• Title/Summary/Keyword: messengers

Search Result 111, Processing Time 0.025 seconds

Moving Object Tracking Using Co-occurrence Features of Objects (이동 물체의 상호 발생 특징정보를 이용한 동영상에서의 이동물체 추적)

  • Kim, Seongdong;Seongah Chin;Moonwon Choo
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2002
  • In this paper, we propose an object tracking system which can be convinced of moving area shaped on objects through color sequential images, decided moving directions of foot messengers or vehicles of image sequences. In static camera, we suggests a new evaluating method extracting co-occurrence matrix with feature vectors of RGB after analyzing and blocking difference images, which is accessed to field of camera view for motion. They are energy, entropy, contrast, maximum probability, inverse difference moment, and correlation of RGB color vectors. we describe how to analyze and compute corresponding relations of objects between adjacent frames. In the clustering, we apply an algorithm of FCM(fuzzy c means) to analyze matching and clustering problems of adjacent frames of the featured vectors, energy and entropy, gotten from previous phase. In the matching phase, we also propose a method to know correspondence relation that can track motion each objects by clustering with similar area, compute object centers and cluster around them in case of same objects based on membership function of motion area of adjacent frames.

  • PDF

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows (윈도우에서의 말랑말랑 톡카페 데이터베이스 암호화 프로세스 분석 및 삭제된 메시지 복구 연구)

  • Youn, Byungchul;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.397-403
    • /
    • 2020
  • With the convenience of real-time conversation, multimedia file and contact sharing services, most people use instant messenger, and its usage time is increasing. Because the messengers contain a lot of user behavior information data, in the digital forensic investigation, they can be very useful evidence to identify user behavior. However, some of useful data can be difficult to acquire or recognize because they are encrypted or deleted. Thus, in order to use the messenger data as evidence, the study of message decryption process and message recovery is essential. In this paper, we analyze the database encryption process of the instant messenger, MalangMalang Talkafe, and propose the method to decrypt it. In addition, we propose the methods to identify the deleted messages and recover from the volatile memory area.

PR-Management and Branding of Media Channels with the Application of Social Networks

  • Shalman, Tatiana;Dobrianska, Viktoriia;Kokhan, Marianna;Pletsan, Khrystyna;Humenchuk, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.70-76
    • /
    • 2021
  • The relevance of intelligence involves the definition of such communication systems of PR-management and branding of media channels with the use of social networks, which are already implemented in practice by modern representatives of professional PR product. The purpose of the investigation is to determine the system of implementation of technologies of PR-management and branding of media channels with the use of social networks based on a survey of PR and brand of different media channels on the basis of a survey of brand managers and PR. 980 respondents from Ukraine took part in the survey. The survey was conducted on the Google-forms platform. The results outline a list of the most popular social networks and messengers for the implementation of PR management and branding technologies, including Facebook, Twitter, Google, LinkedIn, Tumblr; Telegram, WhatsApp, Viber, Skype. It is determined that the criteria of branding analysis are informativeness, centralization/distribution, content, feedback intensity. Identified 2 prospects for the development of branding in an interactive media environment (creation of a presentation system; integration of websites of social media and companies in universal centers). The criteria of general importance of the factors influencing the behavioral intention of consumers to use social media channels are presented (satisfaction, accessibility, perceived usefulness, trust, ease of use, attitude, social influence, self-efficacy). The meaning of the content of social media channels (public, informational and communication) is indicated. The practical significance of the study was to present the links between the criteria, development prospects and the values of branding factors.

The Effect of Motivation for Emoticon Use on Behavior of Purchasing Paid Emoticon: Focused on Theory of Planned Behavior (이모티콘 사용동기가 유료 이모티콘 구매 행동에 미치는 영향: 계획행동이론을 중심으로)

  • Yoo, Seunghun;Park, YounJung;Kang, Hyunmin;Kim, Sungtae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.395-404
    • /
    • 2021
  • Emoticons used in personal messengers have already become a one of industry. In this study, we want to explore what motivations people use emoticons and how they affect to purchasing behavior. We first looked into which emoticon usage motivation influenced the attitude of emoticon purchase, and then analyzed the research model through PLS-based structural equation modeling. The result found that fashion and fun/habit factors significantly explain attitudes to emoticon purchase, and attitude, subjective norms, and perceived self-control affect to purchase intention and purchase intention predict purchase behavior. This study showed the factors affecting the purchase of emoticons through a validated model, and the results suggest what motivation factors should be included in the marketing phase and advertising.

Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database (인스턴트 메신저 말랑말랑 톡카페 애플리케이션 데이터베이스 복호화 방안 및 분석)

  • Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.541-547
    • /
    • 2019
  • As leakage cases of personal information increase, the concern of personal information protection is also increasing. As a result, most applications encrypt and store sensitive information such as personal information. Especially, in case of instant messengers, it is more difficult to find database where is not encrypted and stored. However, this kind of database encryption acts as anti-forensic from the point of view of digital forensic investigation. In this paper, we analyze database encryption process of MalangMalang Talkcafe application which is one of instant messenger. Based on our analysis, we propose a decryption method and explain the meaningful information collected in the database.

Analysis on the Current Virtual Workplace Design Trends, and a Proposal for the Design Directions of the Future Virtual Workplace - Based on 12 Current Virtual Workplace Platforms - (가상 업무 공간의 디자인 현황 분석 및 향후 디자인 방법에 관한 제언 - 12개의 현행 사례의 비교분석을 중심으로 -)

  • Cho, Kyung hyun;Eum, Yu jeung;Choi, Hyeok jin;Lee, Seung Hyun;Cha, Seung Hyun
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.80-92
    • /
    • 2022
  • Recently, remote work has arisen due to the social atmosphere and advancement of digital technology. Although effective in premeditated communications such as conferences or meetings, the current technology such as messengers and video chats insufficiently supports impromptu communications like a chance encounter, daily conversation with colleagues, or brief instant meetings. This causes various problems such as a decrease in social belonging and an increase in social isolation. The virtual workplace, which emerged as an alternative to this technology, is merely replicating the workplace layouts in reality with an absence of the proper design guideline. Therefore, this paper aims to establish the foundation for the better design of the virtual workplace for remote-work employees. The research compared 12 current workplace cases with the analysis with 5 categories(Spatial Composition, Scale, Individual & Collaboration Workplace, Socializing Space), and discovered the following results: 1) some design principles of the real workplace can be applied on the virtual workplace design, 2) the architectural components of the virtual workplace can differ from them of the real. Based on the results, the research suggests both the appropriate design methodologies of the virtual workplace considering the design principles of the real office layouts, and the design direction for the future of the virtual workplace. This research will be the foundation for the future design of the virtual workplace.

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

Hybrid phishing site detection system with GRU-based shortened URL determination technique (GRU 기반 단축 URL 판별 기법을 적용한 하이브리드 피싱 사이트 탐지 시스템)

  • Hae-Soo Kim;Mi-Hui Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.213-219
    • /
    • 2023
  • According to statistics from the National Police Agency, smishing crimes using texts or messengers have increased dramatically since COVID-19. In addition, most of the cases of impersonation of public institutions reported to agency were related to vaccination and reward, and many methods were used to trick people into clicking on fake URLs (Uniform Resource Locators). When detecting them, URL-based detection methods cannot detect them properly if the information of the URL is hidden, and content-based detection methods are slow and use a lot of resources. In this paper, we propose a system for URL-based detection using transformer for regular URLs and content-based detection using XGBoost for shortened URLs through the process of determining shortened URLs using GRU(Gated Recurrent Units). The F1-Score of the proposed detection system was 94.86, and its average processing time was 5.4 seconds.

How Extracellular Reactive Oxygen Species Reach Their Intracellular Targets in Plants

  • Jinsu Lee;Minsoo Han;Yesol Shin;Jung-Min Lee;Geon Heo;Yuree Lee
    • Molecules and Cells
    • /
    • v.46 no.6
    • /
    • pp.329-336
    • /
    • 2023
  • Reactive oxygen species (ROS) serve as secondary messengers that regulate various developmental and signal transduction processes, with ROS primarily generated by NADPH OXIDASEs (referred to as RESPIRATORY BURST OXIDASE HOMOLOGs [RBOHs] in plants). However, the types and locations of ROS produced by RBOHs are different from those expected to mediate intracellular signaling. RBOHs produce O2•- rather than H2O2 which is relatively long-lived and able to diffuse through membranes, and this production occurs outside the cell instead of in the cytoplasm, where signaling cascades occur. A widely accepted model explaining this discrepancy proposes that RBOH-produced extracellular O2•- is converted to H2O2 by superoxide dismutase and then imported by aquaporins to reach its cytoplasmic targets. However, this model does not explain how the specificity of ROS targeting is ensured while minimizing unnecessary damage during the bulk translocation of extracellular ROS (eROS). An increasing number of studies have provided clues about eROS action mechanisms, revealing various mechanisms for eROS perception in the apoplast, crosstalk between eROS and reactive nitrogen species, and the contribution of intracellular organelles to cytoplasmic ROS bursts. In this review, we summarize these recent advances, highlight the mechanisms underlying eROS action, and provide an overview of the routes by which eROS-induced changes reach the intracellular space.