- Education and Learning Interventions
- Educational Systems and Policies
- Educational Research and Pedagogy
- Education, Safety, and Science Studies
- Innovation in Digital Healthcare Systems
- Advanced Malware Detection Techniques
- Video Coding and Compression Technologies
- Technology and Data Analysis
- Advanced Vision and Imaging
- Network Security and Intrusion Detection
- Diverse Approaches in Healthcare and Education Studies
- Internet of Things and Social Network Interactions
- Psychosocial Factors Impacting Youth
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Advanced Data Compression Techniques
- Advanced Steganography and Watermarking Techniques
- Spam and Phishing Detection
- Biometric Identification and Security
- Homotopy and Cohomology in Algebraic Topology
- Cryptography and Data Security
- Health and Wellbeing Research
- Healthcare Education and Workforce Issues
- Advanced Image Processing Techniques
- Image and Video Quality Assessment
Jeonbuk National University
2019-2024
Chung-Ang University
2024
Soonchunhyang University
2016-2023
Yonsei University
2009-2023
Severance Hospital
2023
Kongju National University
2013
Science Oxford
2012
Anyang University
2012
Chungbuk National University
2011
Hanyang University
2006-2011
With the advent of big data and cloud services, user has become an important issue. Although a variety detection prevention technologies are used to protect data, ransomware that demands money in exchange for one's emerged. In order detect prevent ransomware, file- behavior-based methods have been investigated. Nevertheless, we still facing from threats, as it is difficult containing unknown malicious codes. particular, these limited they cannot backup systems such services. For instance, if...
The key point of cryptography is cryptographic algorithms and keys. random number generator used to generate seeds keys randomly in many systems. For this reason, it essential use encrypt decrypt the transferring information, security these closely related 5G network. We propose a true (TRNG) method paper, are using visible spectrum for noise source. consider that if system utilizes data proposed TRNG, TRNG generates numbers with high entropy.
Concomitant with advances in technology, the number of systems and devices that utilize image data has increased. Nowadays, processing incorporated into systems, such as Internet things, drones, closed-circuit television, can collect images people automatically share them networks. Consequently, threat invasion privacy by leakage increased exponentially. However, traditional image-security methods, masking encryption, have several disadvantages, including storage space wastage associated...
“Internet of Things” (IoT) bridges the communication barrier between computing entities by forming a network them. With common solution for control and management IoT devices, these networks are prone to all types threats. Such may experience threats which launched exploitation vulnerabilities that left unhandled during testing phases. These often termed as “zero-day” vulnerabilities, their conversion into attack is named attack. attacks can affect devices exploiting defense perimeter...
A variety of data-based services such as cloud and big have emerged in recent times. These store data derive the value data. The reliability integrity must be ensured. Unfortunately, attackers taken valuable hostage for money attacks called ransomware. It is difficult to recover original from files systems infected by ransomware because they are encrypted cannot accessed without keys. There backup data; however, synchronized with service. Therefore, file restored even when victim infected....
AbstractCloud computing is a new paradigm, which provides low-cost and effective outsourced data storage service. People are used to storing personal in cloud server. E-Health system (EHS) privacy should be protected, because it national security for citizen privacy. Personal Health Record (PHR) the core of EHS that protected. Thus, how efficiently store, access share these critical. Attribute-based encryption (ABE) public key based on users’ attributes. In this paper, we present method...
Ever since many well-known image and video coding standards such as JPEG, MPEG, H.26x started using DCT a core process in data compression, the design of fast inverse discrete cosine transform (IDCT) has been an intensive research topic. Most focused on reduction number operations butterfly structure. However, majority coefficients is zero after quantization therefore redundant for IDCT computation. Therefore, we exploited this redundancy to propose coefficient-aware algorithm decoding. The...
Ransomware is one type of malware that involves restricting access to files by encrypting stored on the victim’s system and demanding money in return for file recovery. Although various ransomware detection technologies have been introduced, existing certain limitations problems affect their ability. Therefore, there a need new can overcome methods minimize damage from ransomware. A technology be used detect infected measuring entropy has proposed. However, an attacker’s point view,...
With the change from pre-internet era to online society, user authentication technology is required, and for that, password-based generally used. However, has vulnerabilities security threats that cannot ensure reliability, due exposure of keyboard data comprises a password input keyboard. In order settle this problem, image-based emerged; but mouse not secure, data. This problem led emergence protection technology. protects by generating large number random positions at any time, thereby...
As the Internet banking service has become popular, many users have been able to exchange goods online. Even though this offers advantage, there are cases of incidents in arising from security threats. In order counteract problem, various techniques applied over whole area service. paper, we analyze results user terminal area. detail, classify existing technologies into network domain, financial institution and ensure This paper focuses on domain. Specifically, domain secure keyboard...
In connected cars with various electronic control unit (ECU) modules, Ethernet is used to communicate data received by the sensor in real time, but it partially alongside a controller area network (CAN) due cost. There are security threats CAN, such as replay attacks and denial-of-service attacks, which can disrupt driver or cause serious damage, car accident through malicious manipulation. Although several secure protocols for protecting CAN messages have been proposed, they carry...
Format-preserving encryption has been studied for a long time since its proposal, but the algorithm is yet to be adequately evaluated or verified. The existing standard format-preserving FF1 and FF3-1 use block cipher AES in internal function. This paper proposes method improve speed of whereby implemented by changing lightweight ciphers LEA(Lightweight Encryption Algorithm) SPECK. analyzed compared with that dividing it into high-performance computer environments low-performance Internet...
Seamless cloning algorithm for image and video is an important editing operation. Recently [Farbman et al. 2009] introduced alternative which exploits the Mean-Value Coordinates (MVC) rather than solving a large linear system to perform weighted sum of values along boundary. It demonstrated result as good that earlier techniques in remarkably short time ease implementation. object was also discussed 2009], where they used simple exponential decay previous frames. In this paper, we propose...
Summary We verified the mouse data exposure using WM_INPUT message handler that obtains mouse‐inputted to derive vulnerability of image‐based authentication. Consequently, were exposed on most banking and payment sites South Korea. Experiment results show are in authentication six Internet services. Therefore, we proved safety information is vulnerable even when applied. In future, will propose an method solve found from this paper a set criteria for analysis security assessment.