• Title/Summary/Keyword: embedding capacity

Search Result 127, Processing Time 0.022 seconds

Detection of Helicobacter pylori by Pre-embedding Immunoelectron Microscopy - Comparison with Immunoblotting Method (Pre-embedding Immunoelectron Microscopy를 이용한 Helicobacter pylori의 발견 - Immunoblotting법과 비교 -)

  • Jung, Hae-Seoung;Kim, Eun-Jung;Kim, Eun-A;Park, Ji-Hoe;Jun, Jin-Su;Seo, Ji-Hyoun;Lim, Jae-Young;Choi, Myoung-Bum;Woo, Hyang-Ok;Youn, Hee-Shang;Ko, Gyung-Hyuck;Baik, Seung-Chul;Lee, Woo-Kon;Cho, Myung-Je;Rhee, Kwang-Ho
    • Clinical and Experimental Pediatrics
    • /
    • v.45 no.7
    • /
    • pp.862-874
    • /
    • 2002
  • Purpose : We tried to evaluate whether the detection rate of Helicobacter pylori in gastric biopsy specimens could be improved by using pre-embedding immunoelectron microscopy. Methods : A total of 119 children who complained of upper gastrointestinal symptoms were endoscoped at the Gyeongsang National University Hospital from July, 1996 to July, 1999. Five biopsy specimens(three for urease test, one for hematoxylin-eosin(H & E) staining, and one for preembedding immunoelectron microscopy) were obtained from each antrum and body. Immunoblotting analysis were also performed. Results : Among the 119 patients, H. pylori were found in 116 patients(97.5%) by the immunoelectron microscopy. Among three patients who were found H. pylori negative in immunoelectron microscopy, two patients showed H. pylori in H & E stained slides and one patient was urease test positive(color change within six hours). Urease tests were positive in 107 patients(89.9 %). The positive rate of immunoblotting tests was 81.5%. However, only 13 patients(10.9%) showed H. pylori on the H & E stained antrum or body tissue. Conclusion : In this study, we found H. pylori histopathologically in most of the pediatric patients who complained of upper gastrointestinal symptoms. This study showed that pre-embedding immunoelectron microscopic examinations can be used as a gold standard in the diagnosis of childhood H. pylori infection. However, this method also has limited capacity to detect widely scattered H. pylori compared to the other histopathologic diagnostic methods.

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting (모듈러 연산과 히스토그램 이동에 기반한 새로운 가역 정보 은닉 기법)

  • Kim, Dae-Soo;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.639-650
    • /
    • 2012
  • In 2009, Tsai et al. proposed reversible image hiding scheme using linear prediction coding and histogram shifting. Tsai et al.'s scheme improved the hiding capacity of Ni et al.'s scheme by using the prediction coding and two histograms. However, Tsai et al.'s scheme has problems. In the prediction coding, the basic pixel is not used from embedding procedure. Many additional communication data are generated because two peak and zero point pairs are generated by each block. To solve the problems, this paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting. In experimental results, the hiding capacity was increased by 28% than Tsai et al.'s scheme. However, the additional communication data was decreased by 71%.

Reversible Data Hiding Based on the Histogram Modification of Difference Image (차분 영상 히스토그램 수정 기반의 가역 데이터 은닉 기법)

  • Yoo, Hyang-Mi;Lee, Sang-Kwang;Suh, Jae-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.2
    • /
    • pp.32-40
    • /
    • 2011
  • Reversible data hiding, which can recover the original image without any distortion after the extraction of the hidden data, has drawn considerable attention in recent years. However, underflow and overflow problems have occurred occasionally in the embedded image. To overcome these problems, we propose a new reversible data hiding algorithm which embeds a compressed location map used to identify these underflow and overflow points. In addition, the proposed algorithm allows for multilevel data hiding to increase the hiding capacity. The simulation results demonstrate that the proposed algorithm generates good performances in the PSNR, the embedding capacity, and the size of side information.

Data Hiding Method Utilizing Skipping Based Hybrid Histogram Shifting (도약기반의 하이브리드 히스토그램 시프팅을 이용하는 데이터 은닉 방법)

  • Choi, YongSoo;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.371-376
    • /
    • 2018
  • In the system security technology, the information hiding field is developed as technologies for embedding information, which are generally used as contents media. The proposed technique is a technical steganography technique which uses a technique of concealing certain information through physical / statistical change of signal values of contents. Recently, there have been various studies based on histogram shifting in reversible data concealment. In multi - peak histogram shifting, the capacity of data concealment gradually increased by applying multiple peak histogram method. In this paper, we analyze the effect of concealment in terms of adopting the histogram shift method including skipping. In addition, we propose multi - branch data concealment as a general method to improve concealment capacity. The above proposal has proved to be an example using mathematical expressions, and further improvement measures could be derived.

Reversible and High-Capacity Data Hiding in High Quality Medical Images

  • Huang, Li-Chin;Hwang, Min-Shiang;Tseng, Lin-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.132-148
    • /
    • 2013
  • Via the Internet, the information infrastructure of modern health care has already established medical information systems to share electronic health records among patients and health care providers. Data hiding plays an important role to protect medical images. Because modern medical devices have improved, high resolutions of medical images are provided to detect early diseases. The high quality medical images are used to recognize complicated anatomical structures such as soft tissues, muscles, and internal organs to support diagnosis of diseases. For instance, 16-bit depth medical images will provide 65,536 discrete levels to show more details of anatomical structures. In general, the feature of low utilization rate of intensity in 16-bit depth will be utilized to handle overflow/underflow problem. Nowadays, most of data hiding algorithms are still experimenting on 8-bit depth medical images. We proposed a novel reversible data hiding scheme testing on 16-bit depth CT and MRI medical image. And the peak point and zero point of a histogram are applied to embed secret message k bits without salt-and-pepper.

Seismic responses of composite bridge piers with CFT columns embedded inside

  • Qiu, Wenliang;Jiang, Meng;Pan, Shengshan;Zhang, Zhe
    • Steel and Composite Structures
    • /
    • v.15 no.3
    • /
    • pp.343-355
    • /
    • 2013
  • Shear failure and core concrete crushing at plastic hinge region are the two main failure modes of bridge piers, which can make repair impossible and cause the collapse of bridge. To avoid the two types of failure of pier, a composite pier was proposed, which was formed by embedding high strength concrete filled steel tubular (CFT) column in reinforced concrete (RC) pier. Through cyclic loading tests, the seismic performances of the composite pier were studied. The experimental results show that the CFT column embedded in composite pier can increase the flexural strength, displacement ductility and energy dissipation capacity, and decrease the residual displacement after undergoing large deformation. The analytical analysis is performed to simulate the hysteretic behavior of the composite pier subjected to cyclic loading, and the numerical results agree well with the experimental results. Using the analytical model and time-history analysis method, seismic responses of a continuous girder bridge using composite piers is investigated, and the results show that the bridge using composite piers can resist much stronger earthquake than the bridge using RC piers.

Data-Hiding for Halftone Images Using an Improved CPT scheme

  • Phan, Trung Huy;Nguyen, Hai Thanh;Kim, Cheonshik;Yang, Ching-Nung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.405-424
    • /
    • 2013
  • In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e.g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as $r={\lfloor}{\log}_2(m{\times}n+1){\rfloor}$ bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.

Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images (암호화된 이미지에서 대칭키 암호화 알고리듬을 이용한 가역 비밀이미지 공유 기법)

  • Jeon, Byoung-Hyun;Shin, Sang-Ho;Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1332-1341
    • /
    • 2015
  • This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting

  • Wang, Zhi-Hui;Chen, Kuo-Nan;Chang, Chin-Chen;Qin, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5170-5188
    • /
    • 2015
  • This paper proposes a novel progressive secret image-hiding scheme based on the inpainting technique, the vector quantization technique (VQ) and the exploiting modification direction (EMD) technique. The proposed scheme first divides the secret image into non-overlapping blocks and categorizes the blocks into two groups: complex and smooth. The blocks in the complex group are compressed by VQ with PCA sorted codebook to obtain the VQ index table. Instead of embedding the original secret image, the proposed method progressively embeds the VQ index table into the cover images by using the EMD technique. After the receiver recovers the complex parts of the secret image by decoding the VQ index table from the shadow images, the smooth parts can be reconstructed by using the inpainting technique based on the content of the complex parts. The experimental results demonstrate that the proposed scheme not only has the advantage of progressive data hiding, which involves more shadow images joining to recover the secret image so as to produce a higher quality steganography image, but also can achieve high hiding capacity with acceptable recovered image quality.