• Title/Summary/Keyword: 증거 추출

Search Result 141, Processing Time 0.023 seconds

Two-Daughter Problem and Selection Effect (두 딸 문제와 선택 효과)

  • Kim, Myeongseok
    • Korean Journal of Logic
    • /
    • v.19 no.3
    • /
    • pp.369-400
    • /
    • 2016
  • If we learn that 'Mrs Lee has two children and at least one of them is a daughter', what is our credence that her two children are all girls? Obviously it is 1/3. By assuming some other obvious theses it seem to be argued that our credence is 1/2. Also by just supposing we learn trivial information about the future, it seem to be argued that we must change our credence 1/3 into 1/2. However all of these arguments are fallacious, cannot be sound. When using the conditionalization rule to evaluate conformation of a hypothesis by an evidence, or to estimate credence change by information intake, there are some points to keep in mind. We must examine whether relevant information was given through a random procedure or a biased procedure. If someone with full information releases to us particular partial information, an observation, a testimony, an evidence selected intentionally by him, which means the particular partial information was not given by chance, or was not given accidentally or naturally to us, then the conditionalization rule should be employed very cautiously or restrictedly.

  • PDF

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Extraction of Theft in Elevator (엘리베이터에서 절도 범죄의 추출)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Jong-Chan;Park, Sang-Joon;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.57-59
    • /
    • 2012
  • Theft is secretly stealing other people's stuff. And tell the person who secretly stealing, bandits, stealing one's stuff. In modern society, theft is one of the crimes that occur frequently in the elevator. In this paper, theft crime is extracted using a color histogram of scene change detection method. Extracted images are submitted as evidence for the action on the merits the court.

  • PDF

Extraction of Theft in Elevator Using χ2 Histogram (χ2히스토그램을 이용한 승강기에서 절도 범죄의 추출)

  • Shin, Seong-Yoon;Kim, Hee-Ae;Lee, Sang-Won;Park, Sang-Joon;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.86-88
    • /
    • 2013
  • Theft is secretly steal things of others. And theft tell the person who secretly stealing, bandits, stealing one's things. In modern society, theft is one of the crimes that occur frequently in the elevator. In this paper, theft crime is extracted using a ${\chi}^2$ histogram of scene change detection method. Extracted images are submitted as evidence for the action on the merits the court.

  • PDF

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Resolution of Complication in Territorial Sea by Using Digital Forensic (분쟁소지가 있는 공해상에서 Digital Forensic을 이용한 해결 방안)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Youg-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.137-146
    • /
    • 2007
  • Korea's seas have the potentials of dispute against China or Japan due to the overlap of the territorial waters and EEZ. In case of marine accidents, the nature of the sea tends to eliminate much of the track, making it another hardship in evidence adoption in case of an international dispute along with the false entries of fishing vessels' journals. Marine Digital Forensics Protects the functions of computers and IT appliance on vessels and extracts evidence of voyage and accidents to resolve international dispute. The digital evidence, if tampered with its integrity, my lead to the rejection to a critical claim or may even fail to make a case. As a solution, this thesis suggests Marine Digital Forensics as a way to extract evidence and prove a claim. This may be utilized as means of scientific investigation on sea as overseas exchange increases and the vessels digitalize, leading to a solution in international disputes that may occur in the future.

  • PDF

스마트폰 백업 데이터 획득 연구 동향

  • Park, Myungseo;Kim, Jongsung
    • Review of KIISC
    • /
    • v.28 no.5
    • /
    • pp.5-8
    • /
    • 2018
  • 현대인에게 필수적인 스마트폰에는 통화기록, 문자 메시지, 이메일과 같은 사용자 개인 정보뿐 아니라 사진, 동영상, 문서 등과 같은 미디어 파일이 저장된다. 이러한 스마트폰 데이터는 포렌식 수사 입장에서 중요한 증거로써 사용될 수 있기 때문에 필수적으로 획득해야 하는 데이터이다. 하지만, 스마트폰의 꾸준한 업데이트와 FDE (Full Disk Encryption), FBE(File Based Encryption)과 같은 암호 기능의 적용으로 인해 스마트폰에서 사용자 데이터를 추출하는데 어려움이 있다. 이에 따라 스마트폰에서 사용자 데이터를 추출하는 연구가 지속적으로 수행되고 있으며, 본 논문에서는 그 중 하나인 백업 데이터에서 스마트폰의 데이터를 획득하는 연구 동향에 대해 설명한다.

Implementation of Video-Forensic System for Extraction of Violent Scene in Elevator (엘리베이터 내의 폭행 추출을 위한 영상포렌식 시스템 구현)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2427-2432
    • /
    • 2014
  • Color-$X^2$ is used as a method for scene change detection. It extracts a violent scene in an elevator and then could be used for real-time surveillance of criminal acts. The scene could be also used to secure after-discovered evidences and to prove analysis processes. Video Forensic is defined as a research on various methods to efficiently analyze evidences upon crime-related visual images in the field of digital forensic. The method to use differences of color-histogram detects the difference values of histogram for RGB color from two frames respectively. Our paper uses Color-$X^2$ histogram that is composed of merits of color histogram and ones of $X^2$ histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing Color-$X^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1360-1364
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF