• Title/Summary/Keyword: Criminal detection

Search Result 60, Processing Time 0.021 seconds

Developing of latent fingerprint on human skin (생체피부에서의 잠재지문 현출)

  • Lee, Hee-Il;Choi, Mi-Jung;Kim, Jai-Hoon;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.222-228
    • /
    • 2008
  • On living skin the chances of a successfully developing latent fingerprint are very limited. This is due to the fact that continual perspiration and rapid absorption diffuse into the lipophillic layer on skin. A study was conducted to investigate effectively developing method of latent fingerprints on human skin surfaces and pig skin likely corpse's skin. We used commercial fingerprint powder, black powders, black magnetic powder, fluorescence magnetic powder, Cyanoacrylate fuming (CA) and direct lifting methods (lifting paper, glasses and photo glossy paper). Developing of fresh fingerprints on living skin was achieved with S-powderblack, CA fuming and CA fuming following S-powder, fluorescence powder. The other powder tends to overwhelm the latent print and the background. But, latent fingerprint residue was disappeared with time after deposit on a living surface. In case of pig skin likely corpse's skin, latent fingerprint detection was achieved with CA fuming following S-powder and deposited print during 6 hr at $25^{\circ}C$, 40% relative moisture yielded excellent fingerprints with clear ridge details using 1 min CA fuming. And enhancement of fingerprint detection image using forensic light source was achieved.

Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

  • Han, Byeong Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

Detection of Personal Information Leakage using the Network Traffic Characteristics (네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법)

  • Park, Jung-Min;Kim, Eun-Kyung;Jung, Yu-Kyung;Chae, Ki-Joon;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.199-208
    • /
    • 2007
  • In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.

Encapsulation of CdSe/ZnS Quantum Dots in Poly(ethylene glycol)-Poly(D,L-lactide) Micelle for Biomedical Imaging and Detection

  • Lee, Yong-Kyu;Hong, Suk-Min;Kim, Jin-Su;Im, Jeong-Hyuk;Min, Hyun-Su;Subramanyam, Elango;Huh, Kang-Moo;Park, Sung-Woo
    • Macromolecular Research
    • /
    • v.15 no.4
    • /
    • pp.330-336
    • /
    • 2007
  • Luminescent CdSe/ZnS QDs, with emission in the red region of the spectrum, were synthesized and encapsulated in poly(ethylene glycol)-poly(D,L-lactide) diblock copolymer micelles, to prepare water-soluble, bio-compatible QD micelles. PEG-PLA diblock copolymers were synthesized by ring opening polymerization of D,L-lactide, in the presence of methoxy PEG as a macro initiator. QDs were encapsulated with PEG-PLA polymers using a solid dispersion method in chloroform. The resultant polymer micelles, with encapsulated QDs, were characterized using various analytical techniques, such as UV- Vis measurement, light scattering, fluorescence spectroscopy, transmission electron microscopy (TEM) and atomic forced microscopy (AFM). The polymer micelles, with encapsulated QDs, were spherical and showed diameters in the range of 20-150 nm. The encapsulated QDs were highly luminescent, and have high potential for applications in biomedical imaging and detection.

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

Election Prediction on Basis of Sentimental Analysis in 3rd World Countries

  • Bilal, Hafiz Syed Muhammad;Razzaq, Muhammad Asif;Lee, Sungyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.928-931
    • /
    • 2014
  • The detection of human behavior from social media revolutionized health, business, criminal and political prediction. Significance of it, in incentive transformation of public opinion had already proven for developed countries in improving democratic process of elections. In $3^{rd}$ World countries, voters poll votes for personal interests being unaware of party manifesto or national interest. These issues can be addressed by social media, resulting as ongoing process of improvement for presently adopted electoral procedures. On the optimistic side, people of such countries applied social media to garner support and campaign for political parties in General Elections. Political leaders, parties, and people empowered themselves with social media, in disseminating party's agenda and advocacy of party's ideology on social media without much campaigning cost. To study effectiveness of social media inferred from individual's political behavior, large scale analysis, sentiment detection & tweet classification was done in order to classify, predict and forecast election results. The experimental results depicts that social media content can be used as an effective indicator for capturing political behaviors of different parties positive, negative and neutral behavior of the party followers as well as party campaign impact can be predicted from the analysis.

ATM for criminal prevention using deep learning (딥러닝을 이용한 범죄예방 현금인출기)

  • Park, Jiwoo;Lee, Hayoung;Baek, Hwayoung;Park, Boyoung;Jo, Junghwi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.521-523
    • /
    • 2018
  • 본 논문은 보이스피싱 발생 후의 대처 방안이 아닌, 범죄 행위 자체의 예방을 목적으로 하는 신원 허가 후의 자동인출기 시스템을 제안한다. 범죄예방 현금인출기(ATM)의 작동과정은 크게 두 가지이다. 첫째, YOLO Detection System을 이용하여 학습된 데이터에 기반하여, 사용자의 얼굴에서 선글라스와 마스크를 검출한다. 둘째, 미리 학습된 범죄자 모델 데이터에 앞서 사용자의 신원을 조회하고 ATM의 사용허가를 내준다. 혹은 주요지명 피의자일 경우, 경찰에 실시간 안내를 주어 범죄 수사를 용이하게 한다.

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.