• Title/Summary/Keyword: 메시지제시방법

Search Result 392, Processing Time 0.028 seconds

A Performance Analysis of Efficient Wormhole Routing for Multicast Communication in Torus Networks (토러스에서 다중전송을 위한 효율적 웜홀 라우팅의 성능 분석)

  • 김소은;김창수;윤성대
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1998.10a
    • /
    • pp.145-149
    • /
    • 1998
  • 본 논문에서는 동일한 목적지 노드들의 집합을 가지는 다중 멀티캐스트(multiple multicast)가 동시에 일어날 경우 노드간의 경쟁을 최소화하고 메시지 전송 경로를 단축시 키기 위한 알고리즘을 제시하고, 2차원 네트워크인 토러스 구조에서 제시된 본 논문의 알고 리즘을 기존 알고리즘과 비교한다. 기존 논문에서는 멀티캐스트 메시지 패싱 시스템 (multicast message-passing system)에서 여러 개의 소스노드로부터 목적지 노드가 중첩 되는 다중 멀티캐스트를 구현하기 위한 방법으로 2차원 메쉬 구조의 특징을 이용한 SCHL(Source-Centered Hierarchical Leader) 기법[7,8]이 제안되었다. 본 논문에서는 이 를 토러스 구조에 적합하게 변형하여, 기존의 메쉬 구조에 적용된 SCHL 기법[7]과 성능을 분석함으로써 제안된 알고리즘이 메쉬 구조보다 토로스 구조에서 구현될 때, 더 향상된 성 능을 가진다는 것을 보인다. 본 논문에서의 메시지 전송기법은 결정적 웜홀 라우팅 방식을 이용한다.

  • PDF

Selective Shuffling for Hiding Hangul Messages in Steganography (스테가노그래피에서 한글 메시지 은닉을 위한 선택적 셔플링)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.3
    • /
    • pp.211-216
    • /
    • 2022
  • Steganography technology protects the existence of hidden information by embedding a secret message in a specific location on the cover medium. Security and resistance are strengthened by applying various hybrid methods based on encryption and steganography. In particular, techniques to increase chaos and randomness are needed to improve security. In fact, the case where the shuffling method is applied based on the discrete cosine transform(DCT) and the least significant bit(LSB) is an area that needs to be studied. I propose a new approach to hide the bit information of Hangul messages by integrating the selective shuffling method that can add the complexity of message hiding and applying the spatial domain technique to steganography. Inverse shuffling is applied when extracting messages. In this paper, the Hangul message to be inserted is decomposed into the choseong, jungseong and jongseong. It improves security and chaos by applying a selective shuffling process based on the corresponding information. The correlation coefficient and PSNR were used to confirm the performance of the proposed method. It was confirmed that the PSNR value of the proposed method was appropriate when compared with the reference value.

A Message Schedulability Analysis using an Improved EDF Scheduling for Distributed Real-Time Systems (분산 실시간 시스템에서 개선된 EDF 정책을 사용한 메시지 스케줄가능성 분석)

  • Lee, Eun-Mi;Heu, Shin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.9
    • /
    • pp.520-529
    • /
    • 2002
  • This paper presents an approach for scheduling network messages with real-time dynamic algorithms. We present the method that calculates an intermediate relative deadline of the message based on the EDF(Earliest Deadline First) scheduling policy. We adjust the slack of message by using this intermediate relative deadline to allocate a priority of message. The priority of the message can be determined accurately by using the slack that calculates in our approach, which increases the schedulability efficiency of the message. As a result, we reduce the worst-case response time and improve the guarantee ratio of real-time messages. Also, we describe the analysis method to check the schedulability on message sets, and show the efficiency of our approach by comparing the results of the DM(Deadline Monotonic) approach and the existing EDF approach with that of the improved EDF in our approach through the simulation.

An Approach to Conceal Hangul Secret Message using Modified Pixel Value Decomposition (수정된 화소 값 분해를 사용하여 한글 비밀 메시지를 숨기는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.269-274
    • /
    • 2021
  • In secret communication, steganography is the sending and receiving of secret messages without being recognized by a third party. In the spatial domain method bitwise information is inserted into the virtual bit plane of the decomposed pixel values of the image. That is, the bitwise secret message is sequentially inserted into the least significant bit(LSB) of the image, which is a cover medium. In terms of application, the LSB is simple, but has a drawback that can be easily detected by a third party. If the upper bit plane is used to increase security, the image quality may deteriorate. In this paper, I present a method for concealing Hangul secret messages in image steganography based on the lo-th bit plane and the decomposition of modified pixel intensity values. After decomposing the Hangeul message to be hidden into choseong, jungseong and jongseong, then a shuffling process is applied to increase confidentiality and robustness. PSNR was used to confirm the efficiency of the proposed method. It was confirmed that the proposed technique has a smaller effect in terms of image quality than the method applying BCD and Fibonacci when inserting a secret message in the upper bit plane. When compared with the reference value, it was confirmed that the PSNR value of the proposed method was appropriate.

Design and Implementation of CORBA based middleware for Communication Networking System (CORBA 기반의 통신시스템용 미들웨어 설계와 구현)

  • 조인성;장종현;한치문
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.226-228
    • /
    • 2002
  • 본 논문에서는 효율적인 통신 시스템용 미들웨어 개발을 위한 3가지 방법을 나타낸다 첫째, 동일 호스트상에서 메시지 전달 오버헤드를 최적화하기 위해 공유 메모리 기반의 연동 프로토콜을 제시한다. 둘째, 미들웨어 플랫폼의 신뢰성을 향상시키기 위해, 구현 객체 데이터베이스를 이용한 네이밍 서비스 서버 구현 방법을 제시한다. 셋째, 시스템이 운용중인 상태에서 새로운 서비스 모듈의 추가나 기존 모듈의 기능 변경이 필요한 경우 서비스를 중단하지 않고 컴퍼넌트를 실행 중에 동적으로 재구성하는 방안을 제시한다. 이를 통해 통신 시스템용 미들웨어의 성능이 향상됨을 나타냈다.

  • PDF

The Improved-Scheme of Audio Steganography using LSB Techniques (LSB 기법을 이용하는 개선된 오디오 스테가노그래피)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.37-42
    • /
    • 2012
  • Audio steganography is quite similar to the procedure of modifying the least significant bit(LSB) of image media files. The most widely used technique today is hiding of secret messages into a digitized audio signal. In this paper, I propose a new method for hiding messages from attackers, high data inserting rate is achieved. In other words, based on the LSB hiding method and digitized to change the bit position of a secret message, an encrypted stego medium sent to the destination in safe way.

A Study and improved Approach of Text Steganography (텍스트 스테가노그래프의 개선된 접근과 연구)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.51-56
    • /
    • 2014
  • In the digital world of the internet, steganography is introduced to hide the existence of the secret communication by concealing a secret message inside another unsuspicious cover medium. The third parties are unaware that a stego medium is being communicated. There exists a large variety of steganography methods based on texts. In this paper, analyzed the advantages and significant disadvantages of each existing text steganography method and how new approach could be proposed as a solution. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by encryption rearrangement key.

A Study on Non-participating TDL Message Analyzer (비가입형 TDL 메시지 분석기에 관한 연구)

  • Hwang, Byoung-Han;Lee, Jung-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.290-294
    • /
    • 2018
  • Modern warfare exhibit a NCW (Network Centric Warfare) aspect through quick situation awareness and Command and Control. And Tactical messages operate on various tactical data links (TDLs). For monitoring TDL messages processed by data link processor(DLP), message analysers are generally developed as a component during system development. In addition, in order to forward TDL messages processed by DLP to the message anayzer, the interface messages between DLP and message analysers should be defined interface control document(ICD). We propose the methods using UDP or TCP packets provided by TDL layers that are delivered to DLP without communicating directly with DLP. Depending on TDL message standards and Interface Control Documents(ICDs), we design the message analyzer which communicates with data link processor using internal messages. Using known header field information from the TDL application standard such as JREAP-C, we can quickly filter candidate packets against collected packets and use the full data size information contained in the headers to verify the completed message. Because the methods proposed in this paper do not communicate directly with DLP, the methods proposed in this paper are enable to analyze the TDL application messages such as JREAP-C or Link-K without constraints in existing methods that should be reflected in the system configuration and ICD.

A Study on the Mobile IP Routing Optimization through the MRT Agent (MRT 에이전트를 통한 Mobile IP 라우팅 최적화에 관한 연구)

  • 김보균;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.728-735
    • /
    • 2003
  • It is a mainly issue that provide mobility smoothly in Mobile IP networks. The IP mobility support being standardized in the IETF utilized tunneling of IP packets from a home agent to foreign agent and utilized reverse tunneling of IP packets from foreign agent to home agent. In this paper, We propose that solve the triangular routing problem in IP mobility and that lessen the messages about IETF routing optimization. Through the Mobile Routing Table on the edge router, agent process the message instead of a end node when handoff occur and that lessen the routing path length by sending directly from FA to to Correspond Node's router. This action lessen the message occurrence frequency and the packet drop. We compare the standard IP, Routing Optimization of Mobile IP, Wu's method and the proposed algorithm. Finally, the simulation results are presented.

Order Management System Based on Advanced Distributed Objects (진보된 분산객체 기반의 주문 처리 시스템)

  • Song, Min-Chul;Park, Jong-Koo;Ahn, Hyun-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.863-866
    • /
    • 2003
  • 최근 많은 개발자들이 웹 서비스를 기업 내 어플리케이션 통합에서부터 기업간 데이터 전송에 이르기까지 모든 종류의 문제를 해결할 수 있는 솔루션으로 전망한다. 본 논문에서는 이러한 웹 서비스를 구현할 수 있는 기반을 제공하는 SOAP 프로토콜을 기반으로 하여 좀 더 효율적인 메시지 처리 방법을 통해 관련 전자상거래 시스템에 응용하기 위한 방안을 모색한다. 아울러 분산된 이기종 시스템간에 객체들 사이의 메시지 전송을 위하여 XML 메시지를 생성하고, SOAP Tool Kit 즉, AXIS를 통해 좀 더 효율적인 정보 공유 방안을 제시한다. 그리고 관련 사례 연구로 분산된 상호 독립적인 어플리케이션들의 객체들 간의 원격 메시지 호출 과정을 테스트하는 주문 처리 시스템을 설계하고 구현한다.

  • PDF