• Title/Summary/Keyword: Fake Information

Search Result 213, Processing Time 0.022 seconds

A Study of Secure Password Input Method Based on Eye Tracking with Resistance to Shoulder-Surfing Attacks (아이트래킹을 이용한 안전한 패스워드 입력 방법에 관한 연구 - 숄더 서핑 공격 대응을 중심으로)

  • Kim, Seul-gi;Yoo, Sang-bong;Jang, Yun;Kwon, Tae-kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.545-558
    • /
    • 2020
  • The gaze-based input provides feedback to confirm that the typing is correct when the user types the text. Many studies have already demonstrated that feedback can increase the usability of gaze-based inputs. However, because the information of the typed text is revealed through feedback, it can be a target for shoulder-surfing attacks. Appropriate feedback needs to be used to improve security without compromising the usability of the gaze-based input using the original feedback. In this paper, we propose a new gaze-based input method, FFI(Fake Flickering Interface), to resist shoulder-surfing attacks. Through experiments and questionnaires, we evaluated the usability and security of the FFI compared to the gaze-based input using the original feedback.

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.

Performance Evaluation of Review Spam Detection for a Domestic Shopping Site Application (국내 쇼핑 사이트 적용을 위한 리뷰 스팸 탐지 방법의 성능 평가)

  • Park, Jihyun;Kim, Chong-kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.339-343
    • /
    • 2017
  • As the number of customers who write fake reviews is increasing, online shopping sites have difficulty in providing reliable reviews. Fake reviews are called review spam, and they are written to promote or defame the product. They directly affect sales volume of the product; therefore, it is important to detect review spam. Review spam detection methods suggested in prior researches were only based on an international site even though review spam is a widespread problem in domestic shopping sites. In this paper, we have presented new review features of the domestic shopping site NAVER, and we have applied the formerly introduced method to this site for performing an evaluation.

Data Augmentation Techniques of Power Facilities for Improve Deep Learning Performance

  • Jang, Seungmin;Son, Seungwoo;Kim, Bongsuck
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.2
    • /
    • pp.323-328
    • /
    • 2021
  • Diagnostic models are required. Data augmentation is one of the best ways to improve deep learning performance. Traditional augmentation techniques that modify image brightness or spatial information are difficult to achieve great results. To overcome this, a generative adversarial network (GAN) technology that generates virtual data to increase deep learning performance has emerged. GAN can create realistic-looking fake images by competitive learning two networks, a generator that creates fakes and a discriminator that determines whether images are real or fake made by the generator. GAN is being used in computer vision, IT solutions, and medical imaging fields. It is essential to secure additional learning data to advance deep learning-based fault diagnosis solutions in the power industry where facilities are strictly maintained more than other industries. In this paper, we propose a method for generating power facility images using GAN and a strategy for improving performance when only used a small amount of data. Finally, we analyze the performance of the augmented image to see if it could be utilized for the deep learning-based diagnosis system or not.

Smart Optical Fingerprint Sensor for Robust Fake Fingerprint Detection

  • Baek, Young-Hyun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.2
    • /
    • pp.71-75
    • /
    • 2017
  • In this paper, a smart optical fingerprint sensor technology that is robust against faked fingerprints. A new lens and prism accurately detect fingerprint ridges and valleys that are needed to express a fingerprint's intrinsic characteristics well. The proposed technology includes light path configuration and an optical fingerprint sensor that can effectively identify faked fingerprint features. Results of simulation show the smart optical fingerprint sensor classifies the characteristics of faked fingerprints made from silicone, gelatin, paper, and rubber, and show that the proposed technology has superior detection performance with faked fingerprints, compared to the existing infrared discrimination method.

Development of Filtering System ADDAVICHI for Fake Reviews using Big Data Analysis (빅데이터 분석을 활용한 가짜 리뷰 필터링 시스템 ADDAVICHI)

  • Jeong, Davichi;Rho, Young-J.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Recently, consumer distrust has deepened due to blog posts focusing only on public relations due to 'viral marketing'. In addition, marketing projects such as false writing or exaggerated use of the latter phase are one of the most popular programs in 2016 as they are cheaper and more effective than newspaper and TV ads, and the size of advertising costs is set to be a major means of advertising at '3 trillion 394.1 billion won. From this 'viral marketing,' it has become an Internet environment that needs tools to filter information. The fake review filtering application ADDAVICHI presented in this paper extracts, analyzes, and presents blog keywords, total number of searches, reliability and satisfaction when users search for content such as "event" and "taste restaurant." Reliability shows the number of ad posts on a blog, the total number of posts, and satisfaction shows a clean post with confidence divided into positive and negative posts. Finally, the keyword shows a list of the top three words in the review from a positive post. In this way, it helps users interpret information away from advertising.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Empirical study on liveness detection of fingerprint

  • Jin Chang-Long;Huan Nguyen van;Kim Ha-Kil
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.241-245
    • /
    • 2006
  • Recent studies show that fingerprint recognition technology is confronted with spoofing of artificial fingers. In order to overcome this problem, the fingerprint recognition system needs to distinguish a fake finger from a live finger. This paper examines existing software-based approaches for fingerprint liveness detection through experiments. Implemented and tested in this paper are the approaches based on deformation, wavelet, and perspiration. These approaches will be analyzed and compared based on experimental results.

  • PDF

Masked Fake Face Detection by Measuring Infrared Light Reflection (적외선 반사율 측정을 이용한 가면 착용 위변조 얼굴 검출)

  • Kim, Young-Shin;Na, Jae-Keun;Yoon, Seong-Beak;Yi, June-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.165-166
    • /
    • 2007
  • 특수 분장을 이용하여 매우 정교하게 제작된 가면을 쓴 얼굴 위변조의 경우 일반적인 밝기 영상으로는 검출이 용이하지 않다. 최근의 획기적인 특수 분장 기술 발전을 고려할 때 성공적인 얼굴 인식시스템 개발을 위해 가면을 쓴 얼굴 위변조 검출 연구는 매우 중요하다. 본 연구에서는 물질의 재질에 따른 반사율의 차이를 기반으로 가면을 착용하는 얼굴 위변조를 검출하는 방법을 제안한다. 우선 알비도(albedo)에 착안하여 여러 파장대의 조명에 대해 실험하였다. 실제 얼굴 인식 시스템의 적용 환경을 고려할 때 알비도를 단순히 빛의 반사량으로 간략화 할 수 있음을 보였고, 실험결과 850nm 적외선 조명이 적합하다는 결론을 얻었다.

  • PDF

Social Media Data Analysis Trends and Methods

  • Rokaya, Mahmoud;Al Azwari, Sanaa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.358-368
    • /
    • 2022
  • Social media is a window for everyone, individuals, communities, and companies to spread ideas and promote trends and products. With these opportunities, challenges and problems related to security, privacy and rights arose. Also, the data accumulated from social media has become a fertile source for many analytics, inference, and experimentation with new technologies in the field of data science. In this chapter, emphasis will be given to methods of trend analysis, especially ensemble learning methods. Ensemble learning methods embrace the concept of cooperation between different learning methods rather than competition between them. Therefore, in this chapter, we will discuss the most important trends in ensemble learning and their applications in analysing social media data and anticipating the most important future trends.