• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.026 seconds

Adaptive Blind Watermarking Algorithm Using Biased-Shift of Quantization Coefficient

  • Seo Young Ho;Cho Hyun Jun;Kim Dong Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.832-835
    • /
    • 2004
  • In this paper, we proposed a blind watermarking algorithm to use characteristics of a scalar quantizer which is similar with the recommended in the JPEG2000 and JPEG. This algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and adaptively applied as an assigned quantizer according to application area. In the embedding process, a LFSR(Linear feedback shift register) is used to hide the watermarking positions. Therefore the embedded watermark can be extracted by only the owner who knows the initial value of LFSR without the original image. The experimental results showed that the proposed algorithm satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking.

  • PDF

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

A Steganographic Data Hiding Method in Timestamps by Bit Correction Technique for Anti-Forensics

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.75-84
    • /
    • 2018
  • In this research, a bit correction technique of data hiding method in timestamp of MFT entry in NTFS file system is proposed. This method is proposed in two ways, depending on the number of bytes of data to hide. A basic data hiding method using a bit correction technique to solve the problems of the conventional 2-byte technique is proposed. In order to increase the capacity of the data, a 3-byte data hiding method using an extended bit correction technique is proposed. The data hiding method in the timestamps is based on the fact that is not revealed in the Windows explorer window and the command prompt window even if any data is hidden in the timestamp area of less than one second. It is shown that the validity of the proposed method through the experimental two cases of the basic data hiding method by the bit correction method and the 3-byte data hiding method by the extended bit correction method.

Excluding Technique Design for Duplicated Results of Search (검색엔진의 중복된 검색결과 배제 기법설계)

  • Lee Seo-Jeong
    • Journal of Digital Contents Society
    • /
    • v.2 no.2
    • /
    • pp.139-145
    • /
    • 2001
  • As e-commerce has been activated and internet has been used as usual, higher efficient search engine must be used to promote the value of information and take possession of the market place. all e-commerce user seller and buyer want to competitive goods Although these needs, search results are still much to be desired. In this paper, I will suppose two ideas which are abbreviation result and making blacklist. Abbreviation result is to hide results with common factors and making blacklist is to reduce null links of search results, which makes many useless results. This routine is made of making blacklist, check list, reduce list and append list.

  • PDF

A Study on the Antibacteria Effect by Manufacturing Processes of Chrome-Tanned Garment Leather (의류용 크롬유혁의 제조공정에 따르는 항미생물 효과에 관한 연구)

  • 조승식;심미숙;김운배
    • Textile Coloration and Finishing
    • /
    • v.5 no.1
    • /
    • pp.33-39
    • /
    • 1993
  • This study was to examine the anti-bacteria effect of chrome-tanned garment leathers by various processes to article from hide. Anti-bacterial test by halo test and shake flask method, and pH value measurment are carried out in this study. The results can be obtained as follows: 1. In the soaking process of chrome-tanned garment leathers, it needs more effective anti-bacterial treatment. 2. pH value of samples by various processes has affected to anti-bacteria effect. 3. Chrome used by the tanning and the neutralization process have been found to be the anti-bacteria activity. 4. The dyeing, the fatliquoring and the finishing process has required anti bacteria treatment.

  • PDF

Object Detection from High Resolution Satellite Image by Using Genetic Algorithms

  • Kim Kwang-Eun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.120-122
    • /
    • 2005
  • With the commercial availability of very high resolution satellite imagery, the concealment of national confidential targets such as military facilities became one of the most bothering task to the image distributors. This task has been carried out by handwork masking of the target objects. Therefore, the quality of the concealment was fully depends on the ability and skill of a worker. In this study, a spectral clustering based technique for the seamless concealment of confidential targets in high resolution imagery was developed. The applicability test shows that the proposed technique can be used as a practical procedure for those who need to hide some information in image before public distribution

  • PDF

A Hybrid Encryption Technique for Digital Holography using DCT and DWT

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.271-275
    • /
    • 2011
  • In this paper, we present a hybrid encryption for a digital hologram which is the most valuable image content. The encryption algorithm is based on a hybrid technique implementation a four-dimensional transform combining the discrete wavelet transform(DWT) and the discrete cosine transform (DCT). The encryption scheme is composed on the basis of the energy distribution. The experimental results showed that encrypting only 0.0244% of the entire data was enough to hide the constants of the hologram. The encryption algorithm expected to be used effectively on the researches on encryption and others for digital holographic display.

A Reversible Audio Watermarking Scheme

  • Kim, Hyoung-Joong;Sachnev, Vasiliy;Kim, Ki-Seob
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.5 no.1
    • /
    • pp.37-42
    • /
    • 2006
  • A reversible audio watermarking algorithm is presented in this paper. This algorithm transforms the audio signal with the integer wavelet transform first in order to enhance the correlation between neighbor audio samples. Audio signal has low correlation between neighbor samples, which makes it difficult to apply difference expansion scheme. Second, a novel difference expansion scheme is used to embed more data by reducing the size of location map. Therefore, the difference expansion scheme used in this paper theoretically secures high embedding capacity under low perceptual distortion. Experiments show that this scheme can hide large number of information bits and keeps high perceptual quality.

  • PDF

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.

Performance Analysis for Digital Watermarking on the Wavelet Transform Domain (웨이브릿 변환 영역에서 디지털 워터마킹의 성능분석)

  • 김진태;김동욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.314-321
    • /
    • 2003
  • Recently, many studies about digital watermarking have been doing, and their purpose is to protect copyright of multimedia data. In this paper, the performances of digital watermarkings, in order to hide information of copyright into digital images, are analyzed. The watermarks embedded in subbands on wavelet transform domain are transformed by the processing such as image compression, and the degree of the transformation in each subband depend on its statistical characteristics. That says, we must consider the characteristics of subbands for better watermarking.