Jiun-Hau Liew, Hee-Yuan Tan, Hoon-Jae Lee, Hyotaek Lim, Sanggon Lee
{"title":"Block Cipher Enhancement Using Pseudo-random Block Shuffling","authors":"Jiun-Hau Liew, Hee-Yuan Tan, Hoon-Jae Lee, Hyotaek Lim, Sanggon Lee","doi":"10.1109/ICCIT.2009.9","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.9","url":null,"abstract":"This paper presents a pseudo-random shuffling (PRS) method as an enhancement that can be added to many of the block ciphers by exploiting the Strict Avalanche Criterion (SAC) effect. We then analyze and post the result from comprehensive statistical testing for randomness using Diehard battery of tests to show that the shuffling sequence is indeed random. Finally, we include the performance comparison for AES against AES with PRS. This enhancement can be used to protect block cipher encrypted data and make them more resilience from existing cryptanalysis that is based on known-plaintext and chosen-plaintext.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Secure Issue System for Part Page of E-Document in Certified Electronic Document Authority","authors":"Seungmin Lee, Chi-Hyung You, Moon-seog Jun","doi":"10.1109/ICCIT.2009.25","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.25","url":null,"abstract":"The purpose of CEDA(Certified Electronic Document Authority) is to guarantee reliability and stability of electronic documents. When using storage and issuance services which are one of core services offered by CEDA, users register their electronic documents and they are issued to a third party later on. In this process, issuance of partial information(part page) instead of the entire registered information prevents unnecessary leakage of information and improves readability of documents. A method which minimizes information leakage upon loss of encryption and decryption keys was proposed.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standardizing the Medical Data in China by CDA","authors":"Shuli Yuwen, Xiaoping Yang, Huiling Li","doi":"10.1109/ICCIT.2009.162","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.162","url":null,"abstract":"With wide range of applications of EMR in the medical and health industry, the standardization of medical data has become a major bottleneck of the medical and health informationization. This paper proposes a method of standardizing the medical data by CDA using XML. The output of the semantic concept tree can be widely used for further research on analysis of EMR, Data Mining in EMR, information integration and sharing in hospital internal system and medical institutions.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Contemplation of Group Decision Support Systems","authors":"S. Asghar, S. Fong, Rukhsana","doi":"10.1109/ICCIT.2009.316","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.316","url":null,"abstract":"A Decision Support System (DSS) is an interactive computer-based information system that supports decision making and sometimes knowledge management. Essentially, it is fortitude of organizations, associations, corporation of information about the enterprise concerned, for support of assessment-making process. In assimilation with that enterprises relay on DSS tools, techniques and models in order to seek recommendations in business activities and strategies. One of the most important but vast areas specified for DSS is a Group Decision Support System (GDSS), that is a kind of electronic meeting system, a collective technology design for meetings and group works via a human computer interaction for effective group decision making. Though this is a relatively new and emerging field of DSS, there remain some problems and issues to be solved in GDSS such as its requirement of real time operation, process losses, time consuming and high cost required for its group coordination etc. This paper presents a review of numerous researchers’ efforts regarding GDSS and their impacts. The rationale of our study in this paper is in twofold: first is to review the literature, highlight the shortcomings and their core ideas or strengths. Another perspective is to show a critical evaluation by comparison and contrast. The contribution of this paper is on surveying many researchers efforts pertaining to GDSS.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natchamol Srichumroenrattana, C. Lursinsap, R. Lipikorn
{"title":"Facial Feature Detection Using Multiresolution Decomposition and Hillcrest-Valley Classification with Adaptive Mean Filter","authors":"Natchamol Srichumroenrattana, C. Lursinsap, R. Lipikorn","doi":"10.1109/ICCIT.2009.306","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.306","url":null,"abstract":"Automatic facial feature detection is one of the most important topics in computer vision and there are still many open problems that have not been solved. Nonuniform illumination is among one of those problems. This paper proposes a novel method for solving nonuniform illumination problem using multiresolution decomposition and a new technique called hillcreast-valley classification with adaptive mean filter to normalize illumination and detect dominant facial features, such as eyes, nose and mouth automatically. The proposed method is divided into three modules: eye detection, nose detection, and mouth detection modules. In this method, a single face image is divided into three regions: eye, nose, and mouth regions, then we use multiresolution decomposition to detect the eyes, and use thresholding to detect the nose and the mouth. For multiresolution decomposition, we decompose the eye region into small blocks and use hillcrest-valley classification with adaptive mean filter to classify each block as either a high or low-intensity region. Each low-intensity(valley) region is then decomposed into smaller blocks and each block is classified as either high- or low-intersity region. The low-intensity regions are then defined as the eyes. Finally the nose and the mouth are detected using thresholding. The method was evaluated on the YaleB face database that consists of face images taken by different illumination variations and the experimental results indicate that our proposed method achieves high accuracy rate.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung-Lo Park, Hyunsoo Jin, Kyung-Hwan Kim, Jae-Jun Kim
{"title":"A Study on Real-Time Progress Management System Modeling Using Goal and Scenario Based Requirements Engineering","authors":"Jung-Lo Park, Hyunsoo Jin, Kyung-Hwan Kim, Jae-Jun Kim","doi":"10.1109/ICCIT.2009.281","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.281","url":null,"abstract":"All sorts of technique for schedule progress management is being developed recently. In order to meet the demand, system development through various methodologies is proceeded in the whole areas of our society and this movement also can be found in the area of construction industry. In order to respond to such movement, in the area of construction industry we also intend to introduce development of various system. This study extracts users’ requirement and conducts system modelling through Goal & Scenario (G & Sc) based analysis method, and contents of such modeling are partially applied to real-time schedule progress management based on Robot based Construction Automation (RCA) project. Through this study, we want to realize the rapid generation of estimated schedule information and to simulate and analyze actual schedule information by real-time. In addition, it attempts to present various system development in the area of construction industry not only in a specific area.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124207274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Furkan Ince, Y. B. Salman, M. E. Yıldırım, Tae-Cheon Yang
{"title":"Execution Time Prediction for 3D Interactive CAPTCHA by Keystroke Level Model","authors":"Ibrahim Furkan Ince, Y. B. Salman, M. E. Yıldırım, Tae-Cheon Yang","doi":"10.1109/ICCIT.2009.105","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.105","url":null,"abstract":"CAPTCHA is a standard defense system which stands for Completely Automated Public Turing test to tell Computers and Human Apart. The basic idea of CAPCHA is providing questions that human users can easily recognize and answer but computer programs cannot. In this study, an interactive 3D CAPTCHA was introduced, and developed for better security. The design and evaluation phases are presented in detail. The proposed model passed the necessary security tests. The Keystroke Level Model (KLM) can be used to evaluate and predict task execution time for a specific system usage scenario. KLM is based on calculation on the sequences of the users’ tasks or actions. This study attempts to estimate execution times for 3D animated CAPTCHA by KLM. An interactive CAPTCHA method is developed by Flash Movie Technology which is used commonly in the web sites. The results show that performing the 3D CAPTCHA requires a serious amount of time. New interaction methods should be considered to improve the users’ performance.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xi-jun Cheng, Ke-jin Cao, Jiang-ning Xu, Guo-heng Cui
{"title":"Analysis on the Feasibility of Denial of Service of GPS Receivers Based on Hidden Messages","authors":"Xi-jun Cheng, Ke-jin Cao, Jiang-ning Xu, Guo-heng Cui","doi":"10.1109/ICCIT.2009.93","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.93","url":null,"abstract":"There are two main techniques to disable GPS user receivers from performing navigation fix, either causing interference on transmission route segment or using directional signal radiation on satelliet segment. This paper introduces a new Denial of Service (DoS) technique of GPS receivers that operates on the user segment, which is based on hidden messages from the user segment. The paper focuses on the analysis of the feasibility and covertness of using a large number of reserved bits in GPS L1C Nav navigation message to carry and transmit hidden messages, as well as of the feasibility of using expanded data types of GPS L2C CNav navigation messages to transmit hidden messages. Based on the reserved bits in GPS L1C Nav, two formats of hidden messages are designed, with mainframe and superframe as basic carrying units for transmission. Besides, the paper presents four approximate representations of DoS target areas, and probes into the position matching in DoS of GPS receivers. The research in this paper shows that it is feasible to realize DoS of GPS receivers based on hidden messages and hidden messages are provided with high convertness by transmission channels.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Cognitive Science for Improving Judgment and Decision Making in Construction Engineering Management","authors":"X. Xue","doi":"10.1109/ICCIT.2009.211","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.211","url":null,"abstract":"Increasing cognition research in management science indicates the significance of leveraging cognitive science to improve decision making, however, litter research has been investigated in construction engineering management (CEM) community. This workshop aims to provide a forum to discuss the theoretical and practical framework for integrating cognition research into CEM to improve judgment and decision. Papers are collected from departments of construction management in top universities in China. These papers make valuable contributions to explore cognition research in CEM on different topics, such as knowledge transfer, management information system, decision making models and methods, and CEM education.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung-Oh Park, Jung-Jae Kim, Sanggeun Kim, Moon-seog Jun
{"title":"Future Store Picking System Using RFID and USN Technique","authors":"Jung-Oh Park, Jung-Jae Kim, Sanggeun Kim, Moon-seog Jun","doi":"10.1109/ICCIT.2009.87","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.87","url":null,"abstract":"The most core technology demanded by the ubiquitous era is infrastructure. Intellectual store management and future store are receiving the spotlight in recent distribution industry. Intellectualization of stores is applied using techniques such as RFID and USN. Studies are focusing on efficient store management through improvement of work processes and development of services that provide convenience to customers for shopping. In this paper, basic infrastructure was constructed for efficient customer service and store management was simplified through customer participation, thereby allowing reduced use of human resources, reduced cost of operation through simplified store management with reduced number of direct visiting customers by activation of picking and delivery, and concentration of surplus human resources and expenses caused by intellectual system on customer service.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}