• Title/Summary/Keyword: 복제 검출

Search Result 90, Processing Time 0.037 seconds

An research of the error detection method and efficient recovery algorithms in the DNA double helix (DNA 이중나선에서의 오류위치 검출 방법 및 효율적인 복구 알고리즘 연구)

  • Kim, SokeHwan;Hur, Chang-Wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2557-2562
    • /
    • 2012
  • In order to maintain order in the genetic information at cells, it need ongoing monitoring and recovery system. DNA is accomplished by a combination of base pairs, Wrong base pairs is formed with a much more lower frequency than the normal DNA. if it does not modify and was accumulate, the Cells were died. In this study, mistakes of DNA replication and repair of the damaged part was introduced engineering concepts by mimicking DNA repair functions. It was presented recover the complementary part of the previously announced and presented an efficient algorithm at find and recover the complementary part.

Discriminator of Similar Documents Using the Syntactic-Semantic Tree Comparator (구문의미트리 비교기를 이용한 유사문서 판별기)

  • Kang, Won-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.636-646
    • /
    • 2015
  • In information society, the need to detect document duplication and plagiarism is increasing. Many studies have progressed to meet such need, but there are limitations in increasing document duplication detection quality due to technological problem of natural language processing. Recently, some studies tried to increase the quality by applying syntatic-semantic analysis technique. But, the studies have the problem comparing syntactic-semantic trees. This paper develops a syntactic-semantic tree comparator, designs and implements a discriminator of similar documents using the comparator. To evaluate the system, we analyze the correlation between human discrimination and system discrimination with the comparator. This analysis shows that the proposed discrimination has good performance. We need to define the document type and improve the processing technique appropriate for each type.

An research of the error detection method and efficient recovery algorithms in the DNA double helix. (DNA 이중나선에서의 오류위치 검출 방법 및 효율적인 복구 알고리즘 연구)

  • Kim, Soke-Hwan;Hur, Chang-Wu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.293-297
    • /
    • 2012
  • In order to maintain order in the genetic information at cells, it need ongoing monitoring and recovery system. DNA is accomplished by a combination of base pairs, Wrong base pairs is formed with a much more lower frequency than the normal DNA. if it does not modify and was accumulate, the Cells were died. In this study, mistakes of DNA replication and repair of the damaged part was introduced engineering concepts by mimicking DNA repair functions. It was presented recover the complementary part of the previously announced and presented an efficient algorithm at find and recover the complementary part.

  • PDF

Watermarking Technique for the Digital Contents Protection (디지털콘덴츠 보호를 위한 워터마킹 기술)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.66-72
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of ilegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based chi the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we have researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

Watermarking Technique for the Digital Contents Protection (영상 콘텐츠 지적재산권 보호 워터마킹 기술)

  • 송학현;김윤호;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.144-148
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

Blockchain-based Distributed Database System for Efficient Falsification Detection and Reliable Inquiry of Faultless Automobile Driving Information (효율적 위·변조 탐지 및 무결한 차량 운행 정보의 안정적 질의를 위한 블록체인 기반 분산 데이터 관리 방안 연구)

  • Moon, Junoh;Min, Chanki;Lim, Jongmin;Yoon, Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.133-136
    • /
    • 2019
  • 차량에서 생성되는 데이터의 가치가 상승함에 따라 데이터 소스와 데이터 내용에 대한 보안 위협 또한 증가하고 있다. 데이터 소스인 차량의 경우에는 운행의 안정성을 보장하고자 블록체인을 결합하려는 시도가 있어왔지만, 무결한 차량 운행 데이터 관리 시스템에 대한 이해 부족으로 데이터 위·변조 등 차량 데이터에 대한 사이버 공격에 적절히 대응하지 못하고 있다. 이에 본 논문은 수집된 차량 데이터의 무결성을 보장하고 수집된 데이터에 대한 질의가 가능한 블록체인 기반 데이터 베이스 시스템을 제안한다. 본 시스템을 통하여 분산 합의 기반 데이터 무결성 검증, 블록을 구성하는 해시트리의 복제 저장 없이 위·변조된 차량 데이터 검출, 일정 수준의 장애를 허용한 상태 하에서의 질의문 처리 등이 가능해진다. 본 시스템은 높은 공간 효율성과 확장성을 가지며, 수소전기차 공유 업체의 차량 운행 정보를 바탕으로 한 성능 평가 결과 평균적으로 데이터 블록 저장에 4.0 초, 각 블록 검증에 2.4 초, 질의 처리를 위한 합의 과정에 1.3 초가 소요됨을 확인하였다.

Optical encryption system using visual cryptography and virtual phase images (시각 암호화와 가상 위상영상을 이용한 광 암호화 시스템)

  • 김인식;서동환;신창목;조규보;김수중;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.630-635
    • /
    • 2003
  • We propose an encryption method using visual cryptography and virtual phase images. In the encryption process, the original image is shared by virtual images and the decryption key image. We multiply the virtual phase images with each complex image, which has the constant value of its sum after performing the phase modulation of the virtual images and the decryption key. The encryption cards are made by Fourier transforming the multiplied images. It is possible to protect information about the original image because the cards do not have any information from the original image. To reconstruct the original image, all the encryption cards are placed on each path of a Mach-Zehnder interferometer and then the lights passing through them are summed. Since the summed image is inverse Fourier transformed by a Fourier lens, the phase image is multiplied with the decryption key and the output image is obtained in the form of intensity on the CCD plane. Computer simulations show a good performance of the pro-posed optical security system.

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

Combination of Colony Formation and Congo Red Reaction for Detecting Intra- and Extra-Cellular Cellulolytic Activities (세포내외 섬유소 분해능 검출을 위한 Colony 형성과 Congo Red반응의 병용)

  • Lee, D.S.;Kim, H.K.;Pack, M.Y.
    • Microbiology and Biotechnology Letters
    • /
    • v.12 no.4
    • /
    • pp.305-309
    • /
    • 1984
  • A selective medium which allows growth of only cellulolytic bacteria was developed. The medium composed of 0.5% carboxymethylcellulose (CMC), 0.005% yeast extract, minerals and agar. Colony formation on this medium indicates overall activities of cellulose utilization. A subsequent test with Congo Red dye could distinguish extracellular cellulolysis from intracellular type.

  • PDF

Optical Encryption using a Random Phase Image and Shift Position in Joint Transform Correlation Plane (결합 변환 상관 평면의 이동 변위와 무작위 위상 영상을 이용한 광 암호화 시스템)

  • Shin, Chang-Mok;Lee, Woo-Hyuk;Cho, Kyu-Bo;Kim, Soo-Joong;Seo, Dong-Hoan;Lee, Sung-Geun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.248-255
    • /
    • 2006
  • Most optical security systems use a 4-f correlator, Mach-Zehnder interferometer, or a joint transform correlator(JTC). Of them, the JTC does not require an accurate optical alignment and has a good potential for real-time processing. In this paper, we propose an image encryption system using a position shift property of the JTC in the Fourier domain and a random phase image. Our encryption system uses two keys: one key is a random phase mask and the other key is a position shift factor. By using two keys, the proposed method can increase the security level of the encryption system. An encrypted image is produced by the Fourier transform for the multiplication image, which resulted from adding position shift functions to an original image, with a random phase mask. The random phase mask and position shift value are used as keys in decryption, simultaneously. For the decryption, both the encrypted image and the key image should be correctly located on the JTC. If the incorrect position shift value or the incorrect key image is used in decryption, the original information can not be obtained. To demonstrate the efficiency of the proposed system, computer simulation is performed. By analyzing the simulation results in the case of blocking of the encrypted image and affecting of the phase noise, we confirmed that the proposed method has a good tolerance to data loss. These results show that our system is very useful for the optical certification system.