• Title/Summary/Keyword: 프린트 기법

Search Result 80, Processing Time 0.028 seconds

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

Characteristic of the Human Cloning Motif in Feature 〈Blueprint〉 (영화 〈블루프린트〉 속에 투영된 인간복제 모티프의 특성)

  • Jung, Won-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.123-133
    • /
    • 2011
  • Rapid development of life sciences about human cloning in real world is reflected alternately ahead and behind in the movies and it brings up the conversation topics about the scenario of diverse human life in the near future. This study is the consideration of the characteristic of the human cloning motif in movies, focused on the feature film which consider human cloning a philosophical point of view. The emergence and evolution of somatic cell cloning conclude the problem of philosophical anthropology. And identity and un-naturality of human clone boils down to desire and dilemma of character in . The dramatize to the exclusion of genre's attribution and the setting of twofold relationship between original and clone as well as real mother and daughter prove the critical mind of as stated above. This study also reported it reinforces the characteristic of the human cloning motif in movies that plotting with parallel narrative and the consistent attitudes with various cinematic expression and techniques.

Deformation of Polymer Resist in NIL Process by Molecular Dynamic Simulation (분자동역학기법을 이용한 나노 임프린트 리소그래피 공정에서의 고분자 변형모사)

  • Woo, Young-Seok;Lee, Woo-Il
    • Proceedings of the KSME Conference
    • /
    • 2007.05a
    • /
    • pp.337-342
    • /
    • 2007
  • In this study, molecular dynamics simulation of nano imprint lithography in which patterned stamp is pressed onto amorphous polyethylene(PE) surface are performed to study the behaviour of polymer. Force fields including bond, angle, torsion, and Lennard Jones potential are used to describe the inter-molecular and intra-molecular force of PE molecules and stamp, substrate. Periodic boundary condition is used in horizontal direction and canonical NVT ensemble is used to control the system temperature. As the simulation results, the behaviour of polymer is investigated during the imprinting process. The mechanism of polymer deformation is studied by means of inspecting the surface shape, volume, density, atom distribution. Deformation of the polymer resist was found for various of the stamp geometry and the alignment state of the polymer molecules.

  • PDF

A Genetic Algorithm-based Method for Printer Scheduling in Ubiquitous Computing Environment (유전자알고리즘을 이용한 유비쿼터스 컴퓨팅 환경의 프린터 스케쥴링 기법)

  • 문영학;이지형
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.173-176
    • /
    • 2004
  • 유비쿼터스 컴퓨팅 환경에서는 각 클라이언트는 자신이 처한 환경에 따라서 여러 가지 장치를 사용할 수 있고, 각 장치는 각기 다른 클라이언트의 요구를 동시에 받을 수 있다. 본 논문에서는 클라이언트들이 보내는 프린트 요청을 받아 사용자에게 적절한 프린터로 출력하는 유비쿼터스 컴퓨팅 환경에서의 프린터 서버를 가정한다. 그러나 프린터 서버는 많은 클라이언트로부터 동시에 프린트 요청을 받을 수 있으므로, 가능한 모든 클라이언트의 요청을 만족시킬 수 있는 스케줄링을 해야 한다. 이러한 목적을 위한 유전자알고리즘을 이용한 유비쿼터스 환경에서의 실시간 프린터 스케줄링 방법을 제안한다.

  • PDF

A measurement technique for residual thickness of nano-imprinted polymer film using nano-indentation. (나노인덴테이션을 이용한 나노 임프린트된 폴리머 박막의 잔류두께 측정기법)

  • Lee, H.J.;Ko, S.G.;Kim, J.H.;Hur, S.;Lee, E.S.;Jeong, J.H.
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1921-1926
    • /
    • 2003
  • Nano-imprint technology has been vigorously studied by many researchers for it is one of the most promising technologies for manufacturing the pattern with its critical dimension below 100nm. In the nano-imprint technology, nano patterns are transferred on a polymer film and the transferred patterns are used as an etch mask to define the designed patterns on a substrate or a metal layer. To this end, it is important to keep the residual thickness of the imprinted polymer film uniform. In this study, a novel measurement technique to measure the residual thickness of films is proposed based on nanoindentation theory. This technique has advantages of saving time and measuring the residual thickness of highly-localized portions in comparison with other techniques, but has limitation of requiring calibration process.

  • PDF

Introduction to Pritable Electronics in Radio Frequency (라디오 주파수에서 프린터블 엘렉트로닉스 소개)

  • Jo, Heung-Kuk;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.56-57
    • /
    • 2011
  • In this paper, production of antenna or substrate using printing techniques and pattern methods for the semiconductor impurities and SO3H, and its print production process using the step-by-step will be introduced. For mass production problems that can be compared PANI(Polyaniline) is an introduction to the feature. Simple printed substrate is presented.

  • PDF

Energy Conservation of RAID by Exploiting SSD Cache (SSD 캐시를 이용한 RAID의 에너지 절감 기법)

  • Lee, Hyo-J.;Kim, Eun-Sam;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.237-241
    • /
    • 2010
  • Energy conservation of server systems has become important. Though storage subsystem is one of the biggest power consumers, development of energy conservation techniques is challenging problem due to striping techniques like RAID and physical characteristics of hard disks. According to our observation, the size of footprint for a day or for hours is much smaller compared to the size of whole data set. In this paper, we describe a design of a novel architecture for RAID that uses an SSD as a large cache to conserve energy by holding such a footprint. We incorporate these approaches into a real implementation of a RAID 5 system that consists of four hard disks and an SSD in a Linux environment. Our preliminary results in actual performance measurements using the cello99 and SPC traces show that energy consumption is reduced by a maximum of 14%.

Anonymous Fingerprinting Using Secret Sharing Scheme (비밀분산법을 이용한 익명성 보장 핑거프린팅 기법)

  • 용승림;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.365-367
    • /
    • 2003
  • 핑거프린팅 기법은 암호학적인 기법들을 이용하여 디지털 데이터를 불법적으로 재배포한 사용자를 찾아냄으로써 디지털 데이터의 저작권을 보호한다. 익명성이 보장되는 핑거프린팅 기법은 대칭적인 기법과 달리 사용자만이 핑거프린트가 삽입된 데이터를 알 수 있고 비대칭 기법과 달리 데이터가 재배포되기 전에는 사용자의 익명성이 보장되는 기법이다. 본 논문에서는 사용자의 익명성이 보장되는 새로운 핑거프린팅 기법을 제안한다. 비밀분산법을 이용하여 사용자의 신원정보를 숨겨두었다가 재배포 발견시 조정자에게 누가 재배포하였는지 증거를 제출함으로써 재배포자의 배포 사실을 증명한다. 또한 등록시에 Schnorr 서명을 이용하여 고발된 사용자가 범행을 부인할 수 없도록 한다. 제안된 방법은 이산대수문제와 양자간 안전한 계산과정의 안전성에 근거하여 사용자의 익명성이 보장된다.

  • PDF

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.