• Title/Summary/Keyword: concealment

Search Result 345, Processing Time 0.024 seconds

A Study on the Meaning of the Breast Exposure in Women's Fashion Design (패션 디자인에 나타난 가슴 노출의 의미 연구)

  • Geum Key-Sook;Nam Hoo-Nam
    • The Research Journal of the Costume Culture
    • /
    • v.13 no.2 s.55
    • /
    • pp.318-328
    • /
    • 2005
  • Our interest in human body is more and more increasing. Not only academic and art communities but also other social communities show a keen interest in the human body. Especially, the breast of women's body parts may be comparable to men's penis because it is protruded. The breast which sexually distinguishes women from men becomes an important topic in the fashion design community. Therefore, such designs which emphasize the breast are being introduced in a natural way. This paper aims at examining the reason and symbolism for the exposure of breast and analyzing the fashion design that breast is exposed. This study will help us grasp the meaning which the design has. The exposure's scope of breast in the design includes the partial exposure, total exposure and the concealment of breast. But these all have their effects in each scope. For this paper, some general things were investigated. They are as follows: the phases of breast exposure in the fashion design, the exposure of breast expressed in the works of fine art, and the alteration of breast-exposing phenomenon shown in apparels. Then, each type of breast-exposing design shown in the women's fashion was analyzed from the middle of 1980s' when the phenomenon of breast exposure occurred to the year 2004. These could be divided into 4 types. They include a suggestive type, an exaggerative type, an open type and a reproductive type. As the result of analysis of 4 types, such meanings of design as an emphasis of femininity, an expression of liberty, a symbol of maternity and a commercialization of sex could be analogized.

  • PDF

A Steganography Method Improving Image Quality and Minimizing Image Degradation (영상의 화질 개선과 열화측정 시간을 최소화하는 스테가노그라피 방법)

  • Choi, YongSoo;Kim, JangHwan
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.433-439
    • /
    • 2016
  • In this paper, we propose a optimized steganography how to improve the image degradation of the existing data hiding techniques. This method operates in the compressed domain(JPEG) of an image. Most of the current information concealment methods generally change the coefficients to hide information. And several methods have tried to improve the performance of a typical steganography method such as F5 including a matrix encoding. Those papers achieved the object of reducing the distortion which is generated as hiding data in coefficients of compressed domain. In the proposed paper we analyzed the effect of the quantization table for hiding the data in the compressed domain. As a result, it found that can decrease the distortion that occur in the application of steganography techniques. This paper provides a little (Maximum: approximately 6.5%) further improved results in terms of image quality in a data hiding on compressed domain. Developed algorithm help improve the data hiding performance of compressed image other than the JPEG.

Distortion Minimization Resource Allocation Scheme for Multiuser Video Transmission Over OFDM Network with Proportional Rates (다수 사용자 OFDM 시스템에서의 비디오 전송을 위한 비례 율 적용 왜곡 최소화 자원 할당 방법)

  • Ha, Ho-Jin;Yim, Chang-Hoon;Kim, Young-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.583-591
    • /
    • 2008
  • This paper proposes a resource allocation algorithm for minimizing the overall distortion of multiple users in orthogonal frequency division multiplex (OFDM). The proposed algorithm exploits the diversity of multiuser and the rate-distortion function using packet distortion model in a system with limited resources. We first induce a rate-distortion function considering error concealment and error propagation properties of H.264 video structures. Then we perform adaptive resource allocation utilizing multiuser diversity for minimizing the overall video quality degradation. We also consider the proportional rate which is pre-determined for each user. Simulation results show that compared to the previous time division multiple access method and the resource allocation method maximizing data rate, the proposed rate allocation algorithm substantially improves the received video quality.

A Study on Open API Security Protocol based on Multi-Channel (다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.40-46
    • /
    • 2020
  • Safe security technology is required for the startup ecosystem according to the construction and service of a joint open platform in the financial sector. Financial industry standard open API recommends that payment-related fintech companies develop/apply additional security technologies to protect core API authentication keys in the mutual authentication process. This study proposes an enhanced API security protocol using multiple channels. It was designed in consideration of the compatibility of heterogeneous platforms by further analyzing the problems and weaknesses of existing open API related research. I applied the method of concealment to remove the additional security channels into a single channel of the existing security protocols. As a result of the performance analysis, the two-way safety of the communication session of the multi-channel and the security of the man-in-the-middle attack of the enhanced authentication key were confirmed, and the computational performance of the delay time (less than 1 second) in the multi-session was confirmed.

A New Error Spreading Method for MPEG Streaming Service Over the Internet (인터넷망에서 MPEG 스트리밍 서비스를 위한 새로운 에러 확산 기법)

  • Pyun, Jae-Young;Shim, Jae-Jeong;Lee, Jae-Yong;Ko, Sung-Jea
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.5
    • /
    • pp.21-31
    • /
    • 2002
  • As the MPEG streaming traffics are transmitted over the Internet, MPEG packet losses cause error propagation in both spatial and temporal domains which in turn leads to severe degradation in image quality. This image degradation is become worse by the bursty packet loss at the network. In this paper, we propose a new error spreading method to reduce the effects of bursty packet losses over the Internet. The proposed error spreading method spreads out the not utilize packet losses widely, and can be used for videocasting and video-broadcasting that do not utilize the ARQ method. The proposed method can not only reduce the consecutive losses of image blocks, but also improve the performance of error concealment. Experimental results show that the deterioration of MPEG video quality can be reduced by spreading out the MPEG packet losses.

No-reference Measurement of Blocking Artifacts to Assess the Quality of IP Based Video Service (IP 기반 비디오 서비스의 화질 측정을 위한 비참조 블록 열화 측정 방법)

  • Lee, Seon-Oh;Min, Kyung-Yeon;Sim, Dong-Gyu;Lee, Hyun-Woo;Ryu, Won;Kim, Jin-Sul
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.78-87
    • /
    • 2009
  • In this paper, we propose a new method of blocky artifacts measurement for IP based video service. In order to assess the quality of IP based video service, we classify degradation into blocking artifacts by network error or by transmission error. in order to assess blocking artifacts based on No-reference, we estimate blocky artifacts from network errors and image compression by calculating amount of difference between target block and neighbor blocks and error concealment algorithm in a video receiver. To ensure accuracy of proposed method, we compare our result to MOS data using SSCQE method. Experimental results show that the proposed algorithm is better than a conventional method by around 1.3.

A Study on the Visual Characteristics of Camouflage Patterns in Fashion Design (패션에 나타난 카무플라주 패턴의 시각적 표현특성)

  • Choi, Jung-Hwa
    • Fashion & Textile Research Journal
    • /
    • v.15 no.5
    • /
    • pp.682-693
    • /
    • 2013
  • Camouflage is evaluated by scientific principle in the fields of biology, military science, and art. It has a strong influence on contemporary fashion and means exposure with concealment. This study analyzed the visual characteristics of camouflage patterns in fashion design through documentaries and fashion photos. The fashion design results areas follow. The simple blending of a disruptive motif indicated an inaccurate repetition of a disruptive motif, the discontinuous or continuous connection of disruptive motif, the irregular repetition of a disruptive animal silhouette, the collage of a different disruptive motif, the craft of a disruptive motif and the intensive color match of a disruptive motif. It represented the maximization of complication, fantastic and fanciness. The overlap of a disruptive motif showed the overlap of disruptive print patterns with transparency and an overlap of different fabrics with a disruptive pattern. It represented spatial relationships of three dimensions as well as the maximization of visual illusion and the reinforcement of attractiveness. The blurring of a disruptive motif showed the pointage of disruptive motif, the pointage of image, value gradation, the whole blurring of a disruptive pattern cluster and stained appearance. It represented the obscurity of motif form, the uncertainty of object and double meaning. The trompe l'oeil of a partial background object showed the realistic and the painterly imitation of color and texture for partial objects through a close-up. It represented amazement and pleasure by illusion, scarcity and the decoration of surface and synecdochical remind. In conclusion, camouflage in fashion was weakened and modified from a classical military context by a unique expression of various motifs.

A Study of Economic Indicator Prediction Model using Dimensions Decrease Techniques and HMM (차원감소기법과 은닉마아코프모델을 이용한 경기지표 예측 모델 연구)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.305-311
    • /
    • 2013
  • The size of the market as the economy continues to evolve, in order to make the right decisions to accurately predict the economic problems the market has emerged as an important issues. To express the modern economic system, the largest of the various economic indicators, pillars stock indicators analysis and decision-making with a proper understanding of the problem for the application of the model is suitable for time-series data concealment HMM. Based on this time series model and the calculation of the time and cost savings dimension decrease techniques for the estimation and prediction of the model was applied to the problem was to verify the validity. As a result, the model predictions in both the short term rather than long-term predictions of the model estimates the optimal predictive value similar pattern very similar to both the actual data and was able to confirm that.

Adaptive Hangul Steganography Based on Chaotic Encryption Technique (혼돈 암호화 기법에 기반한 적응된 한글 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.177-183
    • /
    • 2020
  • Steganography uses digital images as a medium for sending secret messages over insecure networks. There is also a least significant bit(LSB) that is a popular method of embedding secret messages in digital images. The goal of steganography is to securely and flawlessly transmit secret messages using stego media over a communication channel. There is a need for a method to improve resistance to reduce the risk of exposure to third parties. To safely hide secret messages, I propose new algorithms that go through crossing, encryption, chaos and concealment steps. After separating Hangul syllables into choseong, jungseong and jongseong, the bitwised message information is encrypted. After applying the logistic map, bitwised information is reconstructed using the position of the chaotic sequence. The secret message is inserted into the randomly selected RGB channel. PSNR and SSIM were used to confirm the effectiveness of the applied results. It was confirmed as 44.392(dB) and 0.9884, respectively.

Improved Data Concealing and Detecting Methods for OOXML Document (OOXML 문서에 대한 향상된 데이터 은닉 및 탐지 방법)

  • Hong, Kiwon;Cho, Jaehyung;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.489-499
    • /
    • 2017
  • MS office is a office software which is widely used in the world. The OOXML format has been applied to the document structure from MS office 2007 to the newest version. In this regard, the method of data concealing, which is a representative anti-forensic act has been researched and developed, so the method of detecting concealed data is very important to the digital forensic investigation. In this paper, we present an improved data concealing method bypassing the previewers detecting methods for OOXML formatted MS office documents. In addition, we show concealment of the internal data like sheets and slides for MS office 2013 Excel and PowerPoint, and suggest an improved detecting algorithm against this data concealing.