• Title/Summary/Keyword: Forgery Identification

Search Result 35, Processing Time 0.022 seconds

Food Fraud Monitoring of Commercial Sciaenidae Seafood Product Using DNA Barcode Information (DNA barcode를 이용한 민어과 수산가공품 진위판별 모니터링)

  • Park, Eun-Ji;Jo, Ah-Hyeon;Kang, Ju-Yeong;Lee, Han-Cheol;Park, Min-Ji;Yang, Ji-Young;Shin, Ji-Young;Kim, Gun-Do;Kim, Jong-Oh;Seo, Yong-Bae;Kim, Jung-Beom
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.574-580
    • /
    • 2020
  • In this study we sought to determine the food fraud by discriminating species of commercial seafood product such as Larimichthys polyactis, Larimichthys crocea, Pennahia argentatus, and Miichthys miiuy, which are difficult to morphologically discriminate. After amplifying the mitochondrial cytochrome c oxidase subunit I gene of the reference fish, the DNA sequences of the amplified PCR products were analyzed. As a result, a 655 bp sequence for species identification was selected for use as DNA barcodes. To confirm the DNA data and primer set, the DNA barcode sequence of each fish was compared to that in that in the NCBI. All of the DNA barcode data were matched with the gene sequence of each fish in the NCBI. A total of 32 processed seafood products (8 L. polyactis, 12 L. crocea, 3 Pennahia argentatus, and 9 Miichthys miiuy) were investigated. Homology of 97% or more in DNA sequences was judged as the same species. As a result of the monitoring, there were no discovered cases of forgery or alteration. However, the use of a raw material name having no matching standard name in the Korea Food Code may cause consumer confusion. Therefore, it is suggested that the standard name or scientific name be co-labeled with the raw material name on seafood products to prevent consumer confusion.

Food Fraud Monitoring of Raw Materials for Commercial Seafood Products Using DNA Barcode Information (DNA Barcode를 이용한 수산가공품 원재료 진위판별)

  • Park, Eun-Ji;Kang, Ju-Yeong;Lee, Han-Cheol;Park, Min-Ji;Yang, Ji-Young;Shin, Ji-Young;Kim, Gun-Do;Kim, Jong-Oh;Seo, Yong-Bae;Kim, Jung-Beom
    • Journal of Food Hygiene and Safety
    • /
    • v.36 no.4
    • /
    • pp.331-341
    • /
    • 2021
  • DNA barcode sequences of commercial seafood products, which are difficult to morphologically discriminate, were analyzed to determine cases of food fraud. The gene sequences were analyzed by amplifying the COX I (cytochrome C oxidase subunit I) gene region of mitochondrial DNA, which is mainly used for species identification. The DNA barcode sequences were compared with the gene sequence of each fish registered in the US National Center for Biotechnology. A total of 46 processed seafood products (12 Pagrus majo, 4 Oplegnathus fasciatus, 7 Dentex tumifrons, 2 Acanthopagrus schlegelii, 7 Oreochromis niloticus, 6 Branchiostegus japonicus, 8 Branchiostegus albus) were investigated. Having DNA sequence identity of more than 97% was judged as the same species. As a result of this study, no cases of forgery and alteration were detected. However, some disparities in the commercial names used in local markets and the standard names given in the Korea Food Code were found, which may cause confusion for consumers. It is therefore suggested that the standard name or scientific name be displayed on seafood product labels.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.