• Title/Summary/Keyword: Concealing

Search Result 88, Processing Time 0.03 seconds

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

The Image of Black Expressed in Western Dress-From Renaissance to 19C- (서양 복식에 나타난 검정색의 이미지-르네상스 시대부터 19세기 말까지를 중심으로-)

  • 문혜정;김민자
    • Journal of the Korean Society of Costume
    • /
    • v.41
    • /
    • pp.207-223
    • /
    • 1998
  • The purpose of this study is to abstract the image from black dress, which has been favored by many people regardless of the times and examine it throughout the history of drss and thereby clearly define the images that black limplies in dress. Color image is a visual symbol, an image that forms through a combination of visual stimulus created by color, coupled with all the external factors related to it. Black is a one-dimensional color, of which the impact is subjective to its energy, which depends on light reflected on the object, and its texture. Therefore, black projects different images, depending on its surroundings. In general, black has had negative connotations in the Western culture. In dress, however, it has implied other various images different from the general negative ones. By combining general images of black and those exprssed in dress, major images of black were categorized into dignity, elegance, eroticism, asceticism and tragedy. Dignity is a category similar to the sublime. Dress with dignity has sharp contours and is generally made of velvet or silk which can be characterized by their splendor and voluminous-ness, exaggerating the body of a person wearing it. Such costume is mostly found in powerful countries in history such as Burgundy Court in the 15C, Spain in the 16C. Netherlands in the 17C. Elegance evokes grace and beautifulness. It includes elegance, grace, beauty and dandyism as subcategories or silk. Good examples are dandies' black costume and Ladies black and white dressees in the 19C. Eroticism is an image which expresses sexual attractiveness. Costume with eroticism is made of velvet or silk, which project sumptuousness through reflection. Such costumes expose parts of the body or are tightly tailored in order to emphasizes body contours. Asceticism means restraint from physical and mental desires. Costume with asceticism makes a person wearing it look smaller by covering the whole body. Puritan's black dresses and Bourgeoisie's black suit are good examples. Tragedy is anguish. sorrow. Black costume with grievous feelings such as mourning dresses is made of lusterless textile concealing most of the body except for the face.

  • PDF

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm (유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.277-282
    • /
    • 2018
  • The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

Exclusion and Inclusion of Deathscape : An Investigation on the Intervention of Institutional Discourses in Modern Korea (죽음경관의 배제와 포섭: 근대 한국의 제도적 담론의 개입에 대한 고찰)

  • Seo, Il Woong;Park, Kyonghwan
    • Journal of the Korean association of regional geographers
    • /
    • v.20 no.4
    • /
    • pp.425-443
    • /
    • 2014
  • The subjects of this research are two-folds. First, it investigates the ways in which previous geographic studies have approached to human death and its spatial representations through various theoretical frames. It is found that necrogeographies on cemetery have changed into those studies focusing on the social and spatial contexts in which deathscapes are represented. Second, this research analyzes what institutional discourses have intervened in excluding or including modern deathscapes in Korea. Some discourses socio-spatially excluded specific (undesirable) deathscape, and they mostly depended on employing such terms as 'Yeoido' and 'illegal, luxury, or deserted cemeteries'. On the contrary, other discourses employed such terms as 'developed country', 'Unified-Silla Dynasty', and 'NIMBY', and they introduced new (desirable) types of deathscapes such as cremation. This paper conclusively argues that these discourses engendered 'truth effect' so as to introduce and promote specific deathscapes while repressing pre-modern (or conventional) deasthscapes and concealing discursive contradictions.

  • PDF

'Umakdaejang' and the Power of Mask ('음악대장'과 가면의 힘)

  • Ryu, Jae Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.754-766
    • /
    • 2016
  • What is the relationship between the power of mask and the popularity of 'Umakdaejang(which means a band master in Korean)' who was one of the mask-singers in King of Masksinger? And which aspects of the contemporary Korean society were projected to this fever of Umakdaejang? This study has made efforts to answer these questions. To do this, it has examined the episodes that Umakdaejang appeared in the TV program King of Masksinger, has dealt with the origin and purpose of mask, and with the cultural meaning of the mask's concealing and revealing identity in order to understand the power of mask. Findings are as follows. Umakdaejang amplified the curiosity of his identity by displaying anonymous typicality with the mask. He also showed the resistant gestures against the forms and manners of the existing TV music programs through the way of somewhat tough, uncontrolled, and mischievous behaviors. By doing so, he exposed the desire of self-revelation. As a result, by means of its anonymity and resistance, the mask functioned as an effective apparatus being able to resist against the class polarization of the capitalist ideology. This can be viewed as the origin of the fever of Umakdaejang as well as the very power of mask itself.

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.

Design of Jitter elimination controller for concealing interarrival packet delay variation in VoIP Network (VoIP 네트웍에서 패킷 전송지연시간 변이현상을 없애주는 적응식 변이 제어기 제안 및 성능분석)

  • 정윤찬;조한민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.199-207
    • /
    • 2001
  • We propose an adaptive shaping controller equipped with the technologies of shaping and buffering VoIP packets arriving at the receiving end by the CAM-type controller. In order to conceal interarrival packet delay variation, the conventional jitter buffers force them to be too large, thereby causing the audio quality to suffer excessive delay. However, by using our proposed method, the delay caused by shaping operation dynamically increases or decreases on the level of jitter that exists with in the IP network. This makes the delay accommodates adaptively the network jitter condition. The less jitter network has the fewer delay the shaping controller requires for jitter elimination. And the CAM-type method generally makes the shaping operation faster and leads to processing packets in as little time as can. We analyse the packet loss and delay performance dependency on the average talk ratio and the number of jitter buffer entries in shaping controller. Surprising, we show that the average delay using our shaping controller is about 70msec. This performance is much better than with the delay equalization method which forces the receiving end to delay about 60msec.

  • PDF

Subjective Research on the Menstrual Experiences of Elementary Girl Students -5th and 6th Grade Elementary Girl Students- (초등학생의 월경경험에 관한 주관성 연구 -5, 6학년 여학생을 대상으로-)

  • Kim, Jung-Hee;Chung, Yeon-Kang;Kim, Kyung-Hee;Chung, Hae-Kyung
    • Journal of the Korean Society of School Health
    • /
    • v.12 no.2
    • /
    • pp.263-280
    • /
    • 1999
  • The purpose of this study is to present basic data to be used in the development of a sexual education program to create an affirmative sexual egoism. We classified the types of subjectivities and revelation attitudes of menstrual experience in 5th and 6th elementary school girls. The analytic method of data was a "Q-method" (William Stephenson). The results of this study classified four-types. The first type is an "open type". Girls of this type accepted menstrual experience as neither disease nor an embarrassment but as an important and natural course for a woman. The second type is the "concealing type". Girls of this type keep silent and conceal menstruation from persons because they consider it shameful or disgrace. The third type is the "conceited type". Girls of this type think that menstruation is painful-but only for them. Also, they accept such pains being 'grown-up'. The fourth type is the "tomboy type". Girls of this type want to be an eternal child; they hate being born a woman and think menstruation is troublesome. As a result of this research, we have concluded that it is necessary to educate girl students before they experience menstruation in order to develop positive attitudes towards sexuality and in so doing, aid them through adolescence.

  • PDF

Digital Watermarking using Bit Concealment in Wavelet Transform Domain (웨이브렛 영역에서의 비트 은닉을 이용한 디지털워터마킹)

  • Sung, Kwang-Jin;Kim, Min-Tae;Lee, Jong-Hyuck;Jee, Inn-Ho;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • The object of watermarking is to prevent from copying and distributing without the copyright or right of ownership. In case of using watermark as an image data we can detect watermark whether an original image exists or not. In this paper, we proposed that an image data is used for watermark and the watermark is detected without an original image. After the original image is transformed with DWT and the watermark is transformed with DCT, they are transformed with binary number. We calculate an optimal bit position for concealing watermark of an original binary image and insert the watermark and determine the best position for robustness against JPEG compression, filtering, and resampling attacks within inserted watermark image. In this paper, we are able to confirm the right of copyright and ownership easily while using invisible watermark and also we can detect a watermark without an original image.

  • PDF

Analysis on the Spectacles of K-POP Hologram Concerts -Focus on Contents of SM Entertainment- (K-POP 홀로그램 콘서트에 나타난 스펙터클 분석 -SM Entertainment 콘텐츠를 중심으로-)

  • Han, Hye-Won;Jeong, A-Ram
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.7
    • /
    • pp.740-749
    • /
    • 2016
  • Hologram technology is widely applied in entertainment contents for public, no more remained in specific technological area for minority experts. Expecially, K-POP entertainment contents increasingly adopt hologram images. These contents use hologram technology as a part to arouse spectacles or represent idols as hologram characters. In this study, spectacles and aura of K-POP hologram concerts of SM Entertainment which runs stably in certain period were analyzed, so that it could recognized the differentiation strategy distinguished only in hologram concerts. Thus, the setting of hologram concerts alienates seats from the stage so that maximize distance, and the aura of idol characters strengthens through fantasy of escape from reality. Hologram concerts maximize fantasy through exposing tricks rather than concealing it. Hologram concerts enhance image of Korea as ICT leader, overcome physical and geological limitation of 'Korean Wave' to globalize, and propose examples of popularization of convergence contents.