• 제목/요약/키워드: Function Embedding

검색결과 115건 처리시간 0.02초

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

Virtual Network Embedding based on Node Connectivity Awareness and Path Integration Evaluation

  • Zhao, Zhiyuan;Meng, Xiangru;Su, Yuze;Li, Zhentao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3393-3412
    • /
    • 2017
  • As a main challenge in network virtualization, virtual network embedding problem is increasingly important and heuristic algorithms are of great interest. Aiming at the problems of poor correlation in node embedding and link embedding, long distance between adjacent virtual nodes and imbalance resource consumption of network components during embedding, we herein propose a two-stage virtual network embedding algorithm NA-PVNM. In node embedding stage, resource requirement and breadth first search algorithm are introduced to sort virtual nodes, and a node fitness function is developed to find the best substrate node. In link embedding stage, a path fitness function is developed to find the best path in which available bandwidth, CPU and path length are considered. Simulation results showed that the proposed algorithm could shorten link embedding distance, increase the acceptance ratio and revenue to cost ratio compared to previously reported algorithms. We also analyzed the impact of position constraint and substrate network attribute on algorithm performance, as well as the utilization of the substrate network resources during embedding via simulation. The results showed that, under the constraint of substrate resource distribution and virtual network requests, the critical factor of improving success ratio is to reduce resource consumption during embedding.

확률진폭 스위치에 의한 양자게이트의 함수 임베딩과 투사측정 (Function Embedding and Projective Measurement of Quantum Gate by Probability Amplitude Switch)

  • 박동영
    • 한국전자통신학회논문지
    • /
    • 제12권6호
    • /
    • pp.1027-1034
    • /
    • 2017
  • 본 논문은 양자게이트의 모든 제어 동작점에서 양자들의 확률진폭, 확률, 평균 기댓값 및 정상상태 단위행렬의 행렬요소 등을 수학적 투사로 측정할 수 있는 새로운 함수 임베딩 방법을 제안하였다. 본 논문의 함수 임베딩 방법은 디랙 기호와 크로네커델타 기호를 사용해 각 제어 동작점에 대한 확률진폭의 직교 정규화조건을 2진 스칼라 연산자에 임베딩 한 것이다. 이와 같은 함수 임베딩 방법은 양자게이트 함수를 단일양자들의 텐서 곱으로 표현하는 유니터리 변환에서 유니터리 게이트의 산술 멱함수 제어에 매우 효과적 수단임을 밝혔다. Ternary 2-qutrit cNOT 게이트에 본 논문이 제안한 함수 임베딩 방법을 적용했을 때의 진화연산과 투사측정 결과를 제시하고, 기존의 방법들과 비교 검토하였다.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

The Performance Analysis of Digital Watermarking based on Merging Techniques

  • Ariunzaya, Batgerel;Chu, Hyung-Suk;An, Chong-Koo
    • 융합신호처리학회논문지
    • /
    • 제12권3호
    • /
    • pp.176-180
    • /
    • 2011
  • Even though algorithms for watermark embedding and extraction step are important issue for digital watermarking, watermark selection and post-processing can give us an opportunity to improve our algorithms and achieve higher performance. For this reason, we summarized the possibilities of improvements for digital watermarking by referring to the watermark merging techniques rather than embedding and extraction algorithms in this paper. We chose Cox's function as main embedding and extraction algorithm, and multiple barcode watermarks as a watermark. Each bit of the multiple copies of barcode watermark was embedded into a gray-scale image with Cox's embedding function. After extracting the numbers of watermark, we applied the watermark merging techniques; including the simple merging, N-step iterated merging, recover merging and combination of iterated-recover merging. Main consequence of our paper was the fact of finding out how multiple barcode watermarks and merging techniques can give us opportunities to improve the performance of algorithm.

Secure Modulus Data Hiding Scheme

  • Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.600-612
    • /
    • 2013
  • In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.

FATOU THEOREM AND EMBEDDING THEOREMS FOR THE MEAN LIPSCHITZ FUNCTIONS ON THE UNIT BALL

  • Cho, Hong-Rae;Lee, Jin-Kee
    • 대한수학회논문집
    • /
    • 제24권2호
    • /
    • pp.187-195
    • /
    • 2009
  • We investigate the boundary values of the holomorphic mean Lipschitz function. In fact, we prove that the admissible limit exists at every boundary point of the unit ball for the holomorphic mean Lipschitz functions under some assumptions on the Lipschitz order. Moreover, we get embedding theorems of holomorphic mean Lipschitz spaces into Hardy spaces or into the Bloch space on the unit ball in $\mathbb{C}_n$.

벨 마비 급성기에 대한 매선요법 병행치료의 임상적 효과 (Effectiveness of Thread-embedding Therapy Combined with Korean Medicine Treatment on Acute phase of Bell's Palsy)

  • 이유정;최연아;김태준;노정두
    • 한방안이비인후피부과학회지
    • /
    • 제34권1호
    • /
    • pp.1-12
    • /
    • 2021
  • Objectives : This study was to investigate the effectiveness of thread-embedding therapy for the treatment of acute phase of Bell's palsy. Methods : Thread-embedding therapy was performed once a week on 29 patients within 1 weeks after the onset. We investigated the general characters, Yanagihara's score, House-Brackmann scale and FDI were used to evaluate the effectiveness of thread-embedding therapy. Results : Facial muscle recovery began at 13.37th day, that was about 0.36 day earlier than the previous patients who were treated without thread-embedding therapy in 2017 at the same hospital, but there was no statistical significance. In the change of each scale before and after treatment, Yanagihara's score, House-Brackmann scale, physical function and social function of FDI were changed significantly. Compared with the patients treated without thread-embedding therapy in 2017, Yanagihara's score was a little higher and House-Brackmann scale was a little lower. Conclusions : These findings suggested that thread-embedding therapy on acute phase of Bell's palsy was a little more effective than the conventional therapy without thread-embedding therapy.

족저근막염으로 진단된 족저부 통증 환자에 대한 매선침법 증례 보고 (Effects of Catgut-embedding Acupuncture Therapy on Plantar Fasciitis: Case Report)

  • 노승희;김유리;김건형;양기영;김재규;이병렬
    • Journal of Acupuncture Research
    • /
    • 제30권5호
    • /
    • pp.227-233
    • /
    • 2013
  • Objectives : The purpose of this study was to report the clinical effects of catgut-embedding acupuncture therapy on plantar fasciitis. Methods : Two patients were treated mainly with catgut-embedding acupuncture therapy and partly with other Korean medicine modalities. Catgut-embedding acupuncture therapy was applied once a week for three weeks, and follow-up observation was conducted by telephone survey two months after the first treatment. Results : In these two cases, the pain numerical rating scale(NRS) gradually decreased from 8 to 1, and the pain relief as well as the improvement in ambulatory function was maintained at two-month follow-up. Conclusions : Catgut-embedding acupuncture therapy could be effective for pain-reduction and functional improvement in plantar fasciitis.

효율적 Embedding을 위한 SMIL Processor의 설계 및 개발 (Design and Development of SMIL Processor for efficient Embedding)

  • 장동옥;강미연;정원호;이은철;김도완;김종대;김윤수
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1999년도 가을 학술발표논문집 Vol.26 No.2 (2)
    • /
    • pp.265-267
    • /
    • 1999
  • XML 언어로 설계된 SMIL(Synchronized Multimedia Integration Language)은 멀티미디어 객체들의 순차적 혹은 병렬적 동기화를 효율적으로 할 수 있는 마크업 언어로써, web을 이용한 원격 강의나 홍보 등을 더욱 생성하고 dynamic하게 보여 줄 수 있어, 그 사용이 확대될 전망이다. 본 논문에서는 각종 웹 단말기에 손쉽게 embedding 될 수 있는 SMIL 프로세서에 대한 설계가 제안된다. 웹 응용을 위해, 속도의 개선과 시스템 독립적인 function들로 구성되는 parser와 응용에 적합한 API의 설계에 주안점을 두었으며, 추후 XML parser function들과 API 설계를 위해 가능한 적은 수정을 통하여 재사용이 가능하도록 하는데 또한 주안점을 두고 있다.

  • PDF