• Title/Summary/Keyword: Decrypt

Search Result 134, Processing Time 0.021 seconds

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

A Study of Seong Ho Lee Ik's Noneo Jilseo (성호(星湖) 이익(李瀷)의 『논어질서(論語疾書)』 연구(硏究))

  • Seo, Geunsik
    • (The)Study of the Eastern Classic
    • /
    • no.41
    • /
    • pp.361-384
    • /
    • 2010
  • This paper focused on studies of Noneo Jilseo("論語疾書") written by Lee Ik, also known as his honored name, Seong Ho(星湖). Seong Ho(星湖) also had left 10 types of exegetical commentary other than Noneo Jilseo("論語疾書"). The reason for choosing Noneo Jilseo("論語疾書") was that the teachings of Kongzi(孔子) were contained in Noneo("論語"). Also when we understand the Analects of Kongzi(孔子) correctly, we will be able to understand other Confucian Canons accordingly. Seong Ho(星湖) recommended Zhuzi(朱子) pronounced Noneo Jipju ("論語集註") as a critical commentary on the Analects. That is because there are no writings that had considered pupils' opinions and all of the various situations as much as Noneo Jipju ("論語集註"). For this reason, Noneo Jipju ("論語集註") could play a role as an excellent text. However, it is not just quality of the book that matters. While reading the main body, there is an author's comment, saying "For now, I write down my skeptical point of view." With this short note, the author expressed that "Collected Annotation on the Analects" was not necessarily the best teaching. This is the consequence of 'doubt.' We should be skeptical about the Analects of Confucius. That is not to say that the Analects are unconditionally bad. Seong Ho(星湖) expounded that the beginning students should regard Noneo Jilseo("論語疾書") as their textbook, but do not cling only to the disciplines elucidated in the book. Seong Ho(星湖) had written Noneo Jilseo("論語疾書") in order to help people to understand Confucius correctly. Although this book was written during his early professional years, Seong Ho(星湖) had grasped the essence of teaching precisely. Then, what is the essence? That is 'Doubt.' Innate factors therein can be correctly understood through 'Doubt.' In this context, Seong Ho(星湖) had made such comment as "For now, I write down my skeptical point of view." To understand the opinions of Confucius correctly, this process that being doubtful about the text is necessary. The Analects of Confucius are just similar to a coded message. To know accurately about the code, it is necessary to start from 'Doubt' at the first. Such a "Doubt" shall be a key to decrypt the coded messages further.