• Title/Summary/Keyword: 데이터 삽입

Search Result 769, Processing Time 0.03 seconds

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

A Design and Implementation A Software Profiling Tool based on XML for Embedded System (내장형 시스템 소프트웨어를 위한 XML 기반의 프로파일링 도구의 설계 및 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.143-151
    • /
    • 2010
  • According to increasing requirements in embedded systems. embedded software has been more complicated then before. a optimum software is difficult in embedded system. software developer make a difficult optimum software. this paper suggests a software profiling tool with which a software developer can easily profiling the embedded system software in cross-development environments. the suggested tool is designed based on host/target architecture. this tool insert program source for make profiling log to target program. a target program executed in target system. a target system communicate profiling log to host system. this tool in host system analyze profiling log data. and make a XML of profiling log and a profiling report. a profiling report is graphic viewer based GUI. a target system in this tool needs a few computing power. and XSLT can conversion of profile log XML to other format data. and suggested tool based on eclipse plug-in, therefore developer can use operates in eclipse.

Anonymous Fingerprinting Method using the Secret Sharing Scheme (비밀분산법을 이용한 익명성 보장 핑거프린팅 기법)

  • 용승림;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.353-359
    • /
    • 2004
  • The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous fingerprinting schemes, differ from symmetric fingerprinting, prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And the scheme, differ from asymmetric fingerprinting, allows the buyer to purchase goods without revealing her identity to the merchant. In this paper, a new anonymous fingerprinting scheme based on secret sharing is introduced. The merchant finds a sold version that has been distributed, and then he is able to retrieve a buyer's identity and take her to court. And Schnorr's digital signature prevents the buyer from denying the fact he redistributed. The buyer's anonymity relies on the security of discrete logarithm and secure two-party computations.

Development of a High-Speed Endoscopic OCT System and Its Application to Three-Dimensional Intravascular Imaging in Vivo (고속 내시경적 OFDI 시스템 개발과 이를 이용한 3차원 생체 혈관 내부 이미징)

  • Cho, Han Saem;Jang, Sun-Joo;Oh, Wang-Yuhl
    • Korean Journal of Optics and Photonics
    • /
    • v.25 no.2
    • /
    • pp.67-71
    • /
    • 2014
  • Intravascular optical coherence tomography (OCT) enables imaging of the three-dimensional (3D) microstructure of a blood vessel wall. While 3D vascular visualization provides detailed information of the vessel wall and intraluminal structures, a longitudinal imaging pitch that is several times bigger than the imaging resolution of the system has limited true high-resolution 3D imaging. In this paper we demonstrate high-speed intravascular OCT in vivo, acquiring images at a rate of 350 frames per second. A 47-mm-long rabbit aorta was imaged in 3.7 seconds, after a short flush with contrast agent. The longitudinal imaging pitch was 34 micrometers, comparable to the transverse imaging resolution of the system. Three-dimensional volume rendering showed greatly enhanced visualization of tissue microstructure and stent struts, relative to what is provided by conventional intravascular imaging speeds.

Nacl Aqueous Solution Concentration Detection Using Slot-Coupled Capacitor Resonator (슬롯결합 커패시터 공진기를 이용한 Nacl 수용액 농도 검출)

  • Yun, Gi-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.29-35
    • /
    • 2018
  • In this paper, we proposed a high sensitivity sensor that can detect the concentration change of Nacl aqueous solutions by using a slot coupling capacitor resonator in sub-microwave band. The resonator applied to the sensor consists of a parallel plate capacitor connected to an inductive slot utilizing the ground plane of the microstrip line. Based on the measurement data of the dielectric characteristics according to the concentration change, the resonance frequency was determined in the UHF band where the concentration change is evident and the Nacl aqueous solution is inserted into the capacitor. Based on the simulation, the proposed resonator was designed and fabricated. The concentration level was varied from 0 to 400 mg/dl as 100 mg/dl step, and the transmission scattering coefficient ($S_{21}$) was successfully measured. Experimental results show that it is applicable to the concentration detection sensor in Nacl aqueous solution by obtaining minimum 1.8 dB($S_{21}$) at each step.

Optimization of the Tool Life Prediction Using Genetic Algorithm (유전 알고리즘을 이용한 공구 수명 예측 최적화)

  • Kong, Jung-Shik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.338-343
    • /
    • 2018
  • Recently, a computer numerical control (CNC) machine is used widely for mold making in various industries. In the operation of a CNC machine, the production quality and safety of workers are becoming increasingly important as the product process increases. A variety of tool life prediction studies has been conducted to standardize the quality of production and improve reproducibility. When the tool life is predicted using the conventional tool life equation, there is a large error between the experimental result and result by the conventional tool life equation. In this paper, an algorithm that can predict the precise tool life was implemented using a genetic algorithm.

An LSTM Method for Natural Pronunciation Expression of Foreign Words in Sentences (문장에 포함된 외국어의 자연스러운 발음 표현을 위한 LSTM 방법)

  • Kim, Sungdon;Jung, Jaehee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.4
    • /
    • pp.163-170
    • /
    • 2019
  • Korea language has postpositions such as eul, reul, yi, ga, wa, and gwa, which are attached to nouns and add meaning to the sentence. When foreign notations or abbreviations are included in sentences, the appropriate postposition for the pronunciation of the foreign words may not be used. Sometimes, for natural expression of the sentence, two postpositions are used with one in parentheses as in "eul(reul)" so that both postpositions can be acceptable. This study finds examples of using unnatural postpositions when foreign words are included in Korean sentences and proposes a method for using natural postpositions by learning the final consonant pronunciation of nouns. The proposed method uses a recurrent neural network model to naturally express postpositions connected to foreign words. Furthermore, the proposed method is proven by learning and testing with the proposed method. It will be useful for composing perfect sentences for machine translation by using natural postpositions for English abbreviations or new foreign words included in Korean sentences in the future.

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology (불법복제물 고속검색 및 Heavy Uploader 프로파일링 분석기술 연구)

  • Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1067-1078
    • /
    • 2020
  • With the development of internet technology, a lot of content is produced, and the demand for it is increasing. Accordingly, the number of contents in circulation is increasing, while the number of distributing illegal copies that infringe on copyright is also increasing. The Korea Copyright Protection Agency operates a illegal content obstruction program based on substring matching, and it is difficult to accurately search because a large number of noises are inserted to bypass this. Recently, researches using natural language processing and AI deep learning technologies to remove noise and various blockchain technologies for copyright protection are being studied, but there are limitations. In this paper, noise is removed from data collected online, and keyword-based illegal copies are searched. In addition, the same heavy uploader is estimated through profiling analysis for heavy uploaders. In the future, it is expected that copyright damage will be minimized if the illegal copy search technology and blocking and response technology are combined based on the results of profiling analysis for heavy uploaders.