• Title/Summary/Keyword: 컨텐츠 적용

Search Result 634, Processing Time 0.021 seconds

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Morphological Characteristics Optimizing Pocketability and Text Readability for Mobile Information Devices (모바일 정보기기의 소지용이성과 텍스트 가독성을 최적화하기 위한 형태적 특성)

  • Kim, Yeon-Ji;Lee, Woo-Hun
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.323-332
    • /
    • 2006
  • Information devices such as a cellular phone, smart phone, and PDA become smaller to such an extent that people put them into their pockets without any difficulties. This drastic miniaturization causes to deteriorate the readability of text-based contents. The morphological characteristics of size and proportion are supposed to have close relationships with the pocketability and text readability of mobile information devices. This research was aimed to investigate the optimal morphological characteristics to satisfy the two usability factors together. For this purpose, we conducted an controlled experiment, which was designed to evaluate the pocketability according to $size(4000mm^2/8000mm^2)$, proportion(1:1/2:1/3:1), and weight(100g/200g) of information devices as well as participants' pose and carrying method. In the case of male participants putting the models of information device into their pockets, 2:1 morphological proportion was preferred. On the other hand, the female participants carrying the models in their hands preferred 2:1 proportion$(size:4000mm^2{\times}2mm)$ and 3:1 proportion$(size:8000mm^2{\times}20mm)$. For the device in the size of $4000mm^2$, it was found that the weight of device has an significant effect on pocketability. In consequence, 2:1 proportion is optimal to achieve better pocketability. The second experiment was about how text readability is affected by size $(2000mm^2/4000mm^2/8000mm^2)$ and proportion(1:1/2:1/3:1) of information devices as well as interlinear space of displayed text(135%/200%). From this experiment result, it was found that reading speed was increased as line length increased. Regarding the subjective assessment on reading task, 2:1 proportion was strongly preferred. Based on these results, we suggest 2:l proportion as an optimal proportion that satisfy pocketability of mobile information devices and text readability displayed on the screen together. To apply these research outputs to a practical design work efficiently, it is important to take into account the fact that the space for input devices is also required in addition to a display screen.

  • PDF

Reinforcing Effects around Face of Soil-Tunnel by Crown & Face-Reinforcing - Large Scale Model Testing (천단 및 막장면 수평보강에 의한 토사터널 보강효과 - 실대형실험)

  • Kwon Oh-Yeob;Choi Yong-Ki;Woo Sang-Baik;Shin Jong-Ho
    • Journal of the Korean Geotechnical Society
    • /
    • v.22 no.6
    • /
    • pp.71-82
    • /
    • 2006
  • One of the most popular pre-reinforcement methods of tunnel heading in cohesionless soils would be the fore-polling of grouted pipes, known as RPUM (reinforced protective umbrella method) or UAM (umbrella arch method). This technique allows safe excavation even in poor ground conditions by creating longitudinal arch parallel to the tunnel axis as the tunnel advances. Some previous studies on the reinforcing effects have been performed using numerical methods and/or laboratory-based small scale model tests. The complexity of boundary conditions imposes difficulties in representing the tunnelling procedure in laboratory tests and theoretical approaches. Full-scale study to identify reinforcing effects of the tunnel heading has rarely been carried out so far. In this study, a large scale model testing for a tunnel in granular soils was performed. Reinforcing patterns considered are four cases, Non-Reinforced, Crown-Reinforced, Crown & Face-Reinforced, and Face-Reinforced. The behavior of ground and pipes as reinforcing member were fully measured as the surcharge pressure applied. The influences of reinforcing pattern, pipe length, and face reinforcement were investigated in terms of stress and displacement. It is revealed that only the Face-Reinforced has decreased sufficiently both vertical settlement in tunnel heading and horizontal displacement on the face. Vertical stresses along the tunnel axis were concentrated in tunnel heading from the test results, so the heading should be reinforced before tunnel advancing. Most of maximum axial forces and bending moments for Crown-reinforced were measured at 0.75D from the face. Also it should be recommended that the minimum length of the pipe is more than l.0D for crown reinforcement.

A Study on the Medical Application and Personal Information Protection of Generative AI (생성형 AI의 의료적 활용과 개인정보보호)

  • Lee, Sookyoung
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.4
    • /
    • pp.67-101
    • /
    • 2023
  • The utilization of generative AI in the medical field is also being rapidly researched. Access to vast data sets reduces the time and energy spent in selecting information. However, as the effort put into content creation decreases, there is a greater likelihood of associated issues arising. For example, with generative AI, users must discern the accuracy of results themselves, as these AIs learn from data within a set period and generate outcomes. While the answers may appear plausible, their sources are often unclear, making it challenging to determine their veracity. Additionally, the possibility of presenting results from a biased or distorted perspective cannot be discounted at present on ethical grounds. Despite these concerns, the field of generative AI is continually advancing, with an increasing number of users leveraging it in various sectors, including biomedical and life sciences. This raises important legal considerations regarding who bears responsibility and to what extent for any damages caused by these high-performance AI algorithms. A general overview of issues with generative AI includes those discussed above, but another perspective arises from its fundamental nature as a large-scale language model ('LLM') AI. There is a civil law concern regarding "the memorization of training data within artificial neural networks and its subsequent reproduction". Medical data, by nature, often reflects personal characteristics of patients, potentially leading to issues such as the regeneration of personal information. The extensive application of generative AI in scenarios beyond traditional AI brings forth the possibility of legal challenges that cannot be ignored. Upon examining the technical characteristics of generative AI and focusing on legal issues, especially concerning the protection of personal information, it's evident that current laws regarding personal information protection, particularly in the context of health and medical data utilization, are inadequate. These laws provide processes for anonymizing and de-identification, specific personal information but fall short when generative AI is applied as software in medical devices. To address the functionalities of generative AI in clinical software, a reevaluation and adjustment of existing laws for the protection of personal information are imperative.