• Title/Summary/Keyword: Computer Applications

Search Result 5,296, Processing Time 0.036 seconds

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Object Detection Based on Hellinger Distance IoU and Objectron Application (Hellinger 거리 IoU와 Objectron 적용을 기반으로 하는 객체 감지)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.63-70
    • /
    • 2022
  • Although 2D Object detection has been largely improved in the past years with the advance of deep learning methods and the use of large labeled image datasets, 3D object detection from 2D imagery is a challenging problem in a variety of applications such as robotics, due to the lack of data and diversity of appearances and shapes of objects within a category. Google has just announced the launch of Objectron that has a novel data pipeline using mobile augmented reality session data. However, it also is corresponding to 2D-driven 3D object detection technique. This study explores more mature 2D object detection method, and applies its 2D projection to Objectron 3D lifting system. Most object detection methods use bounding boxes to encode and represent the object shape and location. In this work, we explore a stochastic representation of object regions using Gaussian distributions. We also present a similarity measure for the Gaussian distributions based on the Hellinger Distance, which can be viewed as a stochastic Intersection-over-Union. Our experimental results show that the proposed Gaussian representations are closer to annotated segmentation masks in available datasets. Thus, less accuracy problem that is one of several limitations of Objectron can be relaxed.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

A Performance Study on CPU-GPU Data Transfers of Unified Memory Device (통합메모리 장치에서 CPU-GPU 데이터 전송성능 연구)

  • Kwon, Oh-Kyoung;Gu, Gibeom
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.133-138
    • /
    • 2022
  • Recently, as GPU performance has improved in HPC and artificial intelligence, its use is becoming more common, but GPU programming is still a big obstacle in terms of productivity. In particular, due to the difficulty of managing host memory and GPU memory separately, research is being actively conducted in terms of convenience and performance, and various CPU-GPU memory transfer programming methods are suggested. Meanwhile, recently many SoC (System on a Chip) products such as Apple M1 and NVIDIA Tegra that bundle CPU, GPU, and integrated memory into one large silicon package are emerging. In this study, data between CPU and GPU devices are used in such an integrated memory device and performance-related research is conducted during transmission. It shows different characteristics from the existing environment in which the host memory and GPU memory in the CPU are separated. Here, we want to compare performance by CPU-GPU data transmission method in NVIDIA SoC chips, which are integrated memory devices, and NVIDIA SMX-based V100 GPU devices. For the experimental workload for performance comparison, a two-dimensional matrix transposition example frequently used in HPC applications was used. We analyzed the following performance factors: the difference in GPU kernel performance according to the CPU-GPU memory transfer method for each GPU device, the transfer performance difference between page-locked memory and pageable memory, overall performance comparison, and performance comparison by workload size. Through this experiment, it was confirmed that the NVIDIA Xavier can maximize the benefits of integrated memory in the SoC chip by supporting I/O cache consistency.

Reliability Analysis of Privacy Policies Using Android Static Analysis (안드로이드 정적 분석을 활용한 개인정보 처리방침의 신뢰성 분석)

  • Yoonkyo, Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile app handles user data in a privacy policy. However, users are not certain that the privacy policy describes all the app's behavior. They have no choice but to rely on the privacy policy to confirm how the app uses data. This study designed a system that checks the reliability of privacy policies by analyzing the privacy policy texts and mobile apps. First, the system extracts and analyzes the privacy policy texts to check which personal data the privacy policy discloses that the mobile apps can collect. After analyzing which data apps can access using android static analysis, we compare both results to analyze the reliability of privacy policies. For the experiment, we collected the APK files and metadata of about 13K android apps registered in the Google Play Store and preprocessed the apps by four conditions. According to the comparison between privacy policies and mobile app behavior, many apps can access more personal data than disclosed in the privacy policy.

Line Tracer Modeling for Educational Virtual Experiment (교육용 가상실험 라인 트레이서 모델링)

  • Ki, Jang-Geun;Kwon, Kee-Young
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.109-116
    • /
    • 2021
  • Traditionally, the engineering field has been dominated by face-to-face education focused on experimental practice, but demand for online learning has soared due to the rapid development of IT technology and Internet communication networks and recent changes in the social environment such as COVID-19. In order for efficient online education to be conducted in the engineering field, where the proportion of experimental practice is relatively high compared to other fields, virtual laboratory practice content that can replace actual experimental practice is very necessary. In this study, we developed a line tracer model and a virtual experimental software to simulate it for efficient online learning of microprocessor applications that are essential not only in the electric and electronic field but also in the overall engineering field where IT convergence takes place. In the developed line tracer model, the user can set various hardware parameter values in the desired form and write the software in assembly language or C language to test the operation on the computer. The developed line tracer virtual experimental software has been used in actual classes to verify its operation, and is expected to be an efficient virtual experimental practice tool in online non-face-to-face classes.

Multi-Path Routing Algorithm for Cost-Effective Transactions in Automated Market Makers (자동화 마켓 메이커에서 비용 효율적인 거래를 위한 다중 경로 라우팅 알고리즘)

  • Jeong, Hyun Bin;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.269-280
    • /
    • 2022
  • With the rise of a decentralized finance market (so called, DeFi) using blockchain technology, users and capital liquidity of decentralized finance applications are increasing significantly. The Automated Market Maker (AMM) is a protocol that automatically calculates the asset price based on the liquidity of the decentralized trading platform, and is currently most commonly used in the decentralized exchanges (DEX), since it can proceed the transactions by utilizing the liquidity pool of the trading platform even if the buyers and sellers do not exist at the same time. However, Automated Market Maker have some disadvantages since the cost efficiency of each transaction using Automated Market Maker depends on the liquidity size of some liquidity pools used for the transaction, so the smaller the size of the liquidity pool and the larger the transaction size, the smaller the cost efficiency of the trade. To solve this problem, some platforms are adopting Transaction Path Routing Algorithm that bypasses transaction path to other liquidity pools that have relatively large size to improve cost efficiency, but this algorithm can be further improved because it uses only a single transaction path to proceed each transaction. In addition to just bypassing transaction path, in this paper we proposed a Multi-Path Routing Algorithm that uses multiple transaction paths simultaneously by distributing transaction size, and showed that the cost efficiency of transactions can be further improved in the Automated Market Maker-based trading environment.

Training of a Siamese Network to Build a Tracker without Using Tracking Labels (샴 네트워크를 사용하여 추적 레이블을 사용하지 않는 다중 객체 검출 및 추적기 학습에 관한 연구)

  • Kang, Jungyu;Song, Yoo-Seung;Min, Kyoung-Wook;Choi, Jeong Dan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.274-286
    • /
    • 2022
  • Multi-object tracking has been studied for a long time under computer vision and plays a critical role in applications such as autonomous driving and driving assistance. Multi-object tracking techniques generally consist of a detector that detects objects and a tracker that tracks the detected objects. Various publicly available datasets allow us to train a detector model without much effort. However, there are relatively few publicly available datasets for training a tracker model, and configuring own tracker datasets takes a long time compared to configuring detector datasets. Hence, the detector is often developed separately with a tracker module. However, the separated tracker should be adjusted whenever the former detector model is changed. This study proposes a system that can train a model that performs detection and tracking simultaneously using only the detector training datasets. In particular, a Siam network with augmentation is used to compose the detector and tracker. Experiments are conducted on public datasets to verify that the proposed algorithm can formulate a real-time multi-object tracker comparable to the state-of-the-art tracker models.

An Experiment for Surface Soil Moisture Mapping Using Sentinel-1 and Sentinel-2 Image on Google Earth Engine (Google Earth Engine 제공 Sentinel-1과 Sentinel-2 영상을 이용한 지표 토양수분도 제작 실험)

  • Jihyun Lee ;Kwangseob Kim;Kiwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.599-608
    • /
    • 2023
  • The increasing interest in soil moisture data using satellite data for applications of hydrology, meteorology, and agriculture has led to the development of methods for generating soil moisture maps of variable resolution. This study demonstrated the capability of generating soil moisture maps using Sentinel-1 and Sentinel-2 data provided by Google Earth Engine (GEE). The soil moisture map was derived using synthetic aperture radar (SAR) image and optical image. SAR data provided by the Sentinel-1 analysis ready data in GEE was applied with normalized difference vegetation index (NDVI) based on Sentinel-2 and Environmental Systems Research Institute (ESRI)-based Land Cover map. This study produced a soil moisture map in the research area of Victoria, Australia and compared it with field measurements obtained from a previous study. As for the validation of the applied method's result accuracy, the comparative experimental results showed a meaningful range of consistency as 4-10%p between the values obtained using the algorithm applied in this study and the field-based ones, and they also showed very high consistency with satellite-based soil moisture data as 0.5-2%p. Therefore, public open data provided by GEE and the algorithm applied in this study can be used for high-resolution soil moisture mapping to represent regional land surface characteristics.

Preliminary Study on All-in-JPEG with Multi-Content Storage Format extending JPEG (JPEG를 확장한 멀티 콘텐츠 저장 포맷 All-in-JPEG에 관한 예비 연구)

  • Yu-Jin Kim;Kyung-Mi Kim;Song-Yeon Yoo;Chae-Won Park;Kitae Hwang;In-Hwan Jung;Jae-Moon Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.183-189
    • /
    • 2023
  • This paper proposes a new JPEG format, All-in-JPEG, which can include not only multiple photos but also various media such as audio and text by extending the JPEG format. All-in-JPEG add images, audio, and text at the existing JPEG file, and stores meta information by utilizing the APP3 segment of JPEG. With All-in-JPEG, smartphone users can save many pictures taken in burst shots in one file, and it is also very convenient to share them with others. In addition, you can create a live photo, such as saving a short audio at the time of taking a photo or moving a part of the photo. In addition, it can be used for various applications such as a photo diary app that stores images, voices, and diary text in a single All-in-JPEG file. In this paper, we developed an app that creates and edits All-in-JPEG, a photo diary app, and a magic photo function, and verified feasibility of the All-in-JPEG through them.