• Title/Summary/Keyword: LSH

Search Result 34, Processing Time 0.022 seconds

A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing (API 콜 시퀀스와 Locality Sensitive Hashing을 이용한 악성코드 클러스터링 기법에 관한 연구)

  • Goh, Dong Woo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.91-101
    • /
    • 2017
  • API call sequence analysis is a kind of analysis using API call information extracted in target program. Compared to other techniques, this is advantageous as it can characterize the behavior of the target. However, existing API call sequence analysis has an issue of identifying same characteristics to different function during the analysis. To resolve the identification issue and improve performance of analysis, this study includes the method of API abstraction technique in addition to existing analysis. From there on, similarity between target programs is computed and clustered into similar types by applying LSH to abstracted API call sequence from analyzed target. Thus, this study can attribute in improving the accuracy of the malware analysis based on discovered information on the types of malware identified.

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

  • Deng, Jiehang;Yang, Jixiang;Weng, Shaowei;Gu, Guosheng;Li, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4467-4486
    • /
    • 2018
  • Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.

Locked Super Homeotropic Liquid Crystal Mode with Wide Viewing Angle using patterned polymer

  • Park, S.H.;Song, I.S.;Kim, W.C.;Oh, S.T.;Lee, S.H.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1185-1187
    • /
    • 2004
  • We have studied a liquid crystal (LC) mode, named locked super homeotropic (LSH), where the LCs aligned homeotropically are locked by surrounding walls such as cubic, hexagonal and cylinder. In the device, the vertically aligned LCs tilt down symmetrically around the center of the cell when a voltage is applied and thus it exhibits wide viewing angle. In addition, since the LCs is locked in micro domains the LCs do not flow to the bottom of the panel by gravity.

  • PDF

Implementation of MPEG-4 HVXC decoder with VHDL (VHOL을 이용한 MPEG-4 HVXC 복호화기 구현)

  • 김구용;임강희;차형태
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.465-468
    • /
    • 2001
  • MPEG-4 Parametric Coding 중 저 비트율로 음성신호를 부호화하는 HVXC(Harmonic Vector excitation Ending)의 복호화 모듈인 LSP 합성필터와 무성음 합성부, 유성음 합성부를 VHDL을 이용하여 구현하였다. MPEG-4 HVXC의 복호화 과정은 코드북을 이용하여 LSP 계수, VXC signal, 그리고 Spectral Envelop이 복호화 되어 각각 LSP 역필터, 무성음과 유성음 합성단을 통과하여 LPC계수와 유,무성음 여기신호로 변환된 후 LPC 합성필터링 과정을 거쳐 최종적으로 음성신호를 출력시킨다. LSP inverse filter에서 사용되는 cosine함수값을 위하여 Table based Approximation을 이용하여 적은 양의 Table 값을 사용하여 정확하고 고속의 cosine 연산을 수행하였다. VXC 복호화 과정에서는 신호의 중복성을 제거하는 Hidden Address in LSH 방법을 사용하여 코드북의 크기를 줄였다. 유성음 합성단에서는 IFFT 모듈을 이용하여 연산속도를 증가 시켰다. 최종적으로 위와 같이 구현된 시스템을 Simulation을 통해 Software 검증을 하였다.

  • PDF

Fast Car Model Recognition Algorithm using Frontal Vehicle Image (차량 전면 영상을 이용한 고속 차량 모델 인식 알고리즘)

  • Jung, do-wook;Kim, hyoyeon;Choi, hyung-il
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.305-306
    • /
    • 2015
  • 과속차량 단속카메라에 촬영된 차량 전면 영상은 차량번호를 인식하여 과속차량에 과금하는 용도로 사용되나 범죄 용의자 차량을 추적하기 위한 용도로도 사용되어진다. 본 연구에서는 국소특징점의 정합을 이용하여 차량 모델을 찾는 방법을 넘어서 실시간으로 차량 모델을 찾기 위한 알고리즘을 제안한다. 입력된 영상에 대하여 차량의 모델을 특징지을 수 있는 헤드라이트를 포함한 차량의 그릴 영역을 관심영역으로 제한하고 관심영역에서 추출된 특징점들을 모델 특징벡터 데이터베이스의 자료와 비교하는 방법 을 사용하였다. 입력 영상의 크기 변화와 조명 변화에 강인한 SURF 국소특징점을 이용한 매칭 방법은 차량 모델을 찾는데 적합하나 선형적으로 탐색하는데 시간이 오래걸린다. 따라서 블러를 사용하여 차량 이미지에서 추출되는 특징점들의 수를 매칭이 가능한 수준으로 낮추는 방법으로 모델 자료로부터 탐색에 필요한 시간을 단축시켰다. 또한 모델 자료를 구조화하여 탐색시간을 줄이는 방법들을 비교하여 LSH 를 사용한 결과 차량 모델을 탐색하는데 필요한 시간이 단축됨을 보였다.

  • PDF

Three-Party Key Exchange Protocol based Verifier (검증자 기반의 Three-Party키 교환 프로토콜)

  • 김해문;최영근;김순자
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.784-786
    • /
    • 2003
  • 패스워드 기반 키 교환 프로토콜은 참여자들이 쉽게 기억할 수 있는 자신의 패스워드를 사용하므로 단순성, 편리성, 이동성의 장점 때문에 광범위하게 사용된다. 2000년에 Lin, Sun, Hwang[1]이 Steiner, Tsudik, Waidner[2]가 제안한 three-party EKE 프로토콜(STW-3PEKE)이 패스워드 추측 공격에 취약함을 증명하고 이를 개선한 서버의 공개키를 이용한 새로운 three-party EKE 프로토콜(LSH-3PEKE)을 제안했다. 2001년에는 Lin, Sun, Steiner, Hwang[3]이 서버의 공개키를 사용하지 않는 새로운 three-party EKE 프로토콜(LSSH-3PEKE)을 제안했다. 본 논문에서는 검증자(verifier) 기반 즉 서버가 사용자의 패스워드를 저장하지 않고 패스워드에 의해 생성되는 검증자를 가지는 프로토콜을 제안하며 이전에 제안한 프로토콜의 안전성을 그대로 유지하면서 좀 더 간단하며 효율적인 프로토콜을 제시한다.

  • PDF

Isolation of a Fibrinolytic Bacterium from Cheongkukjang and Characterization of Its Bioactivity (청국장으로부터 Fibrin 분해 세균의 분리 및 이를 이용한 발효 청국장의 생리활성)

  • Lee, Dong-Geun;Kim, Nam-Young;Jang, Min-Kyung;Yoo, Byung-Hong;Kim, Ki-Young;Kim, Sung-Goo;Jeong, Yong-Kee;Lee, Sang-Hyeon
    • Microbiology and Biotechnology Letters
    • /
    • v.34 no.4
    • /
    • pp.299-305
    • /
    • 2006
  • In this study, we have isolated and identified a proteolytic bacterium from conventional Cheongkukjang. We also characterized several bioactivity of Cheongkukjang, which was fermented by an isolated strain. One strain out of about $10^4$ strains obtained from Cheongkukjang showed relatively high proteolytic activity was selected and named as a Bacillus subtilis LSH805 strain. White soy-bean Cheongkukjang possessed less odor and more viscous substance than black soy-bean Cheongkukjang. Cheongkukjang showed fibrinolytic activity, and about 1,500 mg fibrin was degraded after 20 h incubation. Although nitric oxide (NO) assays of soy-bean and Cheongkukjang were almost the same, their activities were significantly higher than that of no treatment. Activity of water fraction of Cheongkukjang was somewhat higher than that of soy-bean. Fibrinolytic and NO assays of Cheongkukjang suggest that Cheongkukjang, which was fermented by an isolated strain may be a useful candidate for natural fibrinolytic and macrophage-stimulating agents.

Production of Ascorbic acid-2-phosphate from Ascorbic acid by Pseudomonas sp.. (Pseudomonas sp.에 의한 Ascorbic acid로부터 Ascorbic acid-2-phosphate의 생산)

  • 권기성;이상협;방원기
    • Microbiology and Biotechnology Letters
    • /
    • v.28 no.1
    • /
    • pp.33-38
    • /
    • 2000
  • In order to produce ascorbic acid-2-phosphate from ascorbic acid, bacteria capable of transforming ascorbic acid to ascorbic acid-2-phosphate were isolated from soils and the stock cultures in our laboratory. Among them, a newly isolated bacterium LSH-3 having the best ability of producing ascorbic acid-2-phosphate was selected and partially identified as Pseudomonas sp. The optimum conditions for the production of ascorbic acid-2-phosphate from ascorbic acid and using its resting cells as the source os enzyme were investigated. The results were summarized as follows: The optimum cultivation time and the cell weight for the production of ascorbic acid-2-phosphate was 14 hours and 100g/I(wet weight), respectively. And 0.1%(v/v) Trition X-100 was the most effective surfactant. The optimum concentrations of ascorbic acid and pyrophosphate were 400mM and 500mM, respectively, which led to produce 14.54g/I of ascorbic acid-2-phosphate. The most effective buffer was 50mM sodium acetate. The optimum pH and temperature were 4.5 and $40^{\circ}C$, respectively. Under the above conditions, 17.71 g/I of ascorbic acid-2-phosphate was produced from ascorbic acid after 32 hour-incubation, which corresponded to 17.5% of conversion rate based on ascorbic acid.

  • PDF

Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware (악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발)

  • Park, Jihyeon;Kim, Taeok;Shin, Yulim;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.650-657
    • /
    • 2020
  • The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware and the emergence of malicious code. For this, it is necessary to accurately and quickly detect and classify malware family. In this paper, we analyzed and classified visualization technology, which is a preprocessing technology used for deep learning-based malware classification. The first method is to convert each byte into one pixel of the image to produce a grayscale image. The second method is to convert 2bytes of the binary to create a pair of coordinates. The third method is the method using LSH. We proposed improving the technique of using the entire existing malicious code file for visualization, extracting only the areas where important information is expected to exist and then visualizing it. As a result of experimenting in the method we proposed, it shows that selecting and visualizing important information and then classifying it, rather than containing all the information in malicious code, can produce better learning results.

Characterization of the Folding Structure of 3'-end of Lactate Dehydrogenase A-mRNA Isolated from Hormone Stimulated Rat $C_{6}$ Glioma cell culture (홀몬으로 처리된 쥐의 $C_{6}$ glioma 세포배양으로부터 분리된 낙산탈수소 효소 A-mRNA의 3'-말단의 2차 구조)

  • 배석철;이승기
    • Korean Journal of Microbiology
    • /
    • v.25 no.2
    • /
    • pp.94-102
    • /
    • 1987
  • Rat liver LDH A-cDNA has been isolated from a .lambda.gt11-rat lover cDNA library and partially characterized. The size of the isolated rat liver LDH A-cDNA if shown to be 1.6Kb and restriction enzyme sites for the rat liver LDH A-cDNA are also mapped. 682-nucleotide sequence coding for 3'-end of rat liver LDH A-cDNA has been analyzed and compared to the nucleotide sequence of the same region of rat $C_6$-glioma cell LDH A-cDNA which has been cloned from the hormonally stimulated cell cultures. The result shows that 177 nucleotide sequences coding for the C-terminal 59-amino acids are identical but 505 nucleotide sequences of 3'-nontranslated region of the two LSH A-cDNA exhibit characteristic differences in thier nucleotide sequences. Computer analysis for the folding structures for 3'-end 400 nucleotide sequences of the two LDH A-cDNA shows a possibility implying that the two LDH A-mRNAs isolated from different tissues of rats may have different half life and therefore their translational efficiency may be different. It has been previously demonstrated that isoproterenol stimulated rat $C_6$ -glioma cell cultures produce LDH A-mRNA showing 2 to 3-fold longer half life in comparison to that of noninduced LHD A-mRNA. The result therefore support for the idea that hormonally stimulated rat $C_6$-glioma cells may produce LDH A-mRNA containing different nucleotide sequences at the 3'-end nontranslated region by which the hormonally induced LDH A-mRNA could have more stable secondary mRAN structure in comparison to that of noninduced LDH A-mRNA.

  • PDF