• Title/Summary/Keyword: Image Signature

Search Result 143, Processing Time 0.029 seconds

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

Object Detection using Multiple Color Normalization and Moving Color Information (다중색상정규화와 움직임 색상정보를 이용한 물체검출)

  • Kim, Sang-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.721-728
    • /
    • 2005
  • This paper suggests effective object detection system for moving objects with specified color and motion information. The proposed detection system includes the object extraction and definition process which uses MCN(Multiple Color Normalization) and MCWUPC(Moving Color Weighted Unmatched Pixel Count) computation to decide the existence of moving object and object segmentation technique using signature information is used to exactly extract the objects with high probability. Finally, real time detection system is implemented to verify the effectiveness of the technique and experiments show that the success rate of object tracking is more than $89\%$ of total 120 image frames.

Monitoring of Graveyards in Mountainous Areas with Simulated KOMPSAT-2 imagery

  • Chang, Eun-Mi;Kim, Min-Ho;Lee, Byung-Whan;Heo, Min
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1409-1411
    • /
    • 2003
  • The application of simulated KOMPSAT-2 imagery to monitor graveyards is to be developed. Positions calculated from image were compared with those obtained from Geographic Positioning System. With 24 checkpoints, the position of graveyards showed within 5-meter range. Unsupervised classification, supervised classification, and objected-orientation classification algorithms were used to extract the graveyard. Unsupervised classification with masking processes based on National topographic data gives the best result. The graveyards were categorized with four types in field studies while the two types of graveyards were shown in descriptive statistics. Cluster Analysis and discriminant analysis showed the consistency with two types of tombs. It was hard to get a specific spectral signature of graveyards, as they are covered with grasses at different levels and shaded from the surrounding trees. The slopes and aspects of location of graveyards did not make any difference in the spectral signatures. This study gives the basic spectral characteristics for further development of objected-oriented classification algorithms and plausibility of KOMPSAT-2 images for management of mountainous areas in the aspect of position accuracy and classification accuracy.

  • PDF

Rice Crop Monitoring Using RADARSAT

  • Suchaichit, Waraporn
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.37-37
    • /
    • 2003
  • Rice is one of the most important crop in the world and is a major export of Thailand. Optical sensors are not useful for rice monitoring, because most cultivated areas are often obscured by cloud during the growing period, especially in South East Asia. Spaceborne Synthetic Aperture Radar (SAR) such as RADARSAT, can see through regardless of weather condition which make it possible to monitor rice growth and to retrieve rice acreage, using the unique temporal signature of rice fields. This paper presents the result of a study of examining the backscatter behavior of rice using multi-temporal RADARSAT dataset. Ground measurements of paddy parameters and water and soil condition were collected. The ground truth information was also used to identify mature rice crops, orchard, road, residence, and aquaculture ponds. Land use class distributions from the RADARSAT image were analyzed. Comparison of the mean DB of each land use class indicated significant differences. Schematic representation of temporal backscatter of rice crop were plotted. Based on the study carried out in Pathum Thani Province test site, the results showed variation of sigma naught from first tillering vegatative phase until ripenning phase. It is suggested that at least, three radar data acquisitions taken at 3 stages of rice growth circle namely; those are at the beginning of rice growth when the field is still covered with water, in the ear differentiation period, and at the beginning of the harvest season, are required for rice monitoring. This pilot project was an experimental one aiming at future operational rice monitoring and potential yield predicttion.

  • PDF

Experimental Study on the Three-Dimensional Topology of Hairpin Packet Structures in Turbulent Boundary Layers (난류경계층의 3차원 헤어핀 다발구조에 대한 실험적 연구)

  • Kwon, Seong-Hun;Yoon, Sang-Youl;Kim, Kyung-Chun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.7
    • /
    • pp.834-841
    • /
    • 2004
  • Experimental study on the three-dimensional topology of hairpin packet structures in turbulent boundary layers were carried out. Two different Reynolds number based on momentum thickness, Re$\sub$$\theta$/=514 and 934 were generated in a blowing type wind tunnel under the condition of zero pressure gradient. Simultaneous measurements of velocity fields at a wall-normal plane and wall-parallel plane by a plane PIV and a Stereo-PIV systems. The two Nd:Yag laser systems and three CCD cameras were synchronized to obtain instantaneous velocity fields at the same time. To avoid optical noise at the crossing line by the two laser light sheets, a new optical arrangement using polarization was applied. The obtained velocity fields show the existence of hairpin packet structure vividly and the idealized hairpin vortex signature is confirmed by experiment. Two counter-rotating vortex pair which reflects the cutting plane of hairpin legs are found both side of a strong streaky structure when the wall-normal plane cuts the hairpin head.

Detection Model based on Deeplearning through the Characteristics Image of Malware (악성코드의 특성 이미지화를 통한 딥러닝 기반의 탐지 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.137-142
    • /
    • 2021
  • Although the internet has gained many conveniences and benefits, it is causing economic and social damage to users due to intelligent malware. Most of the signature-based anti-virus programs are used to detect and defend this, but it is insufficient to prevent malware variants becoming more intelligent. Therefore, we proposes a model that detects and defends the intelligent malware that is pouring out in the paper. The proposed model learns by imaging the characteristics of malware based on deeplearning, and detects newly detected malware variants using the learned model. It was shown that the proposed model detects not only the existing malware but also most of the variants that transform the existing malware.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

A Pilot Study on Environmental Understanding and Estimation of the Nak-Dong River Basin Using Fuyo-1 OPS Data (Fuyo-1 OPS 자료를 이용한 낙동강 하류지역의 환경계측 시고)

  • Kim, Cheon
    • Korean Journal of Remote Sensing
    • /
    • v.12 no.2
    • /
    • pp.169-198
    • /
    • 1996
  • The objectives of this investigation are : 1. To analyze spectral signature and the associated vegetation index for geometric illumination conditions inf1uenced by low solar elevation and high slope orientations in mountainous forest. 2. To assess the accuracy of the spectral angle mapper classification for the a winter land cover in comparison with the maximum likelihood classification. 3. To produce the image of water quality and water properties that could be used to estimate the water pollution sources and the tide-included by turbid water in estuarine and coastal areas. These objectives are to characterize environmental and ecological monitoring applications of the Nak-Dong River Basin by using Fuyo-1 OPS VNIR data acquired on December 26, 1992. The results of this paper are as follows : 1. The spectral digital numbers and vegetation indexes (NDVI and TVI) of mountainous forest are higher on the slope facing the sun than on the slope hidden the sun under low sun elevation condition. 2. The spectral angle mapper algorithm produces a more accurate land cover classification of areas with steep slope, various aspects and low solar elevation than the maximum likelihood classifier. 3. The maximum likelihood classification images can be used for identifying the location and movement of both freshwater and salt water, regardless of geometric illumination conditions. 4. The color-coded density sliced image of selected water bodies by using the near-infrared band 3 can provide distribution of the water quality of the Lower Nak-Dong River. 5. The color-coded normalized difference vegetation index image of the selected mountain forest is suitable to classify winter vegetation cover types, i.e., forest canopy densities for slope orientations.

Steep plasma density gradient at middle latitudes observed by DMSP and TOPEX during the magnetic storm of 11-12 April 2001

  • Park, Sa-Rah;Kim, Khan-Hyuk;Kil, Hyo-Sub;Jee, Geon-Hwa;Lee, Dong-Hun;Goldstein, J.
    • Bulletin of the Korean Space Science Society
    • /
    • 2011.04a
    • /
    • pp.26.3-27
    • /
    • 2011
  • Formation of a steep plasma density gradient in the middle-latitude ionosphere during geomagnetic storms and the latitudinal migration of its location depending on the storm phase are suggested to be associated with the ionospheric signature of the plasmapause. We test this idea by using the satellite and ground observation data during the 11 April 2001 storm. The locations of the steep plasma density gradient identified by TOPEX/Poseidon (2001 LT) and DMSP (1800 and 2130 LT) satellites coincide with the ionospheric footprints of the plasmapause identified by the IMAGE satellite. This observation may support the dependence of the middle-latitude plasma density gradient location on the plasmapause motion, but does not explain why the steep density gradient whose morphology is largely different from the morphology of the middle-latitude ionization trough during quiet period is formed in association with the plasmapause. The ionospheric disturbances in the total electron content (TEC) maps shows that the steep TEC gradient is formed at the boundary of the positive ionospheric storm in low-middle latitudes and the negative ionospheric storm in middle-high latitudes. We interpret that the thermospheric neutral composition disturbance in the dayside is confined within the middle-high latitude ionospheric convection zone. The neutral composition latitudes and, therefore, the locations of the steep plasma density gradient coincide with the footprints of the plasmapause. The TEC maps show that the appearance of the steep plasma density gradient in the pre-midnight sector during the recovery phase is related to the co-rotation of the gradient that is created during the main phase.

  • PDF

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF