http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Implementing Intrusion Detection System by Considering Insider Attacks
Samir Kumar Bandyopadhyay 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.4
Insiders pose the top corporate security threat today. Recent reports indicate that insider breaches have risen from 80% to 86% of all incidents, with more than half occurring after employee termination. Not surprisingly, internal employees who are authorized to access company systems are most likely to be linked to fraud or a security breach — and of all employees, IT staff members have the most resources to do so. In this paper the implementation of Intrusion Detection System against Insider Attacks is proposed. Also, the nature of insider attacks, problems are discussed.
Statistical Analysis towards Image Recognition
Samir Kumar Bandyopadhyay,Poulami Das,Debnath Bhattacharyya 보안공학연구지원센터 2008 International Journal of Multimedia and Ubiquitous Vol.3 No.3
In this paper we propose a new Handwritten Signature Authentication Scheme. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation. This is an extension work of Handwritten Signature Identification. This scheme supports the application environment and we strongly believe that “User Authentication” could be a solid platform for future research and study.
Signature Authentication Scheme based on Statistical Analysis
Samir Kumar Bandyopadhyay,Ronnie Caytiles,Yvette Gelogo,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2011 Proceedings of KIIT Conference Vol.2011 No.5
A new Handwritten Signature Authentication Scheme is proposed in this paper. This Signature Authentication Scheme based on Statistical Analysis. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation.
Identification of Abnormal Masses in Digital Mammography Images
Samir Kumar Bandyopadhyay,Indra Kanta Maitra,Ronnie Caytiles,Yvette Gelogo,Cho-hee Hong,Tai-hoon Kim 한국정보기술학회 2011 Proceedings of KIIT Conference Vol.2011 No.5
In this work a method have been develop to make a supporting tool to easy and less time consuming of identification of abnormal masses in digital mammography images. The identification technique is divided into two distinct parts; Formation of Homogeneous Blocks and Color Quantization after preprocessing. The type of masses, orientation of masses, shape and distribution of masses, size of masses, position of masses, density of masses, symmetry between two pair etc are clearly sited after proposed method is executed on raw mammogram for easy and early detection abnormalities.
Handwritten Signature Watermarking and Extraction Technique Inspired by Principle of Segregation
Debnath Bhattacharyya,Samir Kumar Bandyopadhyay,Poulami Das 보안공학연구지원센터 2007 International Journal of Security and Its Applicat Vol.1 No.1
In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender’s end to the receiver’s end, in due course, from two transmitted images, at the receiver’s end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
A View on LSB Based Audio Steganography
Ratul Chowdhury,Debnath Bhattacharyya,Samir Kumar Bandyopadhyay,Tai-hoon Kim 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.2
In this paper the concept of cryptography and steganography are combined to perform a powerful encryption. Here we propose a novel approach where a duel encryption methodology has been implemented. In the first level of encryption a pattern matching algorithm has been employed to encrypt the text message in terms of their positional value. In second level, the conventional LSB method has been used to embed the positional value in the cover file. Such a duel encryption method will ensure data security in an efficient manner. Finally the performance of the proposed method is evaluated in terms of means square error (MSE) and signal to noise ratio (SNR). A comparison has been carried out with conventional LSB method. The experimental results and the comparisons demonstrated that our algorithm is highly efficient in terms of encryption and the capacity size of the text.