• Title/Summary/Keyword: Format Detection

Search Result 167, Processing Time 0.027 seconds

Development of Digital Watermark Inserting and Detecting System for MPEG-2 Codec (MPEG-2 Codec에 대한 디지털 워터마크 삽입 및 검출 시스템 개발)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.4
    • /
    • pp.390-394
    • /
    • 2010
  • This paper describes a study on developing an insert and detect system of digital watermark to the MPEG-2 coder and decoder. Digital watermark inserting system substitutes a coefficient among the DCT coefficients for new one. This replacement performs in MPEG-2 PS format. Watermark detecting system analyzes the input data stream of MPEG-2 and detect the probability of occurrence of a specific code or watermarking code. Our inserting system had very high invisibility and the PSNR of the results was 130 dB around. And our detection rate of watermark was over 99% in digital format and over 85% in analog captured format according to the quality of contents.

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

Object Detection Using Combined Random Fern for RGB-D Image Format (RGB-D 영상 포맷을 위한 결합형 무작위 Fern을 이용한 객체 검출)

  • Lim, Seung-Ouk;Kim, Yu-Seon;Lee, Si-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.451-459
    • /
    • 2016
  • While an object detection algorithm plays a key role in many computer vision applications, it requires extensive computation to show robustness under varying lightning and geometrical distortions. Recently, some approaches formulate the problem in a classification framework and show improved performances in object recognition. Among them, random fern algorithm drew a lot of attention because of its simple structure and high recognition rates. However, it reveals performance degradation under the illumination changes and noise addition, since it computes patch features based only on pixel intensities. In this paper, we propose a new structure of combined random fern which incorporates depth information into the conventional random fern reflecting 3D structure of the patch. In addition, a new structure of object tracker which exploits the combined random fern is also introduced. Experiments show that the proposed method provides superior performance of object detection under illumination change and noisy condition compared to the conventional methods.

Information Hiding and Detection in MS Office 2007 file (Microsoft Office 2007 파일에의 정보 은닉 및 탐지 방법)

  • Park, Bo-Ra;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.143-154
    • /
    • 2008
  • Information hiding is a very important technology recently. Having this technology can be a competitive power for secure communication. In this paper, it will be showed that hiding data in MS Office 2007 file is possible. Considering Microsoft (MS) Office 2007 file format is based on Open XML format, the feature of Open XML format makes it possible to hide data in MS Office 2007 file. In Open XML format, unknown XML files and their relationships can be defined by user. These parts and relationships are used to hide data in MS Office 2007 file. Considering unknown parts and unknown relationships are not in normal MS Office 2007 file, the hidden data can be detected by confirming of unknown parts and unknown relationships.

Automatic Generation of Explanatory 2D Vector Drawing from 3D CAD Data for Technical Documents (기술문서 작성을 위한 3 차원 CAD 데이터의 도해저작 알고리즘)

  • Shim H.S.;Yang S.W.;Choi Y.;Cho S.W.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.177-180
    • /
    • 2005
  • Three dimensional shaded images are standard visualization method for CAD models on the computer screen. Therefore, much of the effort in the visualization of CAD models has been focused on how conveniently and realistically CAD models can be displayed on the screen. However, shaded 3D CAD data images captured from the screen may not be suitable for some application areas. Technical document, either in the paper or electronic form, can more clearly describe the shape and annotate parts of the model by using projected 2D line drawing format viewed from a user defined view direction. This paper describes an efficient method for generating such a 2D line drawing data in the vector format. The algorithm is composed of silhouette line detection, hidden line removal and cleaning processes.

  • PDF

Fault Locator using GPS Time-synchronized Phasor for Transmission Line (송전선로의 동기페이저를 이용한 고장점 표정장치)

  • Lee, Kyung-Min;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.47-52
    • /
    • 2016
  • Fault location identification in the transmission line is an essential part of quick service restoration for maintaining a stable in power system. The application of digital schemes to protection IEDs has led to the development of digital fault locators. Normally, the impedance measurement had been used to for the location detection of transmission line faults. It is well known that the most accurate fault location scheme uses two-ended measurements. This paper deals with the complete design of a fault locator using GPS time-synchronized phasor for transmission line fault detection. The fault location algorithm uses the transmitted relaying signals from the two-ended terminal. The fault locator hardware consists of a Main Processor Unit, Analog Digital Processor Unit, Signal Interface Unit, and Power module. In this paper, sample real-time test cases using COMTRADE format of Omicron apparatus are included. We can see that the implemented fault locator identified all the test faults.

An effective detection method for hiding data in compound-document files (복합문서 파일에 은닉된 데이터 탐지 기법에 대한 연구)

  • Kim, EunKwang;Jeon, SangJun;Han, JaeHyeok;Lee, MinWook;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1485-1494
    • /
    • 2015
  • Traditionally, data hiding has been done mainly in such a way that insert the data into the large-capacity multimedia files. However, the document files of the previous versions of Microsoft Office 2003 have been used as cover files as their structure are so similar to a File System that it is easy to hide data in them. If you open a compound-document file which has a secret message hidden in it with MS Office application, it is hard for users who don't know whether a secret message is hidden in the compound-document file to detect the secret message. This paper presents an analysis of Compound-File Binary Format features exploited in order to hide data and algorithms to detect the data hidden with these exploits. Studying methods used to hide data in unused area, unallocated area, reserved area and inserted streams led us to develop an algorithm to aid in the detection and examination of hidden data.

A Dipstick-Type Enzyme-Linked Immunosorbent Assay for the Detection of the Insecticide Fenitrothion in Food Samples

  • Cho, Young-Ae;Shim, Jee-Youn;Lee, Yong-Tae;Lee, Hye-Sung
    • Food Science and Biotechnology
    • /
    • v.15 no.6
    • /
    • pp.990-992
    • /
    • 2006
  • In a previous study, we obtained polyclonal antibodies against the organophosphorus insecticide fenitrothion and developed an enzyme-linked immunosorbent assay (ELISA) for this pesticide. Using these antibodies and an enzyme tracer, a direct competitive ELISA method specific for fenitrothion using a dipstick format was developed. Dipstick ELISA using antibodies to fenitrothion immobilized on an Immunodyne membrane allowed the quick visual detection of fenitrothion at concentrations above $10\;{\mu}g/L$. The $IC_{50}$ value of dipstick ELISA using reflectance detection was $27\;{\mu}g/L$ with a detection limit of $2\;{\mu}g/L$. The recovery of fenitrothion from spiked lettuce and rice samples using the dipstick ELISA ranged from 87-107%.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.