• Title/Summary/Keyword: 공격각

Search Result 601, Processing Time 0.024 seconds

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

SNS Message as an Political PR Campaign Strategy: Focusing on the 21st General Election (정치 PR 전략으로서의 SNS 메시지 : 21대 총선을 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.208-223
    • /
    • 2020
  • In the 21st general election held in April 15, 2020, the importance of social media as an election campaigning tool became more prominent when engaged with Corona 19. Therefore, in this study, various studies were conducted to establish SNS strategy as an election campaign tool. This study analyzed the contents of SNS (Facebook, Twitter, YouTube) activities as an election campaign tool to analyze messages on social media messages of candidates Lee Nak-yeon and candidate Hwang Kyo-an of Jongno-gu, Seoul during the 2020 21st National Assembly election. Data collection mainly analyzed posts from each candidate's official account, and the research method used text analysis using the R program. Word cloud, comparative analysis, q-graph analysis, LDA, and STM analysis were used during text analysis. In addition, the analysis result was confirmed to be statistically significant through correlation analysis. As a result of research, candidate Lee Nak-yeon's election includes corona, people, problems, crisis, suffering, and wisdom, which indicates that the crisis caused by corona must be overcome through any means possible. On the other hand, candidate Hwang Kyo-an's election includes Moon Jae-in, the regime, save, the fatherland, the judge, and the economy. And from the perspective of political publicity, candidate Lee Nak-yeon made a lot of acclaims, while candidate Hwang Kyo-an made a lot of attacks, and both themes emphasized the policy rather than the image.

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

A Detection Model using Labeling based on Inference and Unsupervised Learning Method (추론 및 비교사학습 기법 기반 레이블링을 적용한 탐지 모델)

  • Hong, Sung-Sam;Kim, Dong-Wook;Kim, Byungik;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.65-75
    • /
    • 2017
  • The Detection Model is the model to find the result of a certain purpose using artificial intelligent, data mining, intelligent algorithms In Cyber Security, it usually uses to detect intrusion, malwares, cyber incident, and attacks etc. There are an amount of unlabeled data that are collected in a real environment such as security data. Since the most of data are not defined the class labels, it is difficult to know type of data. Therefore, the label determination process is required to detect and analysis with accuracy. In this paper, we proposed a KDFL(K-means and D-S Fusion based Labeling) method using D-S inference and k-means(unsupervised) algorithms to decide label of data records by fusion, and a detection model architecture using a proposed labeling method. A proposed method has shown better performance on detection rate, accuracy, F1-measure index than other methods. In addition, since it has shown the improved results in error rate, we have verified good performance of our proposed method.

The Study of Security System for Candidates for the 17th President (제17대 대통령선거후보자 경호제도에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.43-67
    • /
    • 2007
  • This is the study of efficient security system for candidates for the 17th President. The president election will be held in 20 countries this year. As conflicts between interest groups are expected to emerge, they are afraid of accidental raid in the campaign tour in addition to revival of regionalism and possibility of confrontation between interest groups with issues of anti-FTA In our country. The purpose of this study is to suggest appropriate method through study of security system for president candidate as just 6 months are left for the 17th president election. Also this study covers security environment for the president election, principle of security, and theoretical study for cause of terror, security system domestic and abroad and its analysis and how to provide the efficient security for president candidate. Therefore first, for desirable security the security should be provided by professional org like president security department. Second, combined security for target by current rules should be done. Fourth, total security is necessary to prevent security threats in advance. Third, the public security should be provided for every president candidates. Fifth, example of secret service in America should be studied and economical security should be considered Sixth, we should increase the use of Security Company and martial artists.

  • PDF

Risk and Protective Factors, and Mental Health in Youth's Internet Addiction by the Addiction Types (청소년의 인터넷 중독유형에 따른 위험요인 및 보호요인과 정신건강 비교연구)

  • Nam, Young-Ok;Lee, Sang-June
    • Korean Journal of Social Welfare
    • /
    • v.57 no.3
    • /
    • pp.195-222
    • /
    • 2005
  • This study was a comparative analysis by youth's internet addiction types. Distribution of internet addiction types, relative influence of risk and protective factors in each addiction type, and common and different risk and protective factors among the internet addiction types were investigated. And, the level of youth's mental health and the effect of internet to youth's mental health were identified. A total of 1,830 youth were surveyed, and the findings were as below: Firstly, 62.3% of the surveyed youth were addicted to internet. In detail, 15.9% had internet game addiction and 10.9% had internet sex addiction. Secondly, in all types of internet addiction, the risk factors gave severer influence than the protective factors did, and the protective factors gave compensation effect to each type of addiction. Thirdly, among the internet addiction types, the common risk factors were depression, aggression, parents' control, and friends' influence, while the protective factor was self control. Among the internet addiction types, a different risk factor was PC access, and the different protective factors included self-efficacy, teacher's support, friend's support, and parents' relationship. Fourthly, in all the three addiction pattern, the addicted adolescents had experienced more psychological symptoms than general internet users had. Finally, in the aspects of psychiatric symptoms, sex addiction gave the worst negative effect, and then game addiction, and internet addiction came in order. And the adolescents who had the higher degree of addiction were more likely to experience psychiatric symptoms.

  • PDF

The Relation Between Length of Institutionalization and Sensory Modulation for Preschooler (취학 전 시설보호 아동의 수용기간과 감각조절기능과의 관계)

  • Park, Mi-Sun;Song, Ji-Hun;Hyoun, Hyo-Jin;Kim, Kyoung-Mi
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.7 no.1
    • /
    • pp.59-69
    • /
    • 2009
  • Objective : The purpose of the study is to examine the length of institutionalization and sensory modulation for preschooler without disabilities, and to investigate the relationship between the length of institutionalization and behavioral problem. Method : Mothers of preschoolers without disabilities between ages of 3 and 7 who attend D kindergarten was participated. Nursery school teacher of institutionalized children without disabilities between ages of 3 and 7 who attend child-welfare facilities was participated. We used Short Sensory Profile(SSP) and Children Behavior Check list. The results were analyzed with SPSS 11.0. Results : There was no significant difference between longer length of institutionalization and shorter length of institutionalization in sensory modulation and behavioral problem. Regarding the sensory modulation and behavior problem according to child-welfare facilities, means showed the statistically significant difference. Regarding sensory modulation of test items, movement sensitivity and low energy/weak showed the statistically significant difference in home-reared children than institutionalized children. Conclusions : The results of the study showed high correlation environmental effect in institutionalized children. Further research is needed to improve environmental for institutionalized children.

  • PDF

Random Noise Addition for Detecting Adversarially Generated Image Dataset (임의의 잡음 신호 추가를 활용한 적대적으로 생성된 이미지 데이터셋 탐지 방안에 대한 연구)

  • Hwang, Jeonghwan;Yoon, Ji Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.629-635
    • /
    • 2019
  • In Deep Learning models derivative is implemented by error back-propagation which enables the model to learn the error and update parameters. It can find the global (or local) optimal points of parameters even in the complex models taking advantage of a huge improvement in computing power. However, deliberately generated data points can 'fool' models and degrade the performance such as prediction accuracy. Not only these adversarial examples reduce the performance but also these examples are not easily detectable with human's eyes. In this work, we propose the method to detect adversarial datasets with random noise addition. We exploit the fact that when random noise is added, prediction accuracy of non-adversarial dataset remains almost unchanged, but that of adversarial dataset changes. We set attack methods (FGSM, Saliency Map) and noise level (0-19 with max pixel value 255) as independent variables and difference of prediction accuracy when noise was added as dependent variable in a simulation experiment. We have succeeded in extracting the threshold that separates non-adversarial and adversarial dataset. We detected the adversarial dataset using this threshold.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.