• Title/Summary/Keyword: 아티팩트

Search Result 108, Processing Time 0.021 seconds

Blocking artefact noise reduction using block division (블록 나눔을 사용한 블로킹 아티팩트 잡음 감소)

  • Cha, Seong Won;Shin, Jae Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.47-53
    • /
    • 2008
  • Blocking artefact noise is necessarily happened in compressed images using block-coded algorithms such as JPEC compressing algorithm. This noise is more recognizable especially in highly compressed images. In this paper, an algorithm is presented for reduction of blocking artefact noise using block division. Furthermore, we also mention about the median filter which is often used in image processing.

A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness (포렌식 준비도 제고를 위한 윈도우의 파일 시스템 감사 기능 설정 방안에 관한 연구)

  • Lee, Myeong-Su;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.79-90
    • /
    • 2017
  • If digital forensic investigators can utilize file access logs when they audit insider information leakage cases or incident cases, it would be helpful to understand user's behaviors more clearly. There are many known artifacts related to file access in MS Windows. But each of the artifacts often lacks critical information, and they are usually not preserved for enough time. So it is hard to track down what has happened in a real case. In this thesis, I suggest a method to utilize SACL(System Access Control List) which is one of the audit functions provided by MS Windows. By applying this method of strengthening the Windows's audit settings, even small organizations that cannot adopt security solutions can build better environment for conducting digital forensic when an incident occurs.

Cancellation of MRI Motion Artifact in Image Plane (촬상단면내의 MRI 체동 아티팩트의 제거)

  • Kim, Eung-Kyeu
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.432-440
    • /
    • 2000
  • In this study, a new algorithm for canceling MRI artifact due to translational motion in image plane is described. Unlike the conventional iterative phase retrieval algorithm, in which there is no guarantee for the convergence, a direct method for estimating the motion is presented. In previous approaches, the motions in the x(read out) direction and the y(phase encoding) direction are estimated simultaneously. However, the features of x and y directional motions are different from each other. By analyzing their features, each x and y directional motion is canceled by different algorithms in two steps. First, it is noticed that the x directional motion corresponds to a shift of the x directional spectrum of the MRI signal, and the non-zero area of the spectrum just corresponds to the projected area of the density function on the x-axis. So the motion is estimated by tracing the edges between non-zero area and zero area of the spectrum, and the x directional motion is canceled by shifting the spectrum in inverse direction. Next, the y directional motion is canceled by using a new constraint condition, with which the motion component and the true image component can be separated. This algorithm is shown to be effective by using a phantom image with simulated motion.

  • PDF

Effective Noise Reduction using STFT-based Content Analysis (STFT 기반 영상분석을 이용한 효과적인 잡음제거 알고리즘)

  • Baek, Seungin;Jeong, Soowoong;Choi, Jong-Soo;Lee, Sangkeun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.145-155
    • /
    • 2015
  • Noise reduction has been actively studied in the digital image processing and recently, block-based denoising algorithms are widely used. In particular, a low rank approximation employing WNNM(Weighted Nuclear Norm Minimization) and block-based approaches demonstrated the potential for effective noise reduction. However, the algorithm based on low rank a approximation generates the artifacts in the image restoration step. In this paper, we analyzes the image content using the STFT(Short Time Fourier Transform) and proposes an effective method of minimizing the artifacts generated from the conventional algorithm. To evaluate the performance of the proposed scheme, we use the test images containing a wide range of noise levels and compare the results with the state-of-art algorithms.

Forensic Analysis of Element Instant Messenger Artifacts (포렌식 관점에서의 Element 인스턴트 메신저 아티팩트 분석)

  • Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1113-1120
    • /
    • 2022
  • Recently, the investigation has been difficult due to the emergence of messengers that encrypt and store data for the purpose of protecting personal information and provide services such as end-to-end encryption with a focus on security. Accordingly, the number of crime cases using security messengers is increasing, but research on data decoding for security messengers is needed. Element security messengers provide end-to-end encryption functions so that only conversation participants can check conversation history, but research on decoding them is insufficient. Therefore, in this paper, we analyze the instant messenger Element, which provides end-to-end encryption, and propose a plaintext verification of the history of encrypted secure chat rooms using decryption keys stored in the Windows Credential Manager service without user passwords. In addition, we summarize the results of analyzing significant general and secure chat-related artifacts from a digital forensics investigation perspective.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

Windows Artifacts Analysis for Collecting Cryptocurrency Mining Evidence (암호화폐 채굴 증거 수집을 위한 윈도우 아티팩트 분석 기술 연구)

  • Si-Hyeon Park;Seong-Hun Han;Won-hyung Park
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.121-127
    • /
    • 2022
  • Recently, social issues related to cryptocurrency mining are continuously occurring at the same time as cryptocurrency prices are rapidly increasing. In particular, since cryptocurrency can be acquired through cryptographic operation, anyone with a computer can easily try mining, and as the asset value of major cryptocurrencies such as Bitcoin and Ethereum in creases, public interest is increasing. In addition, the number of cases where individuals who own high-spec computers mine cryptocurrencies in various places such as homes and businesses are increasing. Some miners are mining at companies or public places, not at home, due to the heat problem of computers that consume a lot of electrical energy, causing various problems in companies as well as personal moral problems. Therefore, this study studies the technology to obtain evidence for the traces of mining attempts using the Windows artifacts of the computers that mined cryptocurrency. Through this, it is expected that it can be used for internal audit to strengthen corporate security.

A study on the Convergence Type of Smart City between Device/Technology and Artifact (스마트시티 디바이스/기술과 아티팩트의 융합유형에 관한 연구)

  • Han, Ju-Hyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.601-613
    • /
    • 2018
  • This study aims to find out the types of convergence types between devices/technology and artifact in smart city space. The main contents of the research are in-depth analysis on the convergence change of ET, IT, and ET+IT in a smart city. First, the devices/technology and artifacts through 31 cases study are found out below. There are 92 artifacts and 134 devices/technologies (ET:83, IT:51). Second, the convergence change between devices/technology and artifacts is evolved by 7 types. Type 1, the Evolutionary ET type of ET-centric, is Period 1 (Separation fusion between ET and IT), Period 2 (ET-centric fusion), and Period 3 (Growth IT and ET+IT fusion of ET-centric). Type 2, the Advanced ET type of ET+IT-centric, is Period 1 (ET+IT fusion), Period 2 (Advanced ET of ET+IT-centric), and Period 3 (Hyper-advanced ET of ET+IT-centric). Type 3, the All-in-One type of ET+IT, is Period 1 (Separation fusion between ET and IT), Period 2 (Mixed fusion between ET and IT), and Period 3 (All-in-One fusion of ET and IT). Type 4, the Advanced type of IT-centric, is Period 1 (Development of IT-centric), Period 2 (Advanced IT-centric), and Period 3 (Hyper-advanced IT-centric). Types 5 and 6, the Advanced together type of ET+IT, is Period 1 (Developed IT of ET+IT-centric), Period 2 (Advanced IT of ET+IT-centric), and Period 3 (Hyper-advanced IT of ET+IT-centric). Type 7, the Advanced IT type of ET+IT-centric, is Period 1 (ET+IT fusion), Period 2 (Sub-fusion of ET, Advanced IT), and Period 3 (Sub-fusion of ET, Hyper-advanced IT). This study results are going to expect making new types of convergence through further study.

An Efficient Method of Patch Packing for 3DoF+ Video Coding (3DoF+ 비디오의 효율적인 부호화를 위한 패치 패킹 기법)

  • Kim, Yong-Ju;Kim, Hyun-Ho;Kim, Jae-Gon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.206-207
    • /
    • 2019
  • MPEG 에서는 최대 6 자유도(6DoF)를 가지는 몰입형 미디어의 압축 표준화를 진행하고 있다. 360 비디오에 움직임 시차(parallax)를 추가한 것으로 정의되는 3DoF+의 가상 공간에서, 원하는 위치의 장면을 제공하려면 다른 위치에서 찍은 여러 비디오를 사용하여 임의의 원하는 시점의 뷰(view)를 렌더링 해야 한다. MPEG-I Visual 그룹에서는 이러한 3DoF+ 비디오의 효율적인 부호화 및 전송을 위한 표준화가 진행되고 있으며, 최근 시험모델(TMIV)을 개발하고 있다. 본 논문은 TMIV 에서 패치(patch)를 아틀라스(atlas)에 효율적으로 패킹하여 부호화 성능을 향상시킬 수 있는 패치 패킹 방법을 제안한다. 제안 방식은 패킹되는 패치들 간에 보호 대역(Guard Band)를 적용하여 패치간의 거리를 둠으로써 부호화로 인해 발생할 수 있는 아티팩트(artifact)를 줄여 최종 복원 뷰의 화질을 향상시킨다.

  • PDF

Cancellation of MRI Motion Artifact in Image Plane (촬상단면내의 MRI 체동 아티팩트의 제거)

  • 김응규;권영도
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.631-634
    • /
    • 1999
  • In this work, a new algorithm for canceling MRI artifact in the image plane is presented. In the conventional approach, the motions in the X(readout) direction and Y(the phase encoding) direction are estimated simultaneously. However, the feature of each X and Y directional motion is different. First, we notice that the X directional motion corresponds to a shift of the X directional spectrum of the MRI signal, and the non zero area of the spectrum just corresponds to X axis projected area of the density function. So the motion is estimated by tracing the edges of the spectrum, and the X directional motion is canceled by shifting the spectrum in inverse direction. Next, the Y directional motion is canceled using a new constraint, with which the motion component and the true image component can be separated. This algorithm is shown to be effective by simulations.

  • PDF