james j. (jong hyuk) park shu-ching chen kim-kwang...

30
Lecture Notes in Electrical Engineering 448 James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang Raymond Choo Editors Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech 2017

Upload: hatuong

Post on 16-Mar-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Lecture Notes in Electrical Engineering 448

James J. (Jong Hyuk) ParkShu-Ching ChenKim-Kwang Raymond Choo Editors

Advanced Multimedia and Ubiquitous EngineeringMUE/FutureTech 2017

Page 2: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Lecture Notes in Electrical Engineering

Volume 448

Board of Series editors

Leopoldo Angrisani, Napoli, ItalyMarco Arteaga, Coyoacán, MéxicoSamarjit Chakraborty, München, GermanyJiming Chen, Hangzhou, P.R. ChinaTan Kay Chen, Singapore, SingaporeRüdiger Dillmann, Karlsruhe, GermanyHaibin Duan, Beijing, ChinaGianluigi Ferrari, Parma, ItalyManuel Ferre, Madrid, SpainSandra Hirche, München, GermanyFaryar Jabbari, Irvine, USAJanusz Kacprzyk, Warsaw, PolandAlaa Khamis, New Cairo City, EgyptTorsten Kroeger, Stanford, USATan Cher Ming, Singapore, SingaporeWolfgang Minker, Ulm, GermanyPradeep Misra, Dayton, USASebastian Möller, Berlin, GermanySubhas Mukhopadyay, Palmerston, New ZealandCun-Zheng Ning, Tempe, USAToyoaki Nishida, Sakyo-ku, JapanBijaya Ketan Panigrahi, New Delhi, IndiaFederica Pascucci, Roma, ItalyTariq Samad, Minneapolis, USAGan Woon Seng, Nanyang Avenue, SingaporeGermano Veiga, Porto, PortugalHaitao Wu, Beijing, ChinaJunjie James Zhang, Charlotte, USA

Page 3: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

About this Series

“Lecture Notes in Electrical Engineering (LNEE)” is a book series which reportsthe latest research and developments in Electrical Engineering, namely:

• Communication, Networks, and Information Theory• Computer Engineering• Signal, Image, Speech and Information Processing• Circuits and Systems• Bioengineering

LNEE publishes authored monographs and contributed volumes which presentcutting edge research information as well as new perspectives on classical fields,while maintaining Springer’s high standards of academic excellence. Alsoconsidered for publication are lecture materials, proceedings, and other relatedmaterials of exceptionally high quality and interest. The subject matter should beoriginal and timely, reporting the latest research and developments in all areas ofelectrical engineering.

The audience for the books in LNEE consists of advanced level students,researchers, and industry professionals working at the forefront of their fields. Muchlike Springer’s other Lecture Notes series, LNEE will be distributed throughSpringer’s print and electronic publishing channels.

More information about this series at http://www.springer.com/series/7818

Page 4: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

James J. (Jong Hyuk) ParkShu-Ching Chen • Kim-Kwang Raymond ChooEditors

Advanced Multimediaand Ubiquitous EngineeringMUE/FutureTech 2017

123

Page 5: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

EditorsJames J. (Jong Hyuk) ParkComputer Science and EngineeringSeoul National University of Scienceand Technology

SeoulKorea (Republic of)

Shu-Ching ChenSchool of Computing and InformationSciences

Florida International UniversityMiami, FLUSA

Kim-Kwang Raymond ChooDepartment of Information Systemsand Cyber Security

The University of Texas at San AntonioAdelaideAustralia

ISSN 1876-1100 ISSN 1876-1119 (electronic)Lecture Notes in Electrical EngineeringISBN 978-981-10-5040-4 ISBN 978-981-10-5041-1 (eBook)DOI 10.1007/978-981-10-5041-1

Library of Congress Control Number: 2017940720

© Springer Nature Singapore Pte Ltd. 2017This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made. The publisher remains neutral with regard tojurisdictional claims in published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by Springer NatureThe registered company is Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Page 6: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Message from the FutureTech2017General Chairs

FutureTech2017 is the 12th event of the series of international scientific conference.This conference will take place on May 22–24, 2017 in Seoul, South Korea. The aimof the FutureTech2017 is to provide an international forum for scientific research inthe technologies and application of information technology. FutureTech 2017 is thenext edition of FutureTech2016 (Beijing, China), FutureTech2015 (Hanoi,Vietnam), FutureTech2014 (Zhangjiajie, China), FutureTech2013 (Gwangju,Korea), FutureTech2012 (Vancouver, Canada), FutureTech2011 (Loutraki, Greece),FutureTech2010 (Busan, Korea, May 2010), which was the next event in a series ofhighly successful the International Symposium on Ubiquitous Applications &Security Services (UASS-09, USA, January 2009), previously held as UASS-08(Okinawa, Japan, March 2008), UASS-07 (Kuala Lumpur, Malaysia, August, 2007),and UASS-06 (Glasgow, Scotland, UK, May, 2006).

The conference papers included in the proceedings cover the following topics:Hybrid Information Technology, High-performance Computing, Cloud and ClusterComputing, Ubiquitous Networks and Wireless Communications, DigitalConvergence, Multimedia Convergence, Intelligent and Pervasive Applications,Security and Trust Computing, IT Management and Service, Bioinformatics andBio-inspired Computing, Database and Data Mining, Knowledge System andIntelligent Agent, Game and Graphics, and Human-centric Computing and SocialNetworks. Accepted and presented papers highlight new trends and challenges offuture information technologies. We hope readers will find these results useful andinspiring for their future research.

We would like to express our sincere thanks to Program Chairs: Ching-HsienHsu (Chung Hua University, Taiwan), Yunsick Sung (Dongguk University, Korea),Kwang-il Hwang (Incheon National University, Korea), Houcine Hassan(Universitat Politecnica de Valencia, Spain), Jin Wang (Yangzhou University,China), all Program Committee members, and all reviewers for their valuable effortsin the review process that helped us to guarantee the highest quality of the selectedpapers for the conference.

v

Page 7: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

We cordially thank all the authors for their valuable contributions and the otherparticipants of this conference. The conference would not have been possiblewithout their support. Thanks are also due to the many experts who contributed tomaking the event a success.

FutureTech 2017 General ChairsKim-Kwang Raymond Choo

Gangman YiJiannong Cao

vi Message from the FutureTech2017 General Chairs

Page 8: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Message from the FutureTech2017Program Chairs

Welcome to the 12th International Conference on Future Information Technology(FutureTech 2017), which will be held in Seoul, Korea, on May 22–24, 2017.FutureTech2017 will be the most comprehensive conference focused on the variousaspects of information technologies. It will provide an opportunity for academic andindustry professionals to discuss recent progress in the area of future informationtechnologies. In addition, the conference will publish high-quality papers which areclosely related to the various theories and practical applications in multimedia andubiquitous engineering. Furthermore, we expect that the conference and its publi-cations will be a trigger for further related research and technology improvements inthese important subjects.

For FutureTech2017, we received many paper submissions, and we acceptedonly articles with high quality for the FutureTech2017 proceedings after a rigorouspeer-reviewed process. All submitted papers have undergone blind reviews by atleast two reviewers from the technical program committee, which consists ofleading researchers around the globe. Without their hard work, achieving such ahigh-quality proceeding would not have been possible. We take this opportunity tothank them for their great support and cooperation. We would like to sincerelythank the following invited speakers who kindly accepted our invitations, and, inthis way, helped to meet the objectives of the conference: Prof. Weijia Jia, Directorof Cyber-Space Intelligent Computing Lab, Shanghai Jiaotong University, China,and Prof. Han-Chieh Chao, President of National Dong Hwa University, Taiwan.

vii

Page 9: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Finally, we would like to thank all of you for your participation in our conference,and also thank all the authors, reviewers, and organizing committee members.Thank you and enjoy the conference!

FutureTech 2017 Program ChairsChing-Hsien Hsu

Yunsick SungHoucine HassanKwang-il Hwang

Jin Wang

viii Message from the FutureTech2017 Program Chairs

Page 10: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Organization

Honorary Chair

Doo-soon Park SoonChunHyang University, Korea

Steering Chairs

James J. Park SeoulTech, KoreaYoung-Sik Jeong Dongguk University, Korea

General Chairs

Kim-Kwang RaymondChoo

The University of Texas at San Antonio, USA

Gangman Yi Dongguk University, KoreaJiannong Cao The Hong Kong Polytechnic University,

Hong Kong

Program Chairs

Ching-Hsien Hsu Chung Hua University, TaiwanYunsick Sung Dongguk University, KoreaHoucine Hassan Universitat Politecnica de Valencia, SpainKwang-il Hwang Incheon national University, KoreaJin Wang Yangzhou University, China

ix

Page 11: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Workshop Chairs

Chunho Jang Keimyung University, KoreaNeal N. Xiong Northeastern State University, USA

International Advisory Committee

James J. Park SeoulTech, Korea (Steering Chair)Doo-soon Park SoonChunHyang University, KoreaLaurence T. Yang St Francis Xavier University, CanadaJason C. Hung Oversea Chinese University, TaiwanJianhua Ma Hosei University, JapanC.S. Raghavendra University of Southern California, USAPhilip S. Yu University of Illinois at Chicago, USAHai Jin Huazhong University of Science and Technology,

ChinaYi Pan Georgia State University, USAShu-Ching Chen Florida International University, USAVictor Leung University of British Columbia, CanadaVincenzo Loia University of Salerno, ItalyHsiao-Hwa Chen National Cheng Kung University, Taiwan

Publicity Chairs

Yi Pan Georgia State University, USAVictor Leung University of British Columbia, CanadaVincenzo Loia University of Salerno, ItalyHsiao-Hwa Chen National Cheng Kung University, TaiwanLaurence T. Yang St Francis Xavier University, CanadaC.S. Raghavendra University of Southern California, USAPhilip S. Yu University of Illinois at Chicago, USAHai Jin Huazhong University of Science and Technology,

ChinaQun Jin Waseda University, JapanYang Xiao University of Alabama, USA

Program Committee

Abdelbadeeh Salem Ain Shams University, EgyptAlfredo Cuzzocrea University of Trieste, ItalyBing Chen Memorial University of Newfoundland, Canada

x Organization

Page 12: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Caldelli Roberto University of Florence, ItalyChi-Fu Huang National Chung-Cheng University, TaiwanEpaminondas Kapetanios University of Westminster, UKGuillermo Diaz-Delgado Autonomous University of Queretaro, MexicoHuang Kuo-Chan National Taichung University of Education, TaiwanHomenda Wladyslaw Warsaw University of Technology, PolandIrene Chang Shih-Hsin University, TaiwanJoel Rodrigues National Institute of Telecommunications, BrazilJeng-Shyang Pan Fujian University of Technology, ChinaJinli Cao La Trobe University, AustraliaJiqiang Lu Institute for Infocomm Research, SingaporeKyungbaek Kim Chonnam National University, KoreaMaumita Bhattacharya Charles Sturt University, AustraliaMudasser Wyne National University, USANiketa Gandhi University of Mumbai, IndiaQiang He Swinburne University of Technology, AustraliaRaylin Tso National Chengchi University, TaiwanRen-Song Ko National Chung Cheng University, TaiwanRoberto Caldelli University of Florence, ItalyRuben Rios University of Malaga, SpainRyszard Tadeusiewicz AGH University of Science and Tech., PolandSchahram Dustdar Technical University of Vienna, AustriaSeng Loke La Trobe University, AustraliaSoon M. Chung Wright State University, USAShu-Ching Chen Florida International University, USASuren Byna Lawrence Berkeley National Lab, USATatjana Davidovic Serbian Academy of Sciences and Arts, SerbiaWeichao Wang University of North Carolina at Charlotte, USAWookey Lee Inha University, KoreaYu-Chen Hu Providence University, TaiwanYunquan Zhang Chinese Academy of Sciences, ChinaZoubir Mammeri Paul Sabatier University, France

Organization xi

Page 13: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Message from the MUE2017 General Chairs

MUE 2017 is the 11th event of the series of international scientific conference. Thisconference will take place on May 22–24, 2017 in Seoul, South Korea. The aimof the MUE2017 is to provide an international forum for scientific research in thetechnologies and application of multimedia and ubiquitous engineering. Ever sinceits inception, International Conference on Multimedia and Ubiquitous Engineeringhas been successfully held as MUE-16 (Beijing, China), MUE-15 (Hanoi,Vietnam), MUE-14 (Zhangjiajie, China), MUE-13 (Seoul, Korea), MUE-12(Madrid, Spain), MUE-11 (Loutraki, Greece), MUE-10 (Cebu, Philippines),MUE-09 (Qingdao, China), MUE-08 (Busan, Korea), and MUE-07 (Seoul, Korea).

The conference papers included in the proceedings cover the following topics:Multimedia Modeling and Processing, Multimedia and Digital Convergence,Ubiquitous and Pervasive Computing, Ubiquitous Networks and MobileCommunications, Ubiquitous Networks and Mobile Communications, IntelligentComputing, Multimedia and Ubiquitous Computing Security, Multimedia andUbiquitous Services, and Multimedia Entertainment. Accepted and presentedpapers highlight new trends and challenges of multimedia and ubiquitous engi-neering. We hope readers will find these results useful and inspiring for their futureresearch.

We would like to express our sincere thanks to Steering Chair: James J. (JongHyuk) Park (SeoulTech, Korea). Our special thanks go to the Program Chairs:Naveen Chilamkurti (La Trobe University, Australia), Jungho Kang (SoongsilUniversity, Korea), Ka Lok Man, Xi’an(Jiaotong-Liverpool University, China),Joon-Min Gil(Catholic University of Daegu, Korea), all Program Committeemembers, and all reviewers for their valuable efforts in the review process thathelped us to guarantee the highest quality of the selected papers for the conference.

MUE2017 General ChairsShu-Ching Chen

Yi PanJianhua Ma

Young-Sik Jeong

xiii

Page 14: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Message from the MUE2017 Program Chairs

Welcome to the 11th International Conference on Multimedia and UbiquitousEngineering (MUE 2017), which will be held in Seoul, South Korea, on May22–24, 2017. MUE2017 will be the most comprehensive conference focused on thevarious aspects of multimedia and ubiquitous engineering. It will provide anopportunity for academic and industry professionals to discuss recent progress inthe area of multimedia and ubiquitous environment. In addition, the conference willpublish high-quality papers which are closely related to the various theories andpractical applications in multimedia and ubiquitous engineering. Furthermore, weexpect that the conference and its publications will be a trigger for further relatedresearch and technology improvements in these important subjects.

For MUE2017, we received many paper submissions, and we accepted onlyarticles with high quality for the MUE2017 proceedings after a rigorouspeer-reviewed process. All submitted papers have undergone blind reviews by atleast two reviewers from the technical program committee, which consists ofleading researchers around the globe. Without their hard work, achieving such ahigh-quality proceeding would not have been possible. We take this opportunity tothank them for their great support and cooperation. Finally, we would like to thankall of you for your participation in our conference, and also thank all the authors,reviewers, and organizing committee members. Thank you and enjoy theconference!

MUE 2017 Program ChairsNaveen Chilamkurti

Jungho KangKa Lok ManJoon-Min Gil

xv

Page 15: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Organization

Honorary Chair

Doo-soon Park SoonChunHyang University, Korea

Steering Chair

James J. Park SeoulTech, Korea

General Chairs

Shu-Ching Chen Florida International University, USAYi Pan Georgia State University, USAJianhua Ma Hosei University, JapanYoung-Sik Jeong Dongguk University, Korea

Program Chairs

Naveen Chilamkurti La Trobe University, AustraliaJungho Kang Soongsil University, KoreaKa Lok Man Xi’an Jiaotong-Liverpool University, ChinaJoon-Min Gil Catholic University of Daegu, Korea

xvii

Page 16: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Workshop Chairs

Kwangman Ko Sangji University, KoreaShuo Xu ISTIC, ChinaJun-Ho Huh Catholic University of Pusan, Korea

International Advisory Committee

Han-Chieh Chao National Ilan University, TaiwanWeijia Jia Shanghai Jiaotong University, ChinaBorko Furht Florida Atlantic University, USAThomas Plagemann University of Oslo, NorwayRoger Zimmermann National University of Singapore, SingaporeStephan Olariu Old Dominion University, USAKoji Nakano University of Hiroshima, Japan

Publicity Chairs

Kehua Guo Central South University, ChinaZhi Li Guizhou University, ChinaRuisheng Shi Beijing University of Posts and Telecommunications,

ChinaJaehwa Chung Korea National Open University, KoreaAyaz Ahmad COMSATS Institute of Information Technology,

PakistanQingchun Chen Southwest Jiaotong University, ChinaJunbo Wang University of Aizu, Japan

Program Committee

Afrand Agah West Chester University of Pennsylvania, USAAkihiro Sugimoto National Institute of Informatics, JapanAngel D. Sappa Universitat Autonoma de Barcelona, SpainBin Lu West Chester University, USAChao-Tung Yang Tunghai University, TaiwanChangsun Shin Sunchon National University, KoreaDaewon Lee SeoKyeong University, KoreaDakshina Ranjan Kisku National Institute of Technology Durgapur, IndiaDongkyun Kim KISTI, KoreaGuillermo Camara Chavez Universidade Federal de Minas Gerais, BrazilHari Om Indian School of Mines University, India

xviii Organization

Page 17: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

HaRim Jung Sungkyunkwan University, KoreaHelen Huang The University of Queensland, AustraliaJoel Rodrigue National Institute of Telecommunications (Inatel),

BrazilJungong Han Northumbria University, UKKilhung Lee Seoul National University of Science

and Technology, KoreaKwang Sik Chung Korea National Open University, KoreaLukas Ruf Consecom AG, SwitzerlandMarco Cremonini University of Milan, ItalyMario Döller University of Applied Sciences, AustriaPaisarn Muneesawang Naresuan University, TaipeiPascal Lorenz University of Haute Alsace, FranceQuanqing Xu Data Storage Institute, A*STAR, SingaporeRachid Anane Coventry University, UKSeunghae Kim KISTI, KoreaSokratis Katsikas University of Piraeus, GreeceYong-Yoon Cho Sunchon National University, KoreaZheng-Jun Zha National University of Singapore, Singapore

Organization xix

Page 18: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Contents

Single Password Authentication Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 1Pramote Kuacharoen

Performance Analysis of Congestion Control for MassiveMTC Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Yi-Yen Chen, Yu-Chee Tseng, and Jyh-Cheng Chen

How to Train People to Increase Their Security Awareness in IT . . . . . 12Agata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek,and Adam Wierzbicki

Advanced Data Communication Framework for Cloud Computingfrom CDMI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Jae-Yun Jeong and Jae-Woong Jeong

A Study of AI Based E-learning System and Application . . . . . . . . . . . . 24Min-Gyu Shim and Jae-Woong Jeong

A Study on the Serious Issues in the Practice of Information Securityin IT: With a Focus on Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Junhak Lee and Jae-Woong Jeong

Mobile App for Analyzing Environmental Visual Parameterswith Life Logging Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Hyeonsang Hwang, Daejune Ko, Mincheol Whang, and Eui Chul Lee

Fake Fingerprint Detection Based on Statistical Moments . . . . . . . . . . . . 43Yosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko,and Eui Chul Lee

Path Planning Method for Collision Avoidance of Multiple UAVs . . . . . 49Hyeok Kim, Jeonghoon Kwak, Guichang Sim, and Yunsick Sung

xxi

Page 19: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

3D UAV Flying Path Optimization Method Basedon the Douglas-Peucker Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Guichang Sim, Jaehwa Chung, and Yunsick Sung

Encrypted Network Traffic Analysis Method via Secure Socket LayerHandshake Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Jihoon Yoon, Kangsik Shin, and Yoojae Won

Property Analysis of SMS Spam Using Text Mining . . . . . . . . . . . . . . . . 67Manki Baek, Youngkyung Lee, and Yoojae Won

An Automatic Patch Management System with Improved Security . . . .. . . . 74JunHee Kim, MinSeok Sohn, and YooJae Won

An Empirical Study on the Relationship Between User InterfaceDesign Attributes in Smartphone Applicationsand Intention to Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81Wonjin Jung and HyungRok Yim

Thumb Biometric Using Scale Invariant Feature Transform . . . . . . . . . 85Naeun Lim, Daejune Ko, Kun Ha Suh, and Eui Chul Lee

Image Classification Using Color and Spatial Frequencyin Terms of Human Emotion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Min Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon,and Eui Chul Lee

Human Robot Interaction Method by Using HandGesture Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Jaehyun Han, Woohyuk Jang, Dojoon Jung, and Eui Chul Lee

A Beacon-Based User Direction Estimating Methodin Indoor Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Jeonghoon Kwak and Yunsick Sung

User Selection Based Backpropagation for Siamese Neural Networksin Visual Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Hanju Park and Sukho Lee

Methodological Route to Designing Optimized Bedroom Environmentfor Active-Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Sung Jun Park

Grayscale and Halftone Gel Lithography as PromisingTechniques for Swelling-Induced Deformation of SmartPolymer Hydrogel Films . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Myunghwan Byun

xxii Contents

Page 20: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Methodology for Improving Usability Model of Multiple Devices . . . . . . 126Jeyoun Dong and Myunghwan Byun

Development of SMART Base Isolation Using LinearMotion Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Chunho Chang and Sangyoung Shin

Analysis on Work Zone Characteristics in South Korean ExpresswaysUsing Text Mining Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Oh Hoon Kwon, Je-Jin Park, and Shin Hyoung Park

Seismic Performance Evaluation of a Prestressed I-Type GirderBridge in Daegu for ICT Based Disaster Management in DaeguMetropolitan City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140Chunho Chang, Sung Jig Kim, and Shin Hyoung Park

Implementation of Sitting Posture Monitoring Systemwith Kinect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144Dong-Jun Shin, Min-Sang Kim, Wook Song, Se Dong Min, and Min Hong

Solving the Subgraph Isomorphism ProblemUsing Harmony Search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151Hoyeong Yun, Yongjoon Joe, Byung-Ok Jung, Hyoguen Bang,and Dongmyung Shin

Persuading Recommendations Using Customized Content Curation. . . .. . . . 159Keonsoo Lee and Yunyoung Nam

Improving the Quality of an R-Tree Usingthe Map-Reduce Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164Viet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon,and Ha-Joo Song

An Energy-Efficient and Reliable Routing Protocol for CognitiveRadio Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Zamree Che-aron

A Novel on Automatic K Value for Efficiency Improvementof K-means Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, and Chun-Bo Sim

Study on Integrity Verification and Compatibility-Conflict Analysisfor Safe Patching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Jeongmin An, Sangmoon Jung, and Yoojae Won

OFART: OpenFlow-Switch Adaptive Random Testing . . . . . . . . . . . . . . 193Dong-Su Koo and Young B. Park

Patch Alarm and Collecting System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Jaegeun Oh, Chaeho Cho, and Yoojae Won

Contents xxiii

Page 21: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Method of Building a Security Vulnerability Information Collectionand Management System for Analyzing the Security Vulnerabilitiesof IoT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205Kisu Kim, Jongsoo Lee, and Wonkang Jung

A Cluster Head Selection Method by Restricting Selection Areain Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211Jong Won Lee, JiSu Park, Heung-Keun Kim, and Jin Gon Shon

An Improved Pedestrian Detection System that Utilizesthe HOG-UDP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218Pyeong-Kang Kim, Hyung-Heon Kim, and Tae-Woo Kim

An Approach to Fast Protocol Information Retrievalfrom IoT Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226Onur Soyer, Kwan-Young Park, Nomota Hiongun Kim, and Tae-soo Kim

IoT Vulnerability Information Sharing System. . . . . . . . . . . . . . . . . . . . . 233Taeho Seo

A Study on the Service Identification of Internet-Connected DevicesUsing Common Platform Enumeration . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Sarang Na, Taeeun Kim, and Hwankuk Kim

A Design of IoT Protocol Fuzzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Dae-il Jang, Taeeun Kim, and HwanKuk Kim

A Study on the Management Structure of Vulnerability Informationin IoT Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Eunhye Ko, Taeeun Kim, and Hwankuk Kim

Assessing the Impact of DoS Attacks on IoT Gateway. . . . . . . . . . . . . . . 252Yungee Lee, Wangkwang Lee, Giwon Shin, and Kyungbaek Kim

Low-Cost Infrared Video-Oculography for Measuring RapidEye Movements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Youngsun Kong, Hyeonsoo Lee, Namik Kim, Seungyeon Lee,Jihwan Park, Taeyang Han, and Yunyoung Nam

VM Relocation Method for Increase the Resource Utilizationin Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Sangwook Han, MinSoo Chae, and Hwamin Lee

Challenges and Experiment with LoRaWAN . . . . . . . . . . . . . . . . . . . . . . 269Seung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim,and Byoung-Sup Shim

Consumer’s Behavioral System of Approach and AvoidanceInvestigating Generic Medicine Distribution and Logistics in Japan. . . .. . . . 277Takefumi Hosoda and Hongsik J. Cheon

xxiv Contents

Page 22: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Cross-Conforming Approaches of ICT Functionality Designfor Smart City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Jae-Young Ahn, Eunjun Rhee, Hyun-Woo Lee, and Dae Joon Hwang

GUI-Based Korean Font Editing System Using FontParameterization Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Minju Son, Gyeongjae Gwon, Geunho Jeong, and Jaeyoung Choi

Spatial Big Data Analysis System for Vehicle-DrivingGPS Trajectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Wonhee Cho and Eunmi Choi

i-SHSS: An IoT Based Smart Home Security System . . . . . . . . . . . . . . . 303Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon,and Jong Hyuk Park

The VM Weighted Filter Scheduling Algorithmfor OpenStack Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307Mohan Krishna Varma Nandimandalam and Eunmi Choi

A Hierarchical Motion Estimation Based on the Properties of MotionVectors for Low Complexity in Video Coding . . . . . . . . . . . . . . . . . . . . . 314Hyo-Sun Yoon and Mi-Young Kim

Research on Method of Technological Evolution AnalysisBased on HLDA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Liang Chen, Xiaoping Lei, Guancan Yang, and Jing Zhang

A Mixture Record Linkage Approach for US PatentInventor Disambiguation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331Guan-Can Yang, Cheng Liang, Zhang Jing, Dao-Ren Wang,and Hai-Chao Zhang

The LTC Framework for Competitive Analysison Industrial Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339Hongqi Han, Changqing Yao, Maoxiang Peng, and Yongsheng Yu

Bayesian Multinomial Naïve Bayes Classifier to Text Classification . . . .. . . . 347Shuo Xu, Yan Li, and Zheng Wang

CERIF: A Research Information Model for Electric Vehicles DecisionSupport System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353YingJie Zhang and Na Qi

On Bypassing Page Cache for Block Deviceson Storage Class Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361Jin Baek Kwon

Contents xxv

Page 23: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Applying Tensorflow with Convolutional Neural Networks to TrainData and Recognize National Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367Hoang Huu Duc and Keechul Jung

An Empirical Study on the Effect of the Interpretability of Metaphorsin UI on the Learnability of Mobile Apps . . . . . . . . . . . . . . . . . . . . . . . . . 374Wonjin Jung and HyungRok Yim

A Density-Aware Data Encryption Scheme with Query Auditing Indexfor Secure Mobile Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Moon-Hwan Kang, Min Yoon, and Jae-Woo Chang

A Kernel Density Estimation Model for Moving Object Detection . . . . . 386Yulong Qiao and Wei Xi

Detecting Bases of Maximal Cliques in a Graph . . . . . . . . . . . . . . . . . . . 393Fei Hao, Doo-Soon Park, and Zheng Pei

Forecasting Cultivable Region-Specific Crops Based on FutureClimate Change Utilizing Public Big Data . . . . . . . . . . . . . . . . . . . . . . . . 399Yoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim,Sang Yub Han, Kee Hwan Kim, and Sungkap Cho

Statistical Analysis of Determinants of Intention to Use Virtual RealityServices and Moderating Effects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Young-Ho Hwang and Yoo-Jin Moon

Real-Time Human Depression Diagnosis System Using BrainWave Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412Dongmin Shin, Yunjin Nam, Dongil Shin, and Dongkyoo Shin

Deep Belief Network Based on Double Weber Local Descriptorin Micro-expression Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419Xiao-li Hao and Miao Tian

Design for Network File Forensics System Basedon Approximate Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426Aonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, and Gang Xiong

The Comparative Analysis of the Repeat Regions fromthe Assembled Contigs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432Jaehee Jung

Senior Tourism and Information and CommunicationTechnologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440Blanka Klimova

Wearable and Portable Monitoring Devices for Older People . . . . . . . . . 446Blanka Klimova and Petra Maresova

xxvi Contents

Page 24: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

A Novel Anomaly Detection Method in Wireless NetworkUsing Multi-level Classifier Ensembles . . . . . . . . . . . . . . . . . . . . . . . . . . . 452Bayu Adhi Tama and Kyung-Hyune Rhee

Learning Reaction Analysis Engine for Interactive DigitalTextbook Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459Kwang Sik Chung

Rule-Based Topic Trend Analysis by Using DataMining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466Yunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon,Hansaem Park, and In-Jeong Chung

A Case Study of Hierarchical Safety Analysis for ElicitingTraceable Safety Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474Daehui Jeong, Anit Thapaliya, and Gihwon Kwon

Smart Home Technology and Energy Savings with a SpecialFocus on Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481Blanka Klimova, Petra Maresova, and Ondrej Krejcar

Senior Citizens’ Views of Using Medical Technologies – Case Studyin Central Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Petra Maresova and Jaroslav Kacetl

Audiences Counting in Cinema by Detecting Occupied Chairs . . . . . . . . 493Zhitong Su, Jun Lan, Wei Song, Simon Fong, and Yifei Tian

Efficient Distributed Index Structure and Encrypted Query ProcessingScheme for Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . 499Yeonwoo Jang, Hyunjo Lee, and Jae-Woo Chang

A Data Encryption Scheme Using Periodic Functions for EfficientQuery Processing on Encrypted Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506Hyunjo Lee, Youngho Song, and Jae-Woo Chang

Software Product Line Lifecycle Management-IntegrationEngineering and Management Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 513Jeong Ah Kim and Jin Seok Yang

OLSR Improvement with Link Live Time for FANETs . . . . . . . . . . . . . 521Yan Jiao, Wenyu Li, and Inwhee Joe

An Efficient Partition-Based Filtering for Similarity Joinson MapReduce Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Miyoung Jang, Archana B. Lokhande, Naeun Baek, and Jae-Woo Chang

A Study of Algorithm Replacement Mechanism for EnvironmentAdaptive Load Balancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534JongMin Lee and Young B. Park

Contents xxvii

Page 25: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Face Recognition Based on Enhanced CSLBP . . . . . . . . . . . . . . . . . . . . . 539Chen Li, Shuai Zhao, Ke Xiao, and Yanjie Wang

A Supporting Environment for Formal Analysisof Cryptographic Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, and Jingde Cheng

Modeling and Simulation of LoRa in OPNET . . . . . . . . . . . . . . . . . . . . . 551Andrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee,Inwhee Joe, Kyeseon Lee, and Tae-Joon Park

Dynamic Analysis Bypassing Malware Detection Method UtilizingMalicious Behavior Visualization and Similarity . . . . . . . . . . . . . . . . . . . 560Jihun Kim and Jonghee M. Youn

Mongolian Internet Consumers’ Attitude TowardsWeb Advertising . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566Bulganmaa Togookhuu, Junxing Zhang, and Wuyungerile Li

A Study on the Quantitative Design and Documentationfor the VR Based Training Contents Realism . . . . . . . . . . . . . . . . . . . . . . 573Gyungchang Lee, Kyoil Chung, and Cheong Youn

Progressive Motion Artifact Removal in PPG Signal for AccurateHeart Rate Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580Ji Hun An, Heemang Song, and Hyun-Chool Shin

A Case Study on How to Predict Café Profit: A Dimension Reductionvia Factor Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588Jeong-Hyeon Moon, Chae-Young Yun, Seon-Joo Park,and Kyung-Ah Sohn

Motion Blurred Shadows Using a Hybrid Approach . . . . . . . . . . . . . . . . 594MinhPhuoc Hong and Kyoungsu Oh

Design of ECG Data Compression Algorithm for Efficient M2M-BasedMass Biometric Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601Jae-Sung Shim, Seung-Su Yang, Young-Hwan Jang, Yong-Wan Ju,and Seok-Cheon Park

Design of Clustering Algorithm for Efficient Energy Managementin Wireless Sensor Network Environments . . . . . . . . . . . . . . . . . . . . . . . . 607Seung-Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju,and Seok-Cheon Park

Design of a Framework for Security Enhancement in TelematicsControl Units (TCUs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Kiyoung Jang, Suhong Shin, and Byoungsoo Koh

xxviii Contents

Page 26: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Improved Data Stream Clustering Algorithmfor Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620Chunyong Yin, Sun Zhang, and Jin Wang

Application of an Improved Data Stream Clustering Algorithmin Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626Chunyong Yin, Lian Xia, and Jin Wang

Short Text Classification Technology Basedon KNN+Hierarchy SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633Chunyong Yin, Lingfeng Shi, and Jin Wang

Spectral Response Based Regularization Parameter Selection for TotalVariation Image Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640Yuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, and Jin Wang

Face Recognition for Mobile Self-authenticationwith Online Model Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646Seon Ho Oh and Geon-Woo Kim

Prototype System Design for Large-Scale Person Re-identification . . . . . 649Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi, and Geon-Woo Kim

Topic Modeling for Learner Question and Answer Analytics . . . . . . . . . 652Kyungrog Kim, Hye Jin Song, and Nammee Moon

A Model of Energy-Awareness Predictor to Improvethe Energy Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656Svetlana Kim and Yong-Ik Yoon

A Novel Structure Tensor Using Nonlocal TotalVariation Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663Yin Yu, Kai Ma, Yuhui Zheng, and Jin Wang

Gaussian Mixture Model Based Image Denoising Methodwith Local Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670Min Li, Yuhui Zheng, Shunfeng Wang, and Jin Wang

A Study on Secure Protocol Techniques Supporting TCUsin a Telematics Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676Byoungsoo Koh and Suhong Shin

Development of Test Agents for Automated Dynamic Testingof UNIWAY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683Seoung-Hyeon Lee and Jung-Chan Na

Multi-step Prediction for Time Series with Factor Miningand Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689Mingji Zhou, Jin Liu, Fei Li, and Jin Wang

Contents xxix

Page 27: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

A Vision-Based Approach for Deep Web Form Extraction . . . . . . . . . . . 696Jiachen Pu, Jin Liu, and Jin Wang

Questions Classification with Attention Machine . . . . . . . . . . . . . . . . . . . 703Yunlu Liaozheng, Jin Liu, and Jin Wang

Development of Unidirectional Security Gateway Satisfying SecurityFunctional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709Seon-Gyoung Sohn, Jungchan Na, and Kyung-Soo Lim

Context Based Multiple Players Identification in Sports Images . . . . . . . 715MiYoung Nam, Jun-Young Lee, Sung Youb Kim, and YoungGiu Jung

A Study of the Factors Influencing Information Security PolicyCompliance: Focusing on the Case of ‘K’ Institute . . . . . . . . . . . . . . . . . 720Gwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil,and Hark-Soo Park

Safe-Driving Aid System Using Bi-directional Cameras . . . . . . . . . . . . . . 729Byoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon,and Jong Hyuk Park

Telling Computer and Human Apart: Image-Sound BasedCAPTCHA System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733Jung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, and Jong Hyuk Park

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737

xxx Contents

Page 28: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

Single Password Authentication Protocol

Pramote Kuacharoen(&)

Department of Computer Science, Graduate School of Applied Statistics,National Institute of Development Administration, Bangkok 10240, Thailand

[email protected]

Abstract. Internet users usually subscribe to a few online services. Remem-bering a different password for each service becomes a burden and a challengefor some. As a result, many Internet users frequently use the same password formultiple accounts. This kind of practice is risky since each service has a differentsecurity level. For example, an online community site has a weaker securitymeasure than an online bank site. If an attacker has compromised a lowersecurity service and obtained the user’s password, the attacker may be able toidentify other accounts and use the stolen password. Therefore, reusing pass-words becomes a security risk, and is not generally recommended. This papertries to mitigate the risk of reusing an identical password for multiple accountsby implementing a single password authentication protocol. The proposedprotocol does not expose the user’s password in the event of the server or thecommunication line has been breached.

Keywords: Single password authentication � Mutual authentication �Authentication

1 Introduction

Authentication is the process of verifying the identity of the subject by comparing oneor more factors against a database of valid identities, such as user accounts. There arethree categories of authentication factors of verifying a user’s identity [1, 2, 3]:

• Knowledge factors are something the individual knows which include a passwordand a personal identification number (PIN).

• Possession factors are something the individual has, such as a smart card andcryptographic token.

• Inherence factors are some individual characteristics or something the individualdoes which include static and dynamic biometrics such as fingerprint, retina, face,voice pattern, handwriting characteristic, and keystroke dynamics.

The knowledge factors are the most commonly used form of authentication. Theuser is required to supply a secret such as a password, which matches the one stored inthe server in order to be authenticated. Due to its simplicity and convenience,password-based authentication is widely adopted.

Many online services require users to register and provide the credentials in theform of username and password. The users can later authenticate themselves using the

© Springer Nature Singapore Pte Ltd. 2017J.J. (Jong Hyuk) Park et al. (eds.), Advanced Multimedia and Ubiquitous Engineering,Lecture Notes in Electrical Engineering 448, DOI 10.1007/978-981-10-5041-1_1

Page 29: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

registered user credentials. Internet users usually subscribe to more than one onlineservices. For security reasons, the users should use a different password for eachservice. However, remembering a different password for each service becomes aburden and a challenge for some. As a result, many Internet users frequently use thesame password for multiple accounts. This kind of practice is risky since each servicehas a different security level. For example, an online community site has a weakersecurity measure than an online banking site. Even worse, a lower security site maystore passwords in clear text form and may run a buggy web application. Attackers maybe able to use an SQL injection attack to obtain the user’s password [4].

If an attacker has compromised a lower security service and has obtained the user’spassword, the attacker may be able to identify other accounts and use the stolenpassword. Therefore, reusing passwords becomes a security risk, and is not generallyrecommended.

In this paper, a single password authentication protocol is proposed to mitigate therisk of reusing an identical password for multiple accounts. The proposed protocol doesnot expose the user’s password in the event of the server or the communication line hasbeen breached. Although the protocol helps reduce the risk, the user should be cautioususing an identical password for multiple accounts. There are other attack techniqueswhich can be deployed to steal password. For instance, an attacker may perform ashoulder surfing attack while the user is authenticated in a public place.

2 Background and Related Work

This section provides background and related work which includes password authen-tication and existing single password protocols.

2.1 Password Authentication

Password authentication is the simplest form of authentication. Because of its sim-plicity, the password authentication is commonly used in authenticating the user overthe Internet. The user registers a username and a password as credentials. The serverneeds to store the user’s credentials in order to verify the user. When the user logs intothe server, the user simply presents the username and the password to the authenti-cating entity [5, 6]. The server checks the user’s credentials against the database ofvalid identities. If the values match, the user is authenticated. Otherwise, the authen-tication fails.

The passwords stored at the server must be protected. Storing passwords in cleartext is inadvisable. This is because a compromised user database file reveals allpasswords. The attack can use the obtained passwords on other systems. The attackermay be able to obtain the password database through an SQL injection attack. Insteadof storing passwords in clear text, the hash values of the passwords should be saved.However, a weakness of using the hash value is that two users with the same passwordhave an identical hash value. Furthermore, the attacker can use dictionary attack againstthe entire user database. The best way to protect password is to employ salted password

2 P. Kuacharoen

Page 30: James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang …download.e-bookshelf.de/download/0009/8815/21/L-G-0009881521... · Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

hashing. The server randomly generates a random number called salt and calculates thehash of the salt and the password. Therefore, two users with the same password havedifferent salted passwords. The server stores the salt and the salted password along withother information. Upon logging in, the user supplies the username and the password.The server computes the hash value of the salt and the received password, and thencompares the resulting value to the stored hash value. If the two values are identical, theuser is authenticated.

Both username and password are sent to the server. Sending password in clear textis vulnerable to eavesdropping. Using an SSL connection helps protect the conversa-tion during transit. However, it does not prevent phishing attacks.

2.2 Single Password Protocols

Rose et al. present a method to improve password security and to defend againstpassword phishing [7]. The server stores the hash of the user’s password and thedomain name. When the user enters the username and the password is prefixed withtwo escape characters, the browser extension applies a cryptographic hash function to acombination of the password and the domain name. The username and the hash valueare sent to the server. The domain name is automatically obtained. If the user enters thecredential on the phishing page, the phisher cannot obtain the clear text password.Moreover, the hash value is different from the one stored on the actual server since thephishing site is in a different domain name. Using domain name as salt has a drawback.The attacker may compromise a server under the same domain and may set up aphishing page. The correct salted password can be captured. Since password anddomain name remains unchanged, the salted password is the same, making it sus-ceptible to replay attacks.

Gouda et al. propose a protocol that allows a client to securely use a single pass-word across multiple servers and prevents phishing attacks [8]. The client can beauthenticated without revealing the password to the server at any point. The protocolemploys a one-time ticket technique. The client sets the next authentication ticket. Theticket consists of the hash of the random number, the password, and the server name.The client identifies himself by sending the identity. The server challenges with pre-viously stored random numbers. Subsequently, the client computes the ticket using thereceived number. The client also randomly generates a number and uses it to create thenext authentication ticket. The client responds with the current ticket, the next chal-lenge random number, and the hash value of the next authentication ticket. Althoughthe clear text password remains unchanged, the ticket changes each time the client isauthenticated. This is equivalent to changing the password at the server every time theuser signs in, which makes the protocol susceptible to message modification attacks.Consider the scenario where an attacker intercepts the response from the client. Theattacker then can create a ticket using his password and replaces the hash value withthe one generated from his ticket. The server has no way to verify the authenticity ofthe hash value. Hence, the attacker can log in.

Single Password Authentication Protocol 3