• Title/Summary/Keyword: Similarity comparison

Search Result 751, Processing Time 0.023 seconds

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance

  • Liu, Qiang;Xiang, Xuyu;Qin, Jiaohua;Tan, Yun;Zhang, Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1078-1099
    • /
    • 2021
  • Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.

Factors affecting the intention of Chinese and Vietnamese migrant women to have a second child: Comparison between the "National Survey on the Multi-Cultural Families" of 2009 and 2015 (중국, 베트남 결혼이주여성의 둘째자녀 출산의도 영향요인: 2009년, 2015년 전국다문화가족실태조사의 비교)

  • Ding, Jingya;Chin, Meejung;Ok, Sunwha
    • Journal of Family Relations
    • /
    • v.23 no.2
    • /
    • pp.133-155
    • /
    • 2018
  • Objectives: This study examined the differences in the intention of having a second child and the related factors among Chinese and Vietnamese migrant women from the perspective of adaptation theory. Methods: Data were drawn from the National Survey on Multi-Cultural Families in 2009 and 2015. Among the total 7,615 married migrant women (Korean-Chinese, Chinese-Han, Vietnamese), those within the age group 20-39 within the first 5 years of marriage who had one child were selected. A frequency analysis, chi-squared test, and logit regression analysis were performed. Results: Different ethnic groups had different reasons for having a second child and the related factors also differed between 2009 and 2015. In 2009, after controlling the related variables, the intention of Korean-Chinese and Chinese-Han married immigrant women to have a second child was higher than that of Vietnamese women, but no such difference was found in 2015. Participation in their local community, first marriage, the gender of the first child, and whether they were living with their parents-in-law were associated with the intention of migrant women having a second child in the 2009 analysis model but these factors were not significant in the 2015 analysis model. In the latter model, the household income, a variable related to economic conditions, has a positive effect on the intention of having a second child. Conclusions: The significance of this study supports adaptation theory by addressing the similarity in the childbirth intention between recently married immigrant women and Korean women.

An Algorithm for Detecting Leak of Defaced Confidential Information Based on SVDD (SVDD 기반 중요문서 변조 유출 탐지 알고리즘)

  • Ghil, Ji-Ho;Nam, Ki-Hyo;Kang, Hyung-Seok;Kim, Seong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the algorithm which addresses the problem of detecting leak of defaced confidential documents from original confidential document. Generally, a confidential document is defaced into various forms by insiders and then they are trying to leak these defaced documents to outside. Traditional algorithms detecting leak of documents have low accuracy because they are based on similarity of two documents, which do not reflect various forms of defaced documents in detection. In order to overcome this problem, this paper proposes a novel v-SVDD algorithm which is based on SVDD, the novelty detection algorithm. The result of experiment shows that there is significant improvement m the accuracy of the v-SVDD in comparison with the traditional algorithms.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

A Performance Comparison of Histogram Equalization Algorithms for Cervical Cancer Classification Model (평활화 알고리즘에 따른 자궁경부 분류 모델의 성능 비교 연구)

  • Kim, Youn Ji;Park, Ye Rang;Kim, Young Jae;Ju, Woong;Nam, Kyehyun;Kim, Kwang Gi
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.3
    • /
    • pp.80-85
    • /
    • 2021
  • We developed a model to classify the absence of cervical cancer using deep learning from the cervical image to which the histogram equalization algorithm was applied, and to compare the performance of each model. A total of 4259 images were used for this study, of which 1852 images were normal and 2407 were abnormal. And this paper applied Image Sharpening(IS), Histogram Equalization(HE), and Contrast Limited Adaptive Histogram Equalization(CLAHE) to the original image. Peak Signal-to-Noise Ratio(PSNR) and Structural Similarity index for Measuring image quality(SSIM) were used to assess the quality of images objectively. As a result of assessment, IS showed 81.75dB of PSNR and 0.96 of SSIM, showing the best image quality. CLAHE and HE showed the PSNR of 62.67dB and 62.60dB respectively, while SSIM of CLAHE was shown as 0.86, which is closer to 1 than HE of 0.75. Using ResNet-50 model with transfer learning, digital image-processed images are classified into normal and abnormal each. In conclusion, the classification accuracy of each model is as follows. 90.77% for IS, which shows the highest, 90.26% for CLAHE and 87.60% for HE. As this study shows, applying proper digital image processing which is for cervical images to Computer Aided Diagnosis(CAD) can help both screening and diagnosing.

Soil Washing Technology for Sr and Cs-contaminated Soil Near Nuclear Power Plants using Calcium and Potassium Based Solutions (칼슘 및 칼륨 용액을 이용한 원자력발전소 주변 스트론튬과 세슘 오염토양 세척기술 연구)

  • Song, Hojae;Nam, Kyoungphile
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.2
    • /
    • pp.76-86
    • /
    • 2022
  • Calcium (Ca) and potassium (K) were introduced to remove Sr and Cs in soil, respectively. Four factor and three level Box-Bhenken design was employed to determine the optimal washing condition of Ca- and K-based solutions, and the ranges tested were 0.1 to 1 M of Ca or K, L/S ratio of 5 to 20, washing time of 0.5 to 2 h, and pH of 2 to 7. The optimal washing condition determined was 1 M of Ca or K, L/S ratio of 20, washing time of 1 h, and pH of 2, and Ca-based and K-based solutions showed 68 and 81% removal efficiency for Sr and Cs, respectively in soil. For comparison, widely used conventional washing agents such as 0.075 M EDTA, 0.01 M citric acid, 0.01 M oxalic acid, and 0.05 M phosphoric acid were tested, and they showed 25 to 30% of Sr and Cs removal efficiency. Tessier sequential extraction was employed to identify the changes in chemical forms of Sr and Cs during the washing. In contrast to the conventional washing agents, Ca-based and K-based solutions were able to release relatively strongly bound forms of Sr and Cs such as Fe/Mn-oxide and organic matter bound forms, suggesting the involvement of direct substitution mechanism, probably due to the physicochemical similarities between Sr-Ca and Cs-K.

Image-Based Application Testing Method Using Faster D2-Net for Identification of the Same Image (동일 이미지 판별을 위해 Faster D2-Net을 이용한 이미지 기반의 애플리케이션 테스트 방법)

  • Chun, Hye-Won;Jo, Min-Seok;Han, Sung-Soo;Jeong, Chang-Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.2
    • /
    • pp.87-92
    • /
    • 2022
  • Image-based application testing proposes an application testing method via image structure comparison. This test method allows testing on various devices without relying on various types of device operating systems or GUI. Traditional studies required the creation of a tester for each variant in the existing case, because it differs from the correct image for operating system changes, screen animation execution, and resolution changes. The study determined that the screen is the same for variations. The tester compares the underlying structure of the objects in the two images and extracts the regions in which the differences exist in the images, and compares image similarity as characteristic points of the Faster D2-Net. The development of the Faster D2-Net reduced the number of operations and spatial losses compared to the D2-Net, making it suitable for extracting features from application images and reducing test performance time.

Relationships among bedding materials, bedding bacterial composition and lameness in dairy cows

  • Li, Han;Wang, Xiangming;Wu, Yan;Zhang, Dingran;Xu, Hongyang;Xu, Hongrun;Xing, Xiaoguang;Qi, Zhili
    • Animal Bioscience
    • /
    • v.34 no.9
    • /
    • pp.1559-1568
    • /
    • 2021
  • Objective: Bedding materials directly contact hooves of dairy cows and they may serve as environmental sources of lameness-associated pathogen. However, the specific composition of bacteria hidden in bedding materials is still not clear. The aim of this study was to determine the effect bedding material and its bacterial composition has on lameness of Holstein heifers. Methods: Forty-eight Holstein heifers with similar body weights were randomly assigned into three groups including sand bedding (SB), concrete floor (CF), and compost bedding (CB). Hock injuries severity and gait performance of dairy cows were scored individually once a week. Blood samples were collected at the end of the experiment and bedding material samples were collected once a week for Illumina sequencing. Results: The CF increased visible hock injuries severity and serum biomarkers of joint damage in comparison to SB and CB groups. Besides, Illumina sequencing and analysis showed that the bacterial community of CB samples had higher similarity to that of SB samples than CF samples. Bacteria in three bedding materials were dominated by gastrointestinal bacteria and organic matter-degrading bacteria, such as Actinobacteria, Firmicutes, and norank JG30-KF-cM45. Lameness-associated Spirochaetaceae and Treponeme were only detected in SB and CB samples with a very low relative abundance (0% to 0.08%). Conclusion: The bacterial communities differed among bedding materials. However, the treponemes pathogens involved in the pathogenesis of lameness may not be a part of microbiota in bedding materials of dairy cows.

Study on bearing characteristic of rock mass with different structures: Physical modeling

  • Zhao, Zhenlong;Jing, Hongwen;Shi, Xinshuai;Yang, Lijun;Yin, Qian;Gao, Yuan
    • Geomechanics and Engineering
    • /
    • v.25 no.3
    • /
    • pp.179-194
    • /
    • 2021
  • In this paper, to study the stability of surrounding rock during roadway excavation in different rock mass structures, the physical model test for roadway excavation process in three types of intact rock mass, layered rock mass and massive rock mass were carried out by using the self-developed two-dimensional simulation testing system of complex underground engineering. Firstly, based on the engineering background of a deep mine in eastern China, the similar materials of the most appropriate ratio in line with the similarity theory were tested, compared and determined. Then, the physical models of four different schemes with 1000 mm (height) × 1000 mm (length) × 250 mm (width) were constructed. Finally, the roadway excavation was carried out after applying boundary conditions to the physical model by the simulation testing system. The results indicate that the supporting effect of rockbolts has a great influence on the shallow surrounding rock, and the rock mass structure can affect the overall stability of the surrounding rock. Furthermore, the failure mechanism and bearing capacity of surrounding rock were further discussed from the comparison of stress evolution characteristics, distribution of stress arch, and failure modes in different schemes.

Comparison between Torilis japonica and Cnidium monnieri Using DNA Sequencing and Taste Pattern Analysis (DNA 염기서열과 미각패턴 분석을 이용한 사상자와 벌사상자의 감별)

  • Kim, Young Hwa;Kim, Young Seon;Chae, Sungwook;Lee, Mi Young
    • The Korea Journal of Herbology
    • /
    • v.28 no.6
    • /
    • pp.9-14
    • /
    • 2013
  • Objectives : Cnidii Fructus is prescribed as the fruit of Cnidium monnieri (L.) Cusson or Torilis japonica (Houtt.) DC. in Korea pharmacopoeia. Although there are differences in the composition of useful components, two species have been used without distinction. In order to discriminate them, DNA sequencing and taste pattern analysis were used in this study. Methods : Primers ITS 1 and ITS 4 were used to amplify the intergenic transcribed spacer(ITS) region of nuclear ribosomal DNA from seven T. japonica and six C. monnieri samples. Taste pattern of samples were measured by using taste-sensing system SA402B equipped with five foodstuff sensors(CT0, C00, AAE, CA0, and AE1). The five initial taste(sourness, bitterness, astringency, umami, and saltiness) and three aftertaste(aftertaste of bitterness, astringency, and umami) of two species were compared. Results : According to the results of ITS region sequence analysis, two species showed 94 base pairs differences. The similarity of two sequences was 85%. From the taste pattern analysis, sourness, bitterness, aftertaste of bitterness(aftertaste-B), and umami showed a different pattern. Especially, bitterness and aftertaste-B of C. monnieri were significantly higher than T. japonica. In addition, two species were shown to have two markedly different clustering by these two flavors. Conclusion : T. japonica and C. monnieri were effectively discriminated using DNA sequencing and taste pattern analysis. These methods can be used to identify the origin of traditional medicine in order to maintain therapeutic efficacy.