• Title/Summary/Keyword: 기록 증거

Search Result 216, Processing Time 0.024 seconds

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

Clinical Analysis for Thymic Carcinoma (흉선암의 임상적 고찰)

  • 안지섭;박창권;박남희;김재범;유영선;이광숙;최세영;권영무
    • Journal of Chest Surgery
    • /
    • v.34 no.2
    • /
    • pp.162-166
    • /
    • 2001
  • 배경: 흉선암은 드문 질환으로 치료경과 및 예후가 침윤성 흉선종에 비해 나쁜 것으로 알려져 있으며 병기의 분류나 병기에 따른 치료방법이 아직 표준화 되어있지 않아 치료에 어려운 점이 있다. 이에 본교실에서 흉선암으로 진단되었던 환자들의 피료방법 및 성적을 분석하여 그 결과를 보고하고자 한다. 대상 및 방법: 계명대학교 동산의료원 흉부외과학교실에서는 1984년 8월에서 흉선암으로 진단되었던 8례의 환자를 대상으로 의무기록을 참고하여 병기에 따른 치방법료 및 예후 등을 후향적으로 분석하였다. 결과: 연령은 23세에서 67세까지로 평균 46세였으며 전흉부통증이 주증상이었다. 조직학적으로는 임파상피양암(lymphoepithelioma-like carcinoma)이 2례, 편평상피암(squamous cell carcinoma)이 2례, 기저세포암(basaloid carcinoma)이 1례, 혼합형(mixed type)이 3례 있었다. 임상적 병기분류는 Masoka의 분류법을 사용하였으며 제I기 2례, 제II기 4례, 제III기 1례, 제IVAr기가 1례 있었다. 4례의 환자에서는 종양의 완전적출이 가능했으며 3례에서는 고식적 수술을 시행하였다. 1례의 환자는 주위조직으로의 침윤과 심낭에 퍼져있어 조직생검만을 시행하였다. 전례에서 보조적 항암치료를 받았고 술후 병기가 제III기 이상이거나 종양의 절제가 불완전했던 5례의 환자에서는 보조적 방사선치료를 병행하였다. 이들 중 5례에서 술후 보조적 항암치료 및 방사선치료를 받고 현재까지 생존해있다. 평균추적기간은 55.3$\pm$64.6 개원이었고, 3례의 환자는 사망하였으며 4례의 환자는 종양의 재발증거 없이 생존해있다. 결론: 종양의 조기진단과 완전종양적출후 적극적인 보조적 항암치료 및 방사선치료가 흉선암을 치료하는데 도움이 될 것으로 사료된다.

  • PDF

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

Improved Image Restoration Algorithm about Vehicle Camera for Corresponding of Harsh Conditions (가혹한 조건에 대응하기 위한 차량용 카메라의 개선된 영상복원 알고리즘)

  • Jang, Young-Min;Cho, Sang-Bock;Lee, Jong-Hwa
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.114-123
    • /
    • 2014
  • Vehicle Black Box (Event Data Recorder EDR) only recognizes the general surrounding environments of load. In addition, general EDR is difficult to recognize the images of a sudden illumination change. It appears that the lens is being a severe distortion. Therefore, general EDR does not provide the clues of the circumstances of the accident. To solve this problem, we estimate the value of Normalized Luminance Descriptor(NLD) and Normalized Contrast Descriptor(NCD). Illumination change is corrected using Normalized Image Quality(NIQ). Second, we are corrected lens distortion using model of Field Of View(FOV) based on designed method of fisheye lens. As a result, we propose integration algorithm of two methods that correct distortions of images using each Gamma Correction and Lens Correction in parallel.

Margin and Funding Liquidity: An Empirical Analysis on the Covered Interest Parity in Korea (우리나라 외환시장의 차익거래 유인에 대한 분석)

  • Jeong, Daehee
    • KDI Journal of Economic Policy
    • /
    • v.34 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • During the global financial turmoil in 2007-2008, deviation from the covered interest parity (CIP) between the Korean won and US dollar through the foreign exchange swap has escalated in its magnitude beyond 1,000bp in November 2008, and it still persists around 100bp level. In this paper, we examine a newly developed margin based asset pricing model using Kalman filter approach and show that the escalation of the CIP deviation is found to be significantly related to the global dollar funding illiquidity and country-specific funding conditions. Furthermore, we find evidence that the poor funding conditions (or higher margins) are driven by the general money market illiquidity and may lead to higher funding illiquidity, which suggests the reinforcing effects of the liquidity spiral. We also show that the supply of dollar liquidity and improved funding conditions help alleviate the deviations from the parity, however the persistent anomaly is found to be related to the high level of volatility in the FX swap market.

  • PDF

An Implementation of Automatic Transmission System of Traffic Event Information (교통이벤트 정보의 자동 전송시스템 구현)

  • Jeong, Yeong-Rae;Jang, Jae-Hoon;Kang, Seog Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.987-994
    • /
    • 2018
  • In this paper, an automatic transmission system of traffic information is presented. Here, a traffic event is defined as an obstacle to an emergency vehicle such as an ambulance or a fire truck. When a traffic event is detected from a video recorded by a black box installed in a vehicle, the implemented system automatically transmits a proof image and corresponding information to the control center through an e-mail. For this purpose, we realize an algorithm of identifying the numbers and a character from the license plate, and an algorithm for determining the occurrence of a traffic event. To report the event, a function for automatic transmission of the text and image files through e-mail and file transfer protocol (FTP) is also appended. Therefore, if the traffic event is extended and applied to the presented system, it will be possible to establish a convenient reporting system for the violation of various traffic regulations. In addition, it will contribute to significantly reduce the number of traffic violations against the regulations.

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

Characteristics of a Turbidite Sediment from the Southern Margin of the Okinawa Trough, Japan (오끼나와해곡 남쪽해역의 저탁류 퇴적물의 특성)

  • 현상민
    • 한국해양학회지
    • /
    • v.30 no.2
    • /
    • pp.69-76
    • /
    • 1995
  • A turbidite core sediment (RN88-PC5) from 2051 m on the deep-sea floor at the southern margin of Okinawa Trough was examined. Sedimentological characteristics were quite different between sandy sediments and hemipelagic sediments and hemipelagic sediments in terms of benthic foraminiferal assemblage, grain-size and chemical composition. All turbidite sandy sediments were clearly transported from shallow area as they include typical coral reef dwelling benthic foraminifera which were not found in the background hemipelagic sediments. These layers also suggest that the sediments were transported by turbidity-related currents and implies that sedimentological mechanisms were different between sandy sediments and hemipelagic sediments. The result of the /SUP 14/ C age dating and the stable oxygen isotopic fluctuation of planktonic foraminifera show a gradual warming trend of the surface water from about 10 Ka to present. Also Termination lb as well as two fresh water input events were recognized at ca2 and 7 ka.

  • PDF

Marine terrace and its implications to paleoenvironment during the Quaternary at Suje-ri - Suryum-ri of the East coast of Gyeongju, SE Korea (한반도 남동부 경주시 수제리-수렴리의 해안단구와 제4기 환경변화)

  • HWANG, Sangill;SHIN, Jaeryul;YOON, Soon-Ock
    • Journal of The Geomorphological Association of Korea
    • /
    • v.19 no.3
    • /
    • pp.97-108
    • /
    • 2012
  • During the last few decades, the ever-increasing knowledge of coastal morphogenic processes has made marine terraces the most recognizable, widespread and scientifically reliable records to determine both qualitatively and quantitatively the vertical movements that have affected the tectonically active coastal regions during the Quaternary. This study first aims to address the marine terrace records from Suje-ri to Suryum-ri along the coast of Gyeongju, SE Korea. Eight distinct flights of terraces, including HH YC, elevated up to 160 m above present sea level have been mapped along the coast of the study areas, and are designated $L_{II}$ to HH YC from the youngest to oldest. Based on the elevation of paleo-shoreline and inferred formation age for HH YC uplift rate since the middle Pleistocene has been estimated at 0.23 mm/year. Establishing the nature and timing of the uplift history derived from marine terraces provide a better understanding of neotectonic framework for explain enigmatic, complex landscape evolution in the Korean peninsula.

Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database (인스턴트 메신저 말랑말랑 톡카페 애플리케이션 데이터베이스 복호화 방안 및 분석)

  • Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.541-547
    • /
    • 2019
  • As leakage cases of personal information increase, the concern of personal information protection is also increasing. As a result, most applications encrypt and store sensitive information such as personal information. Especially, in case of instant messengers, it is more difficult to find database where is not encrypted and stored. However, this kind of database encryption acts as anti-forensic from the point of view of digital forensic investigation. In this paper, we analyze database encryption process of MalangMalang Talkcafe application which is one of instant messenger. Based on our analysis, we propose a decryption method and explain the meaningful information collected in the database.