• Title/Summary/Keyword: 허위통신

Search Result 47, Processing Time 0.024 seconds

Screen Capture Authentication System for Web Postings to Used as Digital Evidence (디지털 증거 활용을 위한 웹 게시물 화면캡쳐 인증 시스템)

  • Kang, Ju Young;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • In modern society, everyone can easily access the Internet and freely express their opinions or ideas on Web bulletin boards or SNS. At the same time, they are often used as a place of slandering and the spreading of false information about celebrities such as entertainers and politicians. Typically people use the screen capture method to submit web posts as evidence in lawsuits. But it is difficult to get these accepted as evidence in court because screen captured images are easily forged and tempered. Therefore, as described above, using "Proxy Browser", we propose a screen capture authentication system for web posts that protects forging and tempering to use as digital evidence in court.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

Implementation for Automatic Inspection System on Ventilating Electronic Device Based on Reliability Improvement (신뢰성 향상 기반의 송풍전자장치 자동검사 시스템 구현)

  • Do, Nam Soo;Ryu, Kwang Ryol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1155-1160
    • /
    • 2017
  • This paper describes a system implementation for the automatic inspection on the ventilating electronic device based on the reliability improvement. To be enhancement, the inspection error is minimized by the automatic inspection system on the ventilating apparatuses against the manual inspecting system. The system consists of the control system, software structure and monitoring system to be scanning the inspection processing. The inspection system for reliability improvement is evaluated in Gage Repeatability and Reproducibility. The experimental results are improved about 2 times inspecting speed, measured error ${\pm}0.02V$, effectiveness of discriminating performance 15%, missing probability 17% and false alarm probability 12% respectively in comparing with the manual inspection based on the wind pressure sensor. The system will be also improved more by making database and product bar codes for the total quality control system to the effective reliability enhancement in the future.

Influences Analysis of SAS Azimuth Resolution on the UUV Trajectory Disturbances (수중 무인정 궤적 교란에 따른 SAS 방위해상도 영향에 대한 분석)

  • Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.222-229
    • /
    • 2016
  • Active synthetic aperture sonar on the small UUV is generated several trajectory disturbances under the influences of underwater environments, and causing a large error in the synthetic aperture processing. In this paper, we analyzed the effects of azimuth resolution for the phase mismatch of the synthetic aperture focus processing when the periodic or random trajectory disturbances was generated on the side direction. The simulation results show that ghost targets are generated and azimuth resolution is very deteriorated when disturbance amplitude is greater than $0.3{\lambda}$ and disturbance period is greater than $2L_{sa}$ in the periodic trajectory disturbances environments. And detection performance on the seabed small objects by the synthetic aperture processing is shown that there is a significant effects on the azimuth resolution depending on the types and conditions of the platform trajectory disturbance variations.

Automatic Defect Detection using Fuzzy Binarization and Brightness Contrast Stretching from Ceramic Images for Non-Destructive Testing (비파괴 검사를 위한 개선된 퍼지 이진화와 명암 대비 스트레칭을 이용한 세라믹 영상에서의 결함 영역 자동 검출)

  • Kim, Kwang Baek;Song, Doo Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2121-2127
    • /
    • 2017
  • In this paper, we propose a computer vision based automatic defect detection method from ceramic image for non-destructive testing. From region of interest of the image, we apply brightness enhancing stretching algorithm first. One of the strength of our method is that it is designed to detect defects of images obtained from various thicknesses, that is, 8, 10, 11, 16, and 22 mm. In other cases we apply histogram based binarization algorithm. However, for 8 mm case, it may have false positive cases due to weak brightness contrast between defect and noise. Thus, we apply modified fuzzy binarization algorithm for 8 mm case. From the experiment, we verify that the proposed method shows stronger result than our previous study that used Blob labelling for all five thickness cases as expected.

Autofocus Phase Compensation of Velocity Disturbed UUV by DPC Processing with Multiple-Receiver (다중 수신기 DPC 처리에 의한 속도 교란 수중 무인체의 자동초점 위상 보상)

  • Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1973-1980
    • /
    • 2017
  • In the case of a small UUV operating an active synthetic aperture sonar, various velocity disturbances may occur on the path due to the influence of external underwater environment, and this causes phase errors in coherent synthetic aperture processing, which has a large influence on the detected image. In this paper, when a periodic sinusoidal velocity disturbance is generated in the traveling direction, the phase generated by the round trip slope range at each position is estimated the cross correlation coefficient for multiple received signals and compensated the position variation in the overlapped DPC by the average value within the maximum allowable width. Through simulations, it has been confirmed that the images degraded by the velocity disturbance amplitude and fluctuating frequency of the UUV are removed from the false targets and the performance of azimuth resolution is improved by the proposed phase compensation method.

Automatic Classification of Advertising Restaurant Blogs Using Machine Learning Techniques (기계학습기법을 이용한 광고 외식 블로그의 자동분류)

  • Chang, Jae-Young;Lee, Byung-Jun;Cho, Se-Jin;Han, Da-Hye;Lee, Kyu-Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.55-62
    • /
    • 2016
  • Recently, users choosing a restaurant basedon information provided by blogs are increasing significantly. However, those of most blogs are unreliable since domestic restaurant blogs are occupied by advertising postings written by 'power bloggers'. Thus, in order to ensure the reliability of blogs, it is necessary to filter the advertising blogs which are sometimes false or exaggerated. In this paper, we propose the method of distinguishing the advertising blogs utilizing an automatic classification technique. In the proposed technique, we first manually collected advertising restaurant blogs, and then analyzed features which are commonly found in those blogs. Using the extracted features, we determined whether a given blog is advertising one applying automatic classification algorithms. Additionally, we select the features and the algorithm which guarantee optimal classification performance through comparative experiments.

Text Document Classification Scheme using TF-IDF and Naïve Bayes Classifier (TF-IDF와 Naïve Bayes 분류기를 활용한 문서 분류 기법)

  • Yoo, Jong-Yeol;Hyun, Sang-Hyun;Yang, Dong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.242-245
    • /
    • 2015
  • Recently due to large-scale data spread in digital economy, the era of big data is coming. Through big data, unstructured text data consisting of technical text document, confidential document, false information documents are experiencing serious problems in the runoff. To prevent this, the need of art to sort and process the document consisting of unstructured text data has increased. In this paper, we propose a novel text classification scheme which learns some data sets and correctly classifies unstructured text data into two different categories, True and False. For the performance evaluation, we implement our proposed scheme using $Na{\ddot{i}}ve$ Bayes document classifier and TF-IDF modules in Python library, and compare it with the existing document classifier.

  • PDF

A Study on the Improvement of the Lien System in Real Estate Auction - Focused on the Procedural Law - (부동산경매에서 유치권 제도 개선에 관한 연구 - 절차법을 중심으로 -)

  • Hwang, Hee-Sang;Park, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.757-763
    • /
    • 2011
  • This study was intended to identify the problem of the lien in relation to the real estate auction and present its improvements in terms of procedural laws. To resolve the problem of the lien in the real estate auction, it is valid that the Vollstreckungsgericht needs to set the certain standard in relation to the possession of real estate and notify it at the first date of sale by judging whether the lien can be established. And the institutional improvement is required to obligate one to report the lien in the procedures of the real estate auction and reinforce the survey of the present condition of the lien. And it is necessary to impose the more public confidence on the statement of sale by including the matter of the lien in it. In addition, it is necessary to reinforce legal punishment to the false and fictitious lienholder and establish the legal stability of the lien in the process of the real estate auction.

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.