• Title/Summary/Keyword: Digital Forgery

Search Result 99, Processing Time 0.024 seconds

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof (결함 있는 안전성 증명을 갖는 수신자 지정 서명기법들에 대한 정확한 안전성분석)

  • Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.37-48
    • /
    • 2010
  • Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.

The studies of developing latent fingerprint in general print papers by chemical reaction (화학반응을 이용한 일반 프린트용지의 잠재지문 현출에 관한 연구)

  • Roh, Seung-Chan;Choi, Mi-Jung;Kim, Man-Ki;Lee, Oho-Taick;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.155-163
    • /
    • 2007
  • Porosity paper evidence is encountered in case of forgery, kidnapping, fraud and terrorist activity. The present study was designed to evaluate the effect of three chemical reagents (Ninhydrin, 1,8-diazafluoren-9-one (DFO), Iodine fuming) to the quality of developed latent fingerprints on porosity printing papers and newspaper. In case of printing papers, print quality was better with Iodine fuming method than Ninhydrin and DFO treatment to developing latent fingerprints. Developing latent fingerprint on newspapers was achieved with Iodine fuming processing. The processing of Iodine fuming followed by DFO and by using blue light (orange red filter) exhibited better results with Iodine fuming. Enhancement of latent fingerprint detection image using Digital Imaging System was achieved.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Median Filtering Detection using Latent Growth Modeling (잠재성장모델링을 이용한 미디언 필터링 검출)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.61-68
    • /
    • 2015
  • In recent times, the median filtering (MF) detector as a forensic tool for the recovery of forgery images' processing history has concerned broad interest. For the classification of MF image, MF detector should be designed with smaller feature set and higher detection ratio. This paper presents a novel method for the detection of MF in altered images. It is transformed from BMP to several kinds of MF image by the median window size. The difference distribution values are computed according to the window sizes and then the values construct the feature set same as the MF window size. For the MF detector, the feature set transformed to the model specification which is computed using latent growth modeling (LGM). Through experiments, the test image is classified by the discriminant into two classes: the true positive (TP) and the false negative (FN). It confirms that the proposed algorithm is to be outstanding performance when the minimum distance average is 0.119 in the confusion of TP and FN for the effectivity of classification.

Digital video watermarking using fingerprint data (동영상 스트리밍 인증을 위한 지문 기반 워터마킹)

  • Jung, Soo-Yeun;Lee, Dong-Eun;Lee, Seong-Won;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.43-50
    • /
    • 2007
  • In this paper we propose a method that identifies users at H.264 streaming using watermarking with fingerprints. The watermark can efficiently reduce the potential danger of forgery or alteration. Especially a biometric watermark has various advantages. Among entire biometric characteristics, the fingerprint is the most convenient and economical. In this paper we propose a novel fingerprint-based watermarking technique that can survive under very low bit-rate compression. The proposed algorithm consists of enhancement of a fingerprint image, the watermark generation using the extracted feature coordinates, watermark insertion using discrete wavelet transform, and authentication. The proposed algorithm can achieve robust watermark extraction against 0.264 compressed videos.

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.