• Title/Summary/Keyword: 위변조

Search Result 473, Processing Time 0.026 seconds

A Study on the Integrated Electronic Medical Record System Using QR Code (QR코드를 활용한 통합전자의무기록 시스템에 관한 연구)

  • Yun Hwan Oh;Deok Gyu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.330-331
    • /
    • 2023
  • 의료정보의 클라우드화는 허용되었지만 정작 의료현장에서의 영향력은 매우 낮은 상황이다. 이에 따라 통합전자의무기록 시스템을 제안해 전자의무기록의 클라우드화와 QR코드를 활용해 주민등록증의 노출 및 위변조 될 우려를 낮출 수 있으며 사용자의 중복검사를 막아 비용과 시간을 절약할 수 있다.

A Two-Dimensional Code for Bit Patterned Magnetic Recording Channel (비트 패턴 자기기록 채널을 위한 2차원 변조부호)

  • Kim, Gukhui;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.9
    • /
    • pp.739-743
    • /
    • 2013
  • In this paper, a two-dimensional (2-D) channel code for magnetic patterned media is proposed. Patterned media records an information bit on a magnetized dot. Since the space between adjacent tracks is narrow in order to increase the storage density, inter-track interference (ITI) and inter-symbol interference (ISI) can be problems. The amplitude of a bit signal can be corrupted by the 2-D ISI. The signal of the bit surrounded by the same value can be especially destructive, i.e. when its value is the same as the values of the eight surrounding bits. The proposed modulation coding scheme improves the decoding performance of patterned media by preventing this worst case and provides a better code rate than conventional channel codes.

A Low-Complexity Sphere Decoding Algorithm for Generalized Spatial Modulation (일반화 공간 변조를 위한 저복잡도 구복호 수신기)

  • Jeon, EunTak;Yoon, SungMin;Lee, JaeSeong;Woo, DaeWi;Lee, Kyungchun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.30-36
    • /
    • 2016
  • In this paper, an Rx-ordering aided sphere decoding algorithm for generalized spatial modulation (GSM) systems is proposed. In the proposed sphere decoding algorithm, to efficiently reduce the search region, the received signals are optimally ordered, which results in the reduction of computational complexity. To evaluate the performance and the computational complexity of the proposed Rx-ordered sphere decoding algorithm, the simulations are performed. In the simulation results, it is observed that in GSM systems, the proposed decoding algorithm achieves the same error performance with the conventional SD, whereas it efficiently decreases the computational complexity for symbol detection.

2/3 Modulation Code and Its Vterbi Decoder for 4-level Holographic Data Storage (4-레벨 홀로그래픽 저장장치를 위한 2/3 변조부호와 비터비 검출기)

  • Kim, Gukhui;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.10
    • /
    • pp.827-832
    • /
    • 2013
  • Holographic data storage system is affected by two dimensional intersymbol interference and inter-page interference. Especially, for multi-level holographic data storage system, since one pixel contains more than 1 bit, the system is more vulnerable to the error. In this paper, we propose a 2/3 modulation code for 4-level holographic data storage system. The proposed modulation code with error correcting capability could be compensated these interferences. Also, in this paper, we proposed a Viterbi decoder for 2/3 modulation code. The proposed Viterbi decoder eliminates unnecessary calculation. As a result, proposed 2/3 modulation code and Viterbi decoder has shown better performance than conventional one.

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

A Design of KDPC(Key Distributed Protocol based on Cluster) using ECDH Algorithm on USN Environment (USN 환경에서 ECDH 알고리즘을 이용한 KDPC(Key Distribution Protocol based on Cluster) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.856-858
    • /
    • 2013
  • The data which is sensed on USN(Ubiquitous Sensor Network) environment is concerned with personal privacy and the secret information of business, but it has more vulnerable characteristics, in contrast to common networks. In other words, USN has the vulnerabilities which is easily exposed to the attacks such as the eavesdropping of sensor information, the distribution of abnormal packets, the reuse of message, an forgery attack, and denial of service attacks. Therefore, the key is necessarily required for secure communication between sensor nodes. This paper proposes a KDPC(Key Distribution Protocol based on Cluster) using ECDH algorithm by considering the characteristics of sensor network. As a result, the KDPC can provide the safe USN environment by detecting the forgery data and preventing the exposure of sensing data.

  • PDF

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

Development and validation of a PCR method to discriminate between Branchiostegus japonicus and Branchiostegus albus (옥돔과 옥두어 판별을 위한 PCR 검사법 개발과 검증)

  • Kim, Na-Ye-Seul;Yang, Ji-Young;Kim, Jung-Beom
    • Korean Journal of Food Science and Technology
    • /
    • v.51 no.3
    • /
    • pp.295-299
    • /
    • 2019
  • We developed and validated species-specific primers for Branchiostegus japonicus and Branchiostegus albus to prevent the sale of B. albus as B. japonicus. Primers for B. japonicus and B. albus were designed against the cytochrome b gene. Multiplex PCR showed a 288 bp amplicon for B. japonicus, a 159 bp amplicon for B. albus, and a 502 bp amplicon for the internal control. The PCR product bands for B. japonicus, B. albus, and the internal control were present at 1 ng each. The specificity and sensitivity of the primers developed in this study were validated by testing 38 B. japonicus strains and 13 B. albus strains. Using this monitoring method, fake fish did not appear due to the agreement between the experimental results and the species. Therefore, the developed multiplex PCR method was suitable for differentiating B. japonicus and B. albus.

A Protection Profile for E-Document Issuing System (온라인증명서 발급시스템 보호프로파일에 관한 연구)

  • Lee, Hyun-Jung;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.109-117
    • /
    • 2011
  • We can use document issuance services provided by a school, bank, hospital, company, etc. either by visiting those facilities or by simply visiting their Web sites. Services available through the Internet allow us to use the same services as we do by actually going to those facilities at home or office any time. As much as it saves us time and money, there also arises a problem of information being forged on the Internet or on a printed document. There has to be security functions to deal with the problem. This paper intends to think of the possible security threats and draw out the necessary security functions that an on-line document issuance system should have based on the CC v3.1, so that anyone can use it as reference when they evaluate or introduce the system.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.