{"title":"Comparative analysis of quantum circuit implementation for domestic and international hash functions","authors":"Gyeongju Song, Min Song, Hwajung Seo","doi":"10.30693/smj.2023.12.2.83","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.83","url":null,"abstract":"The advent of quantum computers threatens the security of existing hash functions. In this paper, we confirmed the implementation results of quantum circuits for domestic/international hash functions, LSH, SHA2, SHA3 and SM3, and conducted a comparative analysis. To operate the existing hash function in a quantum computer, it must be implemented as a quantum circuit, and the quantum security strength can be confirmed by estimating the necessary quantum resources. We compared methods of quantum circuit implementation and results of quantum resource estimation in various aspects and discussed ways to meet quantum computer security in the future.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rini Wisnu Wardhani, D. Putranto, Thi-Thu-Huong Le, Y. Oktian, Uk Jo, Aji Teguh Prihatno, Naufal Suryanto, Howon Kim
{"title":"Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things","authors":"Rini Wisnu Wardhani, D. Putranto, Thi-Thu-Huong Le, Y. Oktian, Uk Jo, Aji Teguh Prihatno, Naufal Suryanto, Howon Kim","doi":"10.30693/smj.2023.12.2.42","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.42","url":null,"abstract":"The combination of blockchain (BC), artificial Intelligence (AI), quantum computing (QC), and the Internet of Things (IoT) can potentially transform various industries and domains, including healthcare, logistics, and finance. In this paper, we look at the trends and developments in integrating these emerging technologies and the potential benefits and challenges that come with them. We present a conceptual framework for integrating BC, AI, QC, and IoT and discuss the framework's key characteristics and challenges. We also look at the most recent cutting-edge research and developments in integrating these technologies, as well as the key challenges and opportunities that come with them. Our analysis highlights the potential benefits of integrating the technologies and looks to increased security, privacy, and efficiency to provide insights into the future of these technologies.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Fake Job Recruitment with a Machine Learning Approach","authors":"Taghiyev Ilkin, Jae Heung Lee","doi":"10.30693/smj.2023.12.2.36","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.36","url":null,"abstract":"With the advent of applicant tracking systems, online recruitment has become more popular, and recruitment fraud has become a serious problem. This research aims to develop a reliable model to detect recruitment fraud in online recruitment environments to reduce cost losses and enhance privacy. The main contribution of this paper is to provide an automated methodology that leverages insights gained from exploratory analysis of data to distinguish which job postings are fraudulent and which are legitimate. Using EMSCAD, a recruitment fraud dataset provided by Kaggle, we trained and evaluated various single-classifier and ensemble-classifier-based machine learning models, and found that the ensemble classifier, the random forest classifier, performed best with an accuracy of 98.67% and an F1 score of 0.81.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae Young Jang, Sooyong Jeong, Hyun Il Kim, Chang Ho Seo
{"title":"A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse","authors":"Jae Young Jang, Sooyong Jeong, Hyun Il Kim, Chang Ho Seo","doi":"10.30693/smj.2023.12.2.27","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.27","url":null,"abstract":"Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of “meta,” which means virtual and transcendent, and “universe,” means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain","authors":"Hakjun Lee","doi":"10.30693/smj.2023.12.2.76","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.76","url":null,"abstract":"In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions","authors":"Il Hwan Ji, Seungho Jeon, Jung-Taek Seo","doi":"10.30693/smj.2023.12.2.91","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.91","url":null,"abstract":"The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127262056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Price estimation based on business model pricing strategy and fuzzy logic","authors":"Callistus Chisom Obijiaku, K. Kim","doi":"10.30693/smj.2023.12.1.54","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.54","url":null,"abstract":"Pricing, as one of the most important aspects of a business, should be taken seriously. Whatever affects a company's pricing system tends to affect its profits and losses as wall. Currently, many manufacturing companies fix product prices manually by member of an organization's management team. However, due to the imperfect nature of humans, an extremely low or high price may be fixed, which is detrimental to the company in either case. This paper proposes the developement of a fuzzy-based price expert system (Expert Fuzzy Price (EFP)) for manufacturing companies. This system will be able to recommend appropriate prices for products in manufacturing companies based on four major pricing strategic goals, namely : Product Demand, Price Skimming, Competition Price, and Target population.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Second Frame in Film -Focusing on Iconology by Panofsky","authors":"Xunyue Jia","doi":"10.30693/smj.2023.12.1.102","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.102","url":null,"abstract":"As one of the image symbols, the second frame has rich symbolic metaphor. In previous studies, second frames are mostly presented in physical forms such as doors, windows, but in , there are various forms of second frames, providing more types for the study of second frames. Panofsky's Iconology has put forward a rigorous research method on how to interpret the meaning of image symbols in the picture. This study aims to use Panofsky's Iconology to analyze the second frame in . The purpose is to expand the methodology of film image research and break through the problem that the Iconology analysis of film image stays in narrative analysis (iconographical analysis). It can be seen from the results of this study that the second frame has different visual presentation according to the requirements of narrative. In the narrative of the film, it symbolizes the depressed tone of the film and the stressful relationship between different characters. What director Campion wants to show through the second frame is that in the film industry where the problem of women is getting better, the motif of feminist film creation has changed from the expression of female appeals in binary opposition to the expression of the appeals of diverse groups in “decentralization.”","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposal of a Non-contact Interaction Behavior Design Model for the Immersion of Culture Contents based on Non-linear Storytelling","authors":"So Jin Kim, Yeonsu Seol","doi":"10.30693/smj.2023.12.1.77","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.77","url":null,"abstract":"Interaction methods and technologies for mutual exploration based on user behavior are evolving variously. Especially, in recent years, with the development of a wide range of sensors, they have developed from contact to non-contact methods. However, developers’ senseless definitions of the interaction methods have made the exploration process quite complicated, which rather creates the hassle of users needing to learn the interaction guide defined by the developers before experiencing the exhibition contents. In this context, in order to make visitors smoothly communicate with exhibition contents, a preliminary study on easy interaction for users of various ages is needed, and in particular, research on improving the usability of user interaction is also essential when developing non-contact exhibition contents. So, in this study, a method to reduce the confusion between developers and users was sought by researching non-contact interaction that could be universally interacted with in the field of exhibition contents and proposing behavior designs. First, based on the narrative structure of cultural resources, existing studies were reviewed and the points of interactions as cultural contents were derived. Then the most efficient search process was selected among non-contact behaviors based on hand gestures that allow users to naturally guess and learn interaction methods. Furthermore, on the basis of the meaning of non-linear narrative-based interaction and the analysis results of spatial behavior elements, affordance behavior with high learning effect and efficiency was derived. Through this research process, an action that helps users to understand non-contact interaction naturally in the process of exploring exhibition-type cultural contents and to utilize non-contact interaction in the process of immersion in exhibition contents is proposed as a final model.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric Signal Scanning Scheme to Detect Invasive Attacks","authors":"Da Bin Yang, Young Woo Lee, Young-woo Lee","doi":"10.30693/smj.2023.12.1.17","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.17","url":null,"abstract":"Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}