• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.026 seconds

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters

  • Feng, Bin;Wang, Zhi-Hui;Wang, Duo;Chang, Ching-Yun;Li, Ming-Chu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.269-281
    • /
    • 2014
  • Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.

Grid-Based Cloaking Method supporting K-anonymity and L-diversity for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 K-anonymity 및 L-diversity를 지원하는 그리드 기반 Cloaking 기법)

  • Kim, Ji-Hee;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.606-610
    • /
    • 2009
  • In Location-Based Service (LBS), a scheme to hide the exact locations of users is required for privacy protection, In this paper, we propose a grid-based cloaking method considering K-anonymity and L-diversity. For this, our method creates a minimum cloaking region by finding L number of buildings (L-diversity) and then finding number of users (K-anonymity). Especially, we use a effective filtering method for generating the minimum cloaking region in a fast way. Finally, we show from a performance analysis that our cloaking method outperforms the existing method, in terms of query processing time based on the size of cloaking regions.

Analysing and Neutralizing the Stuxnet's Stealthing Techniques (Stuxnet의 파일 은닉 기법 분석 및 무력화 방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.838-844
    • /
    • 2010
  • This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how it propagates and what it affects if infected and proposes a process to cure infected systems according to its organization. Malicious wares such as Stuxnet secretes themselves within the system during propagation and it is required to analyze file hiding techniques they use to detect and remove them. According to the result of the analysis in this paper, Stuxnet uses the library hooking technique and the file system filter driver technique on both user level and kernel level, respectively, to hide its files. Therefore, this paper shows the results of the Stuxnet's file hiding approach and proposes an idea for countermeasure to neutralize it. A pilot implementation of the idea afterward shows that the stealthing techniques of Stuxnet are removed by the implementation.

Indexing Considering Video Rating of Scenes in Video (동영상의 장면별 비디오 등급을 고려한 색인)

  • Kim Young-Bong
    • Journal of Game and Entertainment
    • /
    • v.2 no.2
    • /
    • pp.51-60
    • /
    • 2006
  • Recently, many streaming videos including drama, music videos, and movies have been extensively given on the web. Such video services are on negative lines in any service restriction depending on the age of users and then whole part of a video have been restricted considering the age of users. Therefore, in this paper, we will present a new method that provides the access depending on the ages of users and also sets the video rating of each scene in a video. To get this restricted access for video, we will first divide a streaming video into many scenes using histogram techniques. Each scene gets an access control depending on the nudity level. Finally, we will make the video indexing including the access level depending on its nudity level and then hide restricted scenes using several masks in playing that streaming video.

  • PDF

Rate-Controlled Data-Driven Real-Time Stream Processing for an Autonomous Machine (자율 기기를 위한 속도가 제어된 데이터 기반 실시간 스트림 프로세싱)

  • Noh, Soonhyun;Hong, Seongsoo;Kim, Myungsun
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.4
    • /
    • pp.340-347
    • /
    • 2019
  • Due to advances in machine intelligence and increased demands for autonomous machines, the complexity of the underlying software platform is increasing at a rapid pace, overwhelming the developers with implementation details. We attempt to ease the burden that falls onto the developers by creating a graphical programming framework we named Splash. Splash is designed to provide an effective programming abstraction for autonomous machines that require stream processing. It also enables programmers to specify genuine, end-to-end timing constraints, which the Splash framework automatically monitors for violation. By utilizing the timing constraints, Splash provides three key language semantics: timing semantics, in-order delivery semantics, and rate-controlled data-driven stream processing semantics. These three semantics together collectively serve as a conceptual tool that can hide low-level details from programmers, allowing developers to focus on the main logic of their applications. In this paper, we introduce the three-language semantics in detail and explain their function in association with Splash's language constructs. Furthermore, we present the internal workings of the Splash programming framework and validate its effectiveness via a lane keeping assist system.

Korean Emotional Laborers' Job Stressors and Relievers: Focus on Work Conditions and Emotional Labor Properties

  • Lee, Garam
    • Safety and Health at Work
    • /
    • v.6 no.4
    • /
    • pp.338-344
    • /
    • 2015
  • Background: The present study aims to investigate job stressors and stress relievers for Korean emotional laborers, specifically focusing on the effects of work conditions and emotional labor properties. Emotional laborers are asked to hide or distort their real emotions in their interaction with clients. They are exposed to high levels of stress in the emotional labor process, which leads to serious mental health risks including burnout, depression, and even suicide impulse. Exploring job stressors and relieving factors would be the first step in seeking alternatives to protect emotional laborers from those mental health risks. Methods: Using the third wave data of Korean Working Conditions Survey, logistic regression analysis was conducted for two purposes: to examine the relations of emotional labor and stress, and to find out job stressors and relievers for emotional laborers. Results: The chances of stress arousal are 3.5 times higher for emotional laborers; emotional laborers experience double risk-burden for stress arousal. In addition to general job stressors, emotional laborers need to bear burdens related to emotional labor properties. The effect of social support at the workplace is not significant for stress relief, unlike common assumptions, whereas subjective satisfaction (wage satisfaction and work-life balance) is proven to have relieving effects on emotional laborers' job stress. Conclusion: From the results, the importance of a balanced understanding of emotional labor for establishing effective policies for emotional laborer protection is stressed.

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

Paranoia and Tragedy in Annie Proulx's "Brokeback Mountain" (금지된 꿈: 「브로크백 마운틴」의 동성애)

  • Nam, Sung-sook
    • English & American cultural studies
    • /
    • v.9 no.1
    • /
    • pp.141-162
    • /
    • 2009
  • "Brokeback Mountain" deals with the love story between two homosexuals named Ennis and Jack. They never do use the word 'homosexual' but instead 'love.' They hide their love into the closet. And they conform to socially constructed gender roles. It is because they recognize that social order has punished the homosexuals severely through history. Especially, Ennis fears the homophobic heterosexual gaze. Through his paranoia, this article examines the conventional contradictory social order causing by the tragic story that is the homosexual "closet phenomenon." Such a phenomenon has resulted from the traditional patriarchal family system that is the central unit of society. Conventionally, patriarchy consists of a dominant male and non-dominant female system, based on force. Sexuality has been constructed, experienced, and understood in culturally and historically specific ways. Homosexuality has been imaged conventionally as a female disguised as a man. As such, homosexuality would violate and break such a constructed system that keeps the sexual hierarchy through male dominant construction. As homosexual, ironically with macho gender personas, Ennis and Jack are social outsiders. Through this story, Proulx suggests the conventional fixed social order is contradictory and, therefore forces the readers to re-consider the world and ponder about the future.

A Security Model for Duplication Resistant eSeal (복제 공격 저항성을 갖는 전자봉인 보안 모델)

  • Kim, Joo-Hae;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.111-116
    • /
    • 2007
  • An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.

In-house Contractors' Exposure to Risks and Determinants of Industrial Accidents; With Focus on Companies Handling Hazardous Chemicals

  • Shin, Kyusoo
    • Safety and Health at Work
    • /
    • v.12 no.2
    • /
    • pp.261-267
    • /
    • 2021
  • Background: The series of serious industrial accidents in recent years at contractors to large companies has highlighted risk outsourcing as a real and urgent problem. This study aims to review the difference in the degree of risk exposure and the occurrence of industrial accidents depending on the type of company relations. Among in-house contractors, the focus will be on those handling hazardous chemicals that include companies for which outsourcing requires approval. Methods: This study uses the 9th wave of the Industrial Safety and Health Survey (2018). For determining the degree of risk exposure, the occurrence of industrial accidents, and industrial accident rate, multivariate, logistic, and fractional logit, regression analyses were used, respectively. Results: First, In-house contractors' degree of risk exposure is higher than that of the client companies. In particular, this gap is even greater for companies dealing with chemicals. Second, among only those that handle hazardous chemicals, in-house contractors do show a significantly higher rate of industrial accident occurrence. Third, In-house contractors have a significantly higher rate of industrial accidents from diseases than client companies. Conclusion: The analysis supports the intent of the legal amendment that strengthens the protection of in-house contracted workers who handle hazardous chemicals. Second, the results of this study suggest that safety and health management must go beyond legal compliance and ensure that it has substance and effectiveness. Last, there should be policy consideration is necessary to reduce attempts to hide industrial accidents.