• 제목/요약/키워드: concealing

검색결과 88건 처리시간 0.023초

무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제1부) : 프로토콜 설계 (Concealing Communication Source and Destination in Wireless Sensor Networks(Part I) : Protocol Design)

  • 차영환
    • 한국전자통신학회논문지
    • /
    • 제8권2호
    • /
    • pp.219-226
    • /
    • 2013
  • 무선 센서 네트워크에 있어서 전역 도청에 대응하는 통신 근원지와 도착치의 위치기밀을 유지하기 위해서는 수많은 속임수용 더미 패킷들이 지속적으로 발행된다. 근원지나 도착지를 포함하는 특정 크기의 보호구역들을 설정한 후, 이 안의 노들들에 대해서만 데이터전송 중에 더미 패킷들을 생성하도록 제한하여 근원지와 도착지의 위치기밀성을 제공하면서도 패킷발생량을 줄이는 접근방안을 고려한다. 제안 프로토콜을 설계하고 형식화한 상세한 프로토콜 명세서를 제시한 후, 주요 특성과 정확성을 검증한다.

무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구 (On Concealing Data-Path Against Eavesdropping in Wireless Networks)

  • 차영환
    • 한국전자통신학회논문지
    • /
    • 제15권3호
    • /
    • pp.433-438
    • /
    • 2020
  • 무선망에서 통신 경로상의 노드들은 데이터 전달 시마다 전자기적 신호를 방출하므로 일련의 발생 신호들을 포착하여 분석하면 해당 경로가 노출 및 탐지될 수 있다. 악의적 도청자에 대응하는 방법의 하나로는 특정 노드들로 하여금 더미(거짓) 패킷을 생성하도록 하여 마치 데이터 경로상의 노드들처럼 보이도록 하는 것이다. 이 논문에서는 근원지와 도착지 간에 최단 경로를 한 번에 설정하면서 더미 패킷의 과도한 생성을 억제하는 패킷 전송 프로토콜을 제안한다. 시뮬레이션을 통해 통신 경로상의 노드 위치 기밀 수준을 검증한다.

패션에 나타난 동서양 문화 퓨전 이미지의 미적 가치에 대한 연구 (Aesthetic Value of Orient-West Culture Fusion Image in Fashion)

  • 유현정
    • 한국의상디자인학회지
    • /
    • 제13권3호
    • /
    • pp.45-54
    • /
    • 2011
  • The purpose of this study is to help understanding of east-west culture fusion in fashion since 2000 years, to play a guideline's role in the development on fashion designs study. The methods of this study are academic literatures as well as practical study through case studies about actual works. Tendency of east-west culture fusion in fashion since 2000 years is shape and performance, pattern, accessary. Shape and performance are reinterpreted through east folk fashion transforming on west fashion, pattern shows traditional pattern of each nations, but letters of typical of each nations appears for new pattern which expresses nation identification. Accessary is in the harmony with east -west fashion culture like that without transform. Aesthetic value of east-west culture fusion in fashion since 2000 years is summerised opening, co-ownership, and amusement. First, opening is positiveness of acception and acknowledgment for other. Second, co-ownership turns towards humanism, and proves participating in globalism and really global village. Third, amusement is to express freedom, and to reveal privately emotion concealing in public area.

  • PDF

Watermarking-based Error Concealment in Video Communications

  • Oh Tae-Suk;Kim Yong-Cheol;Adsumilli Chowdary;Mitra Sanjit
    • 한국통신학회논문지
    • /
    • 제31권7C호
    • /
    • pp.700-705
    • /
    • 2006
  • In this paper, an informed watermarking algorithm is proposed that aids in concealing packet loss errors in video communications. This watermark-based error concealment (WEC) method embeds a low resolution version of the video frame inside itself as watermark data. At the receiver, the extracted watermark is used as a reference for error concealment. The proposed DCT-based algorithm employs informed watermarking techniques in order to minimize the distortion of host frames. At the encoder, a predictive feedback loop is employed which helps to adjust the strength of the data embedding. Furthermore, the distortion of the DCT coefficients introduced in the embedding can be removed to a considerable extent, by employing bit-sign adaptivity. Simulation results on standard video sequences show that the proposed informed WEC scheme has an advantage of 3$\sim$4 dB in PSNR over non-informed WEC and that even a non-informed WEC is still superior to conventional error concealment techniques.

현대 복식에 나타난 "외부로부터의 해체"현상(제1보) -1980년대부터 1990년대를 중심으로- (Deconstruction' From The Outside Expressed In the Contemporary Costume (Part I) -From 1980's to 1990's-)

  • 김주영;양숙희
    • 한국의류학회지
    • /
    • 제21권8호
    • /
    • pp.1261-1274
    • /
    • 1997
  • Contemporary costume by the 'Deconstruction' from the outside has shown disclosure, destruction, poverty and analysis. The conclusion of this thesis as follows, 1. The Deconstruction of disclosure by infra disclosed the underwear and inner structure outside, which has deconstructed a fixed idea i.e.'underwear must be in outwear', modesty versus immodesty and disclosure versus concealment. 2. The Deconstruction of destruction originated in punk look has rejected traditional manners and utility, at the same time, it has shown the ambivalence i.e. completeness versus incompleteness, making versus destructing by slashes, rips, fringes. 3. The Deconstruction of poverty has appeared as French avangarde mode, little black dress by Chanel, second hand style by hippy, blue jean, granny look, especially Rei Kawakubo's poor look influenced by Zen Aesthetics and post punk. It has looked like old and worn out dress by doing patchwork, dye, decolor, rip, fray, which has shown the decentring by concealing the body than disclosing, rejecting snobbery. 4. The Deconstruction of analysis, seemingly partial and patched is a violation only of our expectation of clothing's unbroken entity though it has looked like a fragment. The completeness and coherence of it is made more evident by its breach, void, and bond like a poetic language. As the result, disclosed, destructed, poor, and analytical costumes has expressed as an escape from the appearance which traditional aesthetic concept had pursued.

  • PDF

Efficient secret sharing scheme with cheater identification based on QR code

  • Huang, Peng-Cheng;Chang, Chin-Chen;Li, Yung-Hui;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.5144-5160
    • /
    • 2019
  • Secret sharing is an effective way of protecting secret messages. However, the traditional secret sharing schemes are considered meaningless due to malicious people attention which might raise risks. To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. The secret message will be split and concealed in the padding region of cover QR codes with the assistance of Latin square and it can be completely restored when all the involved participants cooperate. The concealing strategy exploits the characteristic of Reed-Solomon (RS) code to ensure the strong robustness of generated QR code pseudo-shares. The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. The results showed that the proposed scheme is feasible, efficient and secure compared to the other existing schemes. It also achieves a higher secret payload and maintains stronger robustness.

만성신부전 환자의 체험 (Experience of Patients Living with Chronic Renal Failure)

  • 강성례;이병숙
    • 대한간호학회지
    • /
    • 제31권4호
    • /
    • pp.525-537
    • /
    • 2001
  • The Purpose of the study was to understand the experience of chronic renal failure patients for the qualified individual care for them. The purpose of this study was to explore the experience of patients living with chronic renal failure and to identify the meaning and structure of their experience. The subjects were four patients, two females and two males. The age range was from 21 to 54. Data was collected with a few in-depth interviews by the authors until the data was fully saturated. The framework and methodology of this study was based on Parse′s "Human Becoming methodology," an existential phenomenological research methodology. The findings of this study were as follows. Three experience structures of chronic renal failure patients were : 1. Sufferings and conflicts originated in the frustration caused by uncurable disease. 2. Dependence upon God and significant others with complex emotions. 3. Acceptance of sufferings, emerging hope for serving people, and gratitude for living. In conclusion the experience of chronic renal failure patients could be described from the findings (three structures) as "Experiencing the sufferings, conflicts originated in the frustration caused by uncurable disease, dependence upon God and significant others with complex emotion, acceptance of the suffering and hope for serving people, and gratitude for living." The three structures of the lived experience of patients with chronic renal failure, the findings of this study, could be explained by the three concepts of "Theory of Human Becoming," the first structure could be explained with values, the second with revealing-concealing, and the third with transforming.

  • PDF

갈등의 영역 - 실내디자인의 지식체계와 프로페션의 건강, 안전, 복지 에토스와의 갈등 - (Contested terrain - Conflicts between BOK(body of knowledge) of interior design and HSW(health, safety, welfare) ethos of profession -)

  • 김덕수
    • 한국실내디자인학회논문집
    • /
    • 제21권6호
    • /
    • pp.177-185
    • /
    • 2012
  • The endowed privilege to an established profession acts as an important motivation related to professionalization of occupations. The established profession enjoys cognitive, legal, and economic privilege. This study analyzes the professionalization process of interior design. Specifically, the study evaluates the suitability of the body of knowledge and professional ethos(i.e., protection of citizen's health, safety, and welfare), while analyzing the professionalization of interior design in the United States. The research aims at proposing a reference point for the professionalization of Korean interior design. Utilized data include research paper, court sentencing, and reports published by related professional organizations. The study concludes that 3E's are a means of professionalization of interior design, while separating interior design from interior decorating. In addition, there is no evidence to the protection of citizen's HSW. Rather, it increases service costs and restricts the job opportunities. When the public is not persuaded, the argument related to the necessity of license for the protecting citizen's HSW can be consumed as a mere rhetoric, concealing intentions for formulating a cartel. Thus, this study proposes that the professionalization of interior design may focus on the establishment of identity and body of knowledge, which are specific to interior design.

  • PDF

패션에 표현된 Breast 디자인의 미적 고찰 (The Aesthetics on the Breast Design in Fashion)

  • 남후남;금기숙
    • 복식
    • /
    • 제55권1호
    • /
    • pp.101-112
    • /
    • 2005
  • One of the curiosities harbored most by anthropologists may be why women are so different from men physically. One of such differences must be the breast. Female animals do not have such a swollen breast even when they nurse their young. We can find many Western garments highlighting the breast, but in Korea the tradition has been that the breast should not be highlighted. It was because the large breast was deemed useful that Western people appreciated it highly. In general, it is conceived that to ancient Westerners' eyes, the nursing function of the breast was very mysterious, because the food supplies were insufficient. Although the size of a breast does not affect its nursing function, Westerners may have thought that it did. To the contrary, in the societies with rich agricultural products, the breast was not much emphasized as the reproductive organs. Since people are more and more concerned about their body and the breast or one of the body parts characterizing the femininity is regarded as an important element of design, it may well be significant to research into the breast designs for development of the fashion design. With such basic conceptions in mind, this study was aimed at reviewing the artworks featuring women's breast and their historical background and thereupon, analyzing the aesthetic values of the breast-featuring designs by dividing them into four categories in large.

공간적 암호화를 사용하는 영상 워터마킹 기법 (Image Watermarking Algorithm using Spatial Encryption)

  • 정수목
    • 문화기술의 융합
    • /
    • 제6권1호
    • /
    • pp.485-488
    • /
    • 2020
  • 본 논문에서는 공간적 암호화를 사용하여 영상에 소유권 정보인 워터마크를 영상 픽셀의 LSB에 안전하게 은닉하는 기법을 제안하였다. 제안된 워터마킹 기법은 영상의 지적재산권 보호에 효과적으로 사용될 수 있다. 제안된 기법을 사용하여 공간적으로 암호화된 워터마크를 은닉한 영상인 스테고 이미지로부터 워터마크를 손실 없이 추출할 수 있다. 실험을 통하여 제안 기법의 우수성을 확인하였다. 제안된 기법을 적용하여 워터마킹을 수행한 결과 영상인 스테고 이미지의 화질은 51dB이상으로 사람이 육안으로 워터마크의 존재여부를 인식할 수 없으며, 워터마크가 공간적으로 암호화되어 있기 때문에 워터마크의 보안성이 우수하다.