• Title/Summary/Keyword: 은닉통신

Search Result 306, Processing Time 0.025 seconds

Reducing the Number of Hidden Nodes in MLP using the Vertex of Hidden Layer's Hypercube (은닉층 다차원공간의 Vertex를 이용한 MLP의 은닉 노드 축소방법)

  • 곽영태;이영직;권오석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1775-1784
    • /
    • 1999
  • This paper proposes a method of removing unnecessary hidden nodes by a new cost function that evaluates the variance and the mean of hidden node outputs during training. The proposed cost function makes necessary hidden nodes be activated and unnecessary hidden nodes be constants. We can remove the constant hidden nodes without performance degradation. Using the CEDAR handwritten digit recognition, we have shown that the proposed method can remove the number of hidden nodes up to 37.2%, with higher recognition rate and shorter learning time.

  • PDF

Research for Predicting Image Degradation followed by Modification of The Compressed Image's Coefficient (영상의 압축영역 계수 변경에 따른 질저하 예측의 연구)

  • Choi, Yong-Soo;Kim, Hyoung-Joong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.121-124
    • /
    • 2008
  • 최근에는 인터넷 환경에서 여러 형태의 압축된 파일이 이용되고 있으며 통신량의 감소, 통신시간의 절약 등 많은 장점을 가지고 있다. 그래서 많은 압축 기법 그리고 압축 기법에서 동작하는 영상처리기법들이 개발되어 지고 있다. 정보 은닉에서도 JPEG과 같은 압축파일에서 동작하는 알고리즘이 개발되어 지고 있다. 이와 같은 알고리즘들은 주파수변환이나 양자화의 기본적인 룰을 이해하고 있으며 그들의 프로그램에 그러한 룰들을 적용하여 개발에 이용하고 있다. 하지만 정보은닉 알고리즘에 있어, 많은 경우에 데이터 변경 후에 정보은닉의 영향을 평가하였다. 우리는 이 논문에서 정보은닉 처리과정에서 생겨나는 데이터 변경의 영향을 예측하기 위한 방법을 제안하였다. JPEG과 같은 압축 환경에서 정보 은닉 시 적용 가능한 몇 가지 중요한 사실을 여러 경우의 실험을 통하여 얻어냈다. 이러한 사실들은 현재 존재하는(Matrix Encoding, Modified Matrix Encoding 등을 포함한 F3, F4 and F5 알고리즘 등 [1],[5],[6]) 정보은닉 프로그램의 성능향상, 알고리즘 처리시간의 감소와 같은 긍정적인 효과를 거둘 수 있다.

  • PDF

An ID-based Blind Signature Scheme using the Gap Diffie-Hellman Group in Wireless Environments (무선환경에 적합한 GaP Diffie-Hellman 그룹을 사용한 ID 기반 은닉서명 방식)

  • 김현주;김수진;원동호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.720-728
    • /
    • 2003
  • Blind signature is such a signature scheme that conceals the contents of signature itself and who is the user of the signature make user's anonymity possible. For this reason, they are used in security services such as electronic cashes and electronic votes in which the behavior of actor should not be exposed. In this paper we propose an ID-based blind signature scheme from Gap Diffie-Hellman group. Its security is based on the hardness of Computational Diffie-Hellman Problem. Proposed scheme efficiently improve against existing blind signature scheme by using two-pass protocol between two users and by reducing computation process. Therefore it can be used efficiently in wireless PKI environment.

Invisible Data Hiding for Few-Color Image (다치 컬러 영상을 위한 비가시적 데이터 은닉)

  • 박영란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.69-72
    • /
    • 2003
  • 스테가노그라피는 송/수신자간에 비밀 통신을 할 때 제3자가 기밀 정보를 인식하지 못하도록 디지털화된 각종 미디어에 몰래 숨겨서 통신을 한 수 있는 데이터 은닉의 한 분야이다. 특히 흑/백으로만 구성된 이진 영상 및 색상의 표현이 제한된 다치 영상 등에서 비시각적으로 기밀정보를 숨긴다는 것이 일반 컬러 영상에 비해 많은 어려움을 수반한다. 본 제안방식은 시각적인 영향을 작게 주는 패턴에만 기밀 데이터를 삽입하는 방식으로 기밀 데이터를 은닉시킨 후에도 화질의 열화가 거의 발생하지 않아 시각적으로 인지하기 어렵도록 개선한 방식이다.

  • PDF

A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment (SNS 메신저 환경에서의 썸네일 이미지 기반의 새로운 스테가노그래피 통신 기법 연구)

  • Yuk, Simun;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Service platform for sending and receiving multimedia files, which is the main medium of steganography. In this study, we proposed two noble steganography communication techniques that guarantee the complete reception rate through the use of thumbnail images in the SNS messenger environment. In addition, the feasibility was verified through implementation and testing of the proposed techniques in a real environment using KakaoTalk, a representative SNS messenger in south korea. By proposing new steganography methods in this study, we re-evaluate the risk of the steganography methods and promoted follow-up studies on the corresponding defense techniques.

The Error concealment using Scalability in H.236v2 (H.263v2에서 계층부호화를 이용한 오류 은닉)

  • 한승균;장승기;서덕영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.7A
    • /
    • pp.1063-1075
    • /
    • 2000
  • This paper proposes an adaptive error concealment technique for compressed video. Since redundancy is extracted out during compression process, compressed video is vulnerable to errors which occur during transmission of video over error prone networks such as wireless channels and Internet. Error concealment is a process of reconstructing video out of damaged video bit stream. We proved that scalable encoding is very useful for error concealment. Analysis of experiments shows that some part of image is better concealed by using base layer information and other part of image is better concealed by using previous frame information. We developed a technique which enables to decide which methodology is more effective, adaptively, based on motion vectors and regional spatial activity. We used H.263v2 for scalable encoding, but, our approach could be applied to all DCT based video codec.

  • PDF

Boundary Match and Block Reliability Based Error Concealment Algorithm (블록 신뢰도와 경계면 매칭 기반의 잡음 은닉 알고리즘)

  • Kim, Do Hyun;Choi, Kyoung Ho
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A packet loss in wireless environments causes a severe degradation of video quality in video communications. In this paper, a novel video error concealment algorithm is presented by combining boundary errors and a block reliability measure. The block reliability measure decides the reliability of a block by checking residual errors of a block. In the proposed approach, a motion vector of a missing unreliable block in an inter coded frame is obtained initially based on the motion vector of the same block in the reference frame. Furthermore, if the block in the reference frame is unreliable according to the reliability measure, a new motion vector is decided based on block boundary errors around the initial motion vector. According to our simulations, the proposed approach shows promising results for error concealment in error-prone wireless environments.

Hybrid Error Concealment Algorithm for Intra-Frame in H.264 (H.264의 인트라 프레임을 위한 하이브리드 에러 은닉 알고리즘)

  • Yim Chang-Hoon;Kim Won-Jung;Lim Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8C
    • /
    • pp.777-785
    • /
    • 2006
  • H.264 is the prominent video coding standard in various applications such as real-time video streaming and digital multimedia broadcasting, since it provides enhanced compression performance, error resilience tools, and network adaptation. Since compressed video stream is vulnerable to packet loss, error resilience and error concealment(EC) tools are essential for the transmission of video over the Internet. In this paper, we first propose a simple temporal EC method that improves the EC performance for intra-frame in H.264 when the amount of motion is relatively small. Then we propose a new hybrid EC method for intra-frame in H.264, which combines the spatial EC and temporal EC adaptively. The simulations are performed in packet-lossy environments, and the proposed hybrid EC method shows about 0.5-4dB PSNR improvement compared to the conventional spatial EC method that is used for intra-frame in H.264.

Steganography Algorithm Using Stochastic Duration Diffusion (확률적 확산을 이용한 문서은닉 알고리즘)

  • Rhee, Keun-Moo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.530-533
    • /
    • 2013
  • 본 연구에서는 음악연주 정보를 기록하는 SMF (Standard MIDI File) 대한 정보 하이딩을 스테가노그래피의 관점에서 재고 해 보았다. 그 결과 그 중 SMF 데이터 스트림에 메시지를 은닉 하는 방법이 주로 이용되어 왔다. 연주 정보 통제 방법은 포함할 수 정보량의 증대가 어렵다는 문제가 있었다. 이 보고서는 기존 방식과는 다른 성분인 듀레이션의 확률적 확산을 이용해 정보를 은닉하는 SMF 스테가노그래피를 제안한다.

Multi-Hypothesis Error Concealment Algorithm for H.26L Video (H.26L을 위한 다차원 에러 은닉 기법)

  • 박영오;김창수;이상욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1130-1139
    • /
    • 2003
  • In this work, we propose a multi-hypothesis error concealment algorithm, which replaces a lost block with a weighted superposition of more than two reference blocks in previous frames. Three methods are developed to find the set of reference blocks and determine the weighting coefficients. These methods are implemented based on H.26L standard, and their performances are evaluated. It is shown that the proposed multi-hypothesis algorithm provides up to 1.5㏈ better PSNR performance than the conventional single-hypothesis concealment algorithm.