• Title/Summary/Keyword: Image Security

Search Result 1,155, Processing Time 0.023 seconds

Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware (악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발)

  • Park, Jihyeon;Kim, Taeok;Shin, Yulim;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.650-657
    • /
    • 2020
  • The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware and the emergence of malicious code. For this, it is necessary to accurately and quickly detect and classify malware family. In this paper, we analyzed and classified visualization technology, which is a preprocessing technology used for deep learning-based malware classification. The first method is to convert each byte into one pixel of the image to produce a grayscale image. The second method is to convert 2bytes of the binary to create a pair of coordinates. The third method is the method using LSH. We proposed improving the technique of using the entire existing malicious code file for visualization, extracting only the areas where important information is expected to exist and then visualizing it. As a result of experimenting in the method we proposed, it shows that selecting and visualizing important information and then classifying it, rather than containing all the information in malicious code, can produce better learning results.

A Novel Least Square and Image Rotation based Method for Solving the Inclination Problem of License Plate in Its Camera Captured Image

  • Wu, ChangCheng;Zhang, Hao;Hua, JiaFeng;Hua, Sha;Zhang, YanYi;Lu, XiaoMing;Tang, YiChen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.5990-6008
    • /
    • 2019
  • Recognizing license plate from its traffic camera captured images is one of the most important aspects in many traffic management systems. Despite many sophisticated license plate recognition related algorithms available online, license plate recognition is still a hot research issue because license plates in each country all round the world lack of uniform format and their camera captured images are often affected by multiple adverse factors, such as low resolution, poor illumination effects, installation problem etc. A novel method is proposed in this paper to solve the inclination problem of license plates in their camera captured images through four parts: Firstly, special edge pixels of license plate are chosen to represent main information of license plates. Secondly, least square methods are used to compute the inclined angle of license plates. Then, coordinate rotation methods are used to rotate the license plate. At last, bilinear interpolation methods are used to improve the performance of license plate rotation. Several experimental results demonstrated that our proposed method can solve the inclination problem about license plate in visual aspect and can improve the recognition rate when used as the image preprocessing method.

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

Design and Implementation of Hierarchical Image Classification System for Efficient Image Classification of Objects (효율적인 사물 이미지 분류를 위한 계층적 이미지 분류 체계의 설계 및 구현)

  • You, Taewoo;Kim, Yunuk;Jeong, Hamin;Yoo, Hyunsoo;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.53-59
    • /
    • 2018
  • In this paper, we propose a hierarchical image classification scheme for efficient object image classification. In the non-hierarchical image classification, which classifies the existing whole images at one time, it showed that objects with relatively similar shapes are not recognized efficiently. Therefore, in this paper, we introduce the image classification method in the hierarchical structure which attempts to classify object images hierarchically. Also, we introduce to the efficient class structure and algorithms considering the scalability that can occur when a deep learning image classification is applied to an actual system. Such a scheme makes it possible to classify images with a higher degree of confidence in object images having relatively similar shapes.

  • PDF

Detection and Localization of Image Tampering using Deep Residual UNET with Stacked Dilated Convolution

  • Aminu, Ali Ahmad;Agwu, Nwojo Nnanna;Steve, Adeshina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.203-211
    • /
    • 2021
  • Image tampering detection and localization have become an active area of research in the field of digital image forensics in recent times. This is due to the widespread of malicious image tampering. This study presents a new method for image tampering detection and localization that combines the advantages of dilated convolution, residual network, and UNET Architecture. Using the UNET architecture as a backbone, we built the proposed network from two kinds of residual units, one for the encoder path and the other for the decoder path. The residual units help to speed up the training process and facilitate information propagation between the lower layers and the higher layers which are often difficult to train. To capture global image tampering artifacts and reduce the computational burden of the proposed method, we enlarge the receptive field size of the convolutional kernels by adopting dilated convolutions in the residual units used in building the proposed network. In contrast to existing deep learning methods, having a large number of layers, many network parameters, and often difficult to train, the proposed method can achieve excellent performance with a fewer number of parameters and less computational cost. To test the performance of the proposed method, we evaluate its performance in the context of four benchmark image forensics datasets. Experimental results show that the proposed method outperforms existing methods and could be potentially used to enhance image tampering detection and localization.

An End-to-End Sequence Learning Approach for Text Extraction and Recognition from Scene Image

  • Lalitha, G.;Lavanya, B.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.220-228
    • /
    • 2022
  • Image always carry useful information, detecting a text from scene images is imperative. The proposed work's purpose is to recognize scene text image, example boarding image kept on highways. Scene text detection on highways boarding's plays a vital role in road safety measures. At initial stage applying preprocessing techniques to the image is to sharpen and improve the features exist in the image. Likely, morphological operator were applied on images to remove the close gaps exists between objects. Here we proposed a two phase algorithm for extracting and recognizing text from scene images. In phase I text from scenery image is extracted by applying various image preprocessing techniques like blurring, erosion, tophat followed by applying thresholding, morphological gradient and by fixing kernel sizes, then canny edge detector is applied to detect the text contained in the scene images. In phase II text from scenery image recognized using MSER (Maximally Stable Extremal Region) and OCR; Proposed work aimed to detect the text contained in the scenery images from popular dataset repositories SVT, ICDAR 2003, MSRA-TD 500; these images were captured at various illumination and angles. Proposed algorithm produces higher accuracy in minimal execution time compared with state-of-the-art methodologies.

A Real-Time Spatial DSS for Security Camera Image Monitoring

  • Park, Young-Hwan;Lee, Ook
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.413-414
    • /
    • 1998
  • This paper presents a real-time Spatial Decision Support System(SDSS) for security camera image monitoring. Other SDSSs are not real-time systems, i.e., they show the images that are already transformed into data format such as virtual reality. In our system, the image is broadcasted in real-time since the purpose of the security camera needs to do it in real-time. With these real-time images, other systems do not add up anything more; the screen just shows the images from the camera. However in our system, we created a motion detection system so that the supervisor(Judge) of a sec.urity monitoring system does not have to pay attention to it constantly. In other words, we created a judge advising system for the supervisor of the security monitoring system. Most of small objects do not need the supervisor's attention since they could be birds, cats, dogs, etc. if they show up in the screen image. In this new system the system only report the unusual change to the supervisor by calculating the motion and size of objects in the screen. Thus the supervisor can be liberated from the 24-hour concentration duty; instead he/she can be only alerted when the real security threat such as a big moving object like an human intruder appears. Thus this system can be called a real-time Spatial DSS. The utility of this system is proved mathematically by using the concept of entropy. In other words, big objects like human intruders increase the entropy of the screen images significantly therefore the supervisor must be alerted. Thus by proving its utility of the system theoretically, we can claim that our new real-time SDSS is superior to others which do not use our technique.hnique.

  • PDF

A DCT Learning Combined RRU-Net for the Image Splicing Forgery Detection (DCT 학습을 융합한 RRU-Net 기반 이미지 스플라이싱 위조 영역 탐지 모델)

  • Young-min Seo;Jung-woo Han;Hee-jung Kwon;Su-bin Lee;Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2023
  • This paper proposes a lightweight deep learning network for detecting an image splicing forgery. The research on image forgery detection using CNN, a deep learning network, and research on detecting and localizing forgery in pixel units are in progress. Among them, CAT-Net, which learns the discrete cosine transform coefficients of images together with images, was released in 2022. The DCT coefficients presented by CAT-Net are combined with the JPEG artifact learning module and the backbone model as pre-learning, and the weights are fixed. The dataset used for pre-training is not included in the public dataset, and the backbone model has a relatively large number of network parameters, which causes overfitting in a small dataset, hindering generalization performance. In this paper, this learning module is designed to learn the characterization depending on the DCT domain in real-time during network training without pre-training. The DCT RRU-Net proposed in this paper is a network that combines RRU-Net which detects forgery by learning only images and JPEG artifact learning module. It is confirmed that the network parameters are less than those of CAT-Net, the detection performance of forgery is better than that of RRU-Net, and the generalization performance for various datasets improves through the network architecture and training method of DCT RRU-Net.

  • PDF

Methods on Recognition and Recovery Process of Censored Areas in Digital Image (디지털영상의 특정영역 인식과 처리 방안)

  • 김감래;김욱남;김훈정
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.20 no.1
    • /
    • pp.1-11
    • /
    • 2002
  • This study set up a purpose in the efficient utilization of security target objects. This purpose is the following: Firstly, this study analyzed problem about deleted areas for security described on aerial photography image. Secondly, this study made clustering and labeling to recognize censored areas of image. Finally, this study tried to maximize various utilizability of digital image data through postprocessing algorithm. Based on these courses, the results of this study appeared that brightness value of image increased depending on topography and quantities of topographic features. It was estimated that these was able to utilized by useful estimative data in judging information of topography and topographic features included in the total image. Besides, in the image recognition and postprocessing, the better result value was not elicited than in a mountainous region. Because it was included that a lots of topography and topographic features was similarly recognized with the process for deletion of the existing security target objects in urban and suburb region. This result appeared that the topography and quantities of topographic features absolutely affected the recognition and processing of image.

Measurement of Fingerprint Image Quality using Hybrid Segmentation method (Hybrid Segmentation을 이용한 Fingerprint Image Quality 측정 방법)

  • Park, Noh-Jun;Jang, Ji-Hyeon;Kim, Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.19-28
    • /
    • 2007
  • The purpose of this paper is to present a new measure for fingerprint image quality assessment that has a considerable effect on evaluation of fingerprint databases. This paper introduces a hybrid segmentation method for measuring an image quality and evaluates the experimental results using various fingerprint databases. This study compares the performance of the proposed hybrid segmentation using variance and coherence of fingerprints against the NIST's NFIQ program. Although NFIQ is a most widely used tool, it classifies the image quality into 5 levels. However, the proposed hybrid method is developed to be conformant to the ISO standards and accordant to human visual perception. The experimental results demonstrate that the hybrid method is able to produce finer quality measures.