• Title/Summary/Keyword: hiding effects

Search Result 19, Processing Time 0.02 seconds

Relationship between Team Cohesion and Knowledge Hiding : Moderating Effects of Ethical Leadership (팀 응집력이 지식은폐에 미치는 영향 : 윤리적 리더십의 조절효과)

  • Kang, Sora;Han, Su Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.31-48
    • /
    • 2021
  • Knowledge is a key resource for organizations to gain and maintain competitive advantage. Therefore, it is important for organizations to motivate employees to share knowledge with each other in order to achieve optimal performance of knowledge resources. Despite the efforts of organizations to share knowledge, knowledge hiding is still prevalent among employees. In this paper, we want to analyze the factors that may cause more general and pervasive knowledge-hiding behavior in organizations through empirical analysis. The results of this study show that, first, the relationship between team cohesion and knowledge hiding has been verified differently depending on the sub-behavior of knowledge hiding : playing dumb, evasive hiding, and rationalized hiding. Team cohesion has been shown to significantly reduce the playing dumb and evasive hiding. On the other hand, it was shown that team cohesion did not have a significant causal relationship with rationalized hiding. Second, the moderating effect of ethical leadership has been statistically significant in terms of team cohesion and relationships with playing dumb and evasive hiding. In other words, the higher the ethical leadership, the stronger the negative relationship between team cohesion and knowledge hiding. Finally, the theoretical and practical implications of this paper and future research directions are discussed.

Data Hiding Based on EMD for Ordered Block Truncation Coding (ODBTC를 위한 EMD 기법에 기반한 데이터 은닉)

  • Kim, Cheon-Shik;Jo, Min-Ho;Hong, You-Sik;Park, Hyun-Sook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.27-34
    • /
    • 2009
  • Block truncation coding (BTC) is a simple and efficient image compression technique. However, it yields images of unacceptable quality and significant blocking effects are seen when the block size is increasing. Ordered dither block truncation coding (ODBTC) was proposed to solve above problem maintaining the same compression capability. In this paper, we propose a data hiding method which can be applied to halftone images. EMD was developed by Zhang and Wang [6] for data hiding in the grayscale image. Therefore, EMD is not proper for bitmap images. In this paper, we show that EMD can be used to apply bitmap halftone image. In our experiments, we prove that our method is efficient in a halftone image.

An Extended Frequent Pattern Tree for Hiding Sensitive Frequent Itemsets (민감한 빈발 항목집합 숨기기 위한 확장 빈발 패턴 트리)

  • Lee, Dan-Young;An, Hyoung-Geun;Koh, Jae-Jin
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.169-178
    • /
    • 2011
  • Recently, data sharing between enterprises or organizations is required matter for task cooperation. In this process, when the enterprise opens its database to the affiliates, it can be occurred to problem leaked sensitive information. To resolve this problem it is needed to hide sensitive information from the database. Previous research hiding sensitive information applied different heuristic algorithms to maintain quality of the database. But there have been few studies analyzing the effects on the items modified during the hiding process and trying to minimize the hided items. This paper suggests eFP-Tree(Extended Frequent Pattern Tree) based FP-Tree(Frequent Pattern Tree) to hide sensitive frequent itemsets. Node formation of eFP-Tree uses border to minimize impacts of non sensitive frequent itemsets in hiding process, by organizing all transaction, sensitive and border information differently to before. As a result to apply eFP-Tree to the example transaction database, the lost items were less than 10%, proving it is more effective than the existing algorithm and maintain the quality of database to the optimal.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

Experimental study on the sediment sorting processes of the bed surface by geomorphic changes in the vegetated channels (실내실험에 의한 혼합사 식생하도의 지형변화와 하상토 분급 특성 연구)

  • Jang, Chang-Lae
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.1
    • /
    • pp.73-81
    • /
    • 2016
  • This study investigates the development of lower channels and sediment sorting processes in the vegetated channels with the mixed sediment. The sediment discharges fluctuate with time and decrease with vegetation density. The bed changes with irregular patterns, and the sediment particles in the vegetated zone at the surface of bed are fine. The dimensionless geometric mean decreases with vegetation density. The fine sediment particles are trapped by vegetation, and the bed between main steam and vegetated zone increases. Moreover, the particle sizes are distributed irregularly near the zone. The hiding functions decrease with dimensionless particle size. However, the functions increase with vegetation density, which is confirmed by decreasing sediment discharge with vegetation. The lower channel is stable and the migration decreases in the condition of $0.5tems/cm^2$. However, the migration of the lower channel in the condition of $0.7stems/cm^2$ increases due to the increased sinuosity and new generated channels in the sedimentated vegetation zone.

Overlapping Effects of Circular Shift Communication and Computation (원형 쉬프트 통신의 중첩 효과 분석)

  • Kim, Jung-Hwan;Rho, Jung-Kyu;Song, Ha-Yoon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.2
    • /
    • pp.197-206
    • /
    • 2002
  • Many researchers have been interested in the optimization of parallel programs through the latency hiding by overlapping the communication with the computation. We ana1yzed overlapping effects in the circular shift communication which is one of the collective communications being frequently used In many data parallel programs. We measured the time which can be possibly overlapped and the time which cannot be overlapped in over all circular shift communication period on an Ethernet switch-based clustered system. The result from each platform nay be used for the input of optimizing compilers. The previous performance models usually have two kinds of drawbacks one is only based on point-to-point communication, so it is not appropriate for analyzing the overall effects of collective communications. The other provides the performance of collective communication, but no overlapping effect. In this paper we extended the previous models and analyzed the experimental results of the extended model.

Impacts of Social Media (Facebook) on Human Communication and Relationships: A View on Behavioral Change and Social Unity

  • Joo, Tang-Mui;Teng, Chan-Eang
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.7 no.4
    • /
    • pp.27-50
    • /
    • 2017
  • The impact of social networking is varied from good to bad. Online activities have also been categorized into pros and cons of social networking, either as reported as hiding Internet activities among teenagers or killing loneliness among elderly. In terms of relationships, there have been argument over its closeness and quality of an online relationship in Internet settings. Looking at the contradiction in an innovative interaction between classic community communication and social media, there is an unknown scent of the future struggling and challenging both human communication and relationships in the presence of digital culture. This research uses Diffusion of Innovation to study the wide and continuous spread of digital culture in human communication; and, Media Dependency in learning and structuring the cognitive, affective and behavioral effects of social media on each person uses the media in different ways. This research will be using online survey to gain opinions from a social network site as an update of views and reflection of self-awareness to all levels of people. Social media like Facebook (FB) is perceived as a good tool of communication that it is able to bring closeness among the family members. The results show that social media like FB brings positive impact towards family members; it would help to build a better and harmonic society; and, relationships among family members and communication shall be improved and enhanced to the level of a united society.

The Effects of Customer Contact Service to the Mental Health among Korean Taxi Drivers (택시운전원의 고객응대 노동이 정신건강에 미치는 영향)

  • Lee, Bokim
    • Korean Journal of Occupational Health Nursing
    • /
    • v.25 no.2
    • /
    • pp.108-117
    • /
    • 2016
  • Purpose: The purpose of this study was to determine the relationship between customer contact service and mental health among Korean taxi drivers. Methods: This was a secondary analysis of data collected from the 2015 Korean Working Conditions Survey. The sample included 496 taxi drivers in South Korea. The effect of customer contact service on mental health was analyzed using logistic regression analysis. The independent variables were general characteristics, working conditions, and hazardous factors in interactive service. Results: The prevalence of poor mental health was 56.3%. Taxi drivers experienced emotional involvement (17.2%), hiding feeling (32.0%), and contact with angry clients (18.3%) in their job. During the first month of their work, 33.7% experienced verbal abuse and 12.3% threats/humiliating behaviors. In bivariate analysis, verbal abuse, threats/humiliating behaviors, and physical violence were associated with mental health of taxi drivers. Multiple logistic regression analysis revealed 'emotional involvement' and 'contact with angry clients' were significant predictors of mental health. Conclusion: The findings of this study may be useful in developing intervention programs to improve the mental health of taxi drivers in South Korea.

A Video Watermarking Method using Global Masking (전역 마스킹을 이용한 비디오 워터마킹 방법)

  • 문지영;호요성
    • Journal of Broadcast Engineering
    • /
    • v.8 no.3
    • /
    • pp.268-277
    • /
    • 2003
  • In this paper, we propose a new video watermarking method exploiting the human visual system (HVS) to find effective locations. in the video frames which make the watermark robust and imperceptible simultaneously. In particular, we propose a new HVS-optimized weighting map for hiding the watermark by considering HVS in three different aspects : frequency, spatial, and motion masking effects. The global masking map is modeled by combining the frequency masking, the spatial masking, and the motion masking. In this paper, we use a watermark which is generated by the bitwise exclusive-OR operation between a logo image and a random sequence. The amount of watermarks is weighted by a control parameter. Furthermore, we embed the watermark in the uncompressed video sequence for the general watermarking method available to various coding schemes. Simulation results show that the watermark is imperceptible and the proposed method is good for watermark capacity. It is also demonstrated that the proposed method is robust against various attacks, such as MPEG coding, MPEG re-encoding, and frame attacks.