• Title/Summary/Keyword: 위.변조

Search Result 474, Processing Time 0.024 seconds

Blockchain-based Sales and Purchase Record Management Systems for Agricultural Products (블록체인을 활용한 농산물 판매 및 소비이력 시스템에 관한 연구)

  • Na, Wonshik
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.41-46
    • /
    • 2022
  • This paper proposes a consumer-tailored solution to prevent the forgery and falsification of data by incorporating blockchain technology in the online and offline distribution of agricultural produce. The solution provides customized services to consumers based on an analysis of the data generated from the sales, distribution, and consumption of quality of the produce. It can also ensure the safety and credibility of the produce, and allow producers to identify consumption intent and the flow of distribution. Producers will be able to determine the flow of produce based on the data collected and thus tailor promotional efforts. This is expected to be the fourth industrial revolution in the agricultural produce distribution sector. Utilizing blockchain and big data technology to create integrated record management systems that combine multiple solutions will shape future technology trends. In addition, if eco-friendly certification is acknowledged as a valuable service and can be incorporated into the distribution process, this solution could become a one-stop distribution solution for agricultural produce.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.

A Study on the Design and Implementation of E-AV Models for University Academic Qualification Verification (대학 학력 검증을 위한 E-AV 모델 설계와 구현 방법에 관한 연구)

  • Jung-Oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.133-142
    • /
    • 2023
  • In recent years, the problem of academic credential falsification is not simply the manipulation of certificates generated by educational institutions, but also the difficulty of trusting automated relationship verification and verification itself, such as falsely recording completion as graduation while still in school. This is due to the lack of sharing of educational background databases among university institutions and the establishment/operation of independent systems that make it difficult to track educational backgrounds. This study designs and implements an E-AV model for academic credential verification centered on university institutions. It summarizes and stores the linked information on the existing academic background in an encrypted database and implements it with web standard technology considering the compatibility and scalability of the existing system. The results of sample data verification show that it improves safety against forgery and complies with storage space and execution performance. This study aims to contribute to the improvement of online verification services such as academic records management in domestic universities.

A Study on Image Creation and Modification Techniques Using Generative Adversarial Neural Networks (생성적 적대 신경망을 활용한 부분 위변조 이미지 생성에 관한 연구)

  • Song, Seong-Heon;Choi, Bong-Jun;Moon, M-Ikyeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.291-298
    • /
    • 2022
  • A generative adversarial network (GAN) is a network in which two internal neural networks (generative network and discriminant network) learn while competing with each other. The generator creates an image close to reality, and the delimiter is programmed to better discriminate the image of the constructor. This technology is being used in various ways to create, transform, and restore the entire image X into another image Y. This paper describes a method that can be forged into another object naturally, after extracting only a partial image from the original image. First, a new image is created through the previously trained DCGAN model, after extracting only a partial image from the original image. The original image goes through a process of naturally combining with, after re-styling it to match the texture and size of the original image using the overall style transfer technique. Through this study, the user can naturally add/transform the desired object image to a specific part of the original image, so it can be used as another field of application for creating fake images.

A Public Opinion Polling Application with Robust Verification Based on the Ethereum Bolckchain (견고한 검증을 제공하는 이더리움 블록체인 기반의 여론조사 어플리케이션)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Sun, Ju-Eun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.895-905
    • /
    • 2018
  • Public opinion polls have a strong influence on modern society as a means of examining the tendency of social groups on specific issues. As the influence of the polls increases, the problem of forgery and falsification of the results becomes an important issue. So, to guarantee the reliability of the results, our society needs novel mechanisms. As one of such mechanisms, the Ethereum blockchain is an environment for developing decentralized applications with the reliable blockchain technology. Ethereum decentralized applications can utilize smart contracts to provide services for users in transparent and reliable ways. In this paper, we propose a polling method that guarantees reliability using the blockchain technology, which is a distributed ledger technique that makes forgery or falsification actually impossible. The proposed method provides a robust verification function on the results of the associated polls for individual voters and verification organizations. Also, we present a distributed opinion polling application running on our private Ethereum blockchain network, showing the effectiveness of the proposed method.

Limitations of Analyzing Metadata and File Structure of Audio Files for Legal Evidence: Focusing on Samsung Smartphones (법적 증거 능력을 위한 오디오 파일의 메타데이터 및 파일 구조 분석의 한계: 삼성 스마트폰을 중심으로)

  • Sungwon Baek;Homin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1103-1109
    • /
    • 2023
  • Today, as the number of audio files submitted as legal evidence increases with the proliferation of smartphones, the integrity of audio files has become an important issue. Accordingly, the purpose of this study is to explore whether the metadata and file structure of audio files recorded on Samsung smartphones can be manipulated to be identical to the original. This study was based on Samsung smartphones, the most widely used in Korea, and conducted experiments on the built-in voice recording app and the 'Easy Voice Recorder' app, which is the most popular recording app. Through the experiments of this study, it was proven that the metadata and file structure of audio files can be manipulated. Therefore, this study reveals that metadata and file structure analysis have limitations in proving the integrity when audio files are analyzed for adoption as legal evidence. They also argue for the need to develop new voice file forgery technology that does not rely on metadata and file structure analysis.

Dose Planning of Forward Intensity Modulated Radiation Therapy for Nasopharyngeal Cancer using Compensating Filters (보상여과판을 이용한 비인강암의 전방위 강도변조 방사선치료계획)

  • Chu Sung Sil;Lee Sang-wook;Suh Chang Ok;Kim Gwi Eon
    • Radiation Oncology Journal
    • /
    • v.19 no.1
    • /
    • pp.53-65
    • /
    • 2001
  • Purpose : To improve the local control of patients with nasopharyngeal cancer, we have implemented 3-D conformal radiotherapy and forward intensity modulated radiation therapy (IMRT) to used of compensating filters. Three dimension conformal radiotherapy with intensity modulation is a new modality for cancer treatments. We designed 3-D treatment planning with 3-D RTP (radiation treatment planning system) and evaluation dose distribution with tumor control probability (TCP) and normal tissue complication probability (NTCP). Material and Methods : We have developed a treatment plan consisting four intensity modulated photon fields that are delivered through the compensating tilters and block transmission for critical organs. We get a full size CT imaging including head and neck as 3 mm slices, and delineating PTV (planning target volume) and surrounding critical organs, and reconstructed 3D imaging on the computer windows. In the planning stage, the planner specifies the number of beams and their directions including non-coplanar, and the prescribed doses for the target volume and the permissible dose of normal organs and the overlap regions. We designed compensating filter according to tissue deficit and PTV volume shape also dose weighting for each field to obtain adequate dose distribution, and shielding blocks weighting for transmission. Therapeutic gains were evaluated by numerical equation of tumor control probability and normal tissue complication probability. The TCP and NTCP by DVH (dose volume histogram) were compared with the 3-D conformal radiotherapy and forward intensity modulated conformal radiotherapy by compensator and blocks weighting. Optimization for the weight distribution was peformed iteration with initial guess weight or the even weight distribution. The TCP and NTCP by DVH were compared with the 3-D conformal radiotherapy and intensitiy modulated conformal radiotherapy by compensator and blocks weighting. Results : Using a four field IMRT plan, we have customized dose distribution to conform and deliver sufficient dose to the PTV. In addition, in the overlap regions between the PTV and the normal organs (spinal cord, salivary grand, pituitary, optic nerves), the dose is kept within the tolerance of the respective organs. We evaluated to obtain sufficient TCP value and acceptable NTCP using compensating filters. Quality assurance checks show acceptable agreement between the planned and the implemented MLC(multi-leaf collimator). Conclusion : IMRT provides a powerful and efficient solution for complex planning problems where the surrounding normal tissues place severe constraints on the prescription dose. The intensity modulated fields can be efficaciously and accurately delivered using compensating filters.

  • PDF

A Study of Verification for Modification of Location Information in Disaster Image Transmitting Through a Smart-phone (스마트폰을 이용한 재난 영상의 위치변조에 대한 검증에 관한 연구)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.242-249
    • /
    • 2012
  • Recently, value added location based service and convergence monitoring and control system is growing. The cases include increasing usage of smart-phone for taking picture, wireless network, GPS and digital map. Especially, Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on transferring modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification. In addition, we have designed security monitoring and control prototype considering axis-address matching analysis used geocoding, watermarking verification, encryption.

A study on characteristics of ZnSe epilayer by using surface photovoltage (표면 광전압을 이용한 ZnSe 에피층의 특성 연구)

  • 최상수;정명랑;김주현;배인호;박성배
    • Journal of the Korean Vacuum Society
    • /
    • v.10 no.3
    • /
    • pp.350-355
    • /
    • 2001
  • We have investigated characteristics of ZnSe epilayer grown by molecular beam epitaxy(MBE) on semi-insulating(SI) GaAs by using surface photovoltage(SPV). The measurements of SPV were performed with illumination intensity and modulation frequency. The bandgap energy of ZnSe epilayer was determined from derivative surface photovoltage (DSPV). The five states were observed at room temperature(RT), and those states relate to the impurity and defect formed hetero-interface of ZnSe and GaAs during the sample growth. The observed states represented as a tendency of typical extrinsic transition on the increasing illumination intensity. The 1s and 2s signals related to the excitonic absorption were not observed at RT, but those were presented with the splitted of two peaks in the SPV at 80 K. From the modulation frequency dependence, we obtained the junction conductance and capacitance of the sample.

  • PDF

A Study on Introduction Viladity of the Types of Electronic Money (전자화폐의 유형별 도입 타당성 분석)

  • 서정교
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.177-197
    • /
    • 1999
  • On regarding Problems on information security technology that have its rise in the Introduction of electronic money lately, security evaluation of the types of electronic money is important. Therefore in this paper I tried to analyse introduction viladity based on that,in korea. In perticular, there is a synthetical and systematical study on the security of eletronic money, on the viewpoint of choice combination of cryptography technology and the types of attacks on it. And in case of the electronic money that the criterion of efficiency and functionism is superior to that of security, I emphasize on the fact that it could be valid electronic money if it were supplemented by tamper resistance technology in middle-long term

  • PDF