• Title/Summary/Keyword: IT마크

Search Result 787, Processing Time 0.036 seconds

On the watermark insertion and extraction methods using the secret sharing method (비밀정보 분할 방식을 적용한 워터마크 삽입.추출 방법)

  • 서창호;김석우;성열욱
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.47-55
    • /
    • 2001
  • This paper proposes a method which inserts watermark created by secret sharing method and then extracts it from watermarked image for the protection of copyrights of digital images. To do this, after image's DCT transform, once some values created by Key sharing method which used Lagrange interpolation are inserted into a frequency domain, one can recreate original watermark even if only k seeds are extracted among n of inserted seeds ($n{\geq}k$).

  • PDF

NIST PQC 벤치마크 플랫폼 최신 동향

  • Hyeok-Dong Kwon;Min-Joo Sim;Gyeong-Ju Song;Min-Woo Lee;Hwa-Jeong Seo
    • Review of KIISC
    • /
    • v.33 no.2
    • /
    • pp.69-77
    • /
    • 2023
  • 미국 국립표준기술연구소에서 개최한 양자내성암호 표준화 공모전이 2022년 표준화 선정을 마치고 4라운드 추가 표준선정에 진입하였다. 공모전에 제출된 후보 알고리즘은 각자의 성능 지표를 제시하였지만, 서로 다른 환경에서 성능을 측정하였기에 객관적인 비교가 어려웠다. 이를 해결하기 위해 양자내성암호 벤치마크 플랫폼이 등장하였다. 양자내성암호 벤치마크 플랫폼은 양자내성암호 후보 알고리즘을 모두 동일한 환경에서 벤치마크하여 객관적인 결과를 제공하는데 집중하였다. 이때 각 알고리즘이 지니는 다양한 구동 의존성 때문에 알고리즘을 동일 환경에서 가동하는 데에 제한이 있다. 따라서 벤치마크 플랫폼은 알고리즘들의 의존성을 제거하고 동일한 환경을 제공하는데 집중하였으며 이를 통해 양자내성암호의 성능에 대한 접근성을 높여 사람들의 양자내성암호 연구에 큰 도움을 주었다.

Recognition of Special Vehicles Using Roof Marks (루프 마크를 이용한 특수차량 인식)

  • Kim, Seok-Young;Lee, Jaesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.293-296
    • /
    • 2016
  • In case of an emergency on a busy road of a city, drivers should make way for special vehicles such as police cars, fire engines, or ambulance as soon as possible. If road infrastructures recognize the movements of special vehicles, and transfer alert message to traffic signal controllers and normal cars through wireless network such as WAVE or TPEG, normal cars can prepare to make way in advance. As a result, it help special vehicles move faster. In this paper, we install a roof mark on the roof of a special vehicle, detect the mark through a mark recognition algorithm which includes perspective transformation, and get the inner information by decoding the digital pattern on it. The experiment results show that mark can be recognized 100% and 93.3% of inner digital data of the mark can be recognized, when the size of a mark is larger than $88cm{\times}88cm$ and the mark moves at a speed of 50km/s.

  • PDF

Implementation of a Scheme Mobile Programming Application and Performance Evaluation of the Interpreter (Scheme 프로그래밍 모바일 앱 구현과 인터프리터 성능 평가)

  • Dongseob Kim;Sangkon Han;Gyun Woo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.3
    • /
    • pp.122-129
    • /
    • 2024
  • Though programming education has been stressed recently, the elementary, middle, and high school students are having trouble in programming education. Most programming environments for them are based on block coding, which hinders them from moving to text coding. The traditional PC environment has also troubles such as maintenance problems. In this situation, mobile applications can be considered as alternative programming environments. This paper addresses the design and implementation of coding applications for mobile devices. As a prototype, a Scheme interpreter mobile app is proposed, where Scheme is used for programming courses at MIT since it supports multi-paradigm programming. The implementation has the advantage of not consuming the network bandwidth since it is designed as a standalone application. According to the benchmark result, the execution time on Android devices, relative to that on a desktop, was 131% for the Derivative and 157% for the Tak. Further, the maximum execution times for the benchmark programs on the Android device were 19.8ms for the Derivative and 131.15ms for the Tak benchmark. This confirms that when selecting an Android device for programming education purposes, there are no significant constraints for training.

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

Design and Evaluation of Corporate Identity Symbol Marks by Hybrid Kansei Engineering (혼합형 감성공학에 의한 CI 심벌마크의 설계 및 평가)

  • 장인성;박용주
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.129-141
    • /
    • 2001
  • Kansei engineering or image technology is a tool to analyze relation between product design components and the impression or feeling of human for physical products. This paper attempts to construct the designer\`s aid tool for developing corporate identity(CI) symbol mark based on the hybrid Kansei engineering. It combines the forward Kansei engineering for translating consumer\`s feeling into design components of CI symbol mark and the backward Kansei engineering for evaluating consumer\`s feeling for CI symbol mark. The semantic differential(SD) evaluation experiment is carried out to find the relations between image and design. The backward Kansei engineering system is modelled by fuzzy neural network. This research is expected to contribute to the development of CI symbol mark that correspond to comsumer\`s image.

  • PDF

A 3D Watermarking on STL using Vertex domain (버텍스 영역을 이용한 STL에서의 3차원 디지털 워터마킹)

  • 김기석;천인국
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.901-906
    • /
    • 2002
  • This paper is a research about method, that is used in Rapid Prototyping system, that inserts and extracts watermark in STL(standard transform language) that has a 3D geometrical model. The proposed algorithm inserts watermark in the vertex domain of STL facet without the distortion of 3D model. If we make use of a established algorithm for watermarking of STL, a watermark inserted to 3D model can be removed by simple attack that change order of facet. The proposed algorithm has robustness about these attack. Experiment results verify that the proposed algorithm, to encode and decode watermark in STL 3D geometrical model, doesn't distort a 3D model at all. And it shows that the proposed algorithm is available.

  • PDF

CMFston : Synthetic User Programming Benchmark Based on UNIX (CMFston:유닉스 기반의 합성 사용자 프로그래밍 벤치마크)

  • Lee, Si-Jin;Park, Sung-Uk;Kwon, Hyeog-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1215-1228
    • /
    • 1996
  • The purpose of benchmark program is to measure the performance of a computer system. The performance of a computer system is determined by the amount of execution time of user application programs. Thus, it is assumed that a benchmark program must have the same features with user application programs to test. In this paper, we have designed and implemented CMFstone which is consisted of Chaustone, Mchaustone and Fhsstone. After applied the CMFstone, designed and implemented in this paper, to the real situations, the results of comparison show that CMFstone is similar to geometric mean of other benchmarks results. Thus, we have concluded that CMFstone is good enough to measure the performance of a computer system.

  • PDF

Digital Watermarking based on Wavelet Transform and Singular Value Decomposition(SVD) (웨이블릿 변환과 특이치 분해에 기반한 디지털 워터마킹)

  • 김철기;차의영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.602-609
    • /
    • 2002
  • In this paper, we propose an robust invisible watermarking method using wavelet transform and singular value decomposition for the ownership protection. of images. For this method, after we decompose the original image in three level using wavelet transform, we use singular value decomposition based key depended watermark insertion method in the lowest band $LL_3.$ And we also watermark using DCT for extraction of watermark and verification of robustness. In the experiments, we found that it had a good quality and robustness in attack such as compression, image processing, geometric transformation and noises. Especially, we know that this method have very high extraction ratio against nose and JPEG compression. And Digimarc's method can not extract watermark in 80 percent compression ratio of JPEG, but the proposed method can extract well.

Sound Watermarking Technique based on Blackfin Processor (블랙핀 프로세서 기반의 사운드 워터마킹 기법)

  • Kim, Ye-il;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.757-758
    • /
    • 2015
  • The digital watermark is one of important techniques to solve copyright authentication problems of digital media. Researches on the digital watermark are rapidly increasing in various media. The watermark system can resist some attacks such as signal attack, geometric attack and protocol attach. However, so far the robustness of the watermark needs to be improved. This paper suggests a watermarking technique with which a watermark is embedded on a coefficient of wavelet-based frequency band and extracted from it for protection of property rights and authentication of Blackfin processor-based digital sound. By carrying out hardware implementation of the suggested sound watermarking, the commercialization of protection of property rights and robustness of watermarks resulted from development of high-level programs can be confirmed.

  • PDF