• Title/Summary/Keyword: 위조

Search Result 630, Processing Time 0.026 seconds

Fast Image Splicing Detection Algorithm Using Markov Features (마코프 특징을 이용하는 고속 위조 영상 검출 알고리즘)

  • Kim, Soo-min;Park, Chun-Su
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.227-232
    • /
    • 2018
  • Nowadays, image manipulation is enormously popular and easier than ever with tons of convenient images editing tools. After several simple operations, users can get visually attractive images which easily trick viewers. In this paper, we propose a fast algorithm which can detect the image splicing using the Markov features. The proposed algorithm reduces the computational complexity by removing unnecessary Markov features which are not used in the image splicing detection process. The performance of the proposed algorithm is evaluated using a famous image splicing dataset which is publicly available. The experimental results show that the proposed technique outperforms the state-of-the-art splicing detection methods.

Performance Improvement of Fake Discrimination using Time Information in CNN-based Signature Recognition (CNN 기반 서명인식에서 시간정보를 이용한 위조판별 성능 향상)

  • Choi, Seouing-Ho;Jung, Sung Hoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.205-212
    • /
    • 2018
  • In this paper, we propose a method for more accurate fake discrimination using time information in CNN-based signature recognition. To easily use the time information and not to be influenced by the speed of signature writing, we acquire the signature as a movie and divide the total time of the signature into equal numbers of equally spaced intervals to obtain each image and synthesize them to create signature data. In order to compare the method using the proposed signature image and the method using only the last signature image, various signature recognition methods based on CNN have been experimented in this paper. As a result of experiment with 25 signature data, we found that the method using time information improves performance in fake discrimination compared to the existing method at all experiments.

A Study on Counterfeit Electronic Parts Identification and Verification Methods to Improve the Reliability of Weapons Systems in Mass Production Phase (양산단계 무기체계 신뢰성 향상을 위한 위조 전자부품 식별 및 검증 방안에 대한 연구)

  • Kim, Byung-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.617-624
    • /
    • 2020
  • Due to the rapid development of science technology and the main characteristics of the defense industry, such as long development period, design complexity, high possibility of discontinuing parts due to long life cycle, and small quantity production, it can cause increasing of the inflow possibility of counterfeit electronic parts and deteriorating the reliability of weapons systems. This paper presents the specific criteria for the identification of electronic parts to be verified for mass produced weapons systems after the development is completed, and the identification and verification methods for the inflow of counterfeit electronic components.

A Security Analysis of PMAC and TMAC variant (PMAC과 TMAC 변이 알고리즘에 대한 안전성 고찰)

  • 이창훈;김종성;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.91-96
    • /
    • 2004
  • In this paper, we introduce two forgery attacks on the PMAC. If it has no truncation then the attack requires about $2^{n}$ 2+1/ chosen texts, otherwise, the attack requires about $2^{n}$ 2+1/ chosen texts and $2^{n-}$$\tau$ MAC verifications where $\tau$ is the size of the MAC. We also give a forgery attack on the TMAC variant which requires about $2^{n}$ 2+1/ texts.

Studies on Screening Rice Cultivars for Drought Resistance I. Screening at Seedling Stage (수도 한발저항성 품종 선발에 관한 연구)

  • Hak-Soo SUH
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.24 no.3
    • /
    • pp.7-12
    • /
    • 1979
  • Seven hundred and forty eight rice cultivars were screened for drought tolerance at seedling stage in a special green house. A number of cultivars such as Wonkiljo, Hanyangdo, YR 52-$_{x}\textrm{BF}_7-67, Satominori, Mamoriaka, Akanomochi 114, Thkebenimochi, IR 937-55-3, IR2735-F_3B-6-2, IR 2871-53-2, $_{x}\textrm{BFI76}^9/Dwan, Khoo lliok Mali-4-2-105, Os6, Palawan, IRAT10, TOS 2583 and H-l05 seemed to be tolerant to drought at seedling stage. There was negative correlation between drought resistance score and growth of plant height and water content of culm and leaf after drought treatment, and highly positive correlation between resistance to blast and resistance to drought at seedling stage. There was no relationship between drought resistance and germination speed, plant height before drought treatment.

  • PDF

Verification Method to Detect the Fake Test Data in Military Supplies (군수업체 시험 데이터 및 시험 시스템 유효성 점검을 위한 제언)

  • Chung, Ilhan;Joo, Jinchun;Kim, Sunggon;Cho, Hyeonghwan;Ahn, Namsu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.231-240
    • /
    • 2016
  • Recently, fake test data of power cables in nuclear power plants was a terrible shock to the citizens. Some cable companies manipulated the test data to make unfair profits. In addition, fake test data cases were found in military supplies. The fake test data cases focused on parts of army's tank, armored car. This paper propose a new method that can detect fake test data using known statistical methods. In addition, the method was implemented in Microsoft Excel to allow easy use. Lastly, a check sheet was proposed to check the validity of the test system of military suppliers. By detecting and checking the fake test data, it is expected that our new method will play an important role in quality assurance of military supplies.

Mobile Finger Signature Verification Robust to Skilled Forgery (모바일환경에서 위조서명에 강건한 딥러닝 기반의 핑거서명검증 연구)

  • Nam, Seng-soo;Seo, Chang-ho;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1161-1170
    • /
    • 2016
  • In this paper, we provide an authentication technology for verifying dynamic signature made by finger on smart phone. In the proposed method, we are using the Auto-Encoder-based 1 class model in order to effectively distinguish skilled forgery signature. In addition to the basic dynamic signature characteristic information such as appearance and velocity of a signature, we use accelerometer value supported by most of the smartphone. Signed data is re-sampled to give the same length and is normalized to a constant size. We built a test set for evaluation and conducted experiment in three ways. As results of the experiment, the proposed acceleration sensor value and 1 class model shows 6.9% less EER than previous method.

A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor (광학식 지문센서에서의 위조 지문 검출 방법)

  • Lee, Ji-Sun;Kim, Jae-Hwan;Chae, Jin-Seok;Lee, Byoung-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.492-503
    • /
    • 2008
  • With the recent development and increasing importance of personal identification systems, biometric technologies with less risk of loss or unauthorized use are being popularized rapidly. In particular, because of their high identification rate and convenience, fingerprint identification systems are being used much more commonly than other biometric systems such as iris recognition, face recognition and vein pattern recognition. However, a fingerprint identification system has the problem that artificially forged finger-prints can be used as input data. Thus, in order to solve this problem, the present study proposed a method for detecting forged fingerprints by measuring the degree of attenuation when the light from an optical fingerprint sensor passes through the finger and analyzing changes in the transmission of light over stages at fixed intervals. In order to prove improvement in the performance of the proposed system, we conducted an experiment that compared the system with an existing multi-sensor recognition system that measures also the temperature of fingerprint. According to the results of the experiment, the proposed system improved the forged fingerprint detection rate by around 32.6% and this suggests the possibility of solving the security problem in fingerprint identification systems.

  • PDF

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Fuzzy based Path Selection Method for Improving Detection Power in Sensor Networks (센서 네트워크에서 거짓 보고서 탐지 능력을 향상시키기 위한 퍼지 기반의 경로 선택 방법)

  • Seon, Cheong-Il;Jo, Dae-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.304-307
    • /
    • 2007
  • 센서 네트워크 응용 분야에서 센서 노드들은 무인 환경에서 배치되므로, 물리적인 공격들과 노드가 가진 암호 키들이 손상되기 쉬운 취약성을 가진다. 공격자는 노드를 훼손시켜 위조 보고서를 침투 시킬 수 있고, 이는 거짓 경보를 유발시켜 네트워크의 제한된 에너지의 고갈을 야기한다. 이러한 문제점을 보안하기 위해 최근 연구자들은 통계적 여과 기법을 통해서 위조 보고서를 탐지하고 도중에 여과시키는 방안을 제시하였다. 이 제안된 방안에서 각 노드는 검증을 위한 일정한 양의 정보를 가지며, 탐지 능력은 라우팅 경로의 선택에 의해 영향을 받는다. 본 논문에서는, 퍼지를 사용하여 통계적 여과 기법의 위조 보고서 탐지 능력 향상을 위해 네트워크 전체 상황을 고려하여 거짓 보고서 침투 공격에 대해 가장 안전한 경로를 선택하는 방법을 제안한다.

  • PDF