• Title/Summary/Keyword: Code Scanning

Search Result 77, Processing Time 0.025 seconds

Image Steganography to Hide Unlimited Secret Text Size

  • Almazaydeh, Wa'el Ibrahim A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.73-82
    • /
    • 2022
  • This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

COMPONENT-BASED DEVELOPMENT OF OBSERVATIONAL SOFTWARE FOR KASI SOLAR IMAGING SPECTROGRAPH

  • Choi, Seong-Hwan;Kim, Yeon-Han;Moon, Yong-Jae;Choi, Kyung-Seok;Park, Young-Deuk;Jang, Bi-Ho;Kim, Su-Jin;Kim, Kap-Sung
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.4
    • /
    • pp.463-470
    • /
    • 2005
  • In this paper, we have made the component-based development of observational software for KASI solar imaging spectrograph (KSIS) that is able to obtain three-dimensional imaging spectrograms by using a scanning mirror in front of the spectrograph slit. Since 2002, the KASI solar spectrograph has been successfully operated to observe solar spectra for a given slit region as well as to inspect the response functions of narrow band filters. To improve its capability, we have developed the KSIS that can perform sequential observations of solar spectra by simultaneously controlling the scanning mirror and the CCD camera via Visual C++. Main task of this paper is to introduce the development of the component-based software for KSIS. Each component of the software is reusable on the level of executable file instead of source code because the software was developed by using CBD (component-based development) methodology. The main advantage of such a component-based software is that key components such as image processing component and display component can be applied to other similar observational software without any modifications. Using this software, we have successfully obtained solar imaging spectra of an active region (AR 10708) including a small sunspot. Finally, we present solar $H{\alpha}$ spectra ($6562.81{\AA}$) that were obtained at an active region and a quiet region in order to confirm the validity of the developed KSIS and its software.

An Adaptive ROI Mask Generation for ROI coding of JPEG2000 (JPEG200의 관심영역 부호화를 위한 적응적인 관심영역 마스크 생성 방법)

  • Kang, Ki-Jun;Seo, Yeong-Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.39-47
    • /
    • 2007
  • In this thesis, a method of generating an adaptable Region-Of-Interest(ROI) Mask for the Region-Of-Interest coding is suggested. In the method, an ROI Mask is generated using the information of the ROI designated by a user. In the existed method of ROI coding, after scanning all the pixels in order and discriminating an ROI, an ROI Mask is generated. But, in our method, after scanning a part of pixels based on the shape pattern of an ROI and discriminating a ROI by one code block unit, an ROI Mask is generated. Moreover, from the method, a pattern number, threshold of a ROI and background threshold parameter are provided. According to the result of its comparing test with the existed methods to show the usability, it is proved that our method is superior in speed to the existed ones.

  • PDF

A Study on the Residual Stress Evaluation of Autofrettaged SCM440 High Strength Steel (자긴가공된 SCM440 고강도강의 잔류응력평가에 관한 연구)

  • Kim, Jae-Hoon;Shim, Woo-Sung;Yoon, Young-Kwen;Lee, Young-Shin;Cha, Ki-Up;Hong, Suck-Kyun
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.14 no.4
    • /
    • pp.39-45
    • /
    • 2010
  • Thick-walled cylinders, such as a cannon or nuclear reactor, are autofrettaged to induce advantageous residual stresses into pressure vessels and to increase operating pressure and the fatigue lifetimes. As the autofrettage level increases, the magnitude of compressive residual stress at the bore also increases. The purpose of the present paper is to predict the accurate residual stress of SCM440 high strength steel using the Kendall model which was adopted by ASME Code. Hydraulic pressure process was applied in the inner part and thick-walled cylinders were autofrettaged up to 30% overstrain levels. Electro polishing on the surface of autofrettage specimen was performed to get more accurate residual stress. Residual stresses were measured by X-ray diffraction method. The autofrettage surface which was plastically deformed analyzed using a scanning electron microscope(SEM). Although there were some differences in measured residual stress and numerical results, it has a tendency to agree comparatively with each other.

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

VLSI Design of H.264/AVC CAVLC encoder for HDTV Application (실시간 HD급 영상 처리를 위한 H.264/AVC CAVLC 부호화기의 하드웨어 구조 설계)

  • Woo, Jang-Uk;Lee, Won-Jae;Kim, Jae-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.45-53
    • /
    • 2007
  • In this paper, we propose an efficient hardware architecture for H.264/AVC CAVLC (Context-based Adaptive Variable Length Coding) encoding. Previous CAVLC architectures search all of the coefficients to find statistic characteristics in a block. However, it is unnecessary information that zero coefficients following the last position of a non-zero coefficient when CAVLC encodes residual coefficients. In order to reduce this unnecessary operation, we propose two techniques, which detect the first and last position of non-zero coefficients and arrange non-zero coefficients sequentially. By adopting these two techniques, the required processing time was reduced about 23% compared with previous architecture. It was designed in a hardware description language and total logic gate count is 16.3k using 0.18um standard cell library Simulation results show that our design is capable of real-time processing for $1920{\times}1088\;30fps$ videos at 81MHz.

Determination of Bar Code Cross-line Based on Block HOG Clustering (블록 HOG 군집화 기반의 1-D 바코드 크로스라인 결정)

  • Kim, Dong Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.996-1003
    • /
    • 2022
  • In this paper, we present a new method for determining the scan line and range for vision-based 1-D barcode recognition. This is a study on how to detect valid barcode representative points and directions by applying the DBSCAN clustering method based on block HOG (histogram of gradient) and determine scan lines and barcode crosslines based on this. In this paper, the minimum and maximum search techniques were applied to determine the cross-line range of barcodes based on the obtained scan lines. This can be applied regardless of the barcode size. This technique enables barcode recognition even by detecting only a partial area of the barcode, and does not require rotation to read the code after detecting the barcode area. In addition, it is possible to detect barcodes of various sizes. Various experimental results are presented to evaluate the performance of the proposed technique in this paper.

Review on asbestos analysis (석면 분석방법에 대한 고찰)

  • Ham, Seung hon;Hwang, Sung Ho;Yoon, Chungsik;Park, Donguk
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.19 no.3
    • /
    • pp.213-232
    • /
    • 2009
  • This document was prepared to review and summarize the analytical methods for airborne and bulk asbestos. Basic principles, shortcomings and advantages for asbestos analytical instruments using phase contrast microscopy(PCM), polarized light microscopy(PLM), X-ray diffractometer (XRD), transmission electron microscopy(TEM), scanning electron microscopy(SEM) were reviewed. Both PCM and PLM are principal instrument for airborne and bulk asbestos analysis, respectively. If needed, analytical electron microscopy is employed to confirm asbestos identification. PCM is used originally for workplace airborne asbestos fiber and its application has been expanded to measure airborne fiber. Shortcoming of PCM is that it cannot differentiate true asbestos from non asbestos fiber form and its low resolution limit ($0.2{\sim}0.25{\mu}m$). The measurement of airborne asbestos fiber can be performed by EPA's Asbestos Hazard Emergency Response Act (AHERA) method, World Health Organization (WHO) method, International Standard Organization (ISO) 10312 method, Japan's Environmental Asbestos Monitoring method, and Standard method of Indoor Air Quality of Korea. The measurement of airborne asbestos fiber in workplace can be performed by National Institute for Occupational Safety and Health (NIOSH) 7400 method, NIOSH 7402 method, Occupational Safety and Health Administration (OSHA) ID-160 method, UK's Health and Safety Executive(HSE) Methods for the determination of hazardous substances (MDHS) 39/4 method and Korea Occupational Safety and Health Agency (KOSHA) CODE-A-1-2004 method of Korea. To analyze the bulk asbestos, stereo microscope (SM) and PLM is required by EPA -600/R-93/116 method. Most bulk asbestos can be identified by SM and PLM but one limitation of PLM is that it can not see very thin fiber (i.e., < $0.25{\mu}m$). Bulk asbestos analytical methods, including EPA-600/M4-82-020, EPA-600/R-93/116, OSHA ID-191, Laboratory approval program of New York were reviewed. Also, analytical methods for asbestos in soil, dust, water were briefly discussed. Analytical electron microscope, a transmission electron microscope equipped with selected area electron diffraction (SAED) and energy dispersive X-ray analyser(EDXA), has been known to be better to identify asbestiform than scanning electron microscope(SEM). Though there is no standard SEM procedures, SEM is known to be more suitable to analyze long, thin fiber and more cost-effective. Field emission scanning electron microscope (FE-SEM) imaging protocol was developed to identify asbestos fiber. Although many asbestos analytical methods are available, there is no method that can be applied to all type of samples. In order to detect asbestos with confidence, all advantages and disadvantages of each instrument and method for given sample should be considered.