• Title/Summary/Keyword: Code Dissemination

Search Result 25, Processing Time 0.02 seconds

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Coast Evaluation Techniques for Mode Selection in Video Coding (동영상에서 모드 선택을 위한 코스트 평가 방법)

  • Song, Dae-Geon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.275-280
    • /
    • 2013
  • Recently, access networking BroadBand the high performance of the video equipment to the Internet via voice, video, multimedia services, such as dealing with the media information dissemination is becoming increasingly attracting attention. More video devices and network environments in the future to keep pace with the high-quality video using the form dealing with an increasingly diversified and shall utilization is expected. Among them, video encoding technology, image compression encoding technology of information technology is one of the central role. Video coding technology that requires a vast amount of information contained in the video signal and the appropriate amount of information to eliminate redundancy as the efficiency of the digital code representing video signal is developed as a technology is going. Therefore, this study applied to video coding mode selection in the cost evaluation methods to examine and to maximize the coding efficiency and the proposed method compared to the conventional method was confirmed excellence.

A Study on the Image Communication of Military Style in 20th Century (20세기 밀리터리 스타일의 이미지 커뮤니케이션에 대한 연구)

  • Cho, Jung-Mee;Yoo, Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.8
    • /
    • pp.1309-1321
    • /
    • 2008
  • Military style is not limited to a single period but represents various image communications related to items, synthetic images and different periodical culture backgrounds. The purpose of this study is to define the communicational function of the military style beginning from the 1st world war up to the modern days, and furthermore explain the characteristics and contents of military styles in different periods by studying the nowadays various symbols of the military style in denotative and connotative aspects. The research method is documentary studies through the literature and academic paper, and examined masters' and doctors' thesis, domestic and overseas books and fashion magazines, photographs and materials collected from the internet. As a result, first, the military style is a significant fashion code in understanding modern fashion by serving as a strong communication function representing people’s ritual through various image items called the 'military look'. Second, the meaning of the image communication through military look changed throughout the different periods. During the 1st and 2nd World war the military look supported Fascism by serving as a media representing extreme patriotism and at the same time social images like functionalism, women liberation, regulation and saving. During the cold war period it was used by young progressives like hippies and punks to send an opposing message towards war and commercialism. Since then up to the 80s it was a medium representing the ‘new role of women’, who possess same social rights and power as the men. However in the 90s the military style had to go through a paradigm transition period. Since this period it got affected by the post modernism and designers, consumers alike adopted military style to create unique beauty It can also be said that it began to be used as a pure fashion code representing intertextuality. It was rather expressed as a metonymy than a metaphor and combined with elegance and feminine factor, which contrasts to the original military concept, it now represents totally new hybrids such as difference, dissemination and varieties.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

A Development of Facility Web Program for Small and Medium-Sized PSM Workplaces (중·소규모 공정안전관리 사업장의 웹 전산시스템 개발)

  • Kim, Young Suk;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.334-346
    • /
    • 2022
  • There is a lack of knowledge and information on the understanding and application of the Process Safety Management (PSM) system, recognized as a major cause of industrial accidents in small-and medium-sized workplaces. Hence, it is necessary to prepare a protocol to secure the practical and continuous levels of implementation for PSM and eliminate human errors through tracking management. However, insufficient research has been conducted on this. Therefore, this study investigated and analyzed the various violations in the administrative measures, based on the regulations announced by the Ministry of Employment and Labor, in approximately 200 small-and medium-sized PSM workplaces with fewer than 300 employees across in korea. This study intended to contribute to the prevention of major industrial accidents by developing a facility maintenance web program that removed human errors in small-and medium-sized workplaces. The major results are summarized as follows. First, It accessed the web via a QR code on a smart device to check the equipment's specification search function, cause of failure, and photos for the convenience of accessing the program, which made it possible to make requests for the it inspection and maintenance in real time. Second, it linked the identification of the targets to be changed, risk assessment, worker training, and pre-operation inspection with the program, which allowed the administrator to track all the procedures from start to finish. Third, it made it possible to predict the life of the equipment and verify its reliability based on the data accumulated through the registration of the pictures for improvements, repairs, time required, cost, etc. after the work was completed. It is suggested that these research results will be helpful in the practical and systematic operation of small-and medium-sized PSM workplaces. In addition, it can be utilized in a useful manner for the development and dissemination of a facility maintenance web program when establishing future smart factories in small-and medium-sized PSM workplaces under the direction of the government.