• Title/Summary/Keyword: LSH

Search Result 34, Processing Time 0.029 seconds

Scaling Reuse Detection in the Web through Two-way Boosting with Signatures and LSH

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.735-745
    • /
    • 2013
  • The emergence of Web 2.0 technologies, such as blogs and wiki, enable even naive users to easily create and share content on the Web using freely available content sharing tools. Wide availability of almost free data and promiscuous sharing of content through social networking platforms created a content borrowing phenomenon, where the same content appears (in many cases in the form of extensive quotations) in different outlets. An immediate side effect of this phenomenon is that identifying which content is re-used by whom is becoming a critical tool in social network analysis, including expert identification and analysis of information flow. Internet-scale reuse detection, however, poses extremely challenging scalability issues: considering the large size of user created data on the web, it is essential that the techniques developed for content-reuse detection should be fast and scalable. Thus, in this paper, we propose a $qSign_{lsh}$ algorithm, a mechanism for identifying multi-sentence content reuse among documents by efficiently combining sentence-level evidences. The experiment results show that $qSign_{lsh}$ significantly improves the reuse detection speed and provides high recall.

Formal Verification of LSH Hash Function Using Cryptol (Cryptol을 이용한 LSH 해시함수 정형검증)

  • Ryu, Do-Hyeon;Choi, Yong-Rak;Kim, Tae-Hoon;Shin, Youngjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.162-165
    • /
    • 2018
  • 암호 알고리즘은 세계적으로 표준화가 진행되고 있으며, 암호 알고리즘의 안전성은 충분히 입증되어 왔다. 하지만, 기존 검증 방법으로 사용되는 테스트벡터 방식으로는 전수조사를 시행할 수 없어 구현상의 취약점을 완벽하게 발견할 수 없기 때문에 심각한 피해를 야기할 수 있다. 그래서 개발한 혹은 현재 존재하고 있는 암호 알고리즘이 표준에 따라 올바르게 구현되었는지에 대한 개선된 검증 방법이 필요하다. 본 논문에서는 KISA에서 개발한 LSH 해시함수 모듈을 미국의 Galois사와 NSA가 함께 공동 개발한 Cryptol을 이용하여 암호 모듈이 올바르게 구현되었는지 검증하였다.

Pattern Classification and Characteristics Concerning Landscape on Mountains and Hills by Using a Landscape Picture -The Case of Seoul City- (진경산수화 분석을 통한 산지 구릉 경관 유형의 분류 및 해석 -서울시를 중심으로-)

  • 강명수
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.4
    • /
    • pp.12-23
    • /
    • 2001
  • The research focused on the landscape of mountains and hills drawn in a landscape picture. The purpose of the research is to classify patterns of landscape drawning in landscape pictures and to clarify the characteristics of the pattern by a quantitative index. We selected 21 landscape pictures to understand the Landscape Setting Here(LSH) and Landscape Setting These(LST). We investigated size quantitative indices using 1 landscape picture. The index is a follow: altitude, Visual Distance, Angles, Angle of Appearance Size, Inclination, and Angle of Incidence. The following results were obtained by using this data. 1) It has been understood that we offer an important city view because the LSH of this research can establish understanding of the city structure. 2) We dividing 3 patterns by the LST space drawn in the landscape picture. 3 patterns are Ferry point, Beauty point, an Signal-fire point. 3) We clarified the landscape characteristics of each pattern and the characteristics between patterns by using the index according to this pattern. 4) We understood the problem concerning the Seoul city landscape examining the pattern of this research with the ordinance of Seoul city. It is necessary to standardized a system of pattern classification utilized in landscape pictures to establish a universally interpreted detailed quantitative index, which can be applied to research.

  • PDF

Automated Fact Checking Model Using Efficient Transfomer (효율적인 트랜스포머를 이용한 팩트체크 자동화 모델)

  • Yun, Hee Seung;Jung, Jason J.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1275-1278
    • /
    • 2021
  • Nowadays, fake news from newspapers and social media is a serious issue in news credibility. Some of machine learning methods (such as LSTM, logistic regression, and Transformer) has been applied for fact checking. In this paper, we present Transformer-based fact checking model which improves computational efficiency. Locality Sensitive Hashing (LSH) is employed to efficiently compute attention value so that it can reduce the computation time. With LSH, model can group semantically similar words, and compute attention value within the group. The performance of proposed model is 75% for accuracy, 42.9% and 75% for Fl micro score and F1 macro score, respectively.

A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery (위·변조에서 사용되는 암호알고리즘 성능 비교에 대한 연구)

  • Lee, Jun Yeong;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.250-256
    • /
    • 2017
  • Recently, the use of mobile devices has increased in order to provide a variety of services, and thus there has been a surge in the number of application malicious attacks on the Android platform. To resolve the problem, the domestic financial sector has been introducing the app anti-tamper solution based on cryptographic algorithms. However, since the capacity of apps installed in smartphones continues to increase and environments with limited resources as wearables and IoTs spread, there are limitations to the processing speed of the anti-tamper solutions. In this paper, we propose a novel anti-tamper solution by using lightweight hash function LEA and LSH. We also present the test results of a simulation program that implements this method and compare the performance with anti-tamper solutions based on the previous cryptographic algorithms.

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

Multi-Object Tracking Based on Keypoints Using Homography in Mobile Environments (모바일 환경 Homography를 이용한 특징점 기반 다중 객체 추적)

  • Han, Woo ri;Kim, Young-Seop;Lee, Yong-Hwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.3
    • /
    • pp.67-72
    • /
    • 2015
  • This paper proposes an object tracking system based on keypoints using homography in mobile environments. The proposed system is based on markerless tracking, and there are four modules which are recognition, tracking, detecting and learning module. Recognition module detects and identifies an object to be matched on current frame correspond to the database using LSH through SURF, and then this module generates a standard object information. Tracking module tracks an object using homography information that generate by being matched on the learned object keypoints to the current object keypoints. Then update the window included the object for defining object's pose. Detecting module finds out the object based on having the best possible knowledge available among the learned objects information, when the system fails to track. The experimental results show that the proposed system is able to recognize and track objects with updating object's pose for the use of mobile platform.

Multi-Object Tracking based on Reliability Assessment of Learning in Mobile Environment (모바일 환경 신뢰도 평가 학습에 의한 다중 객체 추적)

  • Han, Woo ri;Kim, Young-Seop;Lee, Yong-Hwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.3
    • /
    • pp.73-77
    • /
    • 2015
  • This paper proposes an object tracking system according to reliability assessment of learning in mobile environments. The proposed system is based on markerless tracking, and there are four modules which are recognition, tracking, detecting and learning module. Recognition module detects and identifies an object to be matched on current frame correspond to the database using LSH through SURF, and then this module generates a standard object information that has the best reliability of learning. The standard object information is used for evaluating and learning the object that is successful tracking in tracking module. Detecting module finds out the object based on having the best possible knowledge available among the learned objects information, when the system fails to track. The experimental results show that the proposed system is able to recognize and track the reliable objects with reliability assessment of learning for the use of mobile platform.

Learning Methods for Effective Object Tracking in 3D Storytelling Augmented Reality (3D 스토리텔링 증강현실에서 효과적인 객체 추적을 위한 학습 방법)

  • Choi, Dae han;Han, Woo ri;Lee, Yong-Hwan;Kim, Youngseop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.3
    • /
    • pp.46-50
    • /
    • 2016
  • Recently, Depending on expectancy effect and ripple effect of augmented reality, the convergence between augmented reality and culture & arts are being actively conducted. This paper proposes a learning method for effective object tracking in 3D storytelling augmented reality in cultural properties. The proposed system is based on marker-less tracking, and there are four modules that are recognition, tracking, detecting and learning module. Recognition module is composed of SURF and LSH, and then this module generates standard object information. Tracking module tracks an object using object tracking based on reliability. This information is stored in Learning module along with learned time information. Detecting module finds out the object based on having the best possible knowledge available among the learned objects information, when the system fails to track. Also, it proposes a method for robustly implementing a 3D storytelling augmented reality in cultural properties in the future.

Comparative analysis of quantum circuit implementation for domestic and international hash functions (국내·국제 해시함수에 대한 양자회로 구현 비교 분석)

  • Gyeong Ju Song;Min Ho Song;Hwa Jeong Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.83-90
    • /
    • 2023
  • The advent of quantum computers threatens the security of existing hash functions. In this paper, we confirmed the implementation results of quantum circuits for domestic/international hash functions, LSH, SHA2, SHA3 and SM3, and conducted a comparative analysis. To operate the existing hash function in a quantum computer, it must be implemented as a quantum circuit, and the quantum security strength can be confirmed by estimating the necessary quantum resources. We compared methods of quantum circuit implementation and results of quantum resource estimation in various aspects and discussed ways to meet quantum computer security in the future.