• Title/Summary/Keyword: File modification

Search Result 75, Processing Time 0.026 seconds

File Modification Pattern Detection Mechanism Using File Similarity Information

  • Jung, Ho-Min;Ko, Yong-Woong
    • International journal of advanced smart convergence
    • /
    • v.1 no.1
    • /
    • pp.34-37
    • /
    • 2012
  • In a storage system, the performance of data deduplication can be increased if we consider the file modification pattern. For example, if a file is modified at the end of file region then fixed-length chunking algorithm superior to variable-length chunking. Therefore, it is important to predict in which location of a file is modified between files. In this paper, the essential idea is to exploit an efficient file pattern checking scheme that can be used for data deduplication system. The file modification pattern can be used for elaborating data deduplication system for selecting deduplication algorithm. Experiment result shows that the proposed system can predict file modification region with high probability.

A Proposal on Data Modification Detection System using SHA-256 in Digital Forensics (디지털 포렌식을 위한 SHA-256 활용 데이터 수정 감지시스템 제안)

  • Jang, Eun-Jin;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.9-13
    • /
    • 2021
  • With the development of communication technology, various forms of digital crime are increasing, and the need for digital forensics is increasing. Moreover, if a textual document containing sensitive data is deliberately deleted or modified by a particular person, it could be important data to prove its connection to a particular person and crime through a system that checks for data modification detection. This paper proposes a data modification detection system that can analyze the hash data, file size, file creation date, file modification date, file access date, etc. of SHA-256, one of the encryption techniques, focusing on text files, to compare whether the target text file is modified or not.

Analysis of File Time Change by File Manipulation of Linux System (리눅스 시스템에서의 파일 조작에 따른 시간변화 분석)

  • Yoo, Byeongyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.21-28
    • /
    • 2016
  • File Time information has a significant meaning in digital forensic investigation. File time information in Linux Ext4 (Extended File System 4) environment is the Access Time, Modification Time, Inode Change Time, Deletion Time and Creation Time. File time is variously changed by user manipulations such as creation, copy and edit. And, the study of file time change is necessary for evidence analysis. This study analyzes the change in time information of files or folders resulting from user manipulations in Linux operating system and analyzes ways to determine real time of malware infection and whether the file was modulation.

Modification Performance Comparison of SQLite3 Mobile Databases for File Systems (File System에 따른 SQLite3 모바일 데이터베이스의 갱신 성능 비교)

  • Choi, Jin-oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.508-509
    • /
    • 2019
  • 모바일 환경에서 데이터베이스 엔진 사용이 보편화되고 있으며 모바일에 적합한 데이터베이스 엔진 개발과 발표가 뒤따르고 있다. 모바일 데이터베이스는 대부분 플래시 메모리로 구성한 다양한 파일시스템에서 관리된다. 이 논문에서는 대표적인 모바일 데이터베이스인 SQLite3의 파일 시스템별 갱신 성능을 테스트한다. 그래서 각 파일 시스템별 특성을 파악하고 비교하기 위한 시스템을 구현하고 성능 실험을 실시한다. 실험 결과로부터 각 데이터베이스 갱신 패턴에 따른 파일 시스템별 장단점을 분석할 수 있다.

  • PDF

Study on Measuring Geometrical Modification of Document Image in Scanning Process (스캐닝 과정에서 발생하는 전자문서의 기하학적 변형감지에 관한 연구)

  • Oh, Dong-Yeol;Oh, Hae-Seok;Rhew, Sung-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1869-1876
    • /
    • 2009
  • Scanner which is a kind of optical devices is used to convert paper documents into document image files. The assessment of scanned document image is performed to check if there are any modification on document image files in scanning process. In assessment of scanned documents, user checks the degree of skew, noise, folded state and etc This paper proposed to how to measure geometrical modifications of document image in scanning process. In this study, we check the degree of modification in document image file by image processing and we compare the evaluation value which means the degree of modification in each items with OCR success ratio in a document image file. To analyse the correlation between OCR success ratio and the evaluation value which means the degree of modification in each items, we apply Pearson Correlation Coefficient and calculate weight value for each items to score total evaluation value of image modification degrees on a image file. The document image which has high rating score by proposed method also has high OCR success ratio.

The Method to Estimate Quality Degradation from Information Hiding in JPEG Compression Environment (JPEG 압축 환경의 정보은닉에서 영상 질 저하 예측방법)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Lee, Dal-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.551-555
    • /
    • 2008
  • In these days, compressed file is useful in internet environment and has many advantages. So a lot of data hiding algorithms works on JPEG compressed file. Of course they know basic rules of transformation and quantization and they utilize those rules to implement their programming. But most of them evaluate the affection of data hiding after data modification. We propose how to predict the affection of data modification in course of data hiding process. Through some kind of experiments, several valuable facts are revealed which used in data hiding in compressed domain such as JPEG. These facts will improve existing data hiding algorithms (F3, F4 and F5 which including Matrix Encoding)[1],[5],[6].

  • PDF

Study on Forensic Analysis with Access Control Modification for Registry (레지스트리 접근권한 변조에 관한 포렌식 분석 연구)

  • Kim, Hangi;Kim, Do-Won;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1131-1139
    • /
    • 2016
  • In the Hive file format, the sk(Security Key) cell provides access control to registry key. An attacker can figure out secret information on registry or change the security set-up if she could apply modified hive files on system. This paper presents various methods to change access control of registry key by modifying or replacing cell on hive file. We also discuss threats by access control modification and signs of attacks analysis by modified hive files.

Design and Implementation of Video File Structure Analysis Tool for Detecting Manipulated Video Contents

  • Choi, Yun-Seok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.128-135
    • /
    • 2018
  • The various video recording device, like car black box and cctv, are used currently and video contents are used as evidence of traffic accidents and scenes of crime. To verify integrity of video content, there are various study on manipulated video content analysis. Among these studies, a study based on analysis of video file structure and its variables needs a tool which can be used to analyze file structure and extract interested attributes. In this paper, we proposed design and implementation of an analyzing tool which visualizes video file structure and its attributes. The proposed tool use a model which reflects commonality of various video container format, so it is available to analyze video structure with regardless of the video file types. And the tool specifies interested file structure properties in XML and therefore we can change target properties easily without modification of the tool.

A Rapid Local Modification Algorithm for NURBS surface (NURBS 곡면의 고속 부분 수정 알고리듬 개발)

  • 김호찬;최홍태;김준안;이석희
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1402-1405
    • /
    • 2004
  • Algorithms on modification of NURBS surface requires modeling history to change its boundary conditions. The history is stored when the surface is modeled and saved in the corresponding model file. But when the model is transferred to other systems the history generally cannot be recognized. So modification algorithms without history is highly required. Previous works on the field is concentrated in the point based modification without any restriction condition. Therefore this study is intended to develope a curved based modification algorithm with restriction conditions. A rapid modification algorithm is suggested, implemented and tested.

  • PDF

An Individual Information Management Method on a Distributed Geographic Information System

  • Yutaka-Ohsawa;Kim, Kyongwol
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.105-110
    • /
    • 1998
  • This paper proposes a method to manage individual information on large scale distributed geographic information systems. On such system, ordinary users usually cannot alter the contents of the server. The method proposed in this paper makes possible to alter the contents or add individual data onto such kinds of non-write-permitted data onto set. We call the method as GDSF, ‘geographic differential script file’. In this method, a client user makes a GDSF which contains the private information to be added onto the served data. Then, the client keeps the file on a local disk. After this, when the user uses the data, he applies the differential data sequence onto the down loaded data to restore the information. The GDSF is a collection of picture commands which tell pictures insertions, deletions, and modification operations. The GDSF also can contain the modification. The GDSF also can contain the modification of the attribute information of geographic entities. The method also applicable to modify data on a ROM device, for example CD-ROM or DVD-ROM. This paper describes the method and experimental results.

  • PDF