• 제목/요약/키워드: Reconstruction Attack

검색결과 20건 처리시간 0.03초

Presentation Attacks in Palmprint Recognition Systems

  • Sun, Yue;Wang, Changkun
    • Journal of Multimedia Information System
    • /
    • 제9권2호
    • /
    • pp.103-112
    • /
    • 2022
  • Background: A presentation attack places the printed image or displayed video at the front of the sensor to deceive the biometric recognition system. Usually, presentation attackers steal a genuine user's biometric image and use it for presentation attack. In recent years, reconstruction attack and adversarial attack can generate high-quality fake images, and have high attack success rates. However, their attack rates degrade remarkably after image shooting. Methods: In order to comprehensively analyze the threat of presentation attack to palmprint recognition system, this paper makes six palmprint presentation attack datasets. The datasets were tested on texture coding-based recognition methods and deep learning-based recognition methods. Results and conclusion: The experimental results show that the presentation attack caused by the leakage of the original image has a high success rate and a great threat; while the success rates of reconstruction attack and adversarial attack decrease significantly.

ATT&CK 기반 공격체인 구성을 통한 APT 공격탐지 시스템 구현 (Implementation of an APT Attack Detection System through ATT&CK-Based Attack Chain Reconstruction)

  • 조성영;박용우;이경식
    • 정보보호학회논문지
    • /
    • 제32권3호
    • /
    • pp.527-545
    • /
    • 2022
  • 본 연구에서는 조직화된 공격 주체가 수행하는 APT 공격을 효과적으로 탐지하기 위하여, 공격체인을 구성하여 공격을 탐지하는 시스템을 구축하였다. 공격체인 기반 APT 공격 탐지 시스템은 다양한 호스트 및 네트워크 모니터링 도구에서 생성하는 이벤트를 수집하고 저장하는 '이벤트 수집 및 저장부', 이벤트로부터 MITRE ATT&CK®에 정의된 공격기술 수준의 단위공격을 탐지하는 '단위공격 탐지부', 단위공격으로 생성된 이벤트로부터 Provenance Graph 기반의 인과관계 분석을 수행하여 공격체인을 구성하는 '공격체인 구성부'로 구성하였다. 시스템을 검증하기 위하여 테스트베드를 구축하고 MITRE ATT&CK Evaluation 프로그램에서 제공하는 모의공격 시나리오를 수행하였다. 실험 결과 모의공격 시나리오에 대해 공격체인이 효과적으로 구성되는 것을 확인하였다. 본 연구에서 구현한 시스템을 이용하면, 공격을 단편적인 부분으로 이해하기보다 공격의 진행 흐름 관점에서 이해하고 대응할 수 있을 것이다.

A Sliding Mode Observer for Reconstructing Cyber Attacks

  • Joseph Chang Lun Chan;Tae H. Lee
    • 대한임베디드공학회논문지
    • /
    • 제18권6호
    • /
    • pp.311-317
    • /
    • 2023
  • This paper presents a sliding mode observer (SMO) for reconstructing cyber attacks affecting a system. The system is first re-expressed such that its design freedom is easier to manipulate. The SMO is then used to reconstruct the cyber attack affecting the system. A simulation example is used to verify the performance of the SMO under two types of cyber attacks, and its results demonstrate the effectiveness of our proposed scheme.

그래디언트 기반 재복원공격을 활용한 배치상황에서의 연합학습 프라이버시 침해연구 (Federated Learning Privacy Invasion Study in Batch Situation Using Gradient-Based Restoration Attack)

  • 장진혁;류권상;최대선
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.987-999
    • /
    • 2021
  • 최근 데이터로 인한 개인정보 침해로 인해 연합학습이 이슈화되고 있다. 연합학습은 학습데이터를 요구하지 않기 때문에 프라이버시 침해로부터 안전하다. 이로 인해 분산된 디바이스, 데이터를 활용하여 효율을 내기 위한 응용 방법에 대한 연구들이 진행되고 있다. 그러나 연합학습과정에서 전송되는 그래디언트로부터 학습데이터를 복원하는 재복원공격에 대한 연구가 진행됨에 따라 더는 연합학습도 안전하다고 볼 수 없다. 본 논문은 다양한 데이터 상황에서 데이터 복원 공격이 얼마나 잘되는지 수치적, 시각적으로 확인하는 것이다. 데이터가 1개만 존재할 때부터 크게는 클래스 안에 데이터가 여러 개 분포해 있을 때로 나누어 재복원공격이 얼마나 되는지 확인을 위해 MSE, LOSS, PSNR, SSIM인 평가지표로 MNIST 데이터를 활용해 수치로 확인한다. 알게 된 사실로 클래스와 데이터가 많아질수록 MSE, LOSS,이 높아지고 PSNR, SSIM이 낮아져 복원성능이 떨어지지만 몇 개의 복원된 이미지로 충분히 프라이버시 침해가 가능하다는 것을 확인할 수 있다.

Comparison of artificial intelligence models reconstructing missing wind signals in deep-cutting gorges

  • Zhen Wang;Jinsong Zhu;Ziyue Lu;Zhitian Zhang
    • Wind and Structures
    • /
    • 제38권1호
    • /
    • pp.75-91
    • /
    • 2024
  • Reliable wind signal reconstruction can be beneficial to the operational safety of long-span bridges. Non-Gaussian characteristics of wind signals make the reconstruction process challenging. In this paper, non-Gaussian wind signals are converted into a combined prediction of two kinds of features, actual wind speeds and wind angles of attack. First, two decomposition techniques, empirical mode decomposition (EMD) and variational mode decomposition (VMD), are introduced to decompose wind signals into intrinsic mode functions (IMFs) to reduce the randomness of wind signals. Their principles and applicability are also discussed. Then, four artificial intelligence (AI) algorithms are utilized for wind signal reconstruction by combining the particle swarm optimization (PSO) algorithm with back propagation neural network (BPNN), support vector regression (SVR), long short-term memory (LSTM) and bidirectional long short-term memory (Bi-LSTM), respectively. Measured wind signals from a bridge site in a deep-cutting gorge are taken as experimental subjects. The results showed that the reconstruction error of high-frequency components of EMD is too large. On the contrary, VMD fully extracts the multiscale rules of the signal, reduces the component complexity. The combination of VMD-PSO-Bi-LSTM is demonstrated to be the most effective among all hybrid models.

PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech

  • Yang, Hae-Yong;Lee, Kyung-Hoon;Lee, Sang-Han;Ko, Sung-Jea
    • ETRI Journal
    • /
    • 제31권4호
    • /
    • pp.408-418
    • /
    • 2009
  • Adopting an encryption function in voice over Wi-Fi service incurs problems such as additional power consumption and degradation of communication quality. To overcome these problems, a partial encryption (PE) algorithm for compressed speech was recently introduced. However, from the security point of view, the partial encryption sets (PESs) of the conventional PE algorithm still have much room for improvement. This paper proposes a new selection method for finding a smaller PES while maintaining the security level of encrypted speech. The proposed PES selection method employs the perceptual evaluation of the speech quality (PESQ) algorithm to objectively measure the distortion of speech. The proposed method is applied to the ITU-T G.729 speech codec, and content protection capability is verified by a range of tests and a reconstruction attack. The experimental results show that encrypting only 20% of the compressed bitstream is sufficient to effectively hide the entire content of speech.

픽셀값 변환 기법을 더한 데이터 복원공격에의한 연합학습의 프라이버시 침해 (Invasion of Pivacy of Federated Learning by Data Reconstruction Attack with Technique for Converting Pixel Value)

  • 오윤주;최대선
    • 정보보호학회논문지
    • /
    • 제33권1호
    • /
    • pp.63-74
    • /
    • 2023
  • 프라이버시 침해에 대한 안전성을 보장하기 위해 매개변수를 주고받아 학습하는 연합학습이 대두되고 있다. 하지만 최근 그래디언트를 이용하여 학습 데이터를 유출하는 논문이 발표되었다. 본 논문은 연합학습 환경에서 그래디언트를 이용하여 학습 데이터를 유출하는 실험을 구현하였으며, 학습 데이터를 유출하는 기존 공격을 개선하여 복원성능을 높이는 방법을 제안한다. 제안 방법에 대해 Yale face database B, MNIST dataset를 이용하여 실험한 결과, 연합학습 성능이 accuracy=99~100%로 높을 때 100개의 학습 데이터 중 최대 100개의 데이터를 식별 가능한 수준으로 복원하여, 연합학습이 프라이버시 침해로부터 안전하지 않다는 것을 보인다. 또한, 픽셀단위의 성능(MSE, PSNR, SSIM)과 Human Test에 의한 식별적인 성능을 비교함으로써 픽셀에 기반한 성능보다 식별적인 성능의 중요성을 강조하고자 한다.

Late reconstruction of extensive orbital floor fracture with a patient-specific implant in a bombing victim

  • Smeets, Maximiliaan;Snel, Robin;Sun, Yi;Dormaar, Titiaan;Politis, Constantinus
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • 제46권5호
    • /
    • pp.353-357
    • /
    • 2020
  • Fractures of the orbital floor and walls are among the most frequent maxillofacial fractures. Virtual three-dimensional (3D) planning and use of patient-specific implants (PSIs) could improve anatomic and functional outcomes in orbital reconstruction surgery. The presented case was a victim of a terrorist attack involving improvised explosive devices. This 58-year-old female suffered severe wounds caused by a single piece of metal from a bomb, shattering the left orbital floor and lateral orbital wall. Due to remaining hypotropia of the left eye compared to the right eye, late orbital floor reconstruction was carried out with a personalised 3D printed titanium implant. We concluded that this technique with PSI appears to be a viable method to correct complex orbital floor defects. Our research group noted good aesthetic and functional results one year after surgery. Due to the complexity of the surgery for a major bony defect of the orbital floor, it is important that the surgery be executed by experienced surgeons in the field of maxillofacial traumatology.

광배근 유리 피판술을 이용한 사지 재건술 (Reconstruction of the Limb Using Latissimus Dorsi Free Flap)

  • 김주성;정준모;백구현;정문상
    • Archives of Reconstructive Microsurgery
    • /
    • 제6권1호
    • /
    • pp.56-62
    • /
    • 1997
  • Latissimus dorsi(LD) muscle is the largest transplantable block of vascularized tissue. Since LD free flap was introduced in 1970's, this flap has been widely used for the reconstruction of large soft tissue defect of the limb. From 1981 to 1996, we had experienced 37 cases of LD free flap. Serratus anterior muscle was combined with LD in three of them whose defects were very large. The average age of the patients was 31 years(range : 4-74 years), and thirty one patients were male. Trauma was cause of the defect in every case. For the recipient sites, the foot and ankle was the most common(22 cases); and the knee and lower leg(11 cases), the elbow and forearm(2 cases), the hand(2 cases) were the next. The duration of follow-up was averaged as 16 months(range: 6 months-12 years). Thirty one cases(84%) out of 37 were successful transplantations. In one case the failure of the flap was due to heart attack and subsequent death of the patient. One failure was caused by sudden violent seizure of the patient who had organic brain damage. Immediate reexploration of the flap was performed in 4 patients, and the flap survived in three of them. There was one necrosis of the grafted split-thickness skin on the survived LD flap. LD free flap was considered as one of the good methods, for the reconstruction of the large soft tissue defect of the limb.

  • PDF

채널 오류율 추정에 기반을 둔 길쌈부호의 개선된 재구성 알고리즘 (An Improved Reconstruction Algorithm of Convolutional Codes Based on Channel Error Rate Estimation)

  • 성진우;정하봉
    • 한국통신학회논문지
    • /
    • 제42권5호
    • /
    • pp.951-958
    • /
    • 2017
  • 채널 재구성 기법이란 통신시스템에서 의도되지 않은 수신자가 수신 신호로부터 어떤 채널 부호가 사용되었는지, 주요 파라미터는 무엇인지를 알아내는 기법이다. 본 논문은 수신한 신호가 길쌈부호로 부호화된 경우, 사용된 길쌈부호의 주요파라미터인 입출력단의 비트수인 k와 n, 그리고 $k{\times}n$ 생성다항식행렬(Polynomial Generator Matrix, PGM)을 찾아내는 기법에 대해 다룬다. 본 논문은 M. Marazin 등이 제안한, 피버팅을 통한 가우스 조단소거법(Gauss Jordan Elimination Through Pivoting, GJETP)을 사용한 길쌈부호의 채널 재구성 기법에서 채널오류율과 무관하게 임계값을 설정해주던 것과 달리, 수신한 시퀀스로부터 2진 대칭 채널(Bynary Symetric Channel, BSC)의 채널오류확률을 추정하고 이로부터 임계값을 설정하는 방식을 제안하고, S. Shaojing 등의 연판정(soft decision) 값을 이용한 기법을 적용시켜서 채널 재구성 기법의 성공률을 향상시켰다.