• Title/Summary/Keyword: HIDE

Search Result 327, Processing Time 0.023 seconds

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud

  • Zhu, Taipeng;Zou, Xianxia;Pan, Jiuhui
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.573-589
    • /
    • 2017
  • Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information should be considered by any organization migrating to cloud, which makes the research on relational database system based on encryption schemes to preserve the integrity and confidentiality of data in cloud be an interesting subject. So far there have been various solutions for realizing SQL queries on encrypted data in cloud without decryption in advance, where generally homomorphic encryption algorithm is applied to support queries with aggregate functions or numerical computation. But the existing homomorphic encryption algorithms cannot encrypt floating-point numbers. So in this paper, we present a mechanism to enable the trusted party to encrypt the floating-points by homomorphic encryption algorithm and partial trusty server to perform summation on their ciphertexts without revealing the data itself. In the first step, we encode floating-point numbers to hide the decimal points and the positive or negative signs. Then, the codes of floating-point numbers are encrypted by homomorphic encryption algorithm and stored as sequences in cloud. Finally, we use the data structure of DoubleListTree to implement the aggregate function of SUM and later do some extra processes to accomplish the summation.

The relationship between knowledge hiding and knowledge sharing : Through determinants of knowledge hiding and knowledge sharing (지식은폐와 지식공유의 영향요인과 관계에 관한 연구)

  • Shin, GaHee;Kwag, Sunhwa
    • Knowledge Management Research
    • /
    • v.18 no.2
    • /
    • pp.129-157
    • /
    • 2017
  • Knowledge is important to both individuals and organizations. Individuals can have the opportunity to have bargaining power within their organisations by having knowledge of know-how and ideas. Having ample knowledge of the organization can bring about advantages in securing competitive advantage. Organization wants to encourage employees to share knowledge. Despite the efforts to enhance knowledge sharing, often the effort failed. Employees are unwilling to share their knowledge or hide their knowledge. The purpose of this study is to clarify the relationship between knowledge hiding and knowledge sharing based on exploring the influence factors of knowledge hiding and knowledge sharing. As a result, the influence factors of knowledge hiding and knowledge sharing were different. The influences of knowledge hiding influenced knowledge hiding only and did not affect knowledge sharing. This implies that knowledge hiding and knowledge sharing do not exist on a single line but exist independently of each other, such as 'Herzberg's two-factor theory'. This study suggests that knowledge hiding is a field of interest as well as knowledge sharing. In practice, it is suggested that the concept of promoting knowledge sharing is not a way to reduce knowledge hiding, so the two concepts should be managed separately.

Design of Generalized Fluctuation Function for Reversible Data Hiding in Encrypted Image (암호화된 영상의 가역적 데이터 은닉을 위한 일반화된 섭동 함수 설계)

  • Kim, Young-Hun;Lim, Dae-Woon;Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1329-1340
    • /
    • 2016
  • Recently, Zhang proposed a scheme to hide information in encrypted images using synchronous stream ciphers. After the receiver decrypts the encrypted image and extracts data by calculating the spatial correlation property value using the fluctuation function which is designed to calculate spacial correlation between adjacent pixels in a decrypted image. Then, Hong improved the Zhang's data hiding scheme by introducing the side match technique. In this paper, a novel fluctuation function is proposed to reduce the recovery errors which arise during extracting hidden data. Then, we also demonstrated that the proposed fluctuation function outperforms the previous functions through computer simulations for sample images.

A Study of Folklore on the Traditional Wedding of the West Gyeong Nam District - Focused on 1920s~1950s - (서부경남지방의 전통혼례에 관한 민속학적 연구 - 1920~1950년대를 중심으로 -)

  • 정복남
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.6
    • /
    • pp.871-886
    • /
    • 2000
  • The purpose of this study is to understand the culture on the Traditional Wedding of the West Gyeong Nam District. The traditional wedding was characterized that the bridegroom visited his bride's house accompanied by his honored guests(上客) and the marriage ceremony was to be held in day time, and then the bridegroom became a son-in-law and stayed with the family for a few days. The bridegroom returned to his home, leaving his bride behind. After a certain period, the bride came to her husband's home as a daughter-in-law. The Traditional Wedding costume of the bridegroom were Samo-Gwandae. The coat (outside uniform) was blue Danryeong ornamented with two cranes figured Hyong-Bae and Heukgackdae. In case Samo-Gwandae was not available, Dopo or Durumakie could be substituted and they put on shoes in this case. A bridegroom put on Mokhwa his feet and under the Samo, and he also put on Nambawie or Bokguen. He put on Dopo or Haeng-eui(行衣) or Durumaki under the blue Danryeong. The bride put on Wonsam and Chokduri or Hwagwan on her hair. In case Wonsam was not available, Chima Jogori style or imitational Wonsam, which was roughly sewed with red cloth and blue cloth contained in the Honsuham (Box of wedding treasure), could be substituted. She put on Hyang-guen to protect her body against the coldness and to hide her face.

  • PDF

Invader Detection System Using the Morphological Filtering and Difference Images Based on the Max-Valued Edge Detection Algorithm

  • Lee, Jae-Hyun;Kim, Sung-Shin;Kim, Jung-Min
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.5
    • /
    • pp.645-661
    • /
    • 2012
  • Recently, pirates are infesting on the sea and they have been hijacking the several vessels for example Samho Dream and Samho Jewelry of Korea. One of the items to reduce the risk is to adopt the invader detection system. If the pirates break in to the ship, the detection system can monitor the pirates and then call the security alarm. The crew can gain time to hide to the safe room and the report can be automatically sent to the control room to cope with the situation. For the invader detection, an unmanned observation system was proposed using the image detection algorithm that extracts the invader image from the recording image. To detect the motion area, the difference value was calculated between the current image and the prior image of the invader, and the 'AND' operator was used in calculated image and edge line. The image noise was reduced based on the morphology operation and then the image was transformed into morphological information. Finally, a neural network model was applied to recognize the invader. In the experimental results, it was confirmed that the proposed approach can improve the performance of the recognition in the invader monitoring system.

Data-Hiding for Halftone Images Using an Improved CPT scheme

  • Phan, Trung Huy;Nguyen, Hai Thanh;Kim, Cheonshik;Yang, Ching-Nung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.405-424
    • /
    • 2013
  • In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e.g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as $r={\lfloor}{\log}_2(m{\times}n+1){\rfloor}$ bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

  • Luo, Yubo;Huang, Yongfeng;Li, Fufang;Chang, Chinchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4568-4584
    • /
    • 2016
  • Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.

Impedance-based Long-term Structural Health Monitoring for Tidal Current Power Plant Structure in Noisy Environments (잡음 환경 하에서의 전기-역학적 임피던스 기반 조류발전 구조물의 장기 건전성 모니터링)

  • Min, Ji-Young;Shim, Hyo-Jin;Yun, Chung-Bang;Yi, Jin-Hak
    • Journal of Ocean Engineering and Technology
    • /
    • v.25 no.4
    • /
    • pp.59-65
    • /
    • 2011
  • In structural health monitoring (SHM) using electro-mechanical impedance signatures, it is a critical issue for extremely large structures to extract the best damage diagnosis results, while minimizing unknown environmental effects, including temperature, humidity, and acoustic vibration. If the impedance signatures fluctuate because of these factors, these fluctuations should be eliminated because they might hide the characteristics of the host structural damages. This paper presents a long-term SHM technique under an unknown noisy environment for tidal current power plant structures. The obtained impedance signatures contained significant variations during the measurements, especially in the audio frequency range. To eliminate these variations, a continuous principal component analysis was applied, and the results were compared with the conventional approach using the RMSD (Root Mean Square Deviation) and CC (Cross-correlation Coefficient) damage indices. Finally, it was found that this approach could be effectively used for long-term SHM in noisy environments.

Spark Framework Based on a Heterogenous Pipeline Computing with OpenCL (OpenCL을 활용한 이기종 파이프라인 컴퓨팅 기반 Spark 프레임워크)

  • Kim, Daehee;Park, Neungsoo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.2
    • /
    • pp.270-276
    • /
    • 2018
  • Apache Spark is one of the high performance in-memory computing frameworks for big-data processing. Recently, to improve the performance, general-purpose computing on graphics processing unit(GPGPU) is adapted to Apache Spark framework. Previous Spark-GPGPU frameworks focus on overcoming the difficulty of an implementation resulting from the difference between the computation environment of GPGPU and Spark framework. In this paper, we propose a Spark framework based on a heterogenous pipeline computing with OpenCL to further improve the performance. The proposed framework overlaps the Java-to-Native memory copies of CPU with CPU-GPU communications(DMA) and GPU kernel computations to hide the CPU idle time. Also, CPU-GPU communication buffers are implemented with switching dual buffers, which reduce the mapped memory region resulting in decreasing memory mapping overhead. Experimental results showed that the proposed Spark framework based on a heterogenous pipeline computing with OpenCL had up to 2.13 times faster than the previous Spark framework using OpenCL.

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.