• Title/Summary/Keyword: Authenticity verification

Search Result 31, Processing Time 0.024 seconds

Verification System Using NFT to Prevent Profile Impersonation Crime (프로필 사칭 범죄를 방지하기 위해 NFT를 이용한 검증 시스템)

  • Kim, Ho-Yoon;Lee, Won-Seok;Shin, Seung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.354-356
    • /
    • 2022
  • Profiles are the most basic means of representing who you are, and you represent yourself. In SNS and chatting apps that use profiles the most, profiles are used to express their experiences, moods, and thoughts. However, in voice phishing, impersonation crimes, etc., they steal and impersonate a photo such as a profile, and then deceive the victim into committing a crime. In this paper, to prevent the crime of impersonation, the authenticity of the original is determined using NFT that can distinguish the original. Minting the original profile picture with NFT, registering it on the blockchain network, and storing the original file in off-chain IPFS. This is expected to be effective in preventing impersonation crimes because it is possible to easily determine the authenticity of the profile picture.

  • PDF

Benford's Law and its Potential for Data Verification in Ecological Monitoring

  • Tae-Jun Choi;Woong-Bae Park;Dae-Hee Kim;Dohee Lee;Yuno Do
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.5 no.2
    • /
    • pp.43-49
    • /
    • 2024
  • Ecological monitoring provides indispensable data for biodiversity conservation and sustainable resource management. However, the complexity and variability inherent in ecological monitoring data necessitate robust verification processes to ensure data integrity. This study employed Benford's Law, a statistical principle traditionally used in fields such as finance and health sciences, to evaluate the authenticity of ecological monitoring data related to the abundance of migratory bird species across various locations in South Korea. Benford's Law anticipates a specific logarithmic distribution of leading digits in naturally occurring numerical datasets. Our investigation involved two stages of analysis: a first-order analysis considering the leading digit and a second-order analysis examining the first two digits of bird population counts. While the first-order analysis displayed moderate conformity to Benford's Law that suggested overall data integrity, the second-order analysis revealed more pronounced deviations, indicating potential inconsistencies or inaccuracies in certain subsets of the data. Although our data did not perfectly align with Benford's Law, these deviations underscore the complex nature of ecological research, which is influenced by a multitude of environmental, methodological, and human factors.

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

Research of Verifying the Remote Test Answer Sheets Authentication (원격시험 컴퓨터활용 답안지 진본성 검증에 관한 연구)

  • Park, Kee-Hong;Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.135-141
    • /
    • 2012
  • Development of the Internet has brought many changes in methods of education and assesment. When enforcing the on-line distance education, the tests to check the outcomes of the learning are taken on the Internet. The current trends of education evaluation are focused on the types of questions and the detachments of exam proctor but verifying the authentication of answer sheet. There are several forms to make answers; selection type, short-answer type, write-out answer type, practical exercise type, etc. All the forms can be done on the Internet except the practical exercise type because the source of the examinee's answer sheet is unreliable. In this paper, we made the verification system to solve the doubt by setting the proved information on the answer sheet. Putting the information down to confirm the authenticity during the exam on the server is distinct character of this system. After the test finished, the system will operate when examinee turn in the answer sheet.

Video Integrity Checking Scheme by Using Merkle Tree (머클트리를 활용한 영상무결성 검사 기법 )

  • Yun-Hee Kang;Eun-Young CHANG;Taeun Kwonk
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.

Investigation of Etymology of a Word 'Chal(刹)' from Temple and Verification of Fallacy, Circulated in the Buddhist Community (사찰 '찰(刹)'의 어원 규명과 불교계 통용 오류 검증)

  • Lee, Hee-Bong
    • Journal of architectural history
    • /
    • v.32 no.1
    • /
    • pp.47-60
    • /
    • 2023
  • Due to a mistranslation of Sanskrit to Chinese, East Asian Buddhist community misunderstands the original meaning of the fundamental word, 'sachal(寺刹)'. Sanskrit chattra, a parasol on top of a venerated Indian stupa buried with Buddha's sarira, became the symbol of majesty. The Indian stupa was transformed into a pagoda in China, and the highlighted parasol on the summit was transliterated into chaldara(刹多羅), an abbreviation for chal (刹), and finally designated the whole pagoda(塔). Sachal consists with lying low monastery and high-rise pagoda. Tapsa(塔寺), an archaic word of temple, is exactly the same as sachal, because chal means tap, pagoda. However, during the 7th century a Buddhist monk erroneously double-transliterated the Sanskrit 'kshetra,' meaning of land, into the same word as chal, even despite phonetic disaccord. Thereafter, sutra translators followed and copied the error for long centuries. It was the Japanese pioneer scholars that worsen the situation 100 years ago, to publish Sanskrit dictionaries with the errors insisting on phonetic transliteration, though pronunciation of 'kshe-' which is quite different from 'cha-.' Thereafter, upcoming scholars followed their fallacy without any verification. Fallacy of chal, meaning of land, dominates Buddhist community broadly, falling into conviction of collective fixed dogma in East Asia up to now. In the Buddhist community, it is the most important matter to recognize that the same language has become to refer completely different objects due to translation errors. As a research method, searching for corresponding Sanskrit words in translated sutras and dictionaries of Buddhism is predominant. Then, after analyzing the authenticity, the fallacy toward the truth will be corrected.

Enhancing the Reliability of OTT Viewing Data in the Golden Age of Streaming: A Small Sample AHP Analysis and In-Depth Interview

  • Seung-Chul Yoo;Yoontaek Sung;Hye-Min Byeon;Yoonmo Sang;Diana Piscarac
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.140-148
    • /
    • 2023
  • With the OTT media market growing rapidly, the significance of trustworthy data verification and certification cannot be emphasized enough. This study delves into the crucial need for such measures in South Korea, exploring the steps involved, the technological and policy-related considerations, and the challenges that may arise once these measures are put into place. Drawing on in-depth interviews and the analytical hierarchy process (AHP), this study surveyed various stakeholder groups, both directly and indirectly related to OTT data authentication and certification. By assessing the severity of OTT data-related issues and identifying the requirements for reliability-improvement policies, participants shared their valuable insights and opinions on this pressing matter. The survey results clearly indicate a divided opinion among stakeholders and industry experts on the reliability of OTT data, with some expressing trust while others remain skeptical. However, there was a consensus that advertising-based AVOD is more reliable than SVOD. By analyzing the priorities of authentication and verification, this study paves the way for the establishment and operation of a Korean MRC (KMRC), centered on the OTT media industry. The KMRC will serve as a vital platform for ensuring the authenticity and accuracy of OTT data in South Korea, providing businesses and industry players with a reliable source of information for informed decision-making. This study highlights the pressing need for reliable data authentication and certification in the rapidly growing OTT media market, and provides a persuasive case for the establishment of a KMRC in South Korea to meet this critical need.

Review of Functional Volatile Component in Essential Oil of Medicinal and Aromatic Plants (자원식물의 기능성 정유성분 이용 고찰)

  • 정해곤;방진기;성낙술;김성민
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.48
    • /
    • pp.41-48
    • /
    • 2003
  • The number of natural products obtained from plants has now reached over 100,000 and new chemical compounds are being discovered ever year. Medicinal and Aromatic plants and their extracts have been used for centuries to relieve pain, aid healing, kill bacteria and insects are important as the antifungal and anti-herbivore agents with further compounds being involved in the symbiotic associations. Although their functions in plants have not been fully established, it is Known that some substances have growth regulatory properties while others are involved in pollination and seed dispersal. The complex nature of these chemicals are usually produced in various types of secretory structures which is an important character of a plant family and also influenced and controlled by genetic and ecological factors. Detailed anatomical description of these structures ave relevant to the market value of the plants, the verification of authenticity of a given species and for the detection of substitution or adulteration. Volatile oils are used for their therapeutic action for flavoring of lemon, in perfumery of rose or as starting materials for the synthesis of other compounds of turpentine. For therapeutic purposes they are administered as inhalations of eucalyptus oil, peppermint oil, as gargles and mouthwashes of thymol and transdermally many essential oils including those of lavender, etc. With these current trend for using volatile components in essential oil will be increasing in the future in Korea and in the world as well.

Differences in Product Characteristics in terms of the Impact of Brand Origin on Brand Performance (브랜드원산지의 브랜드성과에 대한 영향에 있어 제품특성에 따른 차이)

  • Kim, Moon-Tae
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.113-126
    • /
    • 2020
  • This study suggested implications by dividing the concept of brand origin into national image and manufacturing capacity image, verifying the direct impact of these variables on brand trust and brand loyalty, and verifying the difference between products with the effect on brand trust of brand origin, which is the result of verification. The specific implications of this paper are as follows. First, brand origin does not directly affect brand loyalty, but it can have a direct impact on the preceding variable, brand loyalty. This study may conclude that it is desirable to define the factors that affect the purchase selection indirectly through the assessment of product properties or positive effects on brand image rather than having a direct impact on product purchase or selection. Second, the difference in brand origin influence by product characteristics was very evident. Past studies were limited to a few products, so pan-product testing was not conducted, and the empirical power was judged to be limited, so this study included a variety of products and tried to detect differences between products through actual empirical research. Involvement and self-congruity have been presented with results that can be judged as important variables for brand origin to affect brand performance and variables. Looking at the role of the brand origin for each product characteristic by distinguishing between product characteristics and whether or not products related to quality, history, authenticity, etc., the product recognized as high quality and the product recognized as having high integrity showed higher effect of the brand origin, but history was a product characteristic that did not show the effect of the brand origin.

The Influence of Social Media Trust through Perceived Risk and Self-efficacy on Brand Trust (소셜미디어 신뢰가 지각된 위험과 자아효능감을 통한 브랜드 신뢰에 미치는 영향에 관한 연구)

  • Na, Kyung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.58-69
    • /
    • 2022
  • The purpose of this study is to find a way that companies can use social media trust effectively to increase brand trust and intelligently increase it by linking with brand authenticity. Therefore, the purpose of this study is as follows. First, a conceptual definition of the research variables of trust in social media, trust in information sources, and trust in messages is established, Second, the casual relationship between two conceptually defined independent variables and mediator variables of perceived risk and self-efficacy was verified. Third, the casual relationship was verified on whether it affects brand authenticity and brand trust through perceived risk and self-efficacy, which are mediators of social media trust. Fourth, through the verification result of the casual relationship between the research variables constituting the research model of this study, it was intended to present academic and practical implications on how social media trust can effectively enhance brand trust.