摘要:
A dynamic multi-dimensional code generation and recognition apparatus in which time information and visual recognition information are combined, and a method thereof are provided. According to the present invention, a dynamic multi-dimensional code or a time-variant code including visual recognition information which is associated with source information and changed over time is provided. Accordingly, users may easily ascertain existence of the multi-dimensional code and intended contents of the source information.
摘要:
A server provides the user's desired data without the server knowing the contents or keywords of data by using a method of searching the desired data without decrypting the encrypted data, such that the privacy for the important data of the user can be secured. Also, the present invention shortens the operation time when searching the encrypted data, such that it can prevent the degradation in efficiency due to excess operation involved in the previous existing methods based on the pairing operation.
摘要:
The present invention includes a rotation based transformation method for preserving data privacy. A rotation based transformation method according to an embodiment of the present invention divides a given data set into a plurality of data subsets, applies a plurality of different rotation matrixes to the plurality of divided data subsets, respectively, to rotate the plurality of data subsets, and re-concatenates the plurality of rotated data subsets to generate a rotated data set. The rotated data set is released and used for data clustering. The rotation based transformation method is effectively used when the impact of the AK-ICA attack is mitigated. Meanwhile, when the two parties are related to the present invention, the two parties need to agree on parameters, such as the number of data subsets. It is preferable that the data subsets be divided into equal sizes. Further, rotation-unification work that removes relative rotation deviation between the plurality of different rotation matrices can be performed in order to provide valid clustering between the data subsets rotated using the different rotation matrixes.
摘要:
Provided is imparting authentication codes to image data photographed by a camera connected to the apparatus for recording and reproducing images to generate encryption data and monitors control instructions input from the outside to the apparatus for recording and reproducing images, thereby interrupting the control instructions that store or cancel the image data stored in the apparatus for recording and reproducing images. As a result, the integrity of the image data cannot be questioned. Further, when the image data stored in the apparatus for recording and reproducing images are submitted as evidence, the integrity of the image data and the information on the corresponding image data submitted as evidence can be verified by using the authentication data generated for the original image data.
摘要:
The present invention provides a system for analyzing forensic digital evidence using an image filter and a method thereof. The system for analyzing forensic evidence using an image filter includes: a duplicator that creates a copy of digital evidence; a verifying unit that discriminates whether a copy and the original of the digital evidence are the same; an original storage that stores the original of the digital evidence; an evidence analyzer that classifies image files for the copy of the digital evidence stored in the original storage, on the basis of an image filtering model created by a learning model in accordance with predetermined categories, and then analyzes the evidence; and a reporting unit that creates a report about the result of evidence analysis. The image evidence analyzer includes an image file extractor, an image filtering model learning unit, an image filter, and a plurality of analyzers.
摘要:
The present invention provides an efficient method and system in which a plurality of participants share a secret key in a communication environment that is not ensured. According to an embodiment of the invention, each of the participants is assigned with a secret key from a key generation party, generates exchange information, and transmits its own exchange information to the other participant to exchange the exchange information with each other. Each of the participants generates a shared key on the basis of the exchange information and its own secret key.
摘要:
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
摘要:
The present invention provides a digital sound recording device that prevents data stored as digital sound data from being forged. A digital sound recording device according to the present invention includes an input unit, a storage unit, a data communication unit, a processor, and a write protection unit that is provided between the storage unit and the data communication unit, thereby preventing the write control from being performed on the storage unit by the external unit.
摘要:
A device of searching a text string based on segmentation according to the present invention includes: a keyword input unit that receives a keyword; a segmentation unit that receives the keyword and constantly splits the received keyword into a search unit having one or more characters; and a search unit that extracts a generation position of each search unit in a search target file by searching each search unit of the keyword from the search target file and calculates similarity as the inputted keyword by using the extracted generation position. According to the present invention, a dictionary does not need to be previously organized at the time of creating an index database and a creation speed of the index database is increased and false extraction is minimized, thereby accurately searching a text string.
摘要:
The present invention relates to a method for data encryption and a method for data search using a conjunctive keyword and more particularly to, a method for searching data stored in a server by using a conjunctive keyword after storing an index table for the conjunctive keyword and encrypted data in the server. According to an embodiment of the present invention, since keywords and relevant data do not need to be searched one by one by performing a conjunctive keyword search by using a linked tree structure modifying a linked list, it is possible to perform a rapid and efficient conjunctive keyword search.