• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.026 seconds

Symbolic Values of Fur in Fashion Since 1990s - An Analysis under the Theories of Fetishism -

  • Hahn, Soo-Yeon;Yang, Sook-Hi
    • Journal of Fashion Business
    • /
    • v.5 no.5
    • /
    • pp.49-64
    • /
    • 2001
  • Fur is conceived as a material signifier, not only with its commodity value as luxury goods but also as its symbolic value as objects invested by one's libidinal desire. In this study, complex meanings of fur as multi-layered signs of political and sexual power focusing on fetishism shall be explored, especially on the spectacle fetishism acted by mass media during the anti-fur movement in the 1980s. In conjuction herewith, a highlight shall also be made to the symbolic value in fashion design since 1990s. In this study, first, as a theoretical investigation, fetishism, that has been traditionally considered only as sexual fetishism in fashion discourse will be explored in socio-economic level. Second, in historical context, how the meanings and values of fur have become realized in various cultural spaces, such as literature, art, film and finally, fashion will be viewed. In fashion, fur is a product of desire and power influenced by commodity fetishism as well as sexual fetishism. During the anti-fur movement, mass media has developed the concept of spectacle fetishism. Fur is a sign of animal-victim, and fur-clad women is viewed with images full of imperialsm, sexism and racism, thus act as derisive spectacles of consumerism. Since 1990s as a reflection on anti-fur movement, fetishistic characteristics, which challenge traditional operation method, are expressed by disguise, parody, and returning to the nature. First, fur as disguise is intended to hide sexually perverse, decadent characteristics and expensiveness of fur by texturing or patterning techniques. Second, fur as parody uses fake fur or dyed fur in order to satirize erotically and ethnographically fetishized meanings of fur. Third, aboriginal design of fur is adapted to use symbolic values outside the West, which can potentially mobilize antagonistic oppositions out of their fetishistic regimes. In conclusion, fur as sign of female sexuality and its libidinal profits of exchange, has significant symbolic values expressed in fashion.

  • PDF

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

Improved Error Detection Scheme Using Data Hiding in Motion Vector for H.264/AVC (움직임 벡터의 정보 숨김을 이용한 H.264/AVC의 향상된 오류 검출 방법)

  • Ko, Man-Geun;Suh, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.20-29
    • /
    • 2013
  • The compression of video data is intended for real-time transmission of band-limited channels. Compressed video bit-streams are very sensitive to transmission error. If we lose packets or receive them with errors during transmission, not only the current frame will be corrupted, but also the error will propagate to succeeding frames due to the spatio-temporal predictive coding structure of sequences. Error detection and concealment is a good approach to reduce the bad influence on the reconstructed visual quality. To increase concealment efficiency, we need to get some more accurate error detection algorithm. In this paper, We hide specific data into the motion vector difference of each macro-block, which is obtained from the procedure of inter prediction mode in H.264/AVC. Then, the location of errors can be detected easily by checking transmitted specific data in decoder. We verified that the proposed algorithm generates good performances in PSNR and subjective visual quality through the computer simulation by H.324M mobile simulation tool.

Korean Boy Group's Misogyny and Division between Female Fandom (남성 아이돌 그룹의 여성혐오 논란과 여성 팬덤의 분열)

  • Ko, Hyeri;Yang, Eunkyung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.506-519
    • /
    • 2017
  • This research examines the impact of Korean boy group's misogyny issue leading to internal conflicts among female fans and external division. As a result of research, BTS's fans who are mostly female reflected their identities by problem posed by external stakeholders on this issue. In the past, most fandoms tried to protect themselves from criticism but this case shows a positive significance since they broke out from stereotypical cases. Under the vague and flexible standard, fandom can be considered the obstructing factor for Feminism which suppress and denounce Feminists' idea. It is important to pay attention to possibilities of females hide at the end of the conflict process, being unaccepted by the society for their opinions and tendencies, have uncomfortable emotion against Feminism itself, or Feminism leading to another type of aversion.

Halftone Image Watermarking Based on Iterative Error Minimizing Method (반복적인 에러 최소화 기법을 이용한 하프톤 영상 워터마킹)

  • 천인국
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.327-339
    • /
    • 2004
  • In this paper, we propose a new watermark algorithm for halftone images using iterative error minimizing method. In the proposed method, watermark bits are hidden at pseudo-random locations within a halftone image. To remove the distortions due to the inserted watermark bits and increase the invisibility of watermark, an iterative error minimizing technique is used. We define the halftoning error is defined as the difference between the original grayscale image and HVS-filtered printed halftone image. Then we iteratively find the pixel pattern with minimum halftoning error and displace the original pixel pattern with it. In order to be robust to geometrical modification like cropping or rotation, we insert the same watermark periodically into halftone images. Experiments using printed and scanned images show that the proposed method is a robust method to the geometrical modification and to hide the large amount of data within a halftone image without noticeable distortion.

  • PDF

Formal Specification and Modeling Techniques of Component Workflow Variability (컴포넌트 워크플로우 가변성의 정형 명세 및 모델링 기법)

  • Lee, Jong-Kook;Cho, Eun-Sook;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.703-725
    • /
    • 2002
  • It is well recognized that component-based development (CBD) is an effective approach to manage the complexity of modem software development. To achieve the benefits of low-cost development and higher productivity, effective techniques to maximize component reusability should be developed. Component is a set of related concepts and objects, and provides a particular coarse-grained business service. Often, these components include various message flows among the objects in the component, called 'business workflow`. Blackbox components that include but hide business workflow provide higher reusability and productivity. A key difficulty of using blackbox components with business workflow is to let the workflow be customized by each enterprise. In this paper, we provide techniques to model the variability of family members and to customize the business workflow of components. Our approach is to provide formal specification on the component variability, and to define techniques to customize them by means of the formalism.

The Phenomenological Study on the Meaning of Services based on Practitioner's Experiences: With Practitioners for Out-of-School Youths (학교 밖 청소년 현장전문가의 활동경험에 대한 현상학적 연구)

  • Park, Byung-Kum
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.100-112
    • /
    • 2017
  • The purpose of the phenomenological study was to explore the practitioner's experiences according to practitioner's perception and to enrich our understanding about them. In order to accomplish the purpose of research, 7 practitioners with out-of-school youths participated. Data were collected through in-depth interview. In addition, the data were analyzed by a Colaizzi's phenomenological analysis. The findings showed that the meaning of experiences in practitioners with out-of-school youths were identified as 17 themes and 5 categories. The 5 categories consisted of "School is not amused", "Family is unhappy", "They hide behind pain or excuses", "Let's go together, until it can be found", "We hope the world changed". Based on the findings, we discussed the meaning of experiences in practitioners with out-of-school youths. And lastly, this results made suggestions for the social welfare policies and practices for them.

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Analysis of distortion effect of resistivity data due to 3D geometry of fill dam (필댐의 3차원 기하 효과에 따른 전기비저항 왜곡 효과 분석)

  • Oh Seokhoon;Kim Hyoung-Soo
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.55-58
    • /
    • 2005
  • Low resistivity zone is observed at the lower part of a CFRD (Concrete Face Rockfill Dam). Generally, CFRD tends not to have any saturated zone within the body, but the result of resistivity survey shows that it is possible for the dam to be saturated under 20m depth with water. The level of reservoir was under 10m from the crest. We suspect that this result may come from the wrong 2D inversion process ignoring the 3D geometry of dams. For the analysis of possibility of distortion by different geometry, we perform the 3D forward modeling for the dam and apply the 2D inversion process. And then we check the point of traditional interpretation of resistivity data. By the analysis, it is found that the result of 2D inversion process of 3D geometry of dams, seems to have deep relation with the reservoir level, and the complex 3D structure hide some internal electrical anomaly of dams from resistivity information.

  • PDF