• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document : 10 / 272 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ºÓÀºº° ¿î¿µÃ¼Á¦ WatermarkingÀ» ÀÌ¿ëÇÑ À̹ÌÁö ÆÄÀÏ Á¤º¸Àº´Ð ±â¹ý
¿µ¹®Á¦¸ñ(English Title) An Image File Hiding Technique Using Watermarking of the Red Star Operating System
ÀúÀÚ(Author) Ȳ±Ô¼·   °­µ¿¼ö   Guesub Hwang   Dongsu Kang                             
¿ø¹®¼ö·Ïó(Citation) VOL 27 NO. 05 PP. 0241 ~ 0247 (2021. 05)
Çѱ۳»¿ë
(Korean Abstract)
ºÏÇÑÀº Àß ¾Ë·ÁÁø Æó¼âÀûÀÎ ±¹°¡ÀÌ´Ù. ºÏÇÑÀº ÀÚü °³¹ßÇÑ ºÓÀºº° ¿î¿µÃ¼Á¦¸¦ °¡Áö°í ÀÖÀ¸¸ç ÁֹεéÀ» ÅëÁ¦Çϱâ À§ÇØ ºÓÀºº° ¿î¿µÃ¼Á¦¿¡´Â ¿öÅ͸¶Å·ÀÌ ÀÖ´Ù. ÀÌ ¿öÅ͸¶Å·¿¡´Â ºñ°¡½Ã¼º°ú ¿¬¼ºÀÇ ¼ºÁúÀ» °¡Áö°í ÀÖ´Ù. »ó¿ë ¿öÅ͸¶Å·°ú ´Ù¸£°Ô ÆÄÀÏÀÇ ³¡¿¡ 31¹ÙÀÌÆ®ÀÇ Æ¯Á¤ÇÑ Á¤º¸°¡ űëµÇ´Â ¹æ½ÄÀ̸ç 16¹ÙÀÌÆ®ÀÇ °¡º¯ÀûÀÎ °ø°£°ú 15¹ÙÀÌÆ®ÀÇ °íÁ¤µÈ °ø°£À¸·Î ±¸¼ºµÇ¾î ÀÖ´Ù. ºÓÀºº° ¿î¿µÃ¼Á¦ ¿öÅ͸¶Å·ÀÇ °¡º¯ÀûÀÎ °ø°£ 16¹ÙÀÌÆ®´Â »ç¿ëÀÚ PC HDD ÀϷùøÈ£°¡ űëµÇ´Â °ø°£À¸·Î À̸¦ È°¿ëÇϸé Á¤º¸Àº´ÐÀÌ °¡´ÉÇÏ´Ù. Á¤º¸Àº´Ð ½Ã ÆÄÀÏ¿¡ ¹ÌÄ¡´Â ¿µÇâÀÌ ¾øÀ½À» °´°üÀûÀ¸·Î Áõ¸íÇϱâ À§ÇØ ÆÛ¡ Å×½ºÆ®, ¿öÅ͸¶Å· Ç¥ÁØ¿¡ ÀÇÇÑ ¼º´É ºÐ¼® µîÀ» ¼öÇàÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
North Korea is a well-known isolated country. North Korea has its own Red Star operating system, and the Red Star operating system uses watermarking to control its people. It has features, such as invisibility and fragileness, which are different from commercial watermarking. A total of 31 bytes of specific information are tagged at the end of the file, consisting of 16 bytes of variable space and 15 bytes of fixed space. The variable 16 bytes of space in Red Star operating system watermarking is the space where the user's serial number of PC HDD is tagged. Information can be hidden using this space. To objectively prove that there is no effect on files when information is hidden, performance analysis was performed using fuzzing test and watermarking standards.
Å°¿öµå(Keyword) ºÓÀºº° 3.0 OS   ¿öÅ͸¶Å·   Á¤º¸Àº´Ð   ÆÛ¡ Å×½ºÆ®   red star operating system   watermarking   information hiding   fuzzing test                    
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå