• Title/Summary/Keyword: Content Verification

Search Result 396, Processing Time 0.052 seconds

Efficient Contents Verification Scheme for Contents-Centric-Networking (콘텐츠 중심 네트워킹을 위한 콘텐츠 인증 기술)

  • Kim, DaeYoub;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.234-241
    • /
    • 2014
  • xTo improve network inefficiency caused by network congestion around a content-source, content-centric networking (CCN) allows network nodes transmitting contents to temporarily cache received contents and then send back the cached contents if the nodes receive relevant request messages without forwarding the request messages to content-sources. However, because nodes receiving requested contents through CCN cannot recognize real senders of the received contents, the receivers need to verify each received contents before using them. But such a verification procedure can cause long service/operation delay. Hence, in this paper, we review the problem of contents verification, propose an improved verification procedure and evaluate its performance.

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

A Efficient Contents Verification Scheme for Distributed Networking/Data Store (분산 환경에서의 효율적인 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.839-847
    • /
    • 2015
  • To seamlessly provide content through the Internet, it is generally considered to use distributed processing for content requests converged on original content providers like P2P, CDN, and ICN. That is, after other nodes temporally save content, they handle content requests instead of original content providers. However, in this case, it may be possible that a content sender is different from the original provider of the content. In this case, users may be exposed to various risks. To solve such a problem, it is highly recommended to verify received contents before using them, but it can cause network traffic increases as well as a serious service delay. This paper proposes an efficient content verification scheme for distributed networking/data store environments and analyzes its performance.

Writer verification using feature selection based on genetic algorithm: A case study on handwritten Bangla dataset

  • Jaya Paul;Kalpita Dutta;Anasua Sarkar;Kaushik Roy;Nibaran Das
    • ETRI Journal
    • /
    • v.46 no.4
    • /
    • pp.648-659
    • /
    • 2024
  • Author verification is challenging because of the diversity in writing styles. We propose an enhanced handwriting verification method that combines handcrafted and automatically extracted features. The method uses a genetic algorithm to reduce the dimensionality of the feature set. We consider offline Bangla handwriting content and evaluate the proposed method using handcrafted features with a simple logistic regression, radial basis function network, and sequential minimal optimization as well as automatically extracted features using a convolutional neural network. The handcrafted features outperform the automatically extracted ones, achieving an average verification accuracy of 94.54% for 100 writers. The handcrafted features include Radon transform, histogram of oriented gradients, local phase quantization, and local binary patterns from interwriter and intrawriter content. The genetic algorithm reduces the feature dimensionality and selects salient features using a support vector machine. The top five experimental results are obtained from the optimal feature set selected using a consensus strategy. Comparisons with other methods and features confirm the satisfactory results.

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang;Ji Su Park;Jin Gon Shon
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.334-346
    • /
    • 2023
  • An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.

Broken Integrity Detection of Video Files in Video Event Data Recorders

  • Lee, Choongin;Lee, Jehyun;Pyo, Youngbin;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3943-3957
    • /
    • 2016
  • As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.

Verification of Core/Shell Structure of Poly(glycidyl methacrylate-co-divinyl benzene) Microspheres

  • Jin, Jeong-Min;Choi, Jin-Young;Lee, Kang-Seok;Choe, Soon-Ja
    • Macromolecular Research
    • /
    • v.17 no.5
    • /
    • pp.339-345
    • /
    • 2009
  • The core/shell type structure of the highly crosslinked poly(glycidylmetharylate-co-divinylbenzene) microspheres prepared in the precipitation polymerization in acetonitrile was thoroughly verified by means of swelling, $^1H$ NMR, XPS, TEM and TGA measurements. In the XPS measurement, the higher the GMA content, the higher the oxygen content was observed, implying that the higher content of GMA is observed in the particle surface. The further verification of the core/shell structure of the poly(GMA-co-DVB) particles was carried out using $^1H$ NMR and TEM techniques, resulting in the poly(GMA-co-DVB) particles with the GMA rich-phase and DVB rich-phase. In overall, the poly(GMA-co-DVB) microspheres consist of a highly crosslinked DVB rich-phase in the core and slightly or non-crosslinked GMA rich-phase in the shell part due to the different reaction ratios between two monomers and self-crosslinking density of DVB.

A Study on Web Accessibility Status of Metropolitan and Provincial Offices of Education from the Universal Design View (유니버설 디자인 관점에서 본 국내 시도 교육청의 웹 접근성 실태에 관한 연구)

  • Seo, Mi-Ra
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.405-410
    • /
    • 2013
  • Due to the enforcement of a law about disability nondiscrimination and rights protection in 2008, the web accessibility has become an obligation. According to a survey targeting public sectors such as central administrative organization, local autonomous entity and etc., the level of compliance with web accessibility appeared to be improved every year. However, such legal mechanism focuses on the improvement of convenience for disabled people only and does not meet the concept of universal design that aims to satisfy every user. Therefore, this study verifies the status of web accessibility on 17 homepages of metropolitan and provincial offices of education. The status survey was carried out with 3 steps: 1) Verification through automated verification tool by National Information Society Agency, 2) Verification through Web Content Accessibility Guidelines(UD-WCAG) that adopts the concept of universal design, 3) Verification by using screen reader. Compared to the verification through automated verification tool, the overall compliance rate verified through UD-WCAG was reported lower.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Motivation Versus Intention of Sharing Fake News Among Social Media Users during the Pandemic - A SEM Model

  • Alvi, Irum;Saraswat, Niraja
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.2
    • /
    • pp.40-62
    • /
    • 2021
  • Are intentions important in deciding the outcome of an action such as sharing misinformation among social media users during the pandemic? What is their role and how far they are important for the very act of fake sharing news? The social media users' actions on the social platform are determined by what they plan to do themselves; however, their motivation has an immense role to play in the dissemination of fake news on social media. The study proposes a conceptual model for understanding how select factors affect fake news sharing motivation and intentions of social media users. The study scrutinizes the relationship between content and context, fear of missing out (FoMO), news verification and news sharing gratification on the motivation and intention of social media users of networked Asian society. Empirical Data were drawn from social media users (N = 243) from India, using an online questionnaire based on prior studies and structural equation modeling (SEM) approach was used to analyze the data collected. Results indicate that news content, news verification, and news sharing gratification have a direct and positive relationship with sharing motivation. On the other hand, news context and content, FoMO and news sharing gratification have a positive significant relationship with sharing intention. Likewise, it was discovered that news verification will decrease sharing intention of the social media users. However, news context, that is the pandemic in the case of the present study and FoMO were not identified as determinant variables for sharing motivation among social media users. The research limitations and further scope were discussed.