• Title/Summary/Keyword: Concealing

Search Result 88, Processing Time 0.023 seconds

A Study on Extract of Vocal Tract Characteristic after Concealing the Vocal Cord Property (성문특성이 제거된 성도특성 추출에 관한 연구)

  • 민소연;강은영;배명진
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.203-206
    • /
    • 2000
  • Since the amplitude of voiced fall off at about -20dB/decade, dynamic range is often compressed prior to spectral analysis so that details at weak, high frequencies may be visible. Preemphasizing the speech, either by differentiating the analog speech s$\sub$a(t) prior to A/D conversion or by differencing the discrete-time s(n)=s$\sub$a(nT), compensating for falloff at high frequencies. The most common form of preemphasis is y(n)=s(n)-As(n-1), where A typically lies between 0.9 and 1.0 and reflects the degree of pre-emphasis. In This paper, we proposed that A is adjusted at each time by measuring the slope of envelope in frequency domain.

  • PDF

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.

Absence of Physicality in Fashion -Focusing on the Deformation of the Body Parts-

  • Yim, Eun-Hyuk
    • International Journal of Costume and Fashion
    • /
    • v.9 no.1
    • /
    • pp.26-33
    • /
    • 2009
  • Clothes and human body are inseparably related. Aesthetic consciousness of the body determines the form of clothing, reflecting the time and culture as well as the individual and society. Clothes can even reorganize the meaning of the body, while transcending their instrumental functions of concealing, revealing, and deforming the body. Using �body�t o analyze the clothing form, my study develops a framework by which to classify the absence of physicality in fashion focusing on the deformation of the body parts. The absence of physicality denotes the break away from the idealized and standardized body for mass productions. It tends to experiment with extreme exaggeration in form refusing to subscribe to the traditional values that build on the balance and symmetry of the body, which opposes the sartorial convention and symbolism that results in the discord between signifiant and signifi? f clothing.

Application of watermarking to error concealment in video communications (영상통신에서의 패킷 오류 은닉에 활용되는 워터마킹 기법)

  • Oh, Tae-Suk;Kim, Yong-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.84-86
    • /
    • 2006
  • An informed watermarking algorithm is proposed in this work that aids in concealing packet loss errors in video communications. This watermark-based error concealment(WEC) method embeds a low resolution version of the video frame inside itself as watermark data. At the receiver, the extracted watermark is used as a reference for error concealment. The proposed DCT-based algorithm has features of informed watermarking in order to minimize the distortion of the host frame. At the encoder, a predictive feedback loop Is employed which helps to adjusts the strength of the scale factor Furthermore, some of the modified coefficients of the DCT signal are virtually free from distortion by employing bit- sign adaptivity. The performance of the detector is Qualitatively analyzed for error concealment applications where full-frame DCT embedding proved to be more advantageous.

  • PDF

Detecting Steganographic Contents Using EWM Statistics (EWM 통계량을 이용한 스테가노그래픽 자료 감지 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.54-62
    • /
    • 2008
  • For a message hiding technique to be effectual, it needs to have availability, confidentiality and integrity. Steganography is the science of hiding one message within other types of digital contents. In this case, attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover, these discrepancies expose the fact that hidden communication is happening. In this paper, I present a steganography scheme capable of concealing a piece of secrete information in a host image and base on the technique's OCT, RGB, statistical restoration.

  • PDF

A Study and improved Approach of Text Steganography (텍스트 스테가노그래프의 개선된 접근과 연구)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.51-56
    • /
    • 2014
  • In the digital world of the internet, steganography is introduced to hide the existence of the secret communication by concealing a secret message inside another unsuspicious cover medium. The third parties are unaware that a stego medium is being communicated. There exists a large variety of steganography methods based on texts. In this paper, analyzed the advantages and significant disadvantages of each existing text steganography method and how new approach could be proposed as a solution. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by encryption rearrangement key.

A Study on Extract of Vocal Tract Characteristic after Concealing the Vocal Cord Property (성문특성이 제거된 성도특성 추출에 관한 연구)

  • Lim, Ji-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.253-256
    • /
    • 2010
  • Since the amplitude of voiced fall off at about -20dB/decade, dynamic range is often compressed prior to spectral analysis so that details at weak, high frequencies may be visible. Preemphasizing the speech, either by differentiating the analog speech $s_a$(t) prior to A/D conversion or by differencing the discrete-time s(n)=$s_a$(nT), compensating for falloff at high frequencies. The most common form of preemphasis is y(n)=s(n)-As(n-1), where A typically lies between 0.9 and 1.0 and reflects the degree of pre-emphasis. In this paper, we proposed that A is adjusted at each time by measuring the slope of envelope in frequency domain.

  • PDF

A Study on the Fantastic Expression of the Contemporary Interior Space (현대 실내공간의 환상적 표현에 관한 연구)

  • An Eun-Hee;Lee Jung-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.1 s.54
    • /
    • pp.79-87
    • /
    • 2006
  • 'Fantasy' in this study is Not something fantastic in the used to be-way we can Imagine easily. This study is to figure out 'fantasy' and 'the fantastic' as a significant measure to interpret the contemporary space-time. In particular, it analyzed that fantasy have influenced on some kind of specific trend what is expressed a tendency to contemporary interior designs of informal, indeterminacy and unpredictability. Fantasy is represented as 'the fantastic space' through spatial revealing, concealing, distorting, and connoting. Representation becomes a major issue in almost many kinds of knowledge-system that start from the mind to go out to the world in a realistic or idealistic way. Therefore, the fantastic space reconstructs the reality while making itself through to representational creation-process. It is Important for fantasy and the fantastic space to help detect behind beneath the reality more than what we know.

Image Steganography to Hide Unlimited Secret Text Size

  • Almazaydeh, Wa'el Ibrahim A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.73-82
    • /
    • 2022
  • This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.

Lived Experience of patients with Terminal Cancer : Parses Human Becoming Methodology (말기 암환자의 체험에 관한 현상학적 연구)

  • 이옥자
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.3
    • /
    • pp.510-537
    • /
    • 1995
  • Human health is an integral part of experience in the process of Human Becoming. Through continual interaction with the environment human beings freely choose experience and develop as responsible beings. The process of the health experience of patient with terminal cancer is a unique. he objective of this study is to understand the lived experience of patients with terminal cancer in order to provide basic information for nursing care in the clinical setting and to develop a theoretical background for clinical practice. This study is to de-scribe and define the lived experience of patients with terminal cancer in order to provide a foundation for nursing research and education. Data collection has been done between December 1993 and November 1994. The subjects included five persons -four females and one male : one who was in her sixties, one in his fifties, two in their forties, and one who was in her thirties. The researcher has met with these patients 35 times, but at eight times the patient was in a stuporous condition and not able to participate, so these were not included in the data analysis. Parse's "Human Becoming Methodology", an existential phenomenological research methodology is used for this study. Data has been collected using he dialogical engagement process of "I and You", the participant researcher and the participant subject. Dialogical engagement was discontinued when the data was theoretically saturated. Data was analyzed using the extraction - synthesis and heuristic interpretation. The criteria of Guba and Lincoln(1985). and Sandelo wski(1986) : credibility, auditability, fitness and objectivity were used to test the validity and reliability of the data. The following is a description of the structure of the lived experience of patients with terminal cancer as defined by this study : 1. Structure : 1) Suffering through the reminiscence of past experience 2) The appearance of complex emotions related to life and connectedness 3) The increasing importance of significant people and of the Absolute Being 4) The increasing realization of the importance of health and belief 5) Desire for a return to health and a peaceful life or for acceptance of dying and a comfortable death In summary the structure of the lived experience of these patients can be said to be : suffering comes through reminiscence of past experience, and there are complex emotions related to life and connectedness. Significant people and the Absolute Being become increasingly important along with a realization of the importance of health and faith. And finally there is a desire for either a return to health and a peaceful life or for the acceptance of dying and a comfortable death. 2. Heuristic Interpretation : Using Parse's Human Becoming Methodology, the structure of the lived experience of patients with terminal cancer identified in this research is interpreted as. The lived experience of patients with terminal cancer involves the solving of past conflicts, and the experience of the healing and valuing of sorrow and pain. Through the relation of life and health, and the complex emotions that arise, the lived experience of revealing - concealing is of paradoxical emotions. The increasing importance of significant others and of the Absolute Being shows Connecting and Separating an on- going process of nearness and farness. Revision of thoughts about health and faith is interpreted as transforming and desire for restoration to health and a peaceful life or acceptance of dying and a cowfortable death, as powering. In summary, it is possible to see, in the lived experience of patients with terminal cancer, the relationship of the five concepts of Parse's theory : valuing, revealing -concealing, connecting-separating, transforming, and powering. From Parse's theory, the results of this study show that meaning is related to valuing, rhythmicity to revealing-concealing and connect-ing-separating, and cotranscendence to transforming and powering.

  • PDF