• Title/Summary/Keyword: Index Files

Search Result 55, Processing Time 0.022 seconds

A Method of Data Hiding in a File System by Modifying Directory Information

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.85-93
    • /
    • 2018
  • In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.

A Digital Forensic Analysis for Directory in Windows File System (Windows 파일시스템의 디렉토리에 대한 디지털 포렌식 분석)

  • Cho, Gyusang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.73-90
    • /
    • 2015
  • When we apply file commands on files in a directory, the directory as well as the file suffer changes in timestamps of MFT entry. Based on understanding of these changes, this work provides a digital forensic analysis on the timestamp changes of the directory influenced by execution of file commands. NTFS utilizes B-tree indexing structure for managing efficient storage of a huge number of files and fast lookups, which changes an index tree of the directory index when files are operated by commands. From a digital forensic point of view, we try to understand behaviors of the B-tree indexes and are looking for traces of files to collect information. But it is not easy to analyze the directory index entry when the file commands are executed. And researches on a digital forensic about NTFS directory and B-tree indexing are comparatively rare. Focusing on the fact, we present, in this paper, directory timestamp changes after executing file commands including a creation, a copy, a deletion etc are analyzed and a method for finding forensic evidences of a deletion of directory containing files. With some cases, i.e. examples of file copy and file deletion command, analyses on the problem of timestamp changes of the directory are given and the problem of finding evidences of a deletion of directory containging files are shown.

Dynamic Management of Equi-Join Results for Multi-Keyword Searches (다중 키워드 검색에 적합한 동등조인 연산 결과의 동적 관리 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.17A no.5
    • /
    • pp.229-236
    • /
    • 2010
  • With an increasing number of documents in the Internet or enterprises, it becomes crucial to efficiently support users' queries on those documents. In that situation, the full-text search technique is accepted in general, because it can answer uncontrolled ad-hoc queries by automatically indexing all the keywords found in the documents. The size of index files made for full-text searches grows with the increasing number of indexed documents, and thus the disk cost may be too large to process multi-keyword queries against those enlarged index files. To solve the problem, we propose both of the index file structure and its management scheme suitable to the processing of multi-keyword queries against a large volume of index files. For this, we adopt the structure of inverted-files, which are widely used in the multi-keyword searches, as a basic index structure and modify it to a hierarchical structure for join operations and ranking operations performed during the query processing. In order to save disk costs based on that index structure, we dynamically store in the main memory the results of join operations between two keywords, if they are highly expected to be entered in users' queries. We also do performance comparisons using a cost model of the disk to show the performance advantage of the proposed scheme.

Musician Search in Time-Series Pattern Index Files using Features of Audio (오디오 특징계수를 이용한 시계열 패턴 인덱스 화일의 뮤지션 검색 기법)

  • Kim, Young-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.69-74
    • /
    • 2006
  • The recent development of multimedia content-based retrieval technologies brings great attention of musician retrieval using features of a digital audio data among music information retrieval technologies. But the indexing techniques for music databases have not been studied completely. In this paper, we present a musician retrieval technique for audio features using the space split methods in the time-series pattern index file. We use features of audio to retrieve the musician and a time-series pattern index file to search the candidate musicians. Experimental results show that the time-series pattern index file using the rotational split method is efficient for musician retrievals in the time-series pattern files.

  • PDF

Artificial Neural Network System in Evaluating Cervical Lymph Node Metastasis of Squamous Cell Carcinoma (편평세포암종 임파절 전이에 대한 인공 신경망 시스템의 진단능 평가)

  • Park Sang-Wook;Heo Min-Suk;Lee Sam-Sun;Choi Soon-Chul;Park Tae-Won;You Dong-Soo
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.29 no.1
    • /
    • pp.149-159
    • /
    • 1999
  • Purpose: The purpose of this study was to evaluate cervical lymph node metastasis of oral squamous cell carcinoma patients by MRI film and neural network system. Materials and Methods: The oral squamous cell carcinoma patients(21 patients. 59 lymph nodes) who have visited SNU hospital and been taken by MRI. were included in this study. Neck dissection operations were done and all of the cervical lymph nodes were confirmed with biopsy. In MR images. each lymph node were evaluated by using 6 MR imaging criteria(size. roundness. heterogeneity. rim enhancement. central necrosis, grouping) respectively. Positive predictive value. negative predictive value. and accuracy of each MR imaging criteria were calculated. At neural network system. the layers of neural network system consisted of 10 input layer units. 10 hidden layer units and 1 output layer unit. 6 MR imaging criteria previously described and 4 MR imaging criteria (site I-node level II and submandibular area. site II-other node level. shape I-oval. shape II-bean) were included for input layer units. The training files were made of 39 lymph nodes(24 metastatic lymph nodes. 10 non-metastatic lymph nodes) and the testing files were made of other 20 lymph nodes(10 metastatic lymph nodes. 10 non-metastatic lymph nodes). The neural network system was trained with training files and the output level (metastatic index) of testing files were acquired. Diagnosis was decided according to 4 different standard metastatic index-68. 78. 88. 98 respectively and positive predictive values. negative predictive values and accuracy of each standard metastatic index were calculated. Results: In the diagnosis of using single MR imaging criteria. the rim enhancement criteria had highest positive predictive value (0.95) and the size criteria had highest negative predictive value (0.77). In the diagnosis of using single MR imaging criteria. the highest accurate criteria was heterogeneity (accuracy: 0.81) and the lowest one was central necrosis (accuracy: 0.59). In the diagnosis of using neural network systems. the highest accurate standard metastatic index was 78. and that time. the accuracy was 0.90. Neural network system was more accurate than any other single MR imaging criteria in evaluating cervical lymph node metastasis. Conclusion: Neural network system has been shown to be more useful than any other single MR imaging criteria. In future. Neural network system will be powerful aiding tool in evaluating cervical node metastasis.

  • PDF

A Analysis on the Effect of the Controller Design due to Performance Index (평가지표에 따른 제어기 설계 영향 분석)

  • Yoo, Hang-Youal;Lee, Jung-Kuk;Lee, Keum-Won;Lee, Jun-Mo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.05a
    • /
    • pp.90-94
    • /
    • 2004
  • Among various modern control theories, PID control has been well used for several decades. PID algorithms needs son tuning methods are used for selecting PID parameters. But in some cases various kinds of performance indices are used instead of well-known tuning rules, and so variable type of performance index must be tested so that controllers, output characteristics and disturbance rejection property meets some specifications. In this paper, linear conbinational type of performance using error signal, time, control input and robustness is used to the PID control of air conditioning system. By the 2 DOF PID parmeters minimizing perfromacne index, controllers, output characteristics and robustness properties are analyzed. Simulations are done with MATLAB m file and mdl files.

  • PDF

Data Hiding for HTML Files Using Character Coding Table and Index Coding Table

  • Chou, Yung-Chen;Hsu, Ping-Kun;Lin, Iuon-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2913-2927
    • /
    • 2013
  • A data hiding scheme in HTML files is presented in this paper. Web pages are a very popular medium for broadcasting information and knowledge nowadays, and web pages are a good way to achieve the goal of secret message delivery because the different HTML coding codes will render the same screen in any of the popular browsers. The proposed method utilizes the HTML special space codes and sentence segmentation to conceal secret messages into a HTML file. The experimental results show that the stego HTML file generated by the proposed method is imperceptible. Also, the proposed method can conceal one more secret bit in every between-word location.

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks (DHT 기반의 P2P 네트워크에서 사용자 행동양식 및 파일 오염에 관한 측정 연구)

  • Shin, Kyu-Yong;Yoo, Jin-Cheol;Lee, Jong-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.131-140
    • /
    • 2011
  • File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.

A Tuning Method for I-PD Controller Using Performance Index (평가함수를 이용한 I-PD콘트롤러의 튜닝)

  • 유항열;이정국;이금원;이준모
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.169-172
    • /
    • 2003
  • PID control has been well used for several decade. For PID algorithm, some tuning methods are used and with these parameters, control system is designed. But in some cases various kinds of performance are needed, so variable type of performance index must be utilized so that the designed control system meets the conditions. This paper presents some linear combinational type of performance index and with numerical methods, the PID parameters are obtained. Moreover I-PD type controller is used so that this two degree of freedom controller may give more desirable output characteristics. Simulations are done with MATLAB m file and mdl files.

  • PDF

A Problem Solving Method for Non-Admittable Characters of a Windows File Name in a Directory Index Anti-Forensic Technique (디렉토리 인덱스 안티포렌식 기법에서 Windows 파일명에 사용할 수 없는 문자 문제의 해결방법)

  • Cho, Gyusang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.69-79
    • /
    • 2015
  • This research proposes a modified data hiding method to hide data in a slack space of an NTFS index record. The existing data hiding method is for anti-forensics, which uses traces of file names of an index entry in an index record when files are deleted in a direcotry. The proposed method in this paper modifies the existing method to make non-admittable ASCII characters for a file name applicable. By improving the existing method, problems of a file creation error due to non-admittable characters are remedied; including the non-admittable 9 characters (i. e. slash /, colon :, greater than >, less than <, question mark ?, back slash ${\backslash}$, vertical bar |, semi-colon ;, esterisk * ), reserved file names(i. e. CON, PRN, AUX, NUL, COM1~COM9, LPT1~LPT9) and two non-admittable characters for an ending character of the file name(i. e. space and dot). Two results of the two message with non-admittable ASCII characters by keyboard inputs show the applicability of the proposed method.