• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.02 seconds

Detecting Hidden Messages Using CUSUM Steganalysis based on SPRT (SPRT를 기반으로 하는 누적합 스테간 분석을 이용한 은닉메시지 감지기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.51-57
    • /
    • 2010
  • Steganography techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image. I propose a steganalysis to detecting hidden message in sequential steganography. This paper presents adjusted technique for detecting abrupt jumps in the statistics of the stego signal during steganalysis. The repeated statistical test based on CUSUM-SPRT runs constantly until it reaches decision. In this paper, I deal with a new and improved statistic $g_t$ by computing $S^{t^*}_j$.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

Data Hiding Technique using the Characteristics of Neighboring Pixels and Encryption Techniques

  • Jung, Soo-Mok
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.163-169
    • /
    • 2022
  • In this paper, we propose a data hiding technique that effectively hides confidential data in the LSB of an image pixel by using the characteristics of the neighboring pixels of the image and the encryption techniques. In the proposed technique, the boundary surface of the image and the flat surface with little change in pixel values are investigated. At the boundary surface of the image, 1 bit of confidential data is encrypted and hidden in the LSB of the boundary pixel to preserve the characteristics of the boundary surface. In the pixels of the plane where the change in pixel value is small, 2 bits secret data is encrypted and hidden in the lower 2 bits of the corresponding pixel. In this way, when confidential data is hidden in an image, the amount of confidential data hidden in the image is greatly increased while maintaining excellent image quality. In addition, the security of hidden confidential data is strongly maintained. When confidential data is hidden by applying the proposed technique, the amount of confidential data concealed increases by up to 92.2% compared to the existing LSB method. The proposed technique can be effectively used to hide copyright information in commercial images.

Detection of TrustZone Rootkits Using ARM PMU Events (ARM PMU 이벤트를 활용한 TrustZone 루트킷 탐지에 대한 연구)

  • Jimin Choi;Youngjoo Shin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.929-938
    • /
    • 2023
  • ARM processors, utilized in mobile devices, have integrated the hardware isolation framework, TrustZone technology, to implement two execution environments: the trusted domain "Secure World" and the untrusted domain "Normal World". Rootkit is a type of malicious software that gains administrative access and hide its presence to create backdoors. Detecting the presence of a rootkit in a Secure World is difficult since processes running within the Secure World have no memory access restrictions and are isolated. This paper proposes a technique that leverages the hardware based PMU(Performance Monitoring Unit) to measure events of the Secure World rootkit and to detect the rootkit using deep learning.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

The Effect of Facing What Is True in Counseling - Reporting Style Based on Narrative Methods - (문제 직시가 상담성과에 미치는 영향 - '이야기 방식'에 기초한 보고 형태 -)

  • Sung-sook Chang
    • Korean Journal of Culture and Social Issue
    • /
    • v.15 no.4
    • /
    • pp.529-546
    • /
    • 2009
  • Korean clients show a tendency to hide the real causes of problem. Therefore the 'grasping the real cause of a problem' is regarded as the first characteristic in Reality Dynamic Counseling. Many counselors stress over how express empathy with a client rather than understanding a problem. However the attitude change wouldn't be attained without grasping the real cause of a problem. The researcher tries to demonstrate how this characteristic is at play in counseling process. The researcher illustrates this process by 'narrative method' as one of qualitative research methods. The client who had received counseling for stress disorder and insomnia took a turn for the better as soon as getting at the truth of his problem.

  • PDF

Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging

  • Leihong Zhang;Yiqiang Zhang;Runchu Xu;Yangjun Li;Dawei Zhang
    • Current Optics and Photonics
    • /
    • v.8 no.3
    • /
    • pp.270-281
    • /
    • 2024
  • Information-hiding technology is introduced into an optical ghost imaging encryption scheme, which can greatly improve the security of the encryption scheme. However, in the current mainstream research on camouflage ghost imaging encryption, information hiding techniques such as digital watermarking can only hide 1/4 resolution information of a cover image, and most secret images are simple binary images. In this paper, we propose an equal-resolution image-hiding encryption scheme based on deep learning and computational ghost imaging. With the equal-resolution image steganography network based on deep learning (ERIS-Net), we can realize the hiding and extraction of equal-resolution natural images and increase the amount of encrypted information from 25% to 100% when transmitting the same size of secret data. To the best of our knowledge, this paper combines image steganography based on deep learning with optical ghost imaging encryption method for the first time. With deep learning experiments and simulation, the feasibility, security, robustness, and high encryption capacity of this scheme are verified, and a new idea for optical ghost imaging encryption is proposed.

A Qualitative Study on the Divorced People`s Perception of Divorce (이혼자들의 이혼 인식에 관한 질적 연구)

  • Ok Sun-Wha;Nam Young-Joo;Kang Eun-Young
    • Journal of Families and Better Life
    • /
    • v.24 no.1 s.79
    • /
    • pp.223-235
    • /
    • 2006
  • This study examined, through a qualitative approach, the viewpoints and beliefs toward divorce held by people who have experienced a divorce. In-depth interviews with divorced individuals (two males and twelve females) were conducted for this study. The findings of the study are summarized as follows. First, the participants of the study had a tendency to withdraw. In other words, they felt powerless and lonely, and they think of themselves as a failure. Second, they clearly recognized the double standard in society toward divorce. They strongly felt that people who had shown tolerant attitudes toward divorce when it was a distant phenomenon suddenly took a different attitude when a divorce occurred to a relative. The fact that openly stated viewpoints toward divorce can be significantly different than unstated attitudes made the participants' lives still harder by adding another burden to the difficulties they already faced from the divorce. As a result, they would rather hide the fact that they were divorced than be open about it with other people. Aside from highly significant others, they attempted to conceal their divorce from others whenever possible. Third, as people who have already experienced divorce, they seem to take a more careful attitude toward divorce than those who have not experienced a divorce. The participants pointed to the social responsibilities to promote public understanding and a sense of value about divorce, and they hoped that our society would communicate better about the difficulties of getting divorced from the perspective of those who have experienced divorce. The participants believed this would ultimately contribute to preventing divorce among others. This study is expected to expand understanding toward the phenomenon of divorce in Korean society, and further, to provide basic information for a clearer understanding of the current state of the Korean family.

A Study of Analysis on Abstract Symbolism Expression in Korean Contemporary Protestant Church Main Chapel Design - Focus on the Protestant Church was built after 2000 - (한국 현대 개신교회 대예배실 디자인의 추상적 상징성 표현 분석 연구 - 2000년 이후 건축된 개신교회를 중심으로 -)

  • Kim, Jung-Tae;Choi, Sang-Hun
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.4
    • /
    • pp.3-11
    • /
    • 2012
  • The purpose of the study was to find out design problems of grand chapel of the Protestant church and to set analysis frame based on theoretical study on abstract symbolism and investigate cases and to give reference of abstract symbolism expression of design of the chapel. The findings were as follow: Introduction of the light was found to be the most outstanding among abstract symbolic factors, and metaphor was commonly used to express abstract symbols. First, 1) Introduction of the light was found to be the most outstanding at application of abstract symbolic factor of modern Protestant church to be the highest among pastors, office bearers, believers and non-Christians. 2) The metaphor was found to be the most noticeable among abstract symbolic expressions. Second, the findings of questionnaire survey was: The findings of questionnaire of not only abstract symbolic expression factor but also symbolic expression method was not to cognize ideas of pastor, office bearers, believers and designers often. This was because abstract symbolism was made from point of view of designers. Therefore, abstract symbolic expression factors of grand chapel of modern Protestant church, for instance, effective introduction of the light, light quoting the Bible sayings, material, color and shapes, etc should be used with metaphor and symmetry to give Christians value of symbol and to hide meaning of symbolic values to non-Christians who do not know contents of the Bible.

  • PDF

A Study for the Development of Disposable Diaspers for the Elderly in Need (거동 부자유 노인을 위한 일회용 기저귀 개발에 관한 연구)

  • 조진숙;김소라;최진희
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.7
    • /
    • pp.29-43
    • /
    • 1999
  • The purpose of this study was to develop disposable diapers for the elderly in need by experimenting with wearing disposable diapers and analyzing the properties of materials of these diapers. The diapers were of two different types: one was a panty type for the elderly who were bed ridden, and the other was a pad type for the elderly who had incontinence. The subjects for the wearing test of the panty type were forty who were bed ridden, and there were forty subjects for the wearing test of the pad type who had incontinence. The disposable diapers for these experiments were chosen from those already found in the market place. Four panty types and three pad types were selected. From these experiments for the disposable diapers, the first prototypes were developed, and the second prototypes were proposed by experimenting with the first prototypes. The first panty prototype was designed to improve absorbing power, and we added waist rubber bands to prevent evacuation from back leaking and a frontal tape to prevent waistline film from tearing. The first pad prototype was designed to improve absorbing power also, and we added side rubber bands to prevent the side leaking and an adhesive tape on the fore part of the bottom to prevent the diapers from moving, and made the outline of the back area curved and thin to help hide the diaper from detection thus making the wearer feel better. From these test cases and analyzing the properties of materials with the first prototypes, we gained some success, but several points on further improvements were proposed to refine the final prototypes. The second panty prototype we proposed was to make 1he length longer, especially in the crotch area to prevent excess leaking and to fit the body more snugly. Also, the second pad prototype was proposed to reduce the total thickness of the diaper, and to improve the feeling and appearance.

  • PDF