• Title/Summary/Keyword: Detection Effectiveness Analysis

Search Result 333, Processing Time 0.023 seconds

Detection for Operation Chain: Histogram Equalization and Dither-like Operation

  • Chen, Zhipeng;Zhao, Yao;Ni, Rongrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3751-3770
    • /
    • 2015
  • Many sorts of image processing software facilitate image editing and also generate a great number of doctored images. Forensic technology emerges to detect the unintentional or malicious image operations. Most of forensic methods focus on the detection of single operations. However, a series of operations may be used to sequentially manipulate an image, which makes the operation detection problem complex. Forensic investigators always want to know as much exhaustive information about a suspicious image's entire processing history as possible. The detection of the operation chain, consisting of a series of operations, is a significant and challenging problem in the research field of forensics. In this paper, based on the histogram distribution uniformity of a manipulated image, we propose an operation chain detection scheme to identify histogram equalization (HE) followed by the dither-like operation (DLO). Two histogram features and a local spatial feature are utilized to further determine which DLO may have been applied. Both theoretical analysis and experimental results verify the effectiveness of our proposed scheme for both global and local scenarios.

A Study on Actuation Probability of Underwater Weapon Based on Magnetic Field (Magnetic Field 기반 수중무기체계 발화확률에 관한 연구)

  • Lim, Byeong-Seon;Hong, Sung-Pyo;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1253-1258
    • /
    • 2013
  • This Paper deals with detection and defense methods for underwater weapons because there are so many dangers of underwater weapons not only in the war period but also in the peace time. Underwater mines are the representative strategic arms. The sensors and target detection methods, threat elimination method of mines included in this paper. Among the various sensors of mine, we use the magnetometor for target detection method in the simulation and execute the analysis of magnetic field of detected target ships. It will be also provided that effectiveness of target detection, sweeping method of mine, tactics of mine planning and mine sweeping and so on.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Study of Pre-Filtering Factor for Effectively Improving Dynamic Malware Analysis System (동적 악성코드 분석 시스템 효율성 향상을 위한 사전 필터링 요소 연구)

  • Youn, Kwang-Taek;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.563-577
    • /
    • 2017
  • Due to the Internet and computing capability, new and variant malware are discovered around 1 Million per day. Companies use dynamic analysis such as behavior analysis on virtual machines for unknown malware detection because attackers use unknown malware which is not detected by signature based AV effectively. But growing number of malware types are not only PE(Portable Executable) but also non-PE such as MS word or PDF therefore dynamic analysis must need more resources and computing powers to improve detection effectiveness. This study elicits the pre-filtering system evaluation factor to improve effective dynamic malware analysis system and presents and verifies the decision making model and the formula for solution selection using AHP(Analytics Hierarchy Process)

A Motion Detection Approach based on UAV Image Sequence

  • Cui, Hong-Xia;Wang, Ya-Qi;Zhang, FangFei;Li, TingTing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1224-1242
    • /
    • 2018
  • Aiming at motion analysis and compensation, it is essential to conduct motion detection with images. However, motion detection and tracking from low-altitude images obtained from an unmanned aerial system may pose many challenges due to degraded image quality caused by platform motion, image instability and illumination fluctuation. This research tackles these challenges by proposing a modified joint transform correlation algorithm which includes two preprocessing strategies. In spatial domain, a modified fuzzy edge detection method is proposed for preprocessing the input images. In frequency domain, to eliminate the disturbance of self-correlation items, the cross-correlation items are extracted from joint power spectrum output plane. The effectiveness and accuracy of the algorithm has been tested and evaluated by both simulation and real datasets in this research. The simulation experiments show that the proposed approach can derive satisfactory peaks of cross-correlation and achieve detection accuracy of displacement vectors with no more than 0.03pixel for image pairs with displacement smaller than 20pixels, when addition of image motion blurring in the range of 0~10pixel and 0.002variance of additive Gaussian noise. Moreover,this paper proposes quantitative analysis approach using tri-image pairs from real datasets and the experimental results show that detection accuracy can be achieved with sub-pixel level even if the sampling frequency can only attain 50 frames per second.

Cervical cancer screening strategies based on stochastic process (확률모형을 이용한 자궁경부암 조기검진 전략)

  • Phee, Young-Gyu;Lee, Jeong-Hee;Jeong, Seong-Hwa
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.1
    • /
    • pp.129-138
    • /
    • 2010
  • The purpose of this study was to investigate the most cost-effectiveness screening strategies for cervical cancer in Korea. We calculated the age-specific cervical cancer incidence rate from Korea Central Cancer Registry (2003), and then estimated the schedule sensitivity, detection probability, and screening and confirmative costs of each screening strategy based on the stochastic process (Lee and Zelen, 1998). The efficiency of the screening strategy was evaluated by incremental cost-effectiveness analysis. The most effective strategy was every 3 years pap smear test between the age of 35 and 65 years in the cervical cancer screening. The findings of this study will be helpful to evaluate efficiency of cancer screening strategies, and to provide the theoretical background of development and assessment of early detection of cancer in Korea.

Analysis of Infiltration Area using Prediction Model of Infiltration Risk based on Geospatial Information (지형공간정보 기반의 침투위험도 예측 모델을 이용한 최적침투지역 분석)

  • Shin, Nae-Ho;Oh, Myoung-Ho;Choe, Ho-Rim;Chung, Dong-Yoon;Lee, Yong-Woong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.199-205
    • /
    • 2009
  • A simple and effective analysis method is presented for predicting the best infiltration area. Based on geospatial information, numerical estimation barometer for degree of infiltration risk has been derived. The dominant geospatial features influencing infiltration risk have been found to be area altitude, degree of surface gradient, relative direction of surface gradient to the surveillance line, degree of surface gradient repetition, regional forest information. Each feature has been numerically expressed corresponding to the degree of infiltration risk of that area. Four different detection probability maps of infiltration risk for the surveillance area are drawn on the actual map with respect to the numerically expressed five dominant factors of infiltration risks. By combining the four detection probability maps, the complete picture of thr best infiltration area has been drawn. By using the map and the analytic method the effectiveness of surveillance operation can be improved.

Table Detection from Document Image using Vertical Arrangement of Text Blocks

  • Tran, Dieu Ni;Tran, Tuan Anh;Oh, Aran;Kim, Soo Hyung;Na, In Seop
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.77-85
    • /
    • 2015
  • Table detection is a challenging problem and plays an important role in document layout analysis. In this paper, we propose an effective method to identify the table region from document images. First, the regions of interest (ROIs) are recognized as the table candidates. In each ROI, we locate text components and extract text blocks. After that, we check all text blocks to determine if they are arranged horizontally or vertically and compare the height of each text block with the average height. If the text blocks satisfy a series of rules, the ROI is regarded as a table. Experiments on the ICDAR 2013 dataset show that the results obtained are very encouraging. This proves the effectiveness and superiority of our proposed method.

Detection and Location of Partial Discharge in Oil Filled Transformer

  • Lee, Seung-Whan;Oh, Hak-Joon;Chung, Chan-Soo;Yun, Man-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.98.3-98
    • /
    • 2001
  • The research for detecting of insulating deterioration in transformer has been studied from long ago. Analysis method of combustible gas, which is included in insulating oil, has been widely used in detection of transformer pre-fault detection due to the effectiveness of its method. Recently the fault effect of the large transformer is very critical in a power system, therefore the on-line monitoring and diagnostic system is needed. In addition, the more accurate method of detecting a Partial Discharge (PD) location should be developed. For preventive maintenance against discharge failures, it is important not only to detect the discharges, but also to accurately estimate their positions. However ...

  • PDF

Damage Detection of Truss Structures Using Parametric Projection Filter Theory (파라메트릭 사양필터를 이용한 트러스 구조물의 손상 검출)

  • Mun, Hyo-Jun;Suh, Ill-Gyo
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.29-36
    • /
    • 2004
  • In this paper, a study of damage detection for 2-Dimensional Truss Structures using the parametric projection filter theory is presented. Many researchers are interested in inverse problem and one of solution procedures for inverse problems that are very effective is the approach using the filtering algorithm in conjunction with numerical solution methods. In filtering algorithm, the Kalman filtering algorithm is well known and have been applied to many kind of inverse problems. In this paper, the Parametric projection filtering in conjunction with structural analysis is applied to the identification of damages in 2-D truss structures. The natural frequency and modes of damaged truss model are adopted as the measurement data. The effectiveness of proposed method is verified through the numerical examples.

  • PDF