• Title/Summary/Keyword: 콘텐츠추적정보

Search Result 168, Processing Time 0.022 seconds

Development of a Collection System of Bait Links to Social Media on Dark Web to Track Drug Crimes (마약 범죄 추적을 위한 다크웹 상의 소셜미디어 유인 링크 수집체계 개발)

  • Sol-Kyu Park;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.123-125
    • /
    • 2024
  • 다크웹(Dark Web)은 마약, 불법 촬영물, 해킹, 무기 등 불법 콘텐츠의 공유 및 거래가 이루어지는 인터넷 영역으로서 최근에는 소셜미디어와 연계된 형태로 범죄 양상이 변화하고 있다. 본 논문에서는 최근 국내 외 사회 문제로 대두되고 있는 마약 범죄를 추적하기 위한 다크웹 수사 기술로서 다크웹 사용자를 소셜미디어로 유인하는 마약 정보 수집체계를 개발한다. 먼저 미국 마약단속국에서 공개한 대표적인 마약 용어 3개의 표준어 및 은어를 검색 키워드로 사용하여 마약 관련 다크웹을 수집하고, 수집된 다크웹을 크롤링하여 소셜미디어 계정 링크를 추출한다. 본 논문에서는 다양한 소셜미디어 중, 트위터 및 텔레그램 접속 링크를 수집하였으며 실험 결과, 접속 가능한 총 54개 다크웹 도메인의 9,046개 웹 페이지에서 트위터 유인 링크 567개, 텔레그램 유인 링크 118개를 추출하였다.

  • PDF

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.

Strategies for the Integrated Water Management System based on GIS (GIS 기반의 물통합관리시스템 구축 방안)

  • Seo, dong-jo;Song, dong-ha;Lee, sang-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.463-466
    • /
    • 2009
  • Some strategies for the integrated water management system based on GIS was suggested for the comprehensive and systematic management on the watershed. Contents of database and thematic layers for the related elements with GIS was indicated to estimate the quantity of total pollution loads and to simulate the water quality. Also, functions for the information providing was suggested on the connection with spatial data and attribute data, the search for collected data, the analysis for time series, and the visual presentations. Finally, it was suggested to integrate the existing systems and database structures, and to construct of data warehouse.

  • PDF

Finding Critical Success Factors for Spatial Data Industry by Comparing Strategies of Digital Earth Enterprises (디지털어스 기업들의 전략 비교를 통한 공간정보산업 핵심성공요인의 발견)

  • Kim, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • Spatial information has influenced government policy formation, business strategy implementation, and our everyday life enormously. Digital earth enterprises providing global spatial data services emerge as spatial data industry grows rapidly. So it is highly desirable to grasp recent trends in the industry and find critical success factors (CSFs) for the digital earth firms. The purpose of this study is to compare strategies of digital earth enterprises and find CSFs for them. In addition, strategy analysis framework elaborations, systematic analysis of spatial data industry and market segmentation based on value chain are also performed to trace and cope with the volatile industry environment. Derived CSFs are as follows. First, acquisition of differentiated high quality spatial data is needed. Second, customer oriented convergent contents should be developed. Third, advanced platform functionalities must be provided to consumers. Finally, construction of efficient and effective global value chain is desirable.

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

The DRM System for UCC Rights Protection (UCC 저작권 보호를 위한 DRM 시스템)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.35-39
    • /
    • 2010
  • UCC is a key characteristic of so-called Web 2.0 which encourage the publishing of one's own content and commenting on other people's. Nowadays, UCC has become a widely used. Accordingly, problem of copyright become a issue. In this paper, we propose the DRM system for UCC rights protection. The system solve the copyright problem in UCC. Therefore, UCC creator can exert the right of UCC. In addition, if the problem of copyright occur, we can find the illegal user and call a him to account by CE information which is stored in UCC server and have a property that a manufacture of original contents can control the copyright.

RFID-based Medicine Logistics System for Quick Response in Hospital (병원내 신속 대응을 위한 RFID 기반의 의약품 물류 시스템)

  • Lee, Kang-Dae;Lee, Young-Ho;Kang, Un-Gu;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.10
    • /
    • pp.1-10
    • /
    • 2008
  • The traditional barcode based medicine logistics system have the problems such as loss, management error, online track, public information due to the hand-operated logistic process. Otherwise, quick response allows that the company observe the requests consistently and design medicine and establish manufacture schedule rapidly so that they could prohibit the product stocked. In this paper, we analyzed how to process medicine circulation logistics and information steps practically and proposed the RFID based medicine logistics system for the quick response in hospital. The proposed method provided the medical history tracing service, the traditional system connection, the efficiency logistic service, and the narcotic specified management service using the medicine logistics information from RFID tag. Accordingly, the satisfaction and the productivity will be improved the efficient medicine logistics by reducing the loss as well as the management error.

A Filtering Technique for Stable Marker Tracking in Mobile Augmented Reality (모바일 증강현실 환경에서 안정적인 마커 추적을 위한 필터링 기법)

  • Yoon, Chang-Pyo;Lee, In-Kyung;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.297-299
    • /
    • 2017
  • Recently, the application fields of augmented reality(AR) are rapidly increasing, and related contents are also increasing in demand. In this way, object-based marker recognition is required for service of AR contents in mobile environment. At this time, in order to provide information corresponding to the marker, a technique of generating and servicing a virtual object corresponding to a specific marker is used. However, when a virtual object corresponding to a marker is held on the AR screen, a phenomenon occurs that an object of the marker unstably shakes due to various reasons such as camera shake and camera movement. As described above, the AR service based on the mobile device has a problem that it is difficult to represent objects stably. In this paper, we propose a stable marker recognition and tracking technique by applying the filtering technique according to the physical state change of the device when recognizing fixed markers in mobile AR environment.

  • PDF

ubiTV Application: Harmonized Media Service for a Family (ubiTV Application: 가족을 위한 조화로운 미디어 서비스)

  • Shin, Choon-Sung;Oh, Yoo-Soo;Jung, Woon-Jin;Yoon, Hyo-Seok;Kim, Young-Mi;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.275-280
    • /
    • 2006
  • 본 논문은 스마트 홈에서 다수 사용자를 대상으로 조화로운 미디어 서비스를 제공하는 ubiTV 응용을 제안한다. ubiTV 응용은 사용자의 상황정보를 수집하고 인식하기 위해 정형화된 컨텍스트를 이용하는 ubi-UCAM2.0 을 기반으로 구현되었다. ubiTV 응용은 사용자의 상황정보를 수집하기 위해 위치추적 센서, 출입문센서, 소파센서 그리고 PDA 기반의 리모컨을 활용한다. 그리고 수집된 정보를 기반으로 사용자의 컨텍스트를 인식하고 맞춤형 서비스를 제공하는 방송, 영화, 음악, 영상 및 웹 등의 다양한 미디어 서비스로 구성된다. 이를 기반으로 ubiTV 응용은 사용자의 컨텍스트 및 미디어 콘텐츠 정보를 기반으로 개인화된 서비스를 제공하고 추천한다. 또한, 사용자 및 미디어 서비스 간의 협력을 통해 조화로운 서비스 및 콘텐츠 공유를 지원한다. 그리고 파노라믹 영상을 기반으로 한 직관적인 사용자 인터페이스와 서비스 디스커버리를 통해 사용자들이 미디어 서비스를 쉽고 편리하게 제어할 수 있도록 한다. 실험결과, 제안된 ubiTV 응용은 현재의 널리 사용중인 미디어 시스템과 달리 다수의 사용자들이 미디어 서비스를 함께 이용하고 관심 있는 멀티미디어를 서로간에 공유함을 알 수 있었다. 따라서, 제안하는 ubiTV 응용은 다수의 사용자들이 다양한 미디어 서비스를 조화롭게 이용하도록 함으로서 스마트 홈 환경에서 중요한 역할을 할 것으로 기대된다.

  • PDF

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.