important factors for designing a data hiding technique. The performance of Luo et al.'s method in terms of embedding capacity can be further improved. The proposed method is to increase the height of peak in dierence histogram as many as possible. A segmentation strategy is adopted for narrowing down the range of dierence between a pixel and a pseudo pixel.

63

Integrated Surveillance System and Field Test in Urban Transit System

Kwang-Young Park, Ji-Hye Jeon, Goo-Man Park

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.437-442

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The security issue in urban transit system has been widely considered as the common matters in mass transition system. The safe urban transit system is highly demanded because of the vast number of daily passengers, and providing safety is one of the most challenging projects. We implemented a field model for integrated security system at subway stations and demonstrated its performance. This system consists of cameras, sensor networks and central monitoring software. We described the smart camera functionality in more detail. The proposed smart camera includes video analytics, video encoder and the server modules that transmit video and audio information. The video analytic functions in the system range from enter detection to crowdedness estimation, or fire detection. By the experiment, we obtained the high detection rate for tested events. We expect that the system would prove high performance at various events in our integrated intelligent surveillance system.

64

Model-driven Secure Development Lifecycle

Zhendong Ma, Christian Wagner, Arndt Bonitz, Thomas Bleier, Robert Woitsch, Markus Nichterl

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.443-448

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Building security into software development lifecycles and doing it right is hard. To address the challenge, several prominent organizations have published process-oriented se- curity guidelines to bring security activities into a structured way. Although these eorts contribute to measurable improvements in software and system security, they are often too verbose and fuzzy to be implementable in a development lifecycle involving people (e.g., security experts, developers, and managers) with dierent skillsets. In this paper, we pro- pose the model-driven secure development lifecycle (MD-SDL), an approach that leverages on modeling methods and the advances in model-driven security to simplify the process of eciently integrating security into development lifecycles for the development of security- critical software and systems.

65

Evaluation of Time Complexity Based on Max Average Distance for K-Means Clustering

ShinWon Lee, WonHee Lee

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.449-454

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Clustering method is used in diverse scopes, namely, information retrieve, communication security system, data mining, etc. It is divided into hierarchical clustering, partitioning clustering, and more. K-means is one of partitioning clustering. We improve performance of K-means to select initial centers of cluster through calculating rather than random selecting. This method maximizes the distance among initial centers of clusters. After that, the centers are distributed evenly and that result is more accurate than initial cluster centers selected at random. It is time-consuming, but can reduce total clustering time by minimizing the number of allocation and recalculation. We can reduce the time spent on total clustering.

66

Construct a New ELGamal-type Public Key Cryptography over Finite Field

Zheng-jun Jing, Guo-ping Jiang, Chun-sheng Gu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.455-462

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new ELGamal-type public key cryptosystem using ergodic matrix is proposed in this paper, which is based on isomorphism over finite field. The security of this scheme is equal to the intractability of polynomial discrete logarithm problem over finite field in the standard mode. At the same time, an optimization is described after the performance is analyzed in details. Since the ciphertext expand rate of new scheme is approximately 1, the proposed scheme can encrypt more information one time. Moreover, compared with the original ELGamal scheme, its security has been not reduced.

67

The Characteristics of Smartwork Security Compare to Traditional Telework

Young-Jin Choi, JongHei Ra, DongIk Shin, Yong-Gyu Jung

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.463-468

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Smartwork has been thought to satisfy both employee and company’s interests. Nonetheless, there are critical barriers of introducing smartwork because of security problem. In order to derive threats and vulnerabilities of smartwork, we derive threats through structured interview with heavy users or designers of smartwork, then verify the derived threats by survey. Three layers, which are devices/networks/servers, are proposed as a common framework for analyzing characteristics of two types of smartwork.

68

Hidden Attribute Certificate-based Encryption Extensions Model

LI Yu, ZHAO Yong, GONG Bei, Xin Si-yuan

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.6 No.2 2012.04 pp.469-474

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An encryption extensions model based on hidden attribute certificate is proposed in this paper, which can represent any key by using "and", "or" logic and the threshold monotony of the access rules, and in order to resist the collusion attack, multiple users use a combination of their keys to decrypt the ciphertext, it virtually eliminates the possibility of a conspiracy to know the key.

 
1 2 3
페이지 저장