• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.03 seconds

Selective Shuffling for Hiding Hangul Messages in Steganography (스테가노그래피에서 한글 메시지 은닉을 위한 선택적 셔플링)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.3
    • /
    • pp.211-216
    • /
    • 2022
  • Steganography technology protects the existence of hidden information by embedding a secret message in a specific location on the cover medium. Security and resistance are strengthened by applying various hybrid methods based on encryption and steganography. In particular, techniques to increase chaos and randomness are needed to improve security. In fact, the case where the shuffling method is applied based on the discrete cosine transform(DCT) and the least significant bit(LSB) is an area that needs to be studied. I propose a new approach to hide the bit information of Hangul messages by integrating the selective shuffling method that can add the complexity of message hiding and applying the spatial domain technique to steganography. Inverse shuffling is applied when extracting messages. In this paper, the Hangul message to be inserted is decomposed into the choseong, jungseong and jongseong. It improves security and chaos by applying a selective shuffling process based on the corresponding information. The correlation coefficient and PSNR were used to confirm the performance of the proposed method. It was confirmed that the PSNR value of the proposed method was appropriate when compared with the reference value.

Development of 3-State Blind Digital Watermark based on the Correlation Function (신호상관함수를 이용한 3 상태 능동적 디지털 워터마크의 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.143-151
    • /
    • 2020
  • The digital content's security and authentication are important in the field of digital content application. There are some methods to perform the authentication. The digital watermarking is one of authentication methods. Paper presents a digital watermark authentication method that works in the application of digital image. The proposed watermark has the triple status information and performs the embedding and the detection without original Content. When authenticating the owner information of digital content, an autocorrelation function is used. In addition, a spread spectrum method is used to be adaptive to the signal of the original content in the frequency domain(DWT Domain). Therefore, the possibility of errors occurring in the detection of hidden information was reduced. it also has a advantage what Watermarking in DWT has faster embedding and detection time than other transformation domains(DFT, DCT, etc.). if it has a an image of size N=mXm, the computational amount can be reduced from O(N·logN) to O(N). The particular advantage is that it can hide more information(bits) per bit.

Color Image Watermarking Technique using Adjacent Pixels and Spatial Encryption Technique (인접 픽셀과 공간적 암호화 기법을 사용한 컬러 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.863-867
    • /
    • 2021
  • In this paper, in order to hide the watermark in the LSB of the color image, a color image watermarking technique with high security is proposed by using the adjacent pixels of the image and the spatial encryption technique. According to the technique proposed in this paper, the quality of the stego-image generated by hiding the watermark in the LSB of the color image is so excellent that the difference from the original image cannot be recognized, and the original watermark can be extracted from the stego-image without loss. If the watermark is hidden in the image using the proposed technique, the security of the watermark is maintained very high because the watermark hidden in the stego-image is multi-encrypted. The proposed watermarking technique can be used in applications such as military and intellectual property protection that require high security.

Frontotemporal Craniotomy for Clipping of Unruptured Aneurysm Using a Diamond-Coated Thread Wire Saw and Reconstruction Using Calcium Phosphate Cement without Metal Fixation

  • Hiroyuki Koizumi;Daisuke Yamamoto;Hajime Handa;Wakiko Saruta;Satoru Shimizu;Takuichiro Hide;Toshihiro Kumabe
    • Archives of Plastic Surgery
    • /
    • v.50 no.3
    • /
    • pp.248-253
    • /
    • 2023
  • Metal fixation systems for cranial bone flaps cut by a drill are convenient devices for cranioplasty, but cause several complications. We use modified craniotomy using a fine diamond-coated threadwire saw (diamond T-saw) to reduce the bone defect, and osteoplasty calcium phosphate cement without metal fixation. We report our outcomes and tips of this method. A total of 78 consecutive patients underwent elective frontotemporal craniotomy for clipping of unruptured intracranial aneurysms between 2015 and 2019. The follow-up periods ranged from 13 to 66 months. The bone fixation state was evaluated by bone computed tomography (CT) and three-dimensional CT (3D-CT). The diamond T-saw could minimize the bone defect. Only one wound infection occurred within 1 week postoperatively, and no late infection. No pain, palpable/cosmetically noticeable displacement of the bone flap, fluid accumulations, or other complications were observed. The condition of bone fixation and the cosmetic efficacy were thoroughly satisfactory for all patients, and bone CT and 3D-CT demonstrated that good bone fusion. No complication typical of metal fixation occurred. Our method is technically easy and safety, and achieved good mid-term bone flap fixation in the mid-term course, so has potential for bone fixation without the use of metal plates.

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Method to Use the Augmented Reality for Construction Planning and Management

  • Nam, Keong-Woo;Kang, Chulung;Jang, Myunghoun
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1067-1074
    • /
    • 2022
  • An architect creates his/her design to meet owner's requirements. Floor plans, perspective drawings, and scale models are used in order for the owner to choose the design. The tools are a little helpful for communication between the architect and the owner in case the owner does not know architecture. The scale models are good, but it is hard to make scale models while design is in progress. 3D CAD is a good tool for communication, but it is time-consuming and requires high-performance computer hardware. Augmented reality is able to show 3D virtual models that are updated by the architect with smart devices such as a smart phone and a tablet PC. The owner frequently reviews the updated design anytime anywhere. This study proposes a method to use augmented reality for architectural design and construction management. The method supports the communication between the owner, the architect and the contractor to review updated designs, and to complete the building project. 3D models expressed in augmented reality are created using SketchUp with 2D drawings for building construction. An Android application implementing augmented reality is developed by Qualcomm Vuforia and Unity on smart devices. Drawings as markers and 3D models are connected in Unity. And functions that temporarily hide unnecessary parts can be implemented in C# programming language. If an owner, an architect, or a contractor looks at a smart phone on a 2D drawing, he/she can identify building elements such as 3D buildings or columns on a screen. This can help communication between them.

  • PDF

The Impact of An Interaction between Product Quality and Perceived Risk on Seller Profit

  • Seung HUH
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.2
    • /
    • pp.23-32
    • /
    • 2023
  • Purpose: This study examines the effect of full information disclosure on seller profit when there exists information asymmetry between sellers and buyers, focusing on the risk averseness of buyers. By investigating the interaction between product quality and perceived risk through online sales data, we attempt to figure out the incentive structure of full information disclosure specifically when buyers are risk-averse, so that we can suggest more feasible information disclosure strategy to sellers. Research design, data and methodology: Our empirical model analyzes the sales data of collectible goods from a major online seller using Poisson regression. In our model, we have specifically considered risk-averseness of buyers by estimating the interaction effect between the product quality and perceived risk on seller profit, aiming for a more precise empirical analysis on sellers' incentive structure of full disclosure. Results: Our empirical analysis strongly supports the effect of interaction between product quality and perceived risk, showing that the incentive for full disclosure is much stronger when product quality is higher, and vice versa. Therefore, sellers are strongly encouraged to voluntarily reveal product weaknesses when their product quality is higher than average, while it is more profitable to hide any product defects when quality claim is lower than average. Conclusions: This study supports the related literature by confirming economic incentives for full disclosure, and also supplements and strengthens previous studies by presenting that the effect of interaction between product quality and perceived risk strongly affects seller profit. Our unique finding supports both mandatory disclosure and voluntary disclosure arguments and presents practical implications to marketing managers by suggesting that seller's incentive for revealing weaknesses depends on the level of seller's product quality.

Branch Prediction Latency Hiding Scheme using Branch Pre-Prediction and Modified BTB (분기 선예측과 개선된 BTB 구조를 사용한 분기 예측 지연시간 은폐 기법)

  • Kim, Ju-Hwan;Kwak, Jong-Wook;Jhon, Chu-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.1-10
    • /
    • 2009
  • Precise branch predictor has a profound impact on system performance in modern processor architectures. Recent works show that prediction latency as well as prediction accuracy has a critical impact on overall system performance as well. However, prediction latency tends to be overlooked. In this paper, we propose Branch Pre-Prediction policy to tolerate branch prediction latency. The proposed solution allows that branch predictor can proceed its prediction without any information from the fetch engine, separating the prediction engine from fetch stage. In addition, we propose newly modified BTE structure to support our solution. The simulation result shows that proposed solution can hide most prediction latency with still providing the same level of prediction accuracy. Furthermore, the proposed solution shows even better performance than the ideal case, that is the predictor which always takes a single cycle prediction latency. In our experiments, IPC improvement is up to 11.92% and 5.15% in average, compared to conventional predictor system.

Anarchy of Empire and Empathy of Suffering: Reading of So Far from the Bamboo Grove and Year of Impossible Goodbyes from the Perspectives of Postcolonial Feminism (제국의 혼동과 고통의 분담 -탈식민페미니즘의 관점에서 본 『요코 이야기』와 『떠나보낼 수 없는 세월』)

  • Yu, Jeboon
    • Journal of English Language & Literature
    • /
    • v.58 no.1
    • /
    • pp.163-183
    • /
    • 2012
  • This paper is one of those attempts to explore some possibility of agreement between feminist discourse and postcolonial discourses through the approach of postcolonial feminism in the reading of the controversial novel, So Far from the Bamboo Grove and Year of Impossible Goodbyes. So Far from the Bamboo Grove, when read from the perspective of postcolonial feminism, reveals 'domestic nationalism' of imperial narratives in which the violence of imperial history in Korea is hidden behind the picture of every day lives of an ordinary Japanese family and Japanese women. Furthermore, postcolonial feminist's perspective interprets Yoko family's nostalgia for their 'home,' Nanam in Korea, as 'imperialist nostalgia' working as a mask to hide the violent history of colonization of Empire. In this way, postcolonial feminist reading of the story detects the ways the narrative of Empire appropriates women, family image and even nostalgia for childhood. At the same time, this perspective explains the readers' empathy for Yoko family's suffering and the concerning women issues caused by wartime rape and sexual violence by defining Yoko as a woman of Japanese Empire, whose life of interstice between imperial men and colonial men cannot be free from violence of rape during anti colonial wars. Year of Impossible Goodbyes as a counter discourse does not overcome the traditional binary opposition of nationalism which quietens gender and class issues. As an attempt to fill in the interstice between the two perspectives of feminism and postcolonialism. postcolonial feminist reading turns out to be a valid tool for the reading of the two novels chosen here.

Adolescents' Experiences of Non-Suicidal Self-Injury: An Interpretative Phenomenological Analysis Study (청소년의 비자살적 자해 경험: 해석 현상학적 분석)

  • Ko, Jung A;Kim, Ji Young
    • Journal of Korean Academy of Nursing
    • /
    • v.53 no.5
    • /
    • pp.538-555
    • /
    • 2023
  • Purpose: This qualitative study used interpretative phenomenological analysis and photovoice methods to explore the meaning of non-suicidal self-injury experienced by adolescents. Methods: Participants were adolescents enrolled in middle and high schools in Gyeonggi-do and Jeollabuk-do who were selected through snowball sampling. Six participants had repeatedly engaged in self-injurious behavior for over a year. Data were collected through in-depth interviews and the photovoice method between November 2020 and July 2021. The collected data were analyzed using six steps of interpretative phenomenological analysis. Results: The results yielded 5 main themes and 18 subthemes. The main themes were 'a silent cry to an indifferent world', 'a heartache that one endures with scars', 'an inescapable cycle', 'filling the space in one's heart', and 'healing the wounds'. The study findings revealed that the self-injurious behavior of adolescents began as a consequence of feeling lost and struggling with conflicts at home and school, which helped them relieve tension and pain. Nonetheless, inflicting self-injury only left signs of regret and remorse, which became a trace that the participants wanted to hide. However, the wounds healed after receiving attention and support from others. They were determined to stop engaging in repeated self-injurious behaviors and made efforts to do so. Conclusion: This study can be used as a basis for the development of educational programs to prevent non-suicidal self-injury in adolescents. Additionally, it can inform nursing interventions that focus on building support systems to help adolescents who attempt self-injury.