• Title/Summary/Keyword: 순열의 수

Search Result 116, Processing Time 0.033 seconds

Image Steganography Using Random Permutation and Image Difference (임의 순열과 영상차를 이용한 영상 스테가노그래피)

  • Kim, Chanran;Lee, Sang Hwa;Park, Hanhoon;Park, Jong-Il
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.06a
    • /
    • pp.231-234
    • /
    • 2016
  • 본 논문에서는 전송하고자 하는 원영상 대신에 전혀 다른 영상을 전송하여 원영상 정보를 보호하는 스테가노그래피(steganography) 기법을 제안한다. 전송할 영상의 자연스러움을 잃어버리지 않으면서 원영상을 복구할 수 있는 차영상 정보를 LSB(Least Significant Bit)에 담고, 픽셀간의 위치 관계를 무작위로 섞어 줌으로써, 원영상을 보호하는 기법을 제안한다. 본 논문에서는 우선 원영상과 전송할 영상 (cover image)의 차영상을 생성하고, 각 픽셀의 차이값을 큰 범위로 양자화하여 차영상의 데이터 크기를 줄인다. 그리고, 각 픽셀의 차이값을 전송할 영상의 4 픽셀에 걸쳐서 하위 2bit 에 나누어 담는다. 8bit 영상에서 하위 2 bit 를 다루기 때문에, 각 채널 밝기값의 최대 차이값은 3 으로 설정되어 자연스럽게 영상을 생성할 수 있다. 끝으로 신호의 보호를 위하여 차영상의 픽셀과 전송할 영상의 픽셀간의 대응위치를 무작위 순열로 변환하여 외부에서 쉽게 복원할 수 없도록 한다. 이러한 스테가노그래피 제안 기법을 통하여 원영상 대신에 커버 영상을 전송함으로써, 자연스러운 정보전송이 가능하며, 외부의 감시와 복원에 안전한 정보보호 기능이 강화될 수 있다. 여러 영상에 대한 실험을 통한 제안 기법에 의하면, 전송되는 커버 영상이 자연스럽기 때문에 외부에서 정보가 숨겨진 사실을 느끼지 못하며, 송수신 장치에 내장된 무작위 순열을 통하여 외부에서는 원영상 정보를 복구하는 것도 매우 어렵게 되어 있음을 확인하였다. 본 제안 기법은 군사통신이나 중요한 정보를 다루는 기관에서의 정보 전달 및 정보보호 시스템에서 사용될 수 있다.

  • PDF

Fast Combinatorial Programs Generating Total Data (전수데이터를 생성하는 빠른 콤비나토리얼 프로그램)

  • Jang, Jae-Soo;Won, Shin-Jae;Cheon, Hong-Sik;Suh, Chang-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1451-1458
    • /
    • 2013
  • This paper deals with the programs and algorithms that generate the full data set that satisfy the basic combinatorial requirement of combination, permutation, partial permutation or shortly r-permutation, which are used in the application of the total data testing or the simulation input. We search the programs able to meet the rules which is permutations and combinations, r-permutations, select the fastest program by field. With further study, we developed a new program reducing the time required to processing. Our research performs the following pre-study. Firstly, hundreds of algorithms and programs in the internet are collected and corrected to be executable. Secondly, we measure running time for all completed programs and select a few fast ones. Thirdly, the fast programs are analyzed in depth and its pseudo-code programs are provided. We succeeded in developing two programs that run faster. Firstly, the combination program can save the running time by removing recursive function and the r-permutation program become faster by combining the best combination program and the best permutation program. According to our performance test, the former and later program enhance the running speed by 22% to 34% and 62% to 226% respectively compared with the fastest collected program. The programs suggested in this study could apply to a particular cases easily based on Pseudo-code., Predicts the execution time spent on data processing, determine the validity of the processing, and also generates total data with minimum access programming.

On the Trade-off Between Composition and XOR of Random Permutations (랜덤 순열의 직렬 합성과 병렬 합성 사이의 트래이드오프에 관한 연구)

  • Lee Eon-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.286-292
    • /
    • 2006
  • Both composition and XOR are operations widely used to enhance security of cryptographic schemes. The more number of random permutations we compose (resp. XOR), the more secure random permutation (resp. random function) we get. Combining the two methods, we consider a generalized form of random function: $SUM^s - CMP^c = ({\pi}_{sc} ... {\pi}_{(s-1)c+1}){\oplus}...{\oplus}({\pi}_c...{\pi}_1)$ where ${\pi}_1...{\pi}_{sc}$ are random permutations. Given a fixed number of random permutations, there seems to be a trade-off between composition and XOR for security of $SUM^s - CMP^c$. We analyze this trade-off based on some upper bound of insecurity of $SUM^s - CMP^c$, and investigate what the optimal number of each operation is, in order to lower the upper bound.

On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack (비트 순열 기반 블록암호의 비선형 불변 공격 저항성 연구)

  • Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.325-336
    • /
    • 2020
  • Nonlinear Invariant Attack is an attack that should be considered when constructing lightweight block ciphers with relatively simple key schedule. A shortcut to prove a block cipher's resistance against nonlinear invariant attack is checking the smallest dimension of linear layer-invariant linear subspace which contains all known differences between round keys is equal to the block size. In this paper, we presents the following results. We identify the structure and number of optimal bit-permutations which require only one known difference between round keys for a designer to show that the corresponding block cipher is resistant against nonlinear invariant attack. Moreover, we show that PRESENT-like block ciphers need at least two known differences between round keys by checking all PRESENT-like bit-permutations. Additionally, we verify that the variants of PRESENT-like bit-permutations requiring the only two known differences between round keys do not conflict with the resistance against differential attack by comparing the best differential trails. Finally, through the distribution of the invariant factors of all bit-permutations that maintain BOGI logic with GIFT S-box, GIFT-variant block ciphers require at least 8 known differences between round keys for the resistance.

Travel mode classification method based on travel track information

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.133-142
    • /
    • 2021
  • Travel pattern recognition is widely used in many aspects such as user trajectory query, user behavior prediction, interest recommendation based on user location, user privacy protection and municipal transportation planning. Because the current recognition accuracy cannot meet the application requirements, the study of travel pattern recognition is the focus of trajectory data research. With the popularization of GPS navigation technology and intelligent mobile devices, a large amount of user mobile data information can be obtained from it, and many meaningful researches can be carried out based on this information. In the current travel pattern research method, the feature extraction of trajectory is limited to the basic attributes of trajectory (speed, angle, acceleration, etc.). In this paper, permutation entropy was used as an eigenvalue of trajectory to participate in the research of trajectory classification, and also used as an attribute to measure the complexity of time series. Velocity permutation entropy and angle permutation entropy were used as characteristics of trajectory to participate in the classification of travel patterns, and the accuracy of attribute classification based on permutation entropy used in this paper reached 81.47%.

교정적 치료

  • Yang, Won-Sik
    • The Journal of the Korean dental association
    • /
    • v.20 no.9 s.160
    • /
    • pp.753-758
    • /
    • 1982
  • 선천이상 중에서도 순열과 구개열은 특상한 성질의 것으로서 안모의 변형, 발음장애, 신체타부와의 관계기형, 이비인후과질환을 병발하기 쉽고, 호흡기, 소화기 질환에 이환되기 쉬으며 환자는 정신적, 사회적으로도 매우 불리한 위치에 놓여 있는 신체장애자로, Fogh-Anderson은 순열과 구개열은 열성반성유전(recessive sexlinked heredity)을 한다고 보고했다. 그러나 구개열은 유전적추적이 불가능하기 때문에 그 발생원인으로 물리적원인을 우선적으로 들고있다. 발생기전은 태생 8~12조경의 제2차구개형성기에 어떤 이유로 양측의 구개돌기(palatine process)와 비중격이 분리되있는 채로 있든가, 접근해서도 유합되지 않고 있든가의 조해요인으로 태아의 모태내에 있어서의 자세, 특히 흉부에 의한 하악골압박에 의해 발생하는 소악증(micromandible), 설하수(glossoptosis)를 동반하는 Pierr Robin syndrome, 태생 8~10조경까지의 혀의 만기정유, 지, 제대의 원시구강내로의 미입등을 들수있다. 순열 및 구개열환자의 치료에 있어서 종래에는 전과정이 외과의사에게만 맡겨졌었으나, 구순, 비부의 추형등의 문제, 특징적으로 발생되는 하악의 열성장, 이별궁이 왜형, 발음장애등의 문제점해결을 위하여 필연적으로 이에 관계있는 명기다른 전문분야의 전문의가 시술에 임하게되는 multidiscipline approach로서 종합진단, 장기치료계획의 입안, 전문적 의견의 교환을 통해서 치료시기, 치료순서의 결정으로 성공적인 순열및 구개열의 치료목표를 달성하리라고 생각한다.

  • PDF

Pre-service Teachers' Noticing in Peer Evaluation of Mathematical Problem Posing: Focusing on permutation and combination (동료의 문제 만들기 과제를 평가하는 과정에서 나타난 예비교사의 주목하기: 순열과 조합을 중심으로)

  • Shin, Dongjo
    • Journal of the Korean School Mathematics Society
    • /
    • v.24 no.1
    • /
    • pp.19-38
    • /
    • 2021
  • The purpose of this study is to examine pre-service teachers' noticing when evaluating peers' mathematical problem posing tasks. To this end, 46 secondary pre-service teachers were asked to create real-world problems related to permutation and combination and randomly assigned to evaluate peers' problems. As a result, the pre-service teachers were most likely to notice the difficulty of their peers' mathematics problems. In particular, the pre-service teachers tended to notice particular conditions in order to increase the difficulty of a problem. In addition, the pre-service teachers noticed the clarity of a question and its solution, novelty of the problem, the natural connection between real-world contexts and mathematical concepts, and the convergence between mathematical concepts.

Cryptanalysis and Improvement of a New Ultralightweight RFID Authentication Protocol with Permutation (순열을 사용한 새로운 초경량 RFID 인증 프로토콜에 대한 보안 분석 및 개선)

  • Jeon, Il-Soo;Yoon, Eun-Jun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.1-9
    • /
    • 2012
  • Low-cost RFID tags are used in many applications. However, since it has very limited power of computation and storage, it's not easy to make a RFID mutual authentication protocol which can resist from the various security attacks. Quite recently, Tian et al. proposed a new ultralightweight authentication protocol (RAPP) for low-cost RFID tags using the low computation cost operations; XOR, rotation, and permutation operations, which is able to resist from the various security attacks. In this paper, we show that RAPP is vulnerable to the de-synchronization attack and present an improved RAPP which overcomes the vulnerability of RAPP.

Permutation-Based Test with Small Samples for Detecting Differentially Expressed Genes (극소수 샘플에서 유의발현 유전자 탐색에 사용되는 순열에 근거한 검정법)

  • Lee, Ju-Hyoung;Song, Hae-Hiang
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.5
    • /
    • pp.1059-1072
    • /
    • 2009
  • In the analysis of microarray data with a small number of arrays, the most important task is the detection of differentially expressed genes by a significance test. For this purpose, one needs to construct a null distribution based on a large number of genes and one of the best way for constructing the null distribution for a small number of arrays is by means of permutation methods. In this paper we propose simple test statistics and permutation methods that are appropriate in constructing the null distribution. In a simulation study, we compare the null distributions generated by the proposed test statistics and permutation methods with the previous ones. With an example microarray data, differentially expressed genes are determined by applying these methods.