Learn More
The SVM (support vector machine) and the SCM (skin color model) are used in detection of adult contents on images. The SVM consists of multi-class learning model and is very effective method for face detection, but complex. On the contrary, the SCM is very simple for detecting adult images using skin ratio derived from statistical characteristics of RGB(More)
For the Personal Cloud Storage, security is an important issue. There is latent threat when it comes to the data loss or leakage which may be committed by malicious Cloud Service Provider (CSP) employee. The most basic solution is to encrypt user's data. However, when the encryption key is directly managed by CSP or user's device, then there is latent(More)
With the increasing demand for access of mobile Internet via smartphones, the needs of adult images and videos filtering is escalating. In this paper, we propose a simple and fast objectionable video classification scheme using temporal motion and color energy features (TMCEF) and evaluate the performance on accuracy and processing time. The video segments(More)
There are various kinds of sensor network implementations on the Earth. They are different with respect to the topology, communication protocol between nodes, sensor types supported, sensing value types, etc. In addition to these sensor networks, RFID and mobile RFID is the member of a ubiquitous sensor network infrastructure (called as USN in Korea). To(More)
As distributed denial-of-service (DDoS) attacks have caused serious economic and social problems. In this paper, we propose the Service-oriented DDoS Detection Mechanism using a Pseudo State (SDM-P), which runs on network devices to defend against DDoS attacks without sacrificing performance in terms of data forwarding. In addition, we verified the(More)
sharing scheme is a cryptographic technology that safely manages password keys by dividing them into segments. Existing (k, n) threshold secret sharing scheme has a problem of allowing recovery of original secret information by collecting k or more random segments among divided secret information segments. To resolve such problem, this paper proposes a one(More)
Mobile RFID is a new application that provides a valuable service to users with mobile communication. Current RFID authentication schemes are not viable to use in mobile RFID environment. Since unlike in regular RFID environments, whereas the communication channel between the server and the reader is assumed to be secure, the communication channel between(More)
In the environment like the Cloud computing or the picture archiving and communications systems (PACS) of the hospital, the user’s data is stored in the storage of a third party. In such entrusted management environment, security is an important issue for the user’s private data. The most basic solution is to encrypt user’s private data. However, if the(More)