• Title/Summary/Keyword: data authenticity

Search Result 179, Processing Time 0.023 seconds

ECC based Authentication Scheme for Securing Data Contents over Open Wireless Network Systems

  • Caytiles, Ronnie D.;Park, Byungjoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Multimedia contents have been increasingly available over the Internet as wireless networks systems are continuously growing popular. Unlimited access from various users has led to unauthorized access of third parties or adversaries. This paper deals with the implementation of elliptic curve cryptography (ECC) based user authentication for securing multimedia contents over the Internet. The ECC technique has been incorporated with the advanced encryption standard (AES) algorithm to ensure the complexity of the proposed authentication scheme and to guarantee authenticity of multimedia services.

Text Mining-based Fake News Detection Using News And Social Media Data (뉴스와 소셜 데이터를 활용한 텍스트 기반 가짜 뉴스 탐지 방법론)

  • Hyun, Yoonjin;Kim, Namgyu
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.19-39
    • /
    • 2018
  • Recently, fake news has attracted worldwide attentions regardless of the fields. The Hyundai Research Institute estimated that the amount of fake news damage reached about 30.9 trillion won per year. The government is making efforts to develop artificial intelligence source technology to detect fake news such as holding "artificial intelligence R&D challenge" competition on the title of "searching for fake news." Fact checking services are also being provided in various private sector fields. Nevertheless, in academic fields, there are also many attempts have been conducted in detecting the fake news. Typically, there are different attempts in detecting fake news such as expert-based, collective intelligence-based, artificial intelligence-based, and semantic-based. However, the more accurate the fake news manipulation is, the more difficult it is to identify the authenticity of the news by analyzing the news itself. Furthermore, the accuracy of most fake news detection models tends to be overestimated. Therefore, in this study, we first propose a method to secure the fairness of false news detection model accuracy. Secondly, we propose a method to identify the authenticity of the news using the social data broadly generated by the reaction to the news as well as the contents of the news.

Benford's Law and its Potential for Data Verification in Ecological Monitoring

  • Tae-Jun Choi;Woong-Bae Park;Dae-Hee Kim;Dohee Lee;Yuno Do
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.5 no.2
    • /
    • pp.43-49
    • /
    • 2024
  • Ecological monitoring provides indispensable data for biodiversity conservation and sustainable resource management. However, the complexity and variability inherent in ecological monitoring data necessitate robust verification processes to ensure data integrity. This study employed Benford's Law, a statistical principle traditionally used in fields such as finance and health sciences, to evaluate the authenticity of ecological monitoring data related to the abundance of migratory bird species across various locations in South Korea. Benford's Law anticipates a specific logarithmic distribution of leading digits in naturally occurring numerical datasets. Our investigation involved two stages of analysis: a first-order analysis considering the leading digit and a second-order analysis examining the first two digits of bird population counts. While the first-order analysis displayed moderate conformity to Benford's Law that suggested overall data integrity, the second-order analysis revealed more pronounced deviations, indicating potential inconsistencies or inaccuracies in certain subsets of the data. Although our data did not perfectly align with Benford's Law, these deviations underscore the complex nature of ecological research, which is influenced by a multitude of environmental, methodological, and human factors.

Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks

  • Yi, Chuanjun;Yang, Geng;Dai, Hua;Liu, Liang;Chen, Yunhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4183-4204
    • /
    • 2018
  • The existing en-route filtering schemes only consider some simple false data injection attacks, which results in lower safety performance. In this paper, we propose an efficient geographical information-based en-route filtering scheme (EGEFS), in which each forwarding node verifies not only the message authentication codes (MACs), but also the report identifier and the legitimacy and authenticity of locations carried in a data report. Thus, EGEFS can defend against not only the simple false data injection attacks and the replay attack, but also the collusion attack with forged locations proposed in this paper. In addition, we propose a new method for electing the center-of-stimulus (CoS) node, which can ensure that only one detecting node will be elected as the CoS node to generate one data report for an event. The simulation results show that, compared to the existing en-route filtering schemes, EGEFS has higher safety performance, because it can resist more types of false data injection attacks, and it also has higher filtering efficiency and lower energy expenditure.

The Rationalization of Distribution Structure in Diamond Market and Study on Diamond Grading System In Korea (다이아몬드의 유통구조와 국내감정 현황에 관한 연구)

  • Lee, Sang-Ki
    • Journal of Distribution Science
    • /
    • v.14 no.4
    • /
    • pp.103-110
    • /
    • 2016
  • Purpose - This study investigates the improvement of rationalization of distribution structure in Korean diamond market. It also explores the international distribution of diamond and how the distribution of Korean diamond market system was improved. This study also for providing the evaluation method in case of purchasing diamond on the consumers. Research Design, Data, and Methodology - The research investigates how international diamond distribution market has been changed since 1933 by De Beers. The international Diamond rough stone has been deregulated in supply and demand by Debeers since July, 2000, therefore, the price maintenance policy of diamond market also has been changed. In the short term, the diamond price in market has been down, whereas, in the long term, the market share of Debeers has affected the high quality of diamond price in world market. Before 1985, both G color and VVS1 clarity were used as the level of percentages in the diamond certificate of authenticity in Korea. But, after 1985, the diamond certificate of authenticity uses Diamond Grading Report. Results - Between the 1970's and 1980's, Debeers had controlled about 80 percentages of international diamond supply market. But, Debeers share in diamond market fell by 60 percentages in 2000's. Debeers supplied 31%(4390 carets) of international diamond supply and 41%(39 billion dollars) in 2003. However, Debeers shares 50% of market shares in the diamond supply market by Alosa in Russia. In Korea, the diamond grading report system has been used since 1985. But, the diamond grading report system has price bubbles and much irrational parts in grading system methods. Conclusions - 4C, the grading system of diamond, is a method for comparing and evaluating diamond objectively. Diamond is graded according to its color, cut, clarity, and carat. The price of diamond is determined based on its each item. Consumers purchase diamond for the purpose of investment and wearing. In terms of investment, it is recommended to purchase diamond with color of D grade, cut with Excellent or Very Good Cut grade, Clarity of FL or IF, and more than 3 carat. As for wearing purpose, it is highly recommended for diamond to have color of F or G grade, cut of Excellent or Very Good Cut, clarity of VS2 or SI1, and more than 1 carat Before 2000, Central Selling Organization(CSO) distributed about 80 percentages rough diamond to world market exclusively by purchase, classification, assessment, and sales. After 2000, Dbeers diamond company looses slowly market shares, while Almosa diamond company etc. in Russia are taking over world market shares more and more. Debeers market shares have been falling over the years, and the international diamond markets are gradually growing by other international diamond companies. But, there is no change in Korean diamond market after 1980's. Korean diamond distribution needs to follow international level of Diamond Grading System. By using different grading systems with different panel members, Korean diamond grading system needs to follow international perfect grading systems to grow diamond markets and maintain within top 10 diamond markets countries.

Strategy of CSR Storytelling with the application of Greimas Actantial Model -focusing on Hyundai Motor Company's CSR website (그레마스 행위소 모델을 통해 본 기업의 CSR스토리텔링 전략-현대자동차 CSR홈페이지를 중심으로)

  • HONG, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.119-128
    • /
    • 2016
  • This study is designed with an intention to understand CSR story strategies that the corporates use, focusing on analyzing the method of composition of Hyundai Motor Company's CSR website stories. When analyzing based on interactivity, ease of use, newest, and informativity, interactive dialogue feature was mostly lacking. It is not the most up-to-date data and lacks the newest. However, as sharing information feature was presented, information spread quickly. When applying Greimas' Actantial Model into the 'CSR News' that conveys the news about corporate philanthropic activities, it turned out that the CSR strategies were authenticity, consistency and flexibility. When doing CSR storytelling, a corporate should not only use pre-existing executives and staff members but should use new icons including civic organizations and the youth if possible, and perform its role as a supporter. At the same time, a corporate must build strategical storytelling to the new values and engage in systematic corporate philanthropic activities that meets the need of the time period.

Application of Stable Isotopes to Tracing Geographical Origin of Food and to Determining Its Authenticity (안정동위원소를 이용한 식품의 원산지 추적과 진위 감별)

  • Bong, Yeon-Sik;Ryu, Jong-Sik;Lee, Kwang-Sik
    • Economic and Environmental Geology
    • /
    • v.42 no.6
    • /
    • pp.645-654
    • /
    • 2009
  • Recently there have been increasing consumers' interests in the geographical origin of foods, due to the FTA (Free Trade Agreement) in the global market. Especially, in Korea, in relation to BSE (bovine spongiform encephalopathy), it is considered to be urgent to develop analytical techniques for distinguishing the geographical origin of beef. Korea is facing conclusion of FTA with many countries, and there is a deep national concern about the distinction of the geographical origin of food. Diverse analytical techniques have been used in many of recent researches to obtain data for distinguishing the geographical origin of foods produced in various countries. In this paper, we reviewed national and international researches about tracing of geographical origin and food authentication using stable isotopes. Improvement of the isotopic techniques and their numerous application have been provided useful information of their geographical origin in food products. Furthermore, we expect that this study could be detecting of many frauds and illegal transaction of food products. We look forward to active progressing research of detecting food origin using isotope analysis and numerous application about imported food products.

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

The Legal Problems and Policy Suggestions for Vitalizing Cyber Trade Transactions (사이버무역거래에 관한 법적 문제와 활성화방안)

  • 이신규
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.1-17
    • /
    • 2001
  • This study is to examine some legal problems of cyber trade transactions and to suggest some policy implications to vitalize cyber trade by internet accomplishes electronic business from all process integration of production, marketing and customer service. However, there are some legal problems for the electronic commerce to be used in international trade activities such as trade contract transport documents and payment systems by internet. First international trade rules have to be legislated so that electronic documents has same legal function like traditional documents. Also electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality. Second, traditionally international payment systems such as letters of credits, remittance, documentary collections and open account have been operated as an important and popular method of payment. In the modern world of electronic commerce, information technology has made it possible to pay for the sale of goods and services over the internet. The payment methods such as Credit Card, Debit Card, Electronic Cash, Electronic Fund Transfers enable partly sellers, buyers and service providers to settle payment electronically through the internet. To settle the problems of payment systems, the security requirements for safe electronic Payments such as authenticity, integrity, non-repudiation have to be guaranteed. Also, electronic data interchange in transport documents has to be adopted and negotiability of electronic bills of lading has to be guaranteed. Electronic payment systems through SWIFT enable the sellers and the buyers to conduct and settle international business-to-business electronic commerce in case of solving the above problems and harmonizing the Bolero project.

  • PDF

The Physics of Toegye's Sensational Experience and Mental Response: The Study on the 4th Song of (퇴계선생의 감각경험과 심적반응의 의학생리학: <도산십이곡>중 제4곡을 중심으로)

  • kim, mung hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.283-290
    • /
    • 2022
  • Sijo therapy is to overcome depression and establish the authenticity of existence. This study aims to investigate whether the image of Toegye's Sijo fuses the medical and scientific sensory experience with mental reaction. Toegye's Sijo is operated by the principle of activating vitality. The teacher's sijo is to help the principle of creating the authenticity of existence to overcome depression through the sensory experience and mental response of the human body and to change the life of existence now - here. Therefore, this study aims to prove the healing power of the fourth song of Toegye's Sijo . In the future, it is meaningful that the study of Sijo therapy on sensory experience and mental response is provided as a data for the development of programs to help medical student understanding.