• Title/Summary/Keyword: forgery prevention

Search Result 36, Processing Time 0.03 seconds

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A Study on the Prevention of Smartcard Forgery and Alteration Using Angular Multiplexing and Private Key Multiplexing based on Optical Encryption (영상 암호화 기반에서의 각다중화 및 암호키 다중화 기법을 이용한 스마트카드 위 .변조 방지에 관한 연구)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.63-69
    • /
    • 2001
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This paper proposes a method to prevent card forgery and alteration using angular multiplexing and private key multiplexing method on optical encryption, and proposed a Public Key Infrastructure(PKI)-based authentication system combined with One-Time Password (OTP) for verification of forgery and alteration .

Study of a prevention model against institutional documentation forgery using blockchain technology (블록체인 기술을 이용한 학교문서위조 예방모델의 연구)

  • Kim, Kee-Hong;Kim, Dong-Chul
    • Journal of Arbitration Studies
    • /
    • v.28 no.2
    • /
    • pp.165-178
    • /
    • 2018
  • Exchanging information with a person without credentials over the Internet does not pose any problems. A decentralized system based on blockchain technology enables the user to exchange new value(currency) with other uncredited users. The blockchain technology creates a new paradigm in which the distribution system can be founded on trust. Various applied distribution systems are being developed based on this paradigm. This study analyzed the problems between an institute's grading system and the central administration system. The limitations of an institute's current central management system were presented through actual cases. To improve the problem, a decentralized system based on block chain technology was presented in order to overcome the fundamental limitations by utilizing blockchain technology, peer-to-peer network, and the distribution system. In the central system, a malicious moderator could create a malicious edit that becomes the cause of a dispute, but in a decentralized system, a problem cannot be created even if there were to be a malicious moderator. However, it is difficult for a single college institute to create a distribution system in order to actualize an effective system. Comparatively, it would be possible to create a decentralized system in which all educational institutes in Korea (elementary schools, middle schools, high schools, colleges) took part in. The application of a decentralized system would improve the public transparency and reliability of educational institutes.

Design of Electronic ID System Satisfying Security Requirements of Authentication Certificate Using Fingerprint Recognition (지문 인식을 이용하여 공인인증서의 보안 요건을 만족하는 전자 신분증 시스템의 설계)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.610-616
    • /
    • 2015
  • In this paper, an electronic ID system satisfying security requirements of authentication certificate was designed using fingerprint recognition. The proposed electronic ID system generates a digital signature with forgery prevention, confidentiality, content integrity, and personal identification (=non-repudiation) using fingerprint information, and also encrypts, sends, and verify it. The proposed electronic ID system exploits fingerprint instead of user password, so it avoids leakage and hijacking. And it provides same legal force as conventional authentication certificate. The proposed electronic ID consists of 4 modules, i.e. HSM device, verification server, CA server, and RA client. Prototypes of all modules are designed and verified to have correct operation.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

A Study on Memory Hacking Prevention System in Windows Environment (윈도우 환경에서의 메모리 해킹 방지 시스템 연구)

  • Kim, Yo-Sik;Yun, Young-Tae;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.75-86
    • /
    • 2005
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing due to the advances in reverse engineering techniques. Furthermore someone who has concerns about these area can crack the software by using the open-to-public simple tools on the internet. The software companies are struggling to defend their own softwares against threats, while the crackers are continuing to crack the softwares. In this paper, we first establish the generic software threat model and, analyze and experiment on the software cracks, before suggest a memory hacking prevention system in Microsoft Windows environment.

  • PDF

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management (효율적인 전자문서 관리를 위한 난수 재배열 기반의 키 관리 방법을 이용한 암호화 기법에 관한 연구)

  • Kim, Tae-Wook;Sung, Kyung-Sang;Kim, Jung-Jae;Min, Byoung-Muk;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.575-582
    • /
    • 2009
  • With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requested. Even though various security technologies have been developed for electronic documents, most of them are emphasized to prevention of forgery or repudiation. This paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of the proposed random rearrangement method comparing with the existing cryptographies, basic elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

An Image forgery protection for real-time vehicle black box using PingPong-256MAC (PingPong-256MAC을 이용한 차량용 블랙박스 실시간 영상 위변조 방지 기술)

  • Kim, HyunHo;Kim, Min-Kyu;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.241-244
    • /
    • 2018
  • Domestic vehicle registration is continuously increasing every year, traffic accidents are also increasing by an increase in the number of vehicles. In the event of a traffic accident, the perpetrator and the victim should be judged and handled appropriately. When judging the accident situation, the black box is what evidence can be except for witness who is at the accident scene. The black box becomes an essential role in order to prevent traffic accidents. However, there is no way to prove integrity by evidence corruption, fabrication and etc. For this reason, we propose a method to guarantee the integrity of image through hash value generated by using PingPong 256 encryption algorithm for integrity verification in this paper.

  • PDF

Understanding and Education Measures of the Prevention of Forgery and Falsification of Blockchain for Elementary School Students (초등학생 대상 블록체인 기술의 위변조 방지 핵심원리 이해와 교육방안 설계)

  • Jung, Yujin;Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.513-520
    • /
    • 2019
  • The general learning method aims at conveying knowledge by conveying the contents of the learning set to numerous of learners. However, such a method is difficult to induce the interest of the learner, and the unilateral delivery method has a disadvantage in that the concentration of the learner can be lowered and the overall academic achievement can be lowered. In order to solve this problem, the gay learning method which induces the interest of the students themselves is studied, and the gay learning game which combines the education and the game can influence the learning by inducing the interest of the student. In this paper, we propose a method to prevent the forgery and falsification of the blockchain, which has been widely discussed by the 4th Industrial Revolution, as a card game, And suggests ways to contribute to the development of the process.