• 제목/요약/키워드: embedding capacity

검색결과 127건 처리시간 0.021초

BCC계 Ti-Cr-V 합금의 전기화학적 특성에 미치는 Mn 및 $AB_5$계 합금 첨가 효과 (Effects of the Addition of Mn and $AB_5$ Type Alloy on the Electrochemical Characteristics of Ti-Cr-V BCC Type Alloys)

  • 김종연;유정현;박충년;박찬진;최전;조성욱
    • 한국수소및신에너지학회논문집
    • /
    • 제18권1호
    • /
    • pp.52-59
    • /
    • 2007
  • We investigated the effects of the addition of Mn and $AB_5$ type alloy on the electrochemical characteristics of Ti-Cr-V BCC type alloys as anode materials for Ni-MH battery. The activation behavior and discharge capacity of the BCC type alloys were significantly improved by ball-milling with the $LmNi_{4.1}Al_{0.25}Mn_{0.3}Co_{0.65}$ alloy, because the $AB_5$ type alloy acted as hydrogen path on the surface of the BCC type alloy. Among the Mn substituted alloys($Mn=0.03%{\sim}0.08%$), the $Ti_{0.32}Cr_{0.38}Mn_{0.05}V_{0.25}$ alloy ball-milled with $AB_5$ type alloy exhibited the greatest discharge capacity of $336\;mAh{\cdot}g^{-1}$. In addition, Mn substituted alloys exhibited the lower plateau pressure in P-C- T curve, the better hydrogen storage capacity and faster surface activation compared with the alloy without Mn.

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation

  • Zhang, Mingming;Zhou, Quan;Hu, Yanlang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.404-421
    • /
    • 2020
  • A reversible data hiding scheme in JPEG compressed bitstreams is proposed, which could avoid decoding failure and file expansion by means of removing of bitstreams corresponding to high frequency coefficients and embedding of secret data in file header as comment part. We decode original JPEG images to quantified 8×8 DCT blocks, and search for a high frequency as an optimal termination point, beyond which the coefficients are set to zero. These blocks are separated into two parts so that termination point in the latter part is slightly smaller to make the whole blocks available in substitution. Then spare space is reserved to insert secret data after comment marker so that data extraction is independent of recovery in receiver. Marked images can be displayed normally such that it is difficult to distinguish deviation by human eyes. Termination point is adaptive for variation in secret size. A secret size below 500 bits produces a negligible distortion and a PSNR of approximately 50 dB, while PSNR is also mostly larger than 30 dB for a secret size up to 25000 bits. The experimental results show that the proposed technique exhibits significant advantages in computational complexity and preservation of file size for small hiding capacity, compared to previous methods.

An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing

  • Liu, Hsing-Han;Su, Pin-Chang;Hsu, Meng-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4537-4556
    • /
    • 2020
  • This research was based on the study conducted by Khodaei et al. (2012), namely, the least-significant-bit (LSB) substitution combined with the pixel-value differencing (PVD) steganography, and presented an improved irreversible image steganography method. Such a method was developed through integrating the improved LSB substitution with the modulus function-based PVD steganography to increase steganographic capacity of the original technique while maintaining the quality of images. It partitions the cover image into non-overlapped blocks, each of which consists of 3 consecutive pixels. The 2nd pixel represents the base, in which secret data are embedded by using the 3-bit LSB substitution. Each of the other 2 pixels is paired with the base respectively for embedding secret data by using an improved modulus PVD method. The experiment results showed that the method can greatly increase steganographic capacity in comparison with other PVD-based techniques (by a maximum amount of 135%), on the premise that the quality of images is maintained. Last but not least, 2 security analyses, the pixel difference histogram (PDH) and the content-selective residual (CSR) steganalysis were performed. The results indicated that the method is capable of preventing the detection of the 2 common techniques.

텍스트마이닝을 활용한 주요 대기업 신년사 분석 (Study on CEO New Year's Address: Using Text Mining Method)

  • 김유경;조대곤
    • 한국IT서비스학회지
    • /
    • 제22권2호
    • /
    • pp.93-127
    • /
    • 2023
  • This study analyzed the CEO New Year's addresses of major Korean companies, extracting key topics for employees via text mining techniques. An intended contribution of this study is to assist reporters, analysts, and researchers in gaining a better understanding of the New Year's addresses by elucidating the implicit and implicative features of messages within. To this end, this study collected and analyzed 545 New Year's addresses published between 2012 and 2021 by the top 66 Korean companies in terms of market capitalization. Research methodologies applied include text clustering, word embedding of keywords, frequency analysis, and topic modeling. Our main findings suggest that the messages in the New Year's addresses were categorized into nine topics-organizational culture, global advancement, substantial management, business reorganization, capacity building, market leadership, management innovation, sustainable management, and technology development. Next, this study further analyzed the managerial significance of each topic and discussed their characteristics from the perspectives of time, industry, and corporate groups. Companies were typically found to emphasize sound management, market leadership, and business reorganization during economic downturns while stressing capacity building and organizational culture during market transition periods. Also, companies belonging to corporate groups tended to emphasize founding philosophy and corporate culture.

수치해석을 이용한 이중 강-콘크리트 합성말뚝 연직지지력 평가 (Estimation on End Vertical Bearing Capacity of Double Steel-Concrete Composite Pile Using Numerical Analysis)

  • 김정수;구정민;김문옥;정충열;추연욱
    • 한국지반환경공학회 논문집
    • /
    • 제23권12호
    • /
    • pp.5-15
    • /
    • 2022
  • 이중 강-콘크리트 합성말뚝의 설계를 위한 지지력 평가 방법이 정립되지 않아 기존 강관말뚝 설계 지지력식이 활용되고 있다. 그러나 이들 설계식 간 지지력 예측 결과가 상이할 뿐만 아니라 일반적으로 가장 보수적인 결과를 채택하게 된다. 이러한 말뚝 지지력 평가방법은 설계의 신뢰성 및 경제성을 낮추게 된다. 본 논문은 수직하중을 받는 이중 강관 내 콘크리트 채움된 신형식 합성단면(DSCT) 말뚝의 역학적 거동을 수치해석적으로 조사하고, 여러 DSCT 말뚝 조건변화에 따른 연직지지력을 분석하였다. DSCT 말뚝 및 인접지반에 대한 축대칭 유한요소모델을 생성하였고, 이를 활용해 근입깊이, 말뚝 선단 채움재 강성, 말뚝 선단 채움재 높이, 기반암층 종류 변화에 따른 영향을 분석하였다. 또한 해석결과를 말뚝 설계 실무에서 주로 사용하는 선단 지지력 평가식과 비교하여 합성말뚝에 대한 기존 강관말뚝 지지력 산정식의 활용 가능성을 검토하였다.

보간법과 개선된 JPEG 예측을 통한 스테가노그래픽 기법 연구 (Steganographic Method Based on Interpolation and Improved JPEG Prediction)

  • 전병현;이길제;정기현;유기영
    • 한국군사과학기술학회지
    • /
    • 제16권2호
    • /
    • pp.185-190
    • /
    • 2013
  • The previous steganographic methods by using the interpolation were difficult to estimate the distortion because the size of cover image is extended by interpolation algorithms. In this paper, to solve the problems of previous methods proposed the improved steganographic method based on the pixel replacement algorithms. In our method, we cannot extend a cover image, but also can estimate exactly the distortion of the stego-images. In the experimental results, the estimated distortion and embedding capacity of stego-image are shown on three pixel replacement methods.

행렬 분해와 공격자 구조를 이용한 비밀이미지 공유 기법 (Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure)

  • 현승일;신상호;유기영
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.953-960
    • /
    • 2014
  • In Shamir's (t,n)-threshold based secret image sharing schemes, there exists a problem that the secret image can be reconstructed when an arbitrary attacker becomes aware of t secret image pieces, or t participants are malicious collusion. It is because that utilizes linear combination polynomial arithmetic operation. In order to overcome the problem, we propose a secret image sharing scheme using matrix decomposition and adversary structure. In the proposed scheme, there is no reconstruction of the secret image even when an arbitrary attacker become aware of t secret image pieces. Also, we utilize a simple matrix decomposition operation in order to improve the security of the secret image. In experiments, we show that performances of embedding capacity and image distortion ratio of the proposed scheme are superior to previous schemes.

A Reversible Audio Watermarking Scheme

  • Kim, Hyoung-Joong;Sachnev, Vasiliy;Kim, Ki-Seob
    • 정보통신설비학회논문지
    • /
    • 제5권1호
    • /
    • pp.37-42
    • /
    • 2006
  • A reversible audio watermarking algorithm is presented in this paper. This algorithm transforms the audio signal with the integer wavelet transform first in order to enhance the correlation between neighbor audio samples. Audio signal has low correlation between neighbor samples, which makes it difficult to apply difference expansion scheme. Second, a novel difference expansion scheme is used to embed more data by reducing the size of location map. Therefore, the difference expansion scheme used in this paper theoretically secures high embedding capacity under low perceptual distortion. Experiments show that this scheme can hide large number of information bits and keeps high perceptual quality.

  • PDF

A Nash Bargaining Solution of Electric Power Transactions Embedding Transmission Pricing in the Competitive Electricity Market

  • Kang, Dong-Joo;Kim, Balho H.;Chung, Koo-Hyung;Moon, Young-Hwan
    • KIEE International Transactions on Power Engineering
    • /
    • 제3A권1호
    • /
    • pp.42-46
    • /
    • 2003
  • The economic operation of a utility in a deregulated environment brings about optimization problems different from those in vertically integrated one[1]. While each utility operates its own generation capacity to maximize profit, the market operator (or system operator) manages and allocates all the system resources and facilities to achieve the maximum social welfare. This paper presents a sequential application of non-cooperative and cooperative game theories in analyzing the entire power transaction process.

송전요금을 고려한 게임이론적 전력거래분석 (A Cooperative Game Embedding Transmission Pricing in the Competitive Electricity Market)

  • 강동주;김발호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 A
    • /
    • pp.3-5
    • /
    • 2000
  • It has been the paradigm of game theory that more than two utilities compete and determine the price and amount of dispatch. In order for this theory to be available on real power system, it is necessary to consider the transmission costs as well as the generation costs. In addition Independent System Operator(ISO) should be able to mitigate the congestion, recover the transmission costs and provide information for long-term capacity investment by devising reasonable pricing schemes for the transmission services. Generators also have to take the transmission costs into account when building the bidding strategies. This paper proposes an approach to analyzing the profit maximizing game considering the transmission cost in a competitive electricity market.

  • PDF