• Title/Summary/Keyword: Embedding

Search Result 1,892, Processing Time 0.032 seconds

A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing (비밀 공유 기반의 7×7 스도쿠를 사용한 가역 정보 은닉 기법)

  • Kim, Young-Ju;Kim, Pyung-Han;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.261-270
    • /
    • 2017
  • Data hiding is a way to hide the information in multimedia media such as images or video. The scheme proposed by Nguyen and Chang, was able to embed, extract, and restore the cover image and the secret data using Sudoku. But in the extracting phase, the occurrence of duplicate values in the reference matrix was found to decrease the embedding capacity of secret data. This paper has proposed a reversible data hiding scheme while maintaining the quality of the image to provide high embedding capacity using $7{\times}7$ Sudoku and Shamir's secret sharing scheme.

A Study on the Particle Embedding Phenomena on Machined Surface according to Cutting Fluid in End Milling (절삭유 필터링에 따른 엔드밀 가공면 입자 임베딩 현상에 관한 연구)

  • Kim, Jeon-Ha;Hong, Tae-Yong;Lee, Jong-Hwan;Kang, Myung-Chang;Kim, Jeong-Suk
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.4 no.3
    • /
    • pp.39-44
    • /
    • 2005
  • With the development of high speed and accuracy machining, the micro-chips are formed in the machining process and broken particles are circulated with the cutting fluid. The surface roughness and accuracy of part are deteriorated because the metal particles included in the cutting fluid are embedded on machined surface. In this study, the influences of particles for the machined surface according to filtering degrees are evaluated and the embedding mechanism is suggested.

  • PDF

Doping-free Transparent Conducting Schottky Type Heterojunction Solar Cells

  • Kim, Joon-Dong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.02a
    • /
    • pp.209-209
    • /
    • 2012
  • High-efficient transparent conductive oxide (TCO) film-embedding Si heterojunction solar cells were fabricated. An additional doping was not applied for heterojunction solar cells due to the spontaneous junction formation between TCO films and an n-type Si substrate. Three different TCO coatings were formed by sputtering method for an Al-doped ZnO (AZO) film, an indium-tin-oxide (ITO) film and double stacks of ITO/AZO films. An improved crystalline ITO film was grown on an AZO template upon hetero-epitaxial growth. This double TCO films-embedding Si heterojunction solar cell provided significantly enhanced efficiency of 9.23% as compared to the single TCO/Si devices. The effective arrangement of TCO films (ITO/AZO) provides benefits of a lower front contact resistance and a smaller band offset to Si leading enhanced photovoltaic performances. This demonstrates a potential scheme of the effective TCO film-embedding heterojunction Si solar cells.

  • PDF

A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding

  • Rudder, Andrew;Kieu, The Duc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2984-3004
    • /
    • 2015
  • Designing a new reversible data hiding technique with a high embedding rate and a low compression rate for vector quantization (VQ) compressed images is encouraged. This paper proposes a novel lossless data hiding scheme for VQ-compressed images based on the joint neighboring coding technique. The proposed method uses the difference values between a current VQ index and its left and upper neighboring VQ indexes to embed n secret bits into one VQ index, where n = 1, 2, 3, or 4. The experimental results show that the proposed scheme achieves the embedding rates of 1, 2, 3, and 4 bits per index (bpi) with the corresponding average compression rates of 0.420, 0.483, 0.545, and 0.608 bit per pixel (bpp) for a 256 sized codebook. These results confirm that our scheme performs better than other selected reversible data hiding schemes.

A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure

  • Nia, Nahid Hamzehee;Adabi, Sepideh;Nategh, Majid Nikougoftar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2346-2361
    • /
    • 2017
  • A major challenge in cloud infrastructure is the efficient allocation of virtual network elements on top of substrate network elements. Path algebra is a mathematical framework which allows the validation and convergence analysis of the mono-constraint or multi-constraint routing problems independently of the network topology or size. The present study proposes a new heuristic approach based on mathematical framework "paths algebra" to map virtual nodes and links to substrate nodes and paths in cloud. In this approach, we define a measure criterion to rank the substrate nodes, and map the virtual nodes to substrate nodes according to their ranks by using a greedy algorithm. In addition, considering multi-constraint routing in virtual link mapping stage, the used paths algebra framework allows a more flexible and extendable embedding. Obtained results of simulations show appropriate improvement in acceptance ratio of virtual networks and cost incurred by the infrastructure networks.

Chaotic behavior analysis in the mobile robot of embedding some chaotic equation with obstacle

  • Bae, Youngchul;Kim, Juwan;Kim, Yigon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.6
    • /
    • pp.729-736
    • /
    • 2003
  • In this paper, we propose that the chaotic behavior analysis in the mobile robot of embedding some chaotic such as Chua`s equation, Arnold equation with obstacle. In order to analysis of chaotic behavior in the mobile robot, we apply not only qualitative analysis such as time-series, embedding phase plane, but also quantitative analysis such as Lyapunov exponent In the mobile robot with obstacle. We consider that there are two type of obstacle, one is fixed obstacle and the other is VDP obstacle which have an unstable limit cycle. In the VDP obstacles case, we only assume that all obstacles in the chaos trajectory surface in which robot workspace has an unstable limit cycle with Van der Pol equation.

High capacity multi-bit data hiding based on modified histogram shifting technique

  • Sivasubramanian, Nandhini;Konganathan, Gunaseelan;Rao, Yeragudipati Venkata Ramana
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.677-686
    • /
    • 2018
  • A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.

Video Watermarking Using Shot Detection (프레임간 상대적인 차에 의한 셔트 검출 기법을 이용한 비디오 워터마킹)

  • 정인식;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.101-104
    • /
    • 2002
  • This paper proposes a unique data embedding algorithm for the video sequence. It describes two processings: shot boundary detection and robust data embedding. First, for the shot boundary detection, instead of using absolute frame differences, block by block based relative frame differences are employed. Frame adaptive thresholding values are also employed for the better detection. Second, for the robust data embedding, we generate message template and then convolve and correlate it with carrier signal. And then we embed data on the time domain video sequence. By using these two methods, watermarks into randomly selected frames of shots. Watermarks are detected well even if several certain shots are damaged because we embed watermark into each shot equally.

  • PDF

A Watermarking Scheme of Lowest Frequency Band Based on the Quad-Tree Algorithm (쿼드트리 알고리즘과 최저주파수대역을 이용한 워터마킹 기법)

  • Jeong, Byong-Soo;Chu, Hyung-Suk;Shin, Soung-Wook;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.11
    • /
    • pp.2027-2032
    • /
    • 2007
  • In this paper, digital watermarking method using quad-tree algorithm and the lowest frequency band is proposed. The proposed algorithm searches the coefficient of the watermark by using quad-tree algorithm and inserts the watermark by the Cox's algorithm. The simulation of the proposed algorithm is implemented about the effect of various weight factors in Cox's algorithm, that of embedding watermark in each subband coefficient (HH, LH, HL), and that of embedding in the lowest frequency band (LL). As a simulation result, the bigger weight factors in Cox's algorithm show strong to noise. The watermarking performance of simultaneously embedding in HH, LH, and HL band is better than that of different cases. In addition, insertion the watermark to the LL band about $30{\sim}60%$ of all watermarks improves the watermarking performance in comparison with the case of not using the LL band.

A Study on Watermark Technique for Copyright Protection of Digital Images (디지털 영상물의 저작권 보호를 위한 워터마크 기술에 관한 연구)

  • Hong, Min-Suk;Park, Kang-Seo;Chung, Tae-Yun;Shin, Joon-In;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.606-608
    • /
    • 1998
  • Digital watermarking is the technique which embeds the invisible signal into multimedia data such as audio, video, images, for copyright protection, including owner identification and copy control information. In this paper, a new watermark detection algorithm by local masking cross covariance between watermarked signal and pseudo noise signal is proposed. The proposed algorithm enhances the detection probability for embedding information. Since reducing detection errors for the weak embedding signals, the algorithm improves the image quality and robusts against illegal attack to delete the embedding information and data compression applications such as JPEG and MPEGs.

  • PDF