• Title/Summary/Keyword: Fragmented Data

Search Result 122, Processing Time 0.027 seconds

A Research on Ways to Apply Data Fragmentation and Decentralization Technology to Protect Data of Weapon Systems (무기체계 데이터 보호를 위한 데이터 파편화, 분산화 기술 적용 방안 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.907-914
    • /
    • 2024
  • As technologies for data protection such as data encryption, information leak prevention, access permission setting, and data de-identification are being developed and used. Since the technologies manage the original data, if an attacker steals the data or succeeds in decrypting it, the data may be leaked. Unlike these data protection technologies, if the original data is fragmented and stored multiple distributed servers, data leakage can be prevented because only some fragmented data of the original data is leaked. Additionally, when fragmented data is copied and stored distributedly, even if some servers are damaged, the original data can be restored using the fragmented data stored on others. This paper explains data fragmentation and decentralization technologies for data protection, analyzes the data operation environment of weapon systems, and suggests ways to apply them to weapon systems.

The Setting of Restoration Priority and Assessment for Mountain Range Fragmented Points in Daegu : Focused on the Ecological Aspect (생태적 측면에서의 대구광역시 산줄기 단절지점 평가 및 복원우선순위 설정)

  • Kim, Jin-Hyo;Ra, Jung-Hwa;Kwon, Oh-Sung;Cho, Hyun-Ju
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.21 no.5
    • /
    • pp.1-16
    • /
    • 2018
  • The purpose of this study is to identify the fragmented points of mountain ranges in Daegu metropolitan city using New Sangyeongpyo (Chart of Mountain Ranges), road system map and GIS spatial analysis, and to prioritize the identified fragmented points for restoration based on quantitative assessment. Moreover, this study proposes restoration plans reflecting the assessment results and characteristics of each fragmented point. The results of this study are summarized as follows: First of all, analysis of the distribution of mountain ranges in Daegu metropolitan city showed that jimaek and semaek in Daegu account for 2% of all mountain ranges in the country, implying that the mountain ranges of Daegu do not hold significant ranking on a national level. However, it was found that numerous fragmented points are appearing due to roads. According to the analysis, 35 fragmented points were identified, of which 15 were found to be restorable. In terms of restoration potential and involved risks, assessment results of the 15 fragmented points indicated that 6 points are at Grade I, 3 points are at Grade II and 6 points are at Grade III. Therefore, a methodology of restoring fragmented mountain ranges was proposed through three suggestions of restoration plans that consider the characteristics of each fragmented points. The results of this study are expected to be highly useful as basic data for effective restoration of mountain ranges in connection with mountain range restorations and relevant projects implemented on a national level in the future.

Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment (비할당 영역 데이터 파편의 압축 여부 판단과 압축 해제)

  • Park, Bo-Ra;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.175-185
    • /
    • 2008
  • It is meaningful to investigate data in unallocated space because we can investigate the deleted data. However the data in unallocated space is formed to fragmented and it cannot be read by application in most cases. Especially in case of being compressed or encrypted, the data is more difficult to be read. If the fragmented data is encrypted and damaged, it is almost impossible to be read. If the fragmented data is compressed and damaged, it is very difficult to be read but we can read and interpret it sometimes. Therefore if the computer forensic investigator wants to investigate data in unallocated space, formal work of determining the data is encrypted of compressed and decompressing the damaged compressed data. In this paper, I suggest the method of analyzing data in unallocated space from a viewpoint of computer forensics.

Spatial Analysis for the Assessment of Optimum Place of Eco-bridge (생태통로의 최적지 평가를 위한 공간분석)

  • Jeong, Jong-Chul
    • Journal of Environmental Impact Assessment
    • /
    • v.20 no.5
    • /
    • pp.697-703
    • /
    • 2011
  • The purpose of this study aims to preserve biodiversity in increasingly fragmented green patches for spatial analysis of planting on the eco-corridors and to optimize the target species, the location, width, cross section of the eco-corridors. It was suggested that eco-corridors should have to planned at early stages of road planning so that the number and locations of eco-corridors in advance. Ecological corridor is the facility to connect two habitats fragmented by road, dam, housing and industrial area. And, everyone agree that ecological corridor is important useful structural component that help animal movement in fragmented landscapes. However, ecological corridors have many problems of the recorded the size of corridor, planting species to nearby exiting vegetation species and structure. The most important facts that there are no consideration for location of animal migration and behavior using eco-corridors. This study was carried out to spatial analysis of eco-corridors location, satellite data and GIS were used to analyze for searching optimum location of the eco-corridors.

Fragmented Urban Heat Islands in Seoul, Korea (분절화된 서울의 도시 열섬 현상)

  • Park, Gwangyong;Kwon, Won-Tae;David A. Robinson
    • Proceedings of the KGS Conference
    • /
    • 2004.05a
    • /
    • pp.48-48
    • /
    • 2004
  • A fragmented urban heat island is observed over the Seoul metropolitan area. Long-term (1996-2003) hourly temperature, wind speed and direction, and precipitation data observed at 26 (51) automatic weather stations (AWS) in Seoul (Gyeonggi prevince) makes it possible to reveal more dynamic spatial and temporal patterns of the urban heat island in this area than previously revealed. (omitted)

  • PDF

Reverse engineering of data abstractions on fragmented binary code (단편화된 실행파일을 위한 데이터 구조 역공학 기법)

  • Lee, Jong-Hyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.615-619
    • /
    • 2012
  • Reverse engineering via static analysis is an essential step in software security and it focuses on reconstructing code structures and data abstractions. In particular, reverse engineering of data abstractions is critical to understand software but the previous scheme, VSA, is not suitable for applying to fragmented binaries. This paper proposes an enhanced method through dynamic region assignment.

Proficient: Achieving Progressive Object Detection over a Lossless Network using Fragmented DCT Coefficients

  • Emad Felemban;Saleh Basalamah;Adil Shaikh;Atif Nasser
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.51-59
    • /
    • 2024
  • In this work, we focused on reducing the amount of image data to be sent by extracting and progressively sending prominent image features to high-performance computing systems taking into consideration the right amount of image data required by object identification application. We demonstrate that with our technique called Progressive Object Detection over a Lossless Network using Fragmented DCT Coefficients (Proficient), object identification applications can detect objects with at least 70% combined confidence level by using less than half of the image data.

Frame Rearrangement Method by Time Information Remarked on Recovered Image (복원된 영상에 표기된 시간 정보에 의한 프레임 재정렬 기법)

  • Kim, Yong Jin;Lee, Jung Hwan;Byun, Jun Seok;Park, Nam In
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1641-1652
    • /
    • 2021
  • To analyze the crime scene, the role of digital evidence such as CCTV and black box is very important. Such digital evidence is often damaged due to device defects or intentional deletion. In this case, the deleted video can be restored by well-known techniques like the frame-based recovery method. Especially, the data such as the video can be generally fragmented and saved in the case of the memory used almost fully. If the fragmented video were recovered in units of images, the sequence of the recovered images may not be continuous. In this paper, we proposed a new video restoration method to match the sequence of recovered images. First, the images are recovered through a frame-based recovery technique. Then, after analyzing the time information marked on the images, the time information was extracted and recognized via optical character recognition (OCR). Finally, the recovered images are rearranged based on the time information obtained by OCR. For performance evaluation, we evaluate the recovery rate of our proposed video restoration method. As a result, it was shown that the recovery rate for the fragmented video was recovered from a minimum of about 47% to a maximum of 98%.

A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation (시나리오 기반 이미지 개발을 통한 파일 카빙 도구 검증 방안 연구)

  • Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.835-845
    • /
    • 2019
  • File Carving is a technique for attempting to recover a file without metadata, such as a formated storage media or a damaged file system, and generally looks for a specific header / footer signature and data structure of the file. However, file carving is faced with the problem of recovering fragmented files for a long time, and it is very important to propose a solution for digital forensics because important files are relatively fragmented. To overcome these limitations, various carving techniques and tools are continuously being developed, and data sets from various researches and institutions are provided for functional verification. However, existing data sets are ineffective in verifying tools because of their limited environmental conditions. Therefore, this paper refers to the importance of fragmented file carving and develops 16 images for carving tool verification based on scenarios. The developed images' carving rate and accuracy of each media is shown through Foremost which is well known as a commercial carving tool.