Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.10 No.3 (39건)
No
1

To induce the landing risk of carrier-based aircraft, and improve the safety of pilots and carrier-based aircraft, tthis paper presents an improved landing risk evaluation of carrier-based aircraft based on Mean-Variance statistics error multi-attribute dynamic decision making. Attribute values is shown as triangular fuzzy numbers, and ordering vectors are achieved through possibility-degree and ordering expression. In accordance with ordering wave from ordering values at different times to desire rank, condition analysis should be conducted. Finally, the rank ordering is acquired. The model simulation results indicate the better performance of the new method in comparison with the traditional controller with more accuracy and practicability.

2

Recently, unforeseen disasters have occurred, such as the Fukushima nuclear disaster in Japan and the tragic Sewol ferry incident in Korea. These unforeseen disasters challenged national emergency management capacities in many ways. We are living in a very complex and ever-changing society, and so, improving social security against these disasters is critically important. This paper discusses changes to emergency management to bring contemporary response standards into the aging system. Particular focus is on Korea’s emergency management systems and preparing for the unforeseen events in Korea. Finally, this paper suggests the horizontal collaboration approach at the local level, and further suggests three practical ways of horizontal collaboration to promote effective and efficient response against unforeseen disasters in Korea.

3

Extracting Clone Genealogies for Tracking Code Clone Changes

Chun-Hui Wang, Ying Tu,, Li-Ping Zhang, Dong-Sheng Liu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.21-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software system’s clones are usually two aspects influence on software maintenance and management. One is some clones are effective and can reuse. The other is some clones are unsafe and need revise or reconfiguration. The reason is that the changes of code clones are different. How to determine the clones' attribute of effective or unsafe, it need to track clone changes in the evolution versions of a software system. We firstly find the clones and clone groups in multiple versions of a software system using a clone detector FCD, and construct the mapping of every adjacent version basing on the similarity of code clones, then extract clone genealogies in the software system. The clone genealogies’ results are efficient and can help us analysis the code clone changes and get the attribute about effective and unsafe.

4

Secure Signature Authentication Algorithm in Mobile Internet

Hualin Sun

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.29-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mobile Internet can access to the Internet networkat anytime and anywhere, thus bringing convenient in the application. At the same time, it also brings the hidden trouble of safety certification, and reduces the cost of access, aiming at this problem, this paper proposes the authentication signature algorithm. This algorithm is based on domain alliance, which can effectively prevent attacks, so as to improve the safety and the stability of the system, and enhance its ability to deploy.

5

Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique

G. Keerthana, G. Padmavathi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.41-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless Sensor Network (WSN) is a collection of tiny sensor nodes capable of sensing and processing the data. These sensors are used to collect the information from the environment and pass it on to the base station. A WSN is more vulnerable to various attacks. Among the different types of attacks, sinkhole attack is more vulnerable because it leads to a variety of attacks further in the network. Intrusion detection techniques are applied to handle sinkhole attacks. One of effective approach of intrusion detection mechanism is using Swarm Intelligence techniques (SI). Particle Swarm Optimization is one of the important swarm intelligence techniques. This research work enhances the existing Particle Swarm Optimization technique and the proposed technique is tested in a simulated environment for performance. It is observed that the proposed Enhanced Particle Swarm Optimization (EPSO) technique performs better in terms of Detection rate, False Alarm rate, Packet delivery ration, Message drop and Average delay when compared to the existing swarm intelligence techniques namely, Ant Colony Optimization and Particle Swarm Optimization.

6

A secure Certificateless Aggregate Signature Scheme

Baoyuan Kang, Danhui Xu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.55-68

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor networks. Recently, people discuss aggregate signature in certificateless public key setting. But some existing certificateless aggregate signature schemes are not secure. In this paper, we analyze the security of Zhang et al.’s certificateless aggregate signature schemes, and propose a new ew ew certificateless aggregate signature schemes, and prove the new scheme is existentially unforgeable under adaptive chosen-message attacks under the assumption that computational Diffie–Hellman problem is hard. Furthermore, in signing equation of the proposed scheme user’s partial private key and secret value are directly combined with the signed message. So, the scheme is also secure against some inside forgery attack.

7

Research on the Relationship of Optical Illusion Deceleration Marking and Changing Rate of Pupil

Ting Shang, Boming Tang, Panpan Tao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.69-80

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

8

Face Recognition Using Neural Network : A Review

Manisha M. Kasar, Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.81-100

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Face recognition from the real data, capture images, sensor images and database images is challenging problem due to the wide variation of face appearances, illumination effect and the complexity of the image background. Face recognition is one of the most effective and relevant applications of image processing and biometric systems. In this paper we are discussing the face recognition methods, algorithms proposed by many researchers using artificial neural networks (ANN) which have been used in the field of image processing and pattern recognition. How ANN will used for the face recognition system and how it is effective than another methods will also discuss in this paper. There are many ANN proposed methods which give overview face recognition using ANN. Therefore, this research includes a general review of face detection studies and systems which based on different ANN approaches and algorithms. The strengths and limitations of these literature studies and systems were included, and also the performance analysis of different ANN approach and algorithm is analysing in this research study.

9

Moving Object Detection and Identification Method Based on Vision

TAO Jian-Ping, LV Xiao-lan, LIU Jun

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.101-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In traffic monitoring system, moving object monitor is the key part of monitoring system. This paper proposed a non-reference background detection method based on the reference background model for the poor detection effect of Gaussian background modeling. The model utilizes a series of sampling values to estimate the probability model of observed pixels before current pixels; Then binaryzation moving object detection based on the probability model. In terms of moving object identification, this paper proposed several features, and being trained and identified through BP neural network. The experimental result indicated that this background model can detect the foreground moving object effectively, and achieved satisfied effect on pedestrians and vehicles target recognition rate.

10

Holistic Performance Model for Cyber Security Implementation Frameworks

Issa Atoum, Ahmed Otoom

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.111-120

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The performance measurement process identifies if an implementation process is within acceptable thresholds. Performance measures for cyber security implementation frameworks are considered strategic controls because it can guide the implementation process. Consequently, corrective or predictive actions could be applied to resolve a security issue early in the implementation process. However, to our knowledge, there are no performance measures designed to function at the country level for cyber security implementation frameworks. As a result, cyber security strategy implementation process is left uncontrolled. To resolve this issue, this article proposes a new holistic performance model that is based on the well-known balanced scorecard. It aggregates performance measures from various entities involved in executing cyber security strategies. The inception of the proposed model draws its applicability to address performance measurement of holistic cyber security implementation frameworks.

11

Bagging eEP-based Classifiers for Junk Mail Classification

Yan Li, Hua Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.121-128

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The volume of junk emails on the Internet has grown tremendously in the past few years and is causing serious problems. Content-based filtering is one of mainstream technologies used so far. This paper has had a deep study in the content of emails and come up with a better idea to get the features which make it even convenient to e-mail classify as well. This paper uses the classification algorithm by Bagging eEP-based classifiers to the junk email examine, and carries out a new categorization and filtering algorithm BeEPJMC. The experiments show, the new feature extraction methods and the combination BeEP classification is a very efficient method of classification, and The classification efficiency of the algorithm BeEPJMC is higher than currently several better classification algorithm.

12

A Systematic Review of Network Flow Watermarking In Anonymity Systems

Tianbo Lu, Rui Guo, Lingling Zhao, Yang Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.129-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the rapid development of internet technology, the connection between man and internet is closer and closer. When people is communicating with others through internet, some malicious intruders may want to eavesdrop or peep the communicators. In order to evade being watching, people use anonymous communication systems to communicate. The anonymity system can encrypt the content of communication and the identity of the communicators. But if the communicators want to know who is talking to them at the other end, they must correlate the outgoing and incoming flows to identify a host or a person. As an active traffic analysis approach, network flow watermarking technology can detect the correlation of flows, and then make the anonymous communicators accountable. While network flow watermarking technology achieves good detecting rate and low false positive rate, it could be an effective way to trace the communication connections and supervise anonymous communication. So it is a widely used way for tracing in anonymity systems. In this paper, we introduce some different schemes of network flow watermarking in anonymity systems and discuss some attacks against it. Finally, a conclusion will be given.

13

A Secure Score Report Implemented in a Spreadsheet without Privacy Concerns

Dongchang Yoo, Minyoung Bae, Yongjin Yeom

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.139-150

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Students’ educational records such as exam score and academic achievement should be considered as sensitive information. According to the federal student privacy law, individual scores should not be posted publicly. If a secure online management system is well-equipped in the school, then it is easy to distribute individual data in a privacy preserving way. However, in general, such a centralized system costs high and is not flexible enough to be used for instant score report after each exam. In this paper, we propose a practical way for an instructor to post students’ individual exam scores online in a single file. By implementing a cryptographic hash function together with score data in an MS Excel file, we demonstrate a score report from which allows each student to retrieve his/her score with his/her own password. Based on our worksheet as a template, it is easy for instructors to write their own score reports without relying on any heavy management systems. Since our score report is implemented in MS Excel worksheets, students find out their scores with Excel program or viewers even in their mobile phones without installing any other programs or apps. Also, it is cryptographically as secure as underlying hash function SHA-256.

14

Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance

Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.151-160

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Existing network security technology may not against most of intrusion so that we need to study intrusion tolerance technology. On the basis of existing model of intrusion tolerance, we putted forward an optimization of finite automata state transition model in intrusion tolerance system by adding strategy and updating status. Since the conversion process between the states of the model meets Semi-Markov theory, therefore, the model can be used to quantify this theory; it gives calculation process of the steady probability by each state. By stabilizing the probabilistic analysis of each state, provide theoretical guidance and basis for network management personnel to better maintain network security .Proven, the Semi-Markov applied to finite automata intrusion tolerant system is feasible, effective, and has simple features.

15

A Light Weight Security Scheme for Network Coding Based on a Mobius Transformation

M. H. Tadayon

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.161-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Network coding is a new method for forwarding network throughput in digital communication systems. In this paper, we introduce an efficient scheme for protecting the source data against wiretapper in linear network coding. The proposed scheme is implemented on the generated data packets in source node. We employ a well-known permutation function called Mobius transformation to transfer the existing data packet to an appropriate interchanged data packet. Then the new data packet can be sent to the intermediate nodes via output links of the source node in network securely. Indeed, the security of the proposed scheme against wiretapper is provided by employing Mobius transformation and interleaver operation on the generated data packet in source node. In the absence of cryptography systems, the proposed method is a light weight security scheme for network coding that can provide a security level easily.

16

The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the problem of computer network security. Computer network security is an early warning problem of multi index system. So, the traditional linear forecasting method cannot accurately describe the impact of each index on the evaluation results, and the accuracy of the prediction results is low. In order to improve the prediction accuracy of computer network security, this paper presents a new forecasting method for computer network security. Firstly, the evaluation index of computer network security is selected by expert system, and the weight of evaluation index is determined by the expert scoring method. Secondly, we put the index weight into the BP neural network, and use the BP neural network to learn it. Then, the parameters of BP neural network are optimized by the improved particle swarm optimization algorithm. After that, this paper uses a method based on the Fibonacci method principle to find the number of hidden layer node which has the best fitting ability. Finally, we use this algorithm to predict the network security of a certain enterprise in the next six months. The score is 0.67, 0.84, 0.72, 0.87, 0.86 and 0.91, which is close to the actual value of network security.

17

Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph

Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.183-192

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The determination of network equipment weaknesses and the discovery of intrusion intention is one of the difficulties that troubled network security management personnel. Based on previous studies, further proposed a double attack graph based on domain-equipment. By the underlying network topology data collected and analyzed, using Bayesian theory to complete the quantify for the double attack graph and generation strategy in minimal power key set, with the cost of calculation of key equipment in the automatic recognition network topology, we provide an important basis for network maintenance. Experimental results show that the measure of using quantitative domain-equipment double attack graph to recognize the intrusion intention is not only effective and feasible, but also has the feature of easy promotion.

18

A Provably-Anonymous Authentication Scheme for Roaming Services

Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.193-204

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this work, we extend the widely accepted security model of Bellare, Pointcheval and Rogaway (2000) in order to prove the security of smart-card-based roaming authentication (SRA) schemes. More specifically, in this extended model, we provide formal definitions of authenticated key exchange and user anonymity for SRA schemes, in order to capture side-channel, offline dictionary, and other common attacks. We then present a new SRA scheme and prove its security in our extended model. To the best of our knowledge, our proposed scheme is the first provably-secure SRA scheme that achieves user anonymity. We conclude by demonstrating that our scheme is also computationally efficient relative to other similar published schemes without a security proof.

19

Digital image information security, is accompanied by the rapid development of computer network and multimedia technology and the emergence of new problems. In recent years, the image information on the Internet more and more popular, but for some image information relating to personal privacy and national security, we must take the secret transmission mode, the image encryption technology more and more attention, research has important image encryption technology practical significance. Based on MFC and Matlab7.0 development tools, the paper design color image based on coupling chaotic encryption algorithm developed into an application software that fully implements all the performance of the proposed design of the cryptographic algorithm, and a beautiful interface, easy operation intuitive algorithm evaluation function and so on. In this paper, a digital color image encryption algorithm based on chaotic mapping. It was proposed based on color image encryption algorithm disaster and chaos mapping combined color image encryption algorithm based on logistic mapping, and two encryption algorithms performance comparison and analysis.

20

Research on User Identification Algorithm based on Rewriting URL

Zhou Jiadi, Geng Hai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.215-222

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

21

Android Permissions Management at App Installing

Sujit Biswas, Wang Haipeng, Javed Rashid

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.223-232

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Android based smartphone users’ privacy has been a hot issue recently in public concerns due to various instances of security attacks and privacy leakage on Android platform. Android existing security has been built upon a permission based mechanism which restricts critical resources accesses of third-party Android applications. This permission based security system is widely assessed for its major control of application permissions and critical management of permissions by developers, marketers, and end-users. Considering the critical management of permissions some previous research papers proposed automatic permission management tools. But those automatic tools never assessed end user’s expectation about permissions perfectly. This paper presents a tool, SDroid (Secured anDroid) that assesses the best permissions management based on end users opinion. SDroid evaluates requested permissions and allow users selectively grant permissions considering his/her knowledge level depending on the opinion.

22

Food Supply Chain Safety Risk Evaluation Based on AHP Fuzzy Integrated Evaluation Method

Wang Xiaoping

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.233-244

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the improvement of people’s living standards, the food safety issue occurs frequently. How to identify all kinds of risks, evaluate these risks scientifically and manage the risk control effectively are the challenge for each sully chain manager and the relevant researchers. In order to reduce the occurrence of the food safety issues and ensure the quality of the people’s life, it is necessary to evaluate the food safety. Based on the food supply chain safety evaluation model, this paper uses AHP fuzzy integrated evaluation method with a new scale to evaluate food supply chain safety risk. The paper provides reference to ensure the safety of the food supply chain.

23

Overview of Risk Management System of Commercial Bank Data Center

Zheng Li, Shanlin Yang, Zhenyao Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.245-258

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In nowadays, the trend of the economic globalization is increasing evidently. Without exception, all of the global banking industries take information technology as a necessary condition for survival in the future and the core of the competition. Aimed at two risks, ‘operational risk’ and ‘compliance risk’, which commercial banks data center must face to, this article constructs a risk management system, represents a management style of ‘One management framework, One set of risk baseline, Three kinds of control methods, Three improvement mechanisms’, establishes risk baselines as the basic of risk management, consolidates risk assessment experience, raises the standardization level of the risk assessment, improves risk baselines with continuous effort to adapt the updated security environment, identifies operational risk and compliance risk comprehensively within the unified management framework, achieves risk management standardized and sustainable, provides strong support to the commercial bank on the development and robust operation around the whole world.

24

Critical Analysis of Steganography “An Art of Hidden Writing”

Aqsa Rashid, Muhammad Khurrum Rahim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.259-282

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Steganography is the art of hiding information inside another medium while the presence of this embedding is invisible by human perception. In disparity to cryptography, steganography have a tendency to conceal the presence of the message or communication appearance, while cryptography tries to hide the content of the clandestine message. Hiding the presence of message or communication can be made by inserting a clandestine message into the clear cover medium which no one besides the correspondent and the receiver can imagine. This paper present the review and critical analysis of steganography methods projected during the recent years that are from 2011 to 2015. Many schemes are mentioned with their technical terms, main logic, advantages and disadvantages in terms of important measures. Critical analysis is based on the type of cover object used, domain of the algorithm and important properties that are used as evaluative measures for steganographic system.

25

Slope Stability Analysis of Open Pit Mine Based on AHP and Entropy Weight Method

Hongsen Luo, Yong He, Guohui Li, Ji Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.283-294

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

There are several factors influencing the slope stability of open pit mine, and the common methods can be divided into the subjective weighting method and the objective weighting method. In this paper, we make comprehensive evaluation of slope stability by using AHP method and entropy weight method. First of all, we make evaluation of the first level indicators, using AHP method to determine the weight of factors and then use the entropy weight method to calculate the influence factors, the conclusion has certain reliability and scientific nature. Through field monitoring, we get the membership function of each influence index by using assignment method and trapezoid distribution. Following the principle of maximum membership, slope II is the most stable, followed by slope V and slope I, slope III and slope IV are poor stability. This result is consistent with the on-site inspection, and then we proposed treatment measures according to the engineering practice.

26

Novel Digital Signature Schemes based on Factoring and Discrete Logarithms

Shin-Yan Chiou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.295-310

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the paper, we propose a new digital signature scheme based on factoring and discrete logarithms. Specially, we prove that the security of the proposed signature scheme is based on both the security of the ElGamal signature scheme and the security of the modified OSS signature scheme. This is the first scheme which can be proved that its security is based on two hard problems. Like Meta-ElGamal signature schemes, the proposed signature scheme can be extended to many kinds of scheme. The corresponding computations for our proposed scheme are also discussed.

27

In recent years, as the economic continuous development, market competition has been dramatically increasing. In order to maintain competition advantage, enterprises have to seek for more cooperation. As a new model of cooperation, industry strategic alliance is a significant method for cooperation to get competitive advantage, also increasing the rate of innovation. However, due to a variety of factors, part of the alliance is not stable, failure rate is very high. Heilongjiang province soybean processing industry strategic alliance as one of the best agricultural strategic alliance in China, it is also disturbed by it. In order to ensure the healthy and stable development of the alliance, in this paper, we will draw on relevant literature and expert advice, also field visits to the alliance, finding out the factors affecting the stability of the alliance. Then, AHP and fuzzy comprehensive evaluation method are combined to identify high impact factors, and puts forward specific comments based on the factors identified, thereby enhancing the long-term stable development of the alliance. At the same time, it also laid the foundation for the healthy development of other alliances.

28

This paper made a systematic presenting for the external environment and spatial structure of enterprise innovation and defined the three-dimensional space of enterprise innovation based on the spatial economics and open innovation perspective. The ‘knowledge flow’ was used as an important dimension when delving into the dynamic feedback mechanism between the enterprise innovation and three-dimensional space, forming a systematic recognition for interaction mechanism of three-dimensional space, knowledge flow and the enterprise endogenous innovation. And then, a demonstration based on the structural equation model was used to provide a theoretical basis for the innovation decision of an enterprise. It followed that, the economic space, geographic space and human space all constitute the three-dimensional space of enterprise external knowledge flow. In the open innovation system, the non-rigid boundary of enterprises provides the possibility of the overflow, expansion and penetration of external knowledge. Again, through the mediation of knowledge flow, the dynamic interaction of system dynamics between the three-dimensional space and enterprise endogenous innovation was achieved.

29

With the development of economy and society, the agricultural land stock cooperation system is a typical system innovation, which has a significant effect on rural production efficiency. In this paper, we research on the organizational structure of rural land stock cooperative system based on game theory; the result shows that the economic performance of land circulation stock cooperative system is much higher than other land transfer mode. At the same time, the mode of joint-stock cooperative system also has high social performance. By using game theory, we find that farmers tend to passively accept unfair treatment in enterprises based on the consideration of individual benefit, so that governments should effectively implement the macro management functions, and make punishment for the behavior of the enterprise managers' untrue disclosure. In order to improve the agricultural land stock cooperation system, the government should make clear the property right of farmland; promote the scale management of agricultural land and enhance the industrialization of rural areas.

30

Performance Analysis of LSB Based Watermarking for Optimization of PSNR and MSE

Sehra Jindal, hreyaGoel, Tanya Puri, AsheeshBhardwaj, IshanMahant, Sartaj Singh, DhairyaSood

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.3 2016.03 pp.345-350

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper shows the synopsis of digital watermarking, an important solution used for ensuring and assisting data authentication, security of digital media and protection of copyright. The Least Significant Bit (LSB) algorithm is used for Image Watermarking. LSB embeds the image into the original image. In this paper, the original image is compared with the watermarked image using two parameters that areMean Square Error (MSE) & Peak Signal to Noise Ratio (PSNR) . Further the image after watermarking is distorted with the Gaussian noise and then watermark is detected. Its analysis is done using MATLAB.

 
1 2
페이지 저장