• Title/Summary/Keyword: 아티팩트

Search Result 111, Processing Time 0.023 seconds

Comparison Study on Projection and Backprojection Methods for CT Simulation (투사 및 역투사 방법에 따른 컴퓨터단층촬영 영상 비교)

  • Oh, Ohsung;Lee, Seung Wook
    • Journal of radiological science and technology
    • /
    • v.37 no.4
    • /
    • pp.323-330
    • /
    • 2014
  • Image reconstruction is one of the most important processes in CT (Computed tomography) technology. For fast scanning and low dose to the objects, iterative reconstruction is becoming more and more important. In the implementation of iterative reconstruction, projection and backprojection processes are considered to be indispensable parts. However, many approaches for projection and backprojection may result severe image artifacts due to their discrete characteristics and affects the reconstructed image quality. Thus, new approaches for projection and backprojection are highly demanded these days. In this paper, distance-driven approach was evaluated and compared with other conventional methods. The numerical simulator was developed to make the phantoms, and projection and backprojection images were compared using these approaches. As a result, it turned out that there are less artifacts during projection and backprojection in parallel and fan beam geometry.

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

A Study on the Usefulness of VGR (Virtual Grid Role) Algorithm for Elevation of Image Quality in DR System (DR 시스템에서 화질 개선을 위한 VGR 알고리즘의 유용성에 관한 연구)

  • Yang, Hyun-Jin;Han, Dong-Kyoon
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.6
    • /
    • pp.763-772
    • /
    • 2020
  • During X-ray examinations in the DR system, the scattered X-rays physically generated by the patient cause image blurring in poor quality. Although X-rays to increase the contrast of images, this increases the patient's exposure dose and is likely to result in grid induced artifacts. Therefore, the purpose of this study is obtain images similar to those of real-grid with non-grid level conditions using a VGR (Virtual Grid Role) algorithm that serves as a virtual grid. Comparing MTF, SNR and CNR of non-grid and VGR algorithm images obtained with 70% exposure conditions of real-grid images showed that the MTF0.5 differed from 0.265 to 0.350 and the MTF0.1 from 0.412 to 0.467 and the SNR, CNR were also different. In addition, comparing MTF, SNR and CNR of VGR algorithm and real-grid images showed that the MTF0.5 differed from 0.350 to 0.367 and the MTF0.1 from 0.467 to 0.483 and the SNR, CNR by little.

Optimal Echo phase of FLASH sequence for Brain Enhancement scan of mouse at 9.4T MRI system (9.4T MRI FLASH Sequence에서 마우스의 뇌 조영증강 검사를 위한 적정 Echo phase)

  • Jeong, Hyunkeun;Kim, Mingi;Nam, Kichang;Jung, Hyundo;Ahn, Chigwon;Kim, Hochul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.115-124
    • /
    • 2017
  • The objective of study was to investigate the optimal echo phase for mouse brain enhancement scan using fast low angle shot (FLASH) sequence of 9.4T magnetic resonance imaging (MRI). For quantification based on this method, an MR phantom experiment and clinical research were done. The phantom experiment was conducted by fabricating three phantoms with different molar concentration of gadolinium to create changes in echo phase of 9.4T FLASH sequence used in mouse brain scans. In the phantom experiment, SSI was 25~27 [arbitrary units, a.u.] in each of 33 phases from $6{\pi}$ to $28{\pi}$, while RSP was 30~100 mmol. MPSI was 47~52 [a.u], while MPP, where MPSI is seen, was 0.8~9 mmol. EPMS was 80.8~108.0%, while ASIMP was formed between 21.1 and 31.8 [a.u]. In the clinical research, Finally, the occurrence rate of artifact that expressed -1 nd +1. The present study was able to quantify the degree of enhancement at FLASH sequence of 9.4T MRI, as well as identify the optimal echo phase during mouse brain enhancement scan.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

CINEMAPIC : Generative AI-based movie concept photo booth system (시네마픽 : 생성형 AI기반 영화 컨셉 포토부스 시스템)

  • Seokhyun Jeong;Seungkyu Leem;Jungjin Lee
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.3
    • /
    • pp.149-158
    • /
    • 2024
  • Photo booths have traditionally provided a fun and easy way to capture and print photos to cherish memories. These booths allow individuals to capture their desired poses and props, sharing memories with friends and family. To enable diverse expressions, generative AI-powered photo booths have emerged. However, existing AI photo booths face challenges such as difficulty in taking group photos, inability to accurately reflect user's poses, and the challenge of applying different concepts to individual subjects. To tackle these issues, we present CINEMAPIC, a photo booth system that allows users to freely choose poses, positions, and concepts for their photos. The system workflow includes three main steps: pre-processing, generation, and post-processing to apply individualized concepts. To produce high-quality group photos, the system generates a transparent image for each character and enhances the backdrop-composited image through a small number of denoising steps. The workflow is accelerated by applying an optimized diffusion model and GPU parallelization. The system was implemented as a prototype, and its effectiveness was validated through a user study and a large-scale pilot operation involving approximately 400 users. The results showed a significant preference for the proposed system over existing methods, confirming its potential for real-world photo booth applications. The proposed CINEMAPIC photo booth is expected to lead the way in a more creative and differentiated market, with potential for widespread application in various fields.

Changes of EEG Coherence in Narcolepsy Measured with Computerized EEG Mapping Technique (기면병에서 전산화 뇌파 지도화 기법으로 측정한 뇌파 동시성 시성 변화)

  • Park, Doo-Heum;Kwon, Jun-Soo;Jeong, Do-Un
    • Sleep Medicine and Psychophysiology
    • /
    • v.8 no.2
    • /
    • pp.121-128
    • /
    • 2001
  • Objectives: In narcoleptic patients diagnosed with ICSD (international classification of sleep disorders, 1990) criteria, nocturnal polysomnography, and MSLT (multiple sleep latency test), we tried to find characteristic features of quantitative electroencephalography (QEEG) in a wakeful state. Methods: We compared eight drug-free narcoleptic patients with sex- and age-matched normal controls, using computerized electroencephalographic mapping technique and spectral analysis. Absolute power, relative power, interhemispheric asymmetry, interhemispheric and intrahemispheric coherence, and mean frequency in each frequency band (delta, theta, alpha and beta) were measured and analyzed. Results: Compared with normal controls, narcoleptic patients showed decrease in monopolar interhemispheric coherence of alpha frequency bands in occipital ($O_1/O_2$), parietal ($P_3/P_4$), and temporal ($T_5/T_6$) areas and beta frequency band in the occipital ($O_1/O_2$) area. Monopolar intrahemispheric coherences of alpha frequency bands in left hemispheric areas ($T_3/T_5$, $C_3/P_3$ & $F_3/O_1$) decreased. Decrease of monopolar interhemispheric asymmetry of delta frequency band in the occipital ($O_1/O_2$) area was also noted. The monopolar absolute powers of beta frequency bands decreased in occipital ($O_2,\;O_z$) areas. Conclusion: Decreases in coherences of narcoleptic patients compared with normal controls may indicate fewer posterior neocortical interhemispheric neuronal connections, and fewer left intrahemispheric neuronal connections than normal controls in a wakeful state. Therefore, we suggest that abnormal neurophysiological sites of narcolepsy may involve complex areas such as neocortex and subcortex as well as the brainstem.

  • PDF