![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network
Security issues have been raised with the tremendous growth of social multimedia content evolving content distribution and social interaction. To protect the social multimedia contents in a network, informatio...
-
Chapter and Conference Paper
High Capacity Data Hiding Based on AMBTC and Interpolation
Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for develo** data ...
-
Article
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment
-
Article
Generalizing Hamming+k data hiding by overlapped pixels
Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...
-
Article
Attack Detection Application with Attack Tree for Mobile System using Log Analysis
Recently, the use of smart phones has greatly increased because of the development of cheap high-performance hardware. The biggest threat to a smart phone user is the loss of his/her personal information by an...
-
Chapter and Conference Paper
Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning
Recently, cyber attacks against national institutional information and communication networks have become increasingly intelligent and advanced. Cyber attacks are becoming a serious threat to a nation’s overal...
-
Chapter and Conference Paper
Scenario Based Practical Information Protection Training System Using Virtualization System
As information and communication technology develops, cyber threats are increasing with convenience. In order to cope with this, research and development of information security training systems is actively be...
-
Article
Fast attack detection system using log analysis and attack tree generation
Many government branches report that internal networks are managed safely by separating them from the outside, but there is often a vulnerability that allows malicious codes to attack an internal network. Rece...
-
Article
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques
With the development of IT technology, cyber intelligence, surveillance, and reconnaissance (ISR) have become more important than traditional military ISR. In this paper, we propose an effective method to effi...
-
Article
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...
-
Article
Personal search system based on android using lifelog and machine learning
Lifelog is the foundation on which lifelong services and healthcare services are implemented in a smart home system. It also plays a major role in the sub-processes of the system because it acquires informatio...
-
Chapter and Conference Paper
System Information Comparison and Analysis Technology for Cyber Attacks
Although info-communication technologies are improving the quality of life, the damage due to insufficient security polices and various and powerful hacking techniques are increasing, affecting the national in...
-
Chapter and Conference Paper
Life Log Collection and Analysis System Using Mobile Device
With the increase in the number of smartphone users and the penetration rate now exceeding 85%, providing personalized services to individuals with smartphones has become an important research subject. In this...
-
Article
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment
In the ubiquitous Web environment which exploits real-time image processing methods, easy access to a variety of digital contents such as movies, e-books, and digital songs significantly enhances people’s qual...
-
Chapter and Conference Paper
Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP
With the frequent use of Wi-Fi and hotspots that provide a wireless Internet environment, awareness and threats to wireless AP security are steadily increasing. Especially when using unauthorized APs in compan...
-
Chapter and Conference Paper
A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network
Computer network face many security problems because various smart devices using computer networks are being developed and are rapidly spreading. Therefore, an Intrusion Detection System (IDS) is necessary for...
-
Chapter and Conference Paper
Study on Customer Rating Using RFM and K-Means
The RFM (Recency, Frequency, Monetary) market analysis technique is a widely used in the marketing field to analyze customer behavior. The interest in machine learning has recently increased to utilize the inc...
-
Article
Lossless data hiding for absolute moment block truncation coding using histogram modification
This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...
-
Article
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP
Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...
-
Article
Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents
With the changes in the interface paradigm, a user may not be satisfied using only a behavior-based interface such as a mouse and keyboard. In this paper, we propose a real-time user interface with emotion rec...