• Title/Summary/Keyword: 아티팩트

Search Result 108, Processing Time 0.021 seconds

The Study on Forensic Methodology of Firefox OS (Firefox OS 포렌식 기법에 관한 연구)

  • Kim, Do-Su;Choi, Jong-hyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1167-1174
    • /
    • 2015
  • As the market share of smartphone exponentially increases in mobile market, a number of manufacturers have developed their own operating system. Firefox OS is an open source operating system for the smartphone and tablet which is being developed by the Mozilla Foundation. This OS is designed using JavaScript and operated based on HTML5. Even though the number of manufacturers which release the Firefox OS smartphone is consistently increasing, However it is difficult to analyze artifacts in a smartphone in terms of investigation since existing researches on Firefox OS focused on imaging velocity according to abstract forensic process and block size. In this paper, we propose how to collect data in Firefox OS while minimizing data loss and forensic analysis framework based on analysis results on system and user data leaving in a smartphone.

A Patch Packing Method Using Guardband for Efficient 3DoF+ Video Coding (3DoF+ 비디오의 효율적인 부호화를 위한 보호대역을 사용한 패치 패킹 기법)

  • Kim, Hyun-Ho;Kim, Yong-Ju;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.185-191
    • /
    • 2020
  • MPEG-I is actively working on standardization on the immersive video coding which provides up to 6 degree of freedom (6DoF) in terms of viewpoint. In a virtual space of 3DoF+, which is defined as an extension of 360 with motion parallax, looking at the scene from another viewpoint (another position in space) requires rendering an additional viewpoint using multiple videos included in the 3DoF+ video. In the MPEG-I Visual workgroup, efficient coding methods for 3DoF+ video are being studied, and they released Test Model for Immersive Video (TMIV) recently. This paper presents a patch packing method which packs the patches into atlases efficiently for improving coding efficiency of 3DoF+ video in TMIV. The proposed method improves the reconstructed view quality with reduced coding artifacts by introducing guardbands between patches in the atlas.

Study on SNS Application Data Decryption and Artifact (SNS 애플리케이션의 데이터 복호화 및 아티팩트 연구)

  • Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.583-592
    • /
    • 2020
  • With the popularization of smartphones, Social Networking Service (SNS) has become the means of communication for modern people. Due to the nature of the means of communication, SNS generates a variety of archive and preservation evidence. Therefore, it is a major analysis target in terms of digital forensic investigation. An application that provides SNS stores data in a central server or database in a smartphone inside for user convenience. Some applications provide encryption for privacy, which can be anti-forensic in terms of digital forensic investigation. Therefore, the study of the encryption method should be continuously preceded. In this paper, we analyzed two applications that provide SQLite-based database encryption through SQLCipher module. Each database was decrypted and key data was identified.

CUDA Acceleration of Super-Resolution Algorithm Using ELBP Classifier for Fisheye Images (광각 영상을 위한 ELBP 분류기를 이용한 초해상도 기법과 CUDA 기반 가속화)

  • Choi, Ji Hoon;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.84-91
    • /
    • 2016
  • Most recently, the technology of around view monitoring(AVM) system or the security systems could provide users with images by using a fisheye lens. The filmed images through fisheye lens have an advantage of providing a wider range of scenes. On the other hand, filming through fisheye lens also has disadvantages of distorting images. Especially, it causes the sharpness of images to degrade because the edge of images is out of focus. The influence of a blur still remains at the end of the range when the super-resolution techniques is applied in order to enhance the sharpness. It degrades the clarity of high resolution images and occurs artifacts, which leads to deterioration in the performance of super-resolution algorithm. Therefore, in this paper we propose self-similarity-based pre-processing method to improve the sharpness at the edge. Additionally, we implement the acceleration in the GPU environment of entire algorithm and verify the acceleration.

Removal of Edge Artifact due to Pertial Volume Effect in the Adaptive Template Filtering (적응 템플릿 필터링에서 복셀의 부분 볼륨 효과로 인한 헤지 아티팩트의 제거)

  • 안창범;송영철
    • Investigative Magnetic Resonance Imaging
    • /
    • v.4 no.2
    • /
    • pp.120-127
    • /
    • 2000
  • Adaptive template filtering has been proposed recently for enhancement of signal-to-noise ratio without loss of resolution. In the adaptive template filtering, an optimal template among multiple templates is selected, then linear least square error filtering based on the template is applied in vowel by vowel basis. In some magnetic resonance imaging, where the distribution of gray level has relatively small dynamic range, e.g., $T_1$ imaging, however, artificial stair-like artifact is observed at near edges. This is partially due to the edge enhancement effect in such yokels that contain multiple compounds at the boundaries of tissues. The gray levels of these yokels become similar gray levels of near dominant vowels that contain single compound by the adaptive filtering, which enlarges edge discontinuities. In this paper, we propose a technique to eliminate such artifact by identifying those yokels that contain multiple compounds and assigning the largest template for them. Filtered images with the proposed technique show substantial visual enhancement at the edges without degradation of peak signal-to-noise ratio compared to the original adaptive template filtering for both magnetic resonance images and phantom images.

  • PDF

A Study on Hacking E-Mail Detection using Indicators of Compromise (침해지표를 활용한 해킹 이메일 탐지에 관한 연구)

  • Lee, Hoo-Ki
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.21-28
    • /
    • 2020
  • In recent years, hacking and malware techniques have evolved and become sophisticated and complex, and numerous cyber-attacks are constantly occurring in various fields. Among them, the most widely used route for compromise incidents such as information leakage and system destruction was found to be E-Mails. In particular, it is still difficult to detect and identify E-Mail APT attacks that employ zero-day vulnerabilities and social engineering hacking techniques by detecting signatures and conducting dynamic analysis only. Thus, there has been an increased demand for indicators of compromise (IOC) to identify the causes of malicious activities and quickly respond to similar compromise incidents by sharing the information. In this study, we propose a method of extracting various forensic artifacts required for detecting and investigating Hacking E-Mails, which account for large portion of damages in security incidents. To achieve this, we employed a digital forensic indicator method that was previously utilized to collect information of client-side incidents.

Evaluation of Artifact and Noise in the Standard and MAR Algorithms with Variation of Examination Conditions of CT (Standard와 MAR 알고리즘에서 CT 검사조건 변화에 따른 인공물과 노이즈 평가)

  • Kim, Young-kuen;Yang, Sook;Wang, Tae-uk
    • Journal of radiological science and technology
    • /
    • v.43 no.2
    • /
    • pp.79-85
    • /
    • 2020
  • The influence of metal artifact in CT image depends on the type of metal materialsm, the reconstruction algorithm, and scan parameters. The presence of metal artifacts was quantitatively evaluated by applying the standard and MAR algorithms through the phantom study. In the change of tube voltage applied the standard algorithm, metal artifact decreased to 44.9% for 80 vs 120 kVp, 24% for 100 vs 120 kVp, while the image taken at 140 kVp increased the artifact by 19% compared to 120 kVp. When the tube current was increased from 100 to 300 mA, there was no significant difference in the CT value and noise. Black band and white strike artifacts occurred up to 65.9% in the adjacent ROI of the metal driver, whereas titanium screw produced lesser metal artifact than that of the metal driver. The combination of 120kVp or higher tube voltage-standard algorithm was effective in removing black band artifacts as well as white streak by high density materials. However, MAR reconstruction algorithm was useful in improving image quality under the environment of low kVp and high density materials, without increase of radiation exposure.

Build a Digital Evidence Map considered Log-Chain (로그 체인을 고려한 디지털증거지도 작성)

  • Park, Hojin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.523-533
    • /
    • 2014
  • It has been spent too much time to figure out the incident route when we are facing computer security incident. The incident often recurs moreover the damage is expanded because critical clues are lost while we are wasting time with hesitation. This paper suggests to build a Digital Evidence Map (DEM) in order to find out the incident cause speedy and accurately. The DEM is consist of the log chain which is a mesh relationship between machine data. And the DEM should be managed constantly because the log chain is vulnerable to various external facts. It could help handle the incident quickly and cost-effectively by acquainting it before incident. Thus we can prevent recurrence of incident by removing the root cause of it. Since the DEM has adopted artifacts in data as well as log, we could make effective response to APT attack and Anti-Forensic.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Geometry Padding for Segmented Sphere Projection (SSP) in 360 Video (360 비디오의 SSP를 위한 기하학적 패딩)

  • Kim, Hyun-Ho;Myeong, Sang-Jin;Yoon, Yong-Uk;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.25-31
    • /
    • 2019
  • 360 video is attracting attention as immersive media, and is also considered in VVC (Versatile Video Coding), which is being developed in JVET (Joint Video Expert Team) as a new video coding standard of post-HEVC. A 2D image projected from 360 video for its compression may has discontinuities between the projected faces and inactive regions, and they may cause the visual artifacts in the reconstructed video as well as decrease of coding efficiency. In this paper, we propose a method of efficient geometric padding to reduce these discontinuities and inactive regions in the projection format of SSP (Segmented Sphere Projection). Experimental results show that the proposed method improves subjective quality compared to the existing padding of SSP that uses copy padding with minor loss of coding gain.