TY - GEN
T1 - Information security system using image puzzle type keycode
AU - Cho, Seongsoo
AU - Choi, Changhoon
AU - Hong, Sukjoo
AU - Kim, Youngchoon
PY - 2012
Y1 - 2012
N2 - As the modern society is developing into a multimedia information society, it has become easy to collect, search, process, transmit, and store information. However, damages from illegal system intrusion, personal information leaks, data duplication and forgery are also increasing everyday. Thus, information protection technologies are required to guarantee the confidentiality, integrity, and availability of information by responding to the threats and adverse effects that hinder the information communication environment. This paper proposes an information security system using image puzzle type key-code which divides original images consisting of pictures, figures, texts, numbers, fingerprints, and/or iris into certain sizes and the divided image pieces are arranged in accordance with preset patterns to create an image puzzle type key-code, and the original image is restored to a key-code image by substituting a puzzle type key-code value, thus preventing the leakage of original images.
AB - As the modern society is developing into a multimedia information society, it has become easy to collect, search, process, transmit, and store information. However, damages from illegal system intrusion, personal information leaks, data duplication and forgery are also increasing everyday. Thus, information protection technologies are required to guarantee the confidentiality, integrity, and availability of information by responding to the threats and adverse effects that hinder the information communication environment. This paper proposes an information security system using image puzzle type key-code which divides original images consisting of pictures, figures, texts, numbers, fingerprints, and/or iris into certain sizes and the divided image pieces are arranged in accordance with preset patterns to create an image puzzle type key-code, and the original image is restored to a key-code image by substituting a puzzle type key-code value, thus preventing the leakage of original images.
KW - Image puzzle
KW - Information Security
KW - Key-code
UR - http://www.scopus.com/inward/record.url?scp=84869762719&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-35267-6_24
DO - 10.1007/978-3-642-35267-6_24
M3 - Conference contribution
AN - SCOPUS:84869762719
SN - 9783642352669
T3 - Communications in Computer and Information Science
SP - 187
EP - 193
BT - Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity - International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Proceedings
T2 - 2012 International Conference on Advanced Software Engineering and Its Applications, ASEA 2012, and the 2012 International Conference on Disaster Recovery and Business Continuity, DRBC 2012, Held in Conjunction with GST 2012
Y2 - 28 November 2012 through 2 December 2012
ER -