2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.301-314
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we proposed a novel reversible data hiding scheme for the compressed images for block truncation coding (BTC). In this scheme, the secret data is embedded into the compressed codes of BTC. The histogram shifting technique is employed in the proposed scheme to embed the secret data into the quantization levels of the compressed codes. After the data embedding procedure is executed, the embedded compressed codes still follow the standard format of BTC. The experimental results reveal that the proposed scheme provides good image quality of the embedded image.
Moving Objects Representation for Object Based Surveillance Video Retrieval System
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.315-322
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Increasingly large amounts of surveillance video data have resulted in the critical need for indexing and retrieval from video databases. This paper addresses the problem of objects representation for surveillance video retrieval system. We extract dominant color histogram and edge direction histogram as the object’s appearance model in which the improved histogram intersection algorithm is used to measure the similarity between two dominant color histograms. Furthermore, an agglomerative hierarchical based clustering method is proposed to select the most relevant and representative blobs for compact and effective object representation. Experimental results on real surveillance video sequences have proved the performance of our proposed approach.
An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.323-332
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A Study on Surveillance System of Object’s Abnormal Behavior by Blob Composition Analysis
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.333-340
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Studied in this paper is an advanced detection system which activates emergency alert system to prevent the actual incidence, after computerized evaluation of danger-associated behavior captured in CCTV images. The detection of potential danger involves the ability to discern several steps that may ultimately lead to life-threatening event of an object. The system is designed with preset danger-zone within the zone of interest and analysis of blob composition, based on the assumption that probability of life-threatening event is directly correlated with the proportion of one overlapping with the danger zone. Subsequently, the danger level is evaluated accordingly to the range of encroachment into the danger zone of the targeted objects.
A Design Approach for Wireless Communication Security in Bluetooth Network
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.341-352
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of personal information of user. It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.353-362
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Here we show the new modified RSA algorithm that can be applied to the WSN. Plaintext is converted into ciphertext by means of an encryption engine (again, generally a computer program) whose operation is fixed and determinate (the encryption method) but which functions in practice in a way dependent on a piece of information (the encryption key) which has a major effect on the output of the encryption process. In this process the encryption key and the decryption key may or may not be the same. When they are the cryptosystem is called a "symmetric key" system; when they are not it is called an "asymmetric key" system. The most widely-known instance of a symmetric cryptosystem is DES (the so-called "Data Encryption Standard"). In this paper, we apply the famous Reed Solomon code to the implementation of the asymmetrical cryptosystem based on the modified RAS algorithm which can be applied to the WSN.
An Efficient Identity-based Signcryption from Lattice
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.363-374
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Signcryption is a cryptographic primitive that can provide valid solution for authentication and confidentiality. In this paper, an efficient identity-based signcryption scheme from lattice was proposed. Our scheme based on Macciancio and Piekert’s trapdoor generation method and delegate algorithm for lattice. Our main idea is that establish the identity-based system master key via trapdoor generation method for lattice, and extract user’s key by trapdoor delegate algorithm. With the aid of random oracle, we prove that the proposed scheme has CCA security under the learning with errors (LWE) assumption and unforgeability against adaptive chosen messages attacks under the small integer solution (SIS) assumption. Comparison with signature-then-encryption approach shows that our scheme is efficient.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.375-386
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Based on the analysis of collaborative product development process, the overall task load model was established. Through analyzing the features of task iteration convergence and building the design capabilities constraint functions, the design capability reliability evaluation model was constructed to evaluate the conflict between task iteration and design capabilities for each design entity, and judge whether the design entities’ capability is capable or not to complete the design tasks on the condition of the task iteration. Based on the assessment results and combined iterative design structure matrix, the main factors which affecting the task iteration was analyzed and corresponding improvement measures were also proposed for the purpose of reducing task iteration frequency and optimizing the conflict processes. Finally, a case study was presented to demonstrate the feasibility and effectiveness of the proposed approach.
A Novel Personalized TTP-free Location Privacy Preserving Method
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.2 2014.03 pp.387-398
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a novel TTP(Trusted Third Party)-free location privacy preserving method. A cloaking region is used to hide the precise position of the location based service requestor (a mobile user). The cloaking region is formed through collaboration among neighbors. A mobile user can not only set personalized anticipated privacy requirements but also set minimum privacy requirements according to different contexts. The anticipated requirements will be satisfied if the time is allowed. Otherwise, the system will pursue the minimum standards for privacy requirements. This approach can satisfy k-anonymity, l-diversity and cloaking granularity simultaneously for privacy preserving.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.