• Title/Summary/Keyword: tamper

Search Result 108, Processing Time 0.027 seconds

Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm

  • Shin, Yong-Dal;Cho, Yong-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.527-534
    • /
    • 2019
  • Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS).

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

Enhancing Document Security with Computer Generated Hologram Encryption: Comprehensive Solution for Mobile Verification and Offline Decryption

  • Leehwan Hwang;Seunghyun Lee;Jongsung Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.169-175
    • /
    • 2024
  • In this paper, we introduce a novel approach to enhance document security by integrating Computer Generated Hologram(CGH) encryption technology with a system for document encryption, printing, and subsequent verification using a smartphone application. The proposed system enables the encryption of documents using CGH technology and their printing on the edges of the document, simplifying document verification and validation through a smartphone application. Furthermore, the system leverages high-resolution smartphone cameras to perform online verification of the original document and supports offline document decryption, ensuring tamper detection even in environments without internet connectivity. This research contributes to the development of a comprehensive and versatile solution for document security and integrity, with applications in various domains.

Prospect Analysis for Utilization of Virtual Assets using Blockchain Technology

  • Jeongkyu Hong
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.64-69
    • /
    • 2024
  • Blockchain is a decentralized network in which data blocks are linked. Through a decentralized peer-to-peer network, users can create shared databases, resulting in a trustworthy and aggregated database known as a blockchain that enhances reliability and security. The distributed nature of the blockchain enables data to be stored on multiple nodes, eliminating the need for a central server or platform. This disintermediation significantly reduces the transaction and administrative costs. The blockchain is particularly valuable in applications where reliability and stability are critical because it establishes an open database that ensures data integrity, making it virtually impossible to tamper with or falsify data. This study explores the diverse applications of the blockchain technology in virtual assets, such as cryptocurrency, decentralized finance, central bank digital currency, nonfungible tokens, and metaverses. In addition, it analyzes the potential prospects and developments driven by these innovative technologies.

A Conceptual Design on Training Simulator of the Special Railway Vehicle for Multiple Tie Tamper (궤도보수 특수철도차량 탬퍼 모의훈련연습기의 개념설계)

  • Ahn, Seung-Ho;Kang, Jeong Hyung;Kim, Chul Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.430-436
    • /
    • 2018
  • Special railway vehicles for track maintenance are equipped with a tamping device that adjusts various track trajectories to reduce the vibration of rolling stock and improve ride quality during trains passing over a track. The development of a simulator that can confirm the error of the actual tamping work is important for reducing human error in the linearization of the track misalignment. In this study, to improve the reality and training effect of conventional 2D simulator, 3D simulator modeling was implemented for tamping work of special railway vehicles in virtual space. The problem of buffering during high screen quality of tamping work was solved using the Unwrap UVW mapping technique of a low polygon extracted from high quality polygon modeling. The human error in the training of the tamping work was detected by the principle of circle and square collision when the tamping tyne and the sleeper collided. In addition, vibration of the driving chair was generated at the same time as the collision, and the number of the sleeper strikes is displayed on the simulator exercise screen. Owing to the scattering of railway ballast protruding from the sleepers, which had a serious effect on the safety of the vehicle, the gravel bouncing effect of the tamping unit was applied.

Development and application of tamper-proof clamp-type ferrite filter for protective relays (보호계전기 오동작 방지를 위한 클램프형 Ferrite Filter 연구개발 및 적용사례)

  • Lee, Myeong-Hee;Lee, Bong-Hee;Kim, In-Gon
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.477-478
    • /
    • 2011
  • 전기, 전자분야에 반도체가 폭넓게 사용됨에 따라 발 변전소에서 Noise에 의한 보호계전기 오동작 사례가 늘어나고 있어, 이것을 효과적으로 차단하고 설비의 오동작을 예방할 수 있는 필터개발이 필요 하였다. 현재 시중에서 사용하고 있는 Ferrite Filter는 일반 가전 및 OA를 대상으로 개발하였기 때문에 송변전계통의 변전소에서 발생하는 Noise와 차단 영역이 다르다. 따라서 송변전설비 보호계전기의 오동작원인을 분석하고, 변전소에서 발생하는 Noise의 형태를 측정하여 그것을 차단하기에 적합한 Clamp형의 Ferrite Filter를 개발하였다. Ferrite Filter는 재질에 따라 고주파 차단 영역이 결정된다. 일반적인 전자설비에 사용하는 니켈계(Ni-Zn) 재질의 Filter는 수MHz~수GHz 영역이며, 변전소에 주로 발생하는 고주파 수KHz~수MHz 영역은 망간계(Mn-Zn) 재질을 혼합하여 만들었다. 개발한 Filter의 성능 확인을 위해 공인시험기관인 KERI(한국전기연구원)에서 다양한 형태로 고주파 차단 특성 시험을 시행한 결과, 망간계와 니켈계 Ferrite Filter를 직렬로 설치함으로서 Noise를 효과적으로 차단함을 확인 하였고 5개소에 2개월간시범적용을 통하여 그 성능을 검증하였다. 본 연구결과는 Clamp형 Ferrite Filter의 기술적 한계로 여겨졌던 고주파 차단특성을 발변전소 등의 전력설비에서 발생하는 대역까지 확대하였으며, 경제적으로도 기존의 L-C Filter 대비 약 4%의 비용으로 설치할 수 있어 그 비용을 획기적으로 절감하였고, 설비의 정지 없이 언제든지 간편하게 설치할 수 있어 현장에서 적용하기에 매우 유용하다. 그 성능을 지속적으로 향상시켜 많은 분야에서 활용할 수 있도록 추가적인 연구개발이 필요할 것으로 판단된다.

  • PDF

Numerical modeling of dynamic compaction process in dry sands considering critical distance from adjacent structures

  • Pourjenabia, Majid;Hamidi, Amir
    • Structural Engineering and Mechanics
    • /
    • v.56 no.1
    • /
    • pp.49-56
    • /
    • 2015
  • Dynamic compaction (DC) is a useful method for improvement of granular soils. The method is based on falling a tamper (weighting 5 to 40 ton) from the height of 15 to 30 meters on loose soil that results in stress distribution, vibration of soil particles and desirable compaction of the soil. Propagation of the waves during tamping affects adjacent structures and causes structural damage or loss of performance. Therefore, determination of the safe or critical distance from tamping point to prevent structural hazards is necessary. According to FHWA, the critical distance is defined as the limit of a particle velocity of 76 mm/s. In present study, the ABAQUS software was used for numerical modeling of DC process and determination of the safe distance based on particle velocity criterion. Different variables like alluvium depth, relative density, and impact energy were considered in finite element modeling. It was concluded that for alluvium depths less than 10 m, reflection of the body waves from lower boundaries back to the soil and resonance phenomenon increases the critical distance. However, the critical distance decreases for alluvium depths more than 10 m. Moreover, it was observed that relative density of the alluvium does not significantly influence the critical distance value.

Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

  • Kim, Dong-Kyue;Lee, Mun-Kyu;Kang, You-Sung;Chung, Sang-Hwa;Yoon, Won-Ju;Min, Jung-Ki;Kim, Ho-Won
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.755-768
    • /
    • 2007
  • A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of tamper resistance, the security of electronic seals must be ensured. In this paper, we present the design and implementation of an electronic seal protection system. First, we propose the eSeal Protection Protocol (ePP). Next, we implement and evaluate various cryptographic primitives as building blocks for our protocol. Our experimental results show that AES-CBC-MAC achieves the best performance among various schemes for message authentication and session key derivation. Finally, we implement a new electronic seal system equipped with ePP, and evaluate its performance using a real-world platform. Our evaluation shows that ePP guarantees a sufficient performance over an ARM9-based interrogator.

  • PDF

Improved User Anonymity Authentication Scheme using Smart Card for Traceability (추적 가능성을 위한 스마트카드 기반의 개선된 사용자 익명성 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.83-91
    • /
    • 2012
  • Authentication schemes preserving user anonymity have first been proposed by Das et al, and most of user anonymity schemes provide user anonymity against outside attacks in the communication channel. In this paper, according to the increasing of personal information exposure incidents by server attack, we propose a new authentication scheme that provides user anonymity against server as well as one against outside attacks in the communication channel. Furthermore, the proposed authentication scheme provides traceability that remote server should be able to trace the malicious user and it also solves the problem of increasing computational load of remote server by solving weakness of wrong password input by mistake.