메뉴 건너뛰기




Volumn 30, Issue 1, 2013, Pages 82-105

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY; DATA HANDLING; DIGITAL STORAGE;

EID: 85032751121     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2012.2219653     Document Type: Article
Times cited : (305)

References (110)
  • 2
    • 85032777835 scopus 로고    scopus 로고
    • Feb. 11 Time Mag. [Online]. Available:
    • T. Grose. (2008, Feb. 11). When surveillance cameras talk. Time Mag. [Online]. Available: http://www.time.com/time/world/article/0,8599,1711972,00. html
    • (2008) When Surveillance Cameras talk.
    • Grose, T.1
  • 3
    • 85032755518 scopus 로고    scopus 로고
    • Aug. 07 Los Angeles Times [Online]. Available:
    • M. Magnier. (2008, Aug. 07). Many eyes will watch visitors. Los Angeles Times [Online]. Available: http://articles.latimes.com/2008/aug/07/world/fg- snoop7
    • (2008) Many Eyes Will Watch Visitors.
    • Magnier, M.1
  • 4
    • 20844435854 scopus 로고    scopus 로고
    • Toward the next generation of recommender systems: A survey of the state-of-The-Art and possible extensions
    • DOI 10.1109/TKDE.2005.99
    • G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-The-art and possible extensions," IEEE Trans. Knowledge Data Eng., vol. 17, no. 6, pp. 734-749, 2005. (Pubitemid 40860454)
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.6 , pp. 734-749
    • Adomavicius, G.1    Tuzhilin, A.2
  • 7
    • 78349236191 scopus 로고    scopus 로고
    • Privacy-preserving approximation of l1 distance for multimedia applications
    • S. Rane, S. Wei, and A. Vetro, "Privacy-preserving approximation of L1 distance for multimedia applications," in Proc. IEEE Int. Conf. Multimedia Expo (ICME), 2010, pp. 492-497.
    • (2010) Proc. IEEE Int. Conf. Multimedia Expo (ICME , pp. 492-497
    • Rane, S.1    Wei, S.2    Vetro, A.3
  • 8
    • 80054910703 scopus 로고    scopus 로고
    • Secure and robust iris recognition using random projections and sparse representations
    • Sept
    • J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Secure and robust IRIS recognition using random projections and sparse representations," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 9, pp. 1877-1893, Sept. 2011.
    • (2011) IEEE Trans. Pattern Anal. Mach. Intell. , vol.33 , Issue.9 , pp. 1877-1893
    • Pillai, J.K.1    Patel, V.M.2    Chellappa, R.3    Ratha, N.K.4
  • 11
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • 2007/13801
    • C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists," Eurasip J. Inform. Security, vol. 10.1155/2007/13801, 2007.
    • (2007) Eurasip J. Inform. Security, vol. , vol.10
    • Fontaine, C.1    Galand, F.2
  • 13
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 180-187, 2010.
    • (2010) IEEE Trans. Inform. Forensics Sec. , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 14
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," in Proc. EUROCRYPT, 1998, pp. 308-318.
    • (1998) Proc. EUROCRYPT , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 15
    • 0000867507 scopus 로고
    • Minimum disclosure proofs of knowledge
    • Oct
    • G. Bassard, D. Chaum, and C. Crepeau, "Minimum disclosure proofs of knowledge," J. Comput. Syst. Sci., vol. 37, no. 2, pp. 156-189, Oct. 1986.
    • (1986) J. Comput. Syst. Sci. , vol.37 , Issue.2 , pp. 156-189
    • Bassard, G.1    Chaum, D.2    Crepeau, C.3
  • 16
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but their validity for all languages in NP have zero-knowledge proof systems," J. ACM, vol. 38, no. 3, pp. 691-729, 1991.
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • San Francisco, Aug
    • Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in Proc. 20th USENIX Sec. Symp., San Francisco, Aug. 2011.
    • (2011) Proc. 20th USENIX Sec. Symp.
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 18
    • 80051628570 scopus 로고    scopus 로고
    • A new approach to practical active-secure two-party computation
    • vol. arXiv:1202.3052v1 [cs.CR]
    • J. B. Nielsen, P. S. Nordholt, C. Orlandi, and S. S. Burra, "A new approach to practical active-secure two-party computation," Cryptology ePrint Archive, vol. arXiv:1202.3052v1 [cs.CR], 2011.
    • (2011) Cryptology ePrint Archive
    • Nielsen, J.B.1    Nordholt, P.S.2    Orlandi, C.3    Burra, S.S.4
  • 19
    • 74849111171 scopus 로고    scopus 로고
    • Encrypted domain dct based on homomorphic encryption
    • 2009/716357
    • T. Bianchi, A. Piva, and M. Barni, "Encrypted domain DCT based on homomorphic encryption," Eurasip J. Inform. Security, vol. 10.1155/2009/716357, 2009.
    • (2009) Eurasip J. Inform. Security, vol. , vol.10
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 20
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete fourier transform in the encrypted domain
    • Mar
    • T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 1, pp. 86-97, Mar. 2009.
    • (2009) IEEE Trans. Inform. Forensics Sec. , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 21
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • New York
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., New York, 2009, pp. 169-178.
    • (2009) Proc. 41st Annu. ACM Symp. Theory Comput. , pp. 169-178
    • Gentry, C.1
  • 22
    • 80051986706 scopus 로고    scopus 로고
    • Fully homomorphic encryption from ring-lwe and security for key dependent messages
    • CRYPTO
    • Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages," in Proc. Advances Cryptology, CRYPTO, 2011, pp. 505-524.
    • (2011) Proc. Advances Cryptology , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 23
    • 79957991215 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • [Online]. Available:
    • C. Gentry and S. Halevi, "Implementing gentry's fully-homomorphic encryption scheme," Cryptology ePrint Archive Rep. 520, 2010 [Online]. Available: http://eprint.iacr.org
    • (2010) Cryptology ePrint Archive Rep. , vol.520
    • Gentry, C.1    Halevi, S.2
  • 27
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • May
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining," SIGMOD Rec., vol. 29, no. 2, pp. 439-450, May 2000.
    • (2000) SIGMOD Rec. , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 28
    • 0026065565 scopus 로고
    • Eigenfaces for recognition
    • M. A. Turk and A. P. Pentland, "Eigenfaces for recognition," J. Cognitive Neurosci., vol. 3, no. 1, pp. 71-86, 1991.
    • (1991) J. Cognitive Neurosci. , vol.3 , Issue.1 , pp. 71-86
    • Turk, M.A.1    Pentland, A.P.2
  • 35
    • 33947164049 scopus 로고    scopus 로고
    • PICO: Privacy through invertible cryptographic obscuration
    • DOI 10.1109/CVIIE.2005.16, 1623767, Computer Vision for Interactive and Intelligent Environments 2005
    • T. Boult, "Pico: Privacy through invertible cryptographic obscuration," Comput. Vision Interactive Intell. Environ., 0-7695-2524-5, pp. 27-38, 2005. (Pubitemid 46401992)
    • (2005) Computer Vision for Interactive and Intelligent Environments 2005 , vol.2005 , pp. 27-38
    • Boult, T.E.1
  • 38
    • 84893405732 scopus 로고    scopus 로고
    • Data clustering: A review
    • A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: A review," ACM Comput. Surveys, vol. 31, no. 3, pp. 264-323, 1999.
    • (1999) ACM Comput. Surveys , vol.31 , Issue.3 , pp. 264-323
    • Jain, A.K.1    Murty, M.N.2    Flynn, P.J.3
  • 43
    • 32344446366 scopus 로고    scopus 로고
    • Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
    • DOI 10.1145/1081870.1081942, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
    • G. Jagannathan and R. N. Wright, "Privacy preserving distributed K-means clustering over arbitrarily partitioned data," in Proc. 11th ACM SIGKDD Int. Conf. Knowledge Discovery Data Mining, 2005, pp. 593-599. (Pubitemid 43218325)
    • (2005) Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 593-599
    • Jagannathan, G.1    Wright, R.N.2
  • 47
    • 35048899833 scopus 로고    scopus 로고
    • Achieving privacy preservation when sharing data for clustering
    • New York: Springer
    • S. R. M. Oliveira and O. R. Zaiane, "Achieving privacy preservation when sharing data for clustering," Lecture Notes in Computer Science, New York: Springer, 2004, pp. 67-82.
    • (2004) Lecture Notes in Computer Science , pp. 67-82
    • Oliveira, S.R.M.1    Zaiane, O.R.2
  • 51
    • 3042821101 scopus 로고    scopus 로고
    • Item-based top-n recommendation algorithms
    • M. Deshpande and G. Karypis, "Item-based top-N recommendation algorithms," ACM Trans. Inform Syst., vol. 22, no. 1, pp. 143-177, 2004.
    • (2004) ACM Trans. Inform Syst. , vol.22 , Issue.1 , pp. 143-177
    • Deshpande, M.1    Karypis, G.2
  • 52
    • 33644514610 scopus 로고    scopus 로고
    • Svd-based collaborative filtering with privacy
    • New York
    • H. Polat and W. Du, "SVD-based collaborative filtering with privacy," in Proc. ACM Symp. Appl. Comput., New York, 2005, pp. 791-795.
    • (2005) Proc. ACM Symp. Appl. Comput. , pp. 791-795
    • Polat, H.1    Du, W.2
  • 53
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in Proc. IEEE Int. Conf. Data Mining, 2003, pp. 625-628.
    • (2003) Proc. IEEE Int. Conf. Data Mining , pp. 625-628
    • Polat, H.1    Du, W.2
  • 56
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • J. F. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. ACM SIGIR, 2002, pp. 238-245.
    • (2002) Proc. ACM SIGIR , pp. 238-245
    • Canny, J.F.1
  • 59
    • 84861133582 scopus 로고    scopus 로고
    • Generating private recommendations efficiently using homomorphic encryption and data packing
    • Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Trans. Inform. Forensics Security, vol. 7, no. 3, pp. 1053-1066, 2012.
    • (2012) IEEE Trans. Inform. Forensics Security , vol.7 , Issue.3 , pp. 1053-1066
    • Erkin, Z.1    Veugen, T.2    Toft, T.3    Lagendijk, R.L.4
  • 60
    • 84856450939 scopus 로고    scopus 로고
    • Outsourcing multi-party computation
    • [Online]. Available:
    • S. Kamara, P. Mohassel, and M. Raykova, "Outsourcing multi-party computation," Cryptology ePrint Archive Rep. 272, 2011 [Online]. Available: http://eprint.iacr.org
    • Cryptology ePrint Archive Rep. , vol.272 , pp. 2011
    • Kamara, S.1    Mohassel, P.2    Raykova, M.3
  • 73
    • 0034266804 scopus 로고    scopus 로고
    • Watermarking digital image and video data: A state-of-The-art overview
    • G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A state-of-The-art overview," IEEE Signal Processing Mag., vol. 17, no. 5, pp. 20-46, 2000.
    • (2000) IEEE Signal Processing Mag. , vol.17 , Issue.5 , pp. 20-46
    • Langelaar, G.C.1    Setyawan, I.2    Lagendijk, R.L.3
  • 74
    • 0030409662 scopus 로고    scopus 로고
    • A method for signature casting on digital images
    • I. Pitas, "A method for signature casting on digital images," in Proc. IEEE Int. Conf. Image Processing, 1996, vol. III, pp. 215-218.
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 215-218
    • Pitas, I.1
  • 76
    • 84944404911 scopus 로고    scopus 로고
    • Zero-Knowledge Watermark Detection and Proof of Ownership
    • Information Hiding
    • A. Adelsbach and A.-R. Sadeghi, "Zero-knowledge watermark detection and proof of ownership.," in Proc. Int. Workshop Inform. Hiding, 2001, pp. 273-288. (Pubitemid 33367673)
    • (2001) Lecture Notes In Computer Science , Issue.2137 , pp. 273-288
    • Adelsbach, A.1    Sadeghi, A.-R.2
  • 79
    • 84957353052 scopus 로고    scopus 로고
    • Anonymous Fingerprinting
    • Advances in Cryptology - Eurocrypt '97
    • B. Pfitzmann and M. Waidner, "Anonymous fingerprinting," in Proc. Eurocrypt, 1997, vol. 1233, pp. 88-102. (Pubitemid 127067796)
    • (1997) Lecture Notes In Computer Science , Issue.1233 , pp. 88-102
    • Pfitzmann, B.1    Waidner, M.2
  • 80
    • 84937405827 scopus 로고    scopus 로고
    • Anonymous fingerprinting with direct non-repudiation
    • B. Pfitzmann and A.-R. Sadeghi, "Anonymous fingerprinting with direct non-repudiation," in Proc. Asiacrypt, 2000, vol. 1976, pp. 401-414.
    • (2000) Proc. Asiacrypt , vol.1976 , pp. 401-414
    • Pfitzmann, B.1    Sadeghi, A.-R.2
  • 81
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • DOI 10.1109/TIP.2005.859383
    • M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, 2005. (Pubitemid 41763728)
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 87
    • 84863479013 scopus 로고    scopus 로고
    • Private computation of spatial and temporal power consumption with smart meters
    • Z. Erkin and G. Tsudik, "Private computation of spatial and temporal power consumption with smart meters," in Proc. Int. Conf. Applied Cryptography Network Security, 2012, pp. 561-577.
    • (2012) Proc. Int. Conf. Applied Cryptography Network Security , pp. 561-577
    • Erkin, Z.1    Tsudik, G.2
  • 88
    • 80054080910 scopus 로고    scopus 로고
    • Privacy-friendly energy-metering via homomorphic encryption
    • LNCS 6710
    • F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. 6th Workshop Security Trust Manage., 2010, LNCS 6710, pp. 226-238.
    • (2010) Proc. 6th Workshop Security Trust Manage. , pp. 226-238
    • Garcia, F.D.1    Jacobs, B.2
  • 89
    • 84872766866 scopus 로고    scopus 로고
    • I have a dream! (differentially private smart metering)
    • LNCS
    • G. Acs and C. Castelluccia, "I have a DREAM! (differentially private smart metering)," in Proc. Inform. Hiding Conf., 2011, LNCS, pp. 1-10.
    • (2011) Proc. Inform. Hiding Conf. , pp. 1-10
    • Acs, G.1    Castelluccia, C.2
  • 90
    • 70350754250 scopus 로고    scopus 로고
    • Design for values and values for design
    • M. J. van den Hoven, "Design for values and values for design," Inform. Age, vol. 7, no. 2, pp. 4-7, 2005.
    • (2005) Inform. Age , vol.7 , Issue.2 , pp. 4-7
    • Van Den Hoven, M.J.1
  • 91
    • 71549146406 scopus 로고    scopus 로고
    • A new approach for algebraically homomorphic encryption
    • [Online]. Available:
    • F. Armknecht and A.-R. Sadeghi, "A new approach for algebraically homomorphic encryption," Cryptology ePrint Archive Rep. 422, 2008 [Online]. Available: http://eprint.iacr.org/
    • (2008) Cryptology ePrint Archive Rep. , vol.422
    • Armknecht, F.1    Sadeghi, A.-R.2
  • 92
    • 85032781606 scopus 로고    scopus 로고
    • [Online]. Available:
    • [Online]. Available: http://www.i-programmer.info/news/112-Theory/2330- darpa-spends-20-million-on-homomorphic-encryption.html (2009).
    • (2009)
  • 96
    • 69949126271 scopus 로고    scopus 로고
    • A correction to 'efficient and secure comparison for on-line auctions
    • [Online]. Available:
    • I. Damgård, M. Geisler, and M. Krøigård, "A correction to 'Efficient and secure comparison for on-line auctions,'" Cryptology ePrint Archive Rep. 321, 2008 [Online]. Available: http://eprint.iacr.org/
    • (2008) Cryptology ePrint Archive Rep. , vol.321
    • Damgård, I.1    Geisler, M.2    Krøigård, M.3
  • 97
    • 73849126104 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," J. Cryptology, vol. 23, no. 2, pp. 281-343, 2010.
    • (2010) J. Cryptology , vol.23 , Issue.2 , pp. 281-343
    • Aumann, Y.1    Lindell, Y.2
  • 99
    • 33645492588 scopus 로고    scopus 로고
    • Data Encryption Standard (DES) Number FIPS PUB 46-3, Nat. Inst. of Standards and Technol., Gaithersburg, MD
    • Data Encryption Standard (DES), Number FIPS PUB 46-3, Federal Information Processing Standards Publication, Nat. Inst. of Standards and Technol., Gaithersburg, MD, 1999.
    • (1999) Federal Information Processing Standards Publication
  • 100
    • 33645492588 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES), National Institute of Standards and Technology, Gaithersburg, MD
    • Advanced Encryption Standard (AES), Federal Information Processing Standards Publication, National Institute of Standards and Technology, Gaithersburg, MD, 2001.
    • (2001) Federal Information Processing Standards Publication
  • 101
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signature and public-key cryptosystems," Commun. Assoc. Comput. Mach., vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 102
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 103
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • LNCS 1592
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Advances Cryptology (EUROCRYPT), 1999, LNCS 1592, pp. 223-238.
    • (1999) Proc. Advances Cryptology (EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 104
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information," in Proc. ACM Symp. Theory Comput., 1982, pp. 365-377.
    • (1982) Proc. ACM Symp. Theory Comput. , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 108
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. Jan Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. Int. Conf. Audio-Video-Based Biometric Person Authentication, 2005, LNCS 3546, pp. 436-446. (Pubitemid 41423060)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.-J.4    Bazen, A.M.5    Veldhuis, R.N.J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.