• 제목/요약/키워드: HIDE

검색결과 326건 처리시간 0.022초

Efficient Native Processing Modules for Interactive DTV Middleware Based on the Small Footprint Set-Top Box

  • Shin, Sang-Myeong;Im, Dong-Gi;Jung, Min-Soo
    • 한국멀티미디어학회논문지
    • /
    • 제9권12호
    • /
    • pp.1617-1627
    • /
    • 2006
  • The concept of middleware for digital TV receivers is not new one. Using middleware for digital TV development has a number of advantages. It makes it easier for manufacturers to hide differences in the underlying hardware. It also offers a standard platform for application developers. Digital TV middleware enables set-top boxes(STBs) to run video, audio, and applications. The main concern of digital TV middleware is now to reduce its memory usage because most STBs in the market are small footprint. In this paper, we propose several ideas about how to reduce the required memory size on the runtime area of DTV middleware using a new native process technology. Our proposed system has two components; the Efficient Native Process Module, and Enhanced Native Interface APIs for concurrent native modules. With our approach, the required memory reduced from 50% up to 75% compared with the traditional approach. It can be suitable for low end STBs of very low hardware limitation.

  • PDF

오디오 e-Book 스트리밍을 지원하는 스테가노그래피 모델 (Secure Steganographic Model for Audio e-Book Streaming Service)

  • 이윤정;이봉규;김철수
    • 한국산학기술학회논문지
    • /
    • 제12권12호
    • /
    • pp.5878-5884
    • /
    • 2011
  • 본 논문은 오디오 e-Book 스트리밍 콘텐츠에 저작권과 인증과 관련되는 비밀 데이터를 인코딩하고 추출할 수 있도록, 스트리밍 서비스 특성에 적합한 스테가노그래피 서비스 모델과 알고리즘을 제안한다. 은닉 데이터는 송신측과 수신측에서 공유하는 비밀키 k를 사용하여 생성한 의사난수로 암호화하여 안전도를 높였다. 또한 은닉데이터가 커버데이터의 초반 일정구간 안에 랜덤하게 고루 분포하도록 하였고, 스트리밍의 상황을 고려하여 기타의 연산을 단순화하여 처리율을 높였다.

강릉의 근대건축물에 관한 건축적 특성 조사연구 (An Investigation Study on the Architectural Characteristics of Modern Building at Gangneung)

  • 박문호;최장순
    • 한국농촌건축학회논문집
    • /
    • 제7권1호
    • /
    • pp.73-87
    • /
    • 2005
  • The purpose of this study is aimed at grasping the architectural characteristics of modern buildings in Gangneung from 1910's to 1970's. The results are as follows. 1) The commercial buildings are mostly unsymmetrical flat type and others except commercial buildings are mostly symmetrical flat type. 2)Up until the 1940's, staircases were located inner of building between the first and the second floor, however after the 1950's, they were separately located in one side of the building to ensure perpendicularly more space and easier mobility than before. 3)Windows were widely used in order to avoid monotonous wall elevation after 1950' s. 4)Striped decorations were put to use to decorate the front elevation of building. 5)Parapet which had decorative stripes to the top was generally used to hide roof.

  • PDF

낮은 쓰기 성능을 갖는 비휘발성 메인 메모리 시스템을 위한 성능 및 에너지 최적화 기법 (Performance and Energy Optimization for Low-Write Performance Non-volatile Main Memory Systems)

  • 정우순;이형규
    • 대한임베디드공학회논문지
    • /
    • 제13권5호
    • /
    • pp.245-252
    • /
    • 2018
  • Non-volatile RAM devices have been increasingly viewed as an alternative of DRAM main memory system. However some technologies including phase-change memory (PCM) are still suffering from relatively poor write performance as well as limited endurance. In this paper, we introduce a proactive last-level cache management to efficiently hide a low write performance of non-volatile main memory systems. The proposed method significantly reduces the cache miss penalty by proactively evicting the part of cachelines when the non-volatile main memory system is in idle state. Our trace-driven simulation demonstrates 24% performance enhancement, compared with a conventional LRU cache management, on the average.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권3호
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

A Maximum Data Allocation Rule for an Anti-forensic Data Hiding Method in NTFS Index Record

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.17-26
    • /
    • 2017
  • An anti-forensic data hiding method in an NTFS index record is a method designed for anti-forensics, which records data as a file name in index entries and thereafter the index entries are made to remain in the intentionally generated slack area in a 4KB-sized index record[7]. In this paper, we propose a maximum data allocation rule for an anti-forensic data hiding method in an NTFS index record; i.e., a computational method for storing optimal data to hide data in an index record of NTFS is developed and the optimal solution is obtained by applying the method. We confirm that the result of analyzing the case where the number of index entries n = 7 is the maximum case, and show the screen captures of index entries as experimental results.

내외용 쓰개류에 대한 고찰 (A Study on the Women's Veil of Yi-Dynasty)

  • 강순제
    • 한국의류학회지
    • /
    • 제2권2호
    • /
    • pp.277-286
    • /
    • 1978
  • The history of the women's veil which was used to hide their face in Yi-Dynasty was discussed. The similar fashion of wearing veil was popular in T'ang China as Myok-li and Yoo-Mo, then it might have influenced the fashion of the women's dress of the Silla Dynasty. It was also found out that the custom was most popular in Koryo and then continued to Yi-Dynasty. The confucianism of Yi-Dynasty requested very strict moral obligation toward women that veil had to be worn by them whenever going out. It might not be their popular fashion but obligation. There were several types of veil so called; Neoul(라원) Jangott(장의) Suege-China(쓰개치마) Chun-eue(천의) Sak-kat(삿갓) Chun-mo(천모)etc., which were used as a part of formal dress for women. From the late 1930, when the new society started to accept women's activities, the customs of wearing veil had been vanishing from the women's dress.

  • PDF

카오스 시스템에 의한 DWT기반 영상의 적응적 암호화 (Adaptive Encryption for DWT-based Images by Chaotic system)

  • 김수민;서영호;김동욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅳ
    • /
    • pp.1859-1862
    • /
    • 2003
  • Security of digital images attracts much attention recently, and many image encryption methods have been proposed. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in the wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image. For ciphering the quantization index we use a novel image encryption Algorithm called BRIE(Bit Recirculation Image Encryption). which was proposed by J. C. Yen and J. I. Guo in 1999. According to a chaotic binary sequence generated by BRIE, the block which is produced by quantization index is cyclically shifted in the right or left direction. Finally, simulation results are included to demonstrate its effectiveness.

  • PDF

영상의 통계적 특성에 기반한 다해상도 디지털 워터마킹 (A Multiresolution Digital Watermarking Based on Image Statistics)

  • 한성현
    • 대한전자공학회논문지TE
    • /
    • 제37권2호
    • /
    • pp.25-32
    • /
    • 2000
  • 디지털 워터마킹은 멀티미디어 데이터의 저작권 보호 목적으로 최근에 제안되었다. 본 논문에서는 디지털 영상에 저작권 정보를 은닉하는 새로운 방법을 제안한다. 제안한 방법은 2차원 이산 웨이브릿 변환과 영상의 통계적 특성에 기반한다. 가우시안이나 라플라시안 워터마크를 웨이브릿 영역에서 중간이나 고주파 대역의 큰 계수에 삽입한 결과 라플라시안 워터마크는 잡음, JPEG 압축, 가우시안 블러링 그리고 에지 강조와 같은 일반적인 영상 왜곡에 매우 강함이 입증되었다.

  • PDF

일차원 웨이브렛 변환을 이용한 광학기기의 자동 초점 조절에 관한 연구 (Development of a Wavelet Based Optical Instrument Autofocusing algorithm)

  • 박봉길;김세훈;김윤수;박상희
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1997년도 추계학술대회 논문집 학회본부
    • /
    • pp.603-605
    • /
    • 1997
  • A new algorithm using 1-dimensional wavelet transform for autofocusing of optical instrument has been developed. Previous studies based on the conventional frequency analysis have shown that as the lens-object distance approaches the optimum value, the high frequency energy in the corresponding image shows a consistent increase. However, as conventional frequency analysis techniques hide spatial distribution of each band energy, shape information in the original signal cannot be easily utilized. In this paper, a newly devised wavelet based focus measuring scheme is presented. Unlike other frequency domain analysis techniques that simply produce "frequency-only" spectra, wavelet analysis provides a "time-frequency" localized view of a given signal. As a result, both frequency band filtering and spatial distribution filtering can easily be realized. Depending on the proposed focus quality measuring algorithm, a fast and reliable automatic focus adjustment of optical devices could be implemented.

  • PDF