• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.024 seconds

A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information (RGB-D 정보를 이용한 2차원 키포인트 탐지 기반 3차원 인간 자세 추정 방법)

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.41-51
    • /
    • 2018
  • Recently, in the field of video surveillance, deep learning based learning method is applied to intelligent video surveillance system, and various events such as crime, fire, and abnormal phenomenon can be robustly detected. However, since occlusion occurs due to the loss of 3d information generated by projecting the 3d real-world in 2d image, it is need to consider the occlusion problem in order to accurately detect the object and to estimate the pose. Therefore, in this paper, we detect moving objects by solving the occlusion problem of object detection process by adding depth information to existing RGB information. Then, using the convolution neural network in the detected region, the positions of the 14 keypoints of the human joint region can be predicted. Finally, in order to solve the self-occlusion problem occurring in the pose estimation process, the method for 3d human pose estimation is described by extending the range of estimation to the 3d space using the predicted result of 2d keypoint and the deep neural network. In the future, the result of 2d and 3d pose estimation of this research can be used as easy data for future human behavior recognition and contribute to the development of industrial technology.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

A Study on Improvement of the investigation procedure for the National Security Violators - Focused on the Rights to Counsel - (안보사범에 대한 수사절차 개선방안 검토 - 피의자 신문시 변호인 참여권 문제를 중심으로 -)

  • Yoon, Hae-Sung;Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.113-140
    • /
    • 2016
  • Right to counsel means a defendant has a right to have the assistance of counsel (i.e., lawyers), and if the defendant cannot afford a lawyer, requires that the government appoint one or pay the defendant's legal expenses. The right to counsel is generally regarded as a constituent of the right to a fair trial. Historically, however, not all countries have always recognized the right to counsel. The right is often included in criminal law and constitutional law etc. First, any person who is arrested or detained shall have the right to prompt assistance of counsel. When a criminal defendant is unable to secure counsel by his own efforts, the State shall assign counsel for the defendant as prescribed by act in article 12(4) of the constitutional law. Second, the defense counsel or a person who desires to be a defense counsel may have an interview with the defendant or the suspect who is placed under physical restraint, deliver or receive any documents or things and have any doctor examine and treat the defendant or the suspect in article 34 of the criminal law. Nonetheless, problems about guarantee of the rights to counsel to the national security violators like spy terrorist and etc will be important for Koreans to consider. That is because national security violators's cases are qualitatively different from general criminal offense's cases and historically, lawyer obstruct a investigation in the process of examination of a suspect for national security violators. Therefore, this study suggest a way that a restriction the rights to counsel with an attorney in cases of the national security violators. To this end, in this paper, I touch on restriction of right to counsel during interrogation in the England and Germany etc in comparison to that of Korea and review Korea's Supreme Court decision and Constitution Court decision to understand the prospective and trends for Korean investigation procedure improvement.

  • PDF

A study on factors affecting high school students of school violence - Focusing on personality factors - (고등학생의 학교폭력에 영향을 미치는 요인에 관한 연구 : 인성요인을 중심으로)

  • Lee, Jung-Duk;Chang, Jeong-Hyeon
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.393-422
    • /
    • 2015
  • The school is committed to the role of public education for the effective development of student academic achievement and intellectual ability. It is also a space to expand the range of care and understanding for others with as a member of the academic community as well. However, the reality of our country schooling has been pointed out that if a lot about the lack of character education related to the attitude of life care for others and feel a sense of responsibility. An individual is not necessarily emotional intelligence There are side out, as well as grow into adults, schools are obliged to teach a variety of methods associated with it. Nevertheless, education is not of the country beyond the formal excessive administrative work or other activities due to the process of character education to neglect, including the work of teachers. Therefore, students brought the expansion of the act that should not, and eventually lead to serious social issues that directly harm others, such as school violence. Therefore, students brought the expansion of the act that should not, and eventually lead to serious social issues that directly harm others, such as school violence. This study is based on an act of juvenile delinquency and criminology education was to refine the concept of toughness and validate the relationship between school violence through empirical research. Accordingly, from July 1, 2013 September 31, 2013 to 277 high schools across the country are attending the third year of the schools available for non-response and analysis of the students who participated in the admission and simulated typical presentation of K University in Gyeonggi-do not judge students in the final analysis, except for the data and data from a total of 1045 patients were utilized. As a result, many schools have experienced violence, male student work can be applied to a lot of rock school violence was experienced. Also, a lot of experience can be applied to a healthy student rock school violence, anger-control and empathy, this is considered a low student showed consciousness experienced school violence exerted.

  • PDF

Über die Struktur und die Problematik des Schwangerschaftsabbruchs - Im Vergleich vom Schwangerschaftsabbruch des deutschem Rechts - (낙태죄의 구조와 문제점 - 독일형법에서의 낙태죄 규제와의 비교를 중심으로 -)

  • Lee, Jeong-Weon
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.193-216
    • /
    • 2018
  • Das Leben des Embryos ist als solche ein Rechtsgut, das einen durch das Strafrecht hinreichend $gesch{\ddot{u}}tzt$ werden sollen. Daher versteht es sich von selbst, $da{\ss}$ auch bei der Schwangere die ihren eigenen $empf{\ddot{a}}ngenen$ Embryo beseitigenden Handlungen nicht $unbeschr{\ddot{a}}nkt$ gebilligt werden $k{\ddot{o}}nnten$. Es $k{\ddot{o}}nnte$ bei der Schwangere wegen ihrer $Interessenverh{\ddot{a}}ltnisse$ mit ihrem Embryo z. B. endlosen deren Verantwortlichkeiten nur die $Erlaubnism{\ddot{o}}glichkeiten$ ${\ddot{u}}bergelegt$ werden. Wie der Bundesverfassungsgericht schon ${\ddot{u}}berzeugt$ hat, $k{\ddot{o}}nnte$ das Leben des Embryos keinen vom Strafrechtschutz $ausschlie{\ss}enden$ Teil anerkannt werden, sondern nur in besonderen $F{\ddot{a}}llen$ ausnahmsweise dessen Verletzung erlaubt werden. ${\ddot{U}}ber$ die Reichweite der ausnahmsweisen anerkannten Erlaubnisse gegen einer Rechtsgutsverletzung sollte es im Allgemeinen $abh{\ddot{a}}ngig$ unter Zeitraum und Umwelt konkret ausgefargt werden. Daher kann eine konkrete Diskussion ${\ddot{u}}ber$ Rechtsfertigungsgrund des Schwangerschaftsabbruchs nur erstenmal anfangen, nachdem ein strafrechtlicher Schutz des Embryolebens $pr{\ddot{a}}zis$ ausgeforscht wird. Bis jetzt hat das Strafrecht das Rechtsgut als Leben des Embryos zu leicht bewertet und damit hat die Strafe des Schwangerschaftsabbruchs zu niedrig bestimmt. Die niedrige Strafe des Schwangerschaftsabbruchs $enth{\ddot{a}}lt$ die Gefahr, die die Erlaubnisreichweite des Schwangerschaftsabbruchs ungerecht ausdehnt. Die Handlung der Schwangere sollte minder bestraft werden, um das Sebstbestimmungsrecht der Schwangere hoch $w{\ddot{u}}rdigen$ zu $k{\ddot{o}}nnen$. Letztlich braucht der Versuch des Schwangerschaftsabbruchs zu bestrafen. Der Versuch und die Vollendung ${\ddot{u}}ber$ die Verletzung des Embryolebens sollten deren Unterschiede im ihren Unrechtsgehalt anerkannt werden, weil der Normzweck des Schwangerschaftsabbruchs im Schutz des Lebens des Embryos besteht. Und damit in den $F{\ddot{a}}lle$, die in Folge des versuchten Schwangerschaftsabbruchs die Schwangere verletzt oder gestorben wird, $k{\ddot{o}}nnten$ die Meinungsstreiten $aufgeh{\ddot{o}}rt$ werden.

Influence of identifiable victim effect on third-party's punishment and compensation judgments (인식 가능한 피해자 효과가 제3자의 처벌 및 보상 판단에 미치는 영향)

  • Choi, InBeom;Kim, ShinWoo;Li, Hyung-Chul O.
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.135-153
    • /
    • 2020
  • Identifiable victim effect refers to the tendency of greater sympathy and helping behavior to identifiable victims than to abstract, unidentifiable ones. This research tested whether this tendency also affects third-party's punishment and compensation judgments in jury context for public's legal judgments. In addition, through the Identifiable victim effect in such legal judgment, we intended to explain the effect of 'the bill named for victim', putting the victim's real name and identity at the forefront, which is aimed at strengthening the punishment of related crimes by gaining public attention and support. To do so, we conducted experiments with hypothetical traffic accident scenarios that controlled legal components while manipulating victim's identifying information. In experiment 1, each participant read a scenario of an anonymous victim (unidentifiable condition) or a nonanonymous victim that included personal information such as name and age (identifiable condition) and made judgments on the degree of punishment and compensation. The results showed no effect of identifiability on third-party's punishment and compensation judgments, but moderation effect of BJW was obtained in the identifiable condition. That is, those with higher BJW showed greater tendency of punishment and compensation for identifiable victims. In Experiment 2, we compared an anonymous victim (unidentifiable condition) against a well-conducted victim (positive condition) and ill-conducted victim (negative condition) to test the effects of victim's characteristics on punishment for offender and compensation for victims. The results showed lower compensation for an ill-conducted victim than for an anonymous one. In addition, across all conditions except for negative condition, participants made punishment and compensation judgments higher than the average judicial precedents of 10-point presented in the rating scale. This research showed that victim's characteristics other than legal components affects third-party's legal decision making. Furthermore, we interpreted third-party's tendency to impose higher punishment and compensation with effect of 'the bill named for victim' and proposed social and legal discussion for and future research.

  • PDF

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

Effects of Social Exclusion on Displaced Aggression: the Mediatingon Effect of Stress and Conditional Direct Effect of Social Support (사회적 배제가 전위된 공격성에 미치는 영향: 스트레스의 매개효과 및 사회적지지의 조건부 직접효과)

  • Yoonjae Noh;Sangyeon Yoon
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.4
    • /
    • pp.455-476
    • /
    • 2023
  • This study focused on the characteristics of motiveless crimes that mainly originated from interpersonal problems and were acts of revenge against innocent third parties. This study confirmed the relationship between the experience of social exclusion and displaced aggression and examined the relationship between the two variables. We sought to confirm the role of related factors such as stress and social support. For this purpose, we established and tested hypotheses about the mediatingon effect of stress and the moderated mediatingon effect of social support on the effect of social exclusion experience on displaced aggression among 353 adult males aged between 19 and 49 years. The main results are that, first, social exclusion had a positive effect on displaced aggression. Second, stress was found to partially mediate the relationship between social exclusion and displaced aggression. Third, the hypothesis that social support would moderate the mediating effect of stress was not provedvaild, but the conditional direct effect of social support was confirmed in the mediation model. In other words, social support did not affect the indirect effect mediated by stress, but appeared to moderate the direct effect between social exclusion and displaced aggression. Social exclusion's prediction of displaced aggression was significant only in the average social support group (mean) and the high group (M+1SD), and appeared to increase as the group increased. This means that in groups with high social support, displaced aggression is used as a stress control strategy, which is a different result from previous studies that found that social support plays a role in lowerings aggression. People with low levels of social support showed unexpected results in that they used displaced aggression less frequently despite their experiencinge of social exclusion. In the discussion, the social implications of these results were interpreted, and additional research ideas were proposed to specify the relationship between social exclusion and displaced aggression.