• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.022 seconds

Adaptive Hangul Steganography Based on Chaotic Encryption Technique (혼돈 암호화 기법에 기반한 적응된 한글 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.177-183
    • /
    • 2020
  • Steganography uses digital images as a medium for sending secret messages over insecure networks. There is also a least significant bit(LSB) that is a popular method of embedding secret messages in digital images. The goal of steganography is to securely and flawlessly transmit secret messages using stego media over a communication channel. There is a need for a method to improve resistance to reduce the risk of exposure to third parties. To safely hide secret messages, I propose new algorithms that go through crossing, encryption, chaos and concealment steps. After separating Hangul syllables into choseong, jungseong and jongseong, the bitwised message information is encrypted. After applying the logistic map, bitwised information is reconstructed using the position of the chaotic sequence. The secret message is inserted into the randomly selected RGB channel. PSNR and SSIM were used to confirm the effectiveness of the applied results. It was confirmed as 44.392(dB) and 0.9884, respectively.

A Representation for Multithreaded Data-parallel Programs : PCFG(Parallel Control Flow Graph) (다중스레드 데이타 병렬 프로그램의 표현 : PCFG(Parallel Control Flow Graph))

  • 김정환
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.12
    • /
    • pp.655-664
    • /
    • 2002
  • In many data-parallel applications massive parallelism can be easily extracted through data distribution. But it often causes very long communication latency. This paper shows that task parallelism, which is extracted from data-parallel programs, can be exploited to hide such communication latency Unlike the most previous researches over exploitation of task parallelism which has not been considered together with data parallelism, this paper describes exploitation of task parallelism in the context of data parallelism. PCFG(Parallel Control Flow Graph) is proposed to represent a multithreaded program consisting of a few task threads each of which can include a few data-parallel loops. It is also described how a PCFG is constructed from a source data-parallel program through HDG(Hierarchical Dependence Graph) and how the multithreaded program can be constructed from the PCFG.

Secure Steganography Based on Triple-A Algorithm and Hangul-jamo (Triple-A 알고리즘과 한글자모를 기반한 안전한 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.507-513
    • /
    • 2018
  • Steganography is a technique that uses hidden messages to prevent anyone apart from knowing the existence of a secret message, except the sender and trusted recipients. This paper applies 24 bit color image as cover medium. And a 24-bit color image has three components corresponding to red, green and blue. This paper proposes an image steganography method that uses Triple-A algorithm to hide the secret (Hangul) message by arbitrarily selecting the number of LSB bits and the color channel to be used. This paper divides the secret character into the chosung, jungsung and jongsung, and applies crossover, encryption and arbitrary insertion positions to enhance robustness and confidentiality. Experimental results of the proposed method show that insertion capacity and correlation are excellent and acceptable image quality level. Also, considering the image quality, it was confirmed that the size of LSB should be less than 2.

Performance Analysis of Flash Memory SSD with Non-volatile Cache for Log Storage (비휘발성 캐시를 사용하는 플래시 메모리 SSD의 데이터베이스 로깅 성능 분석)

  • Hong, Dae-Yong;Oh, Gi-Hwan;Kang, Woon-Hak;Lee, Sang-Won
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.107-113
    • /
    • 2015
  • In a database system, updates on pages that are made by a transaction should be stored in a secondary storage before the commit is complete. Generic secondary storages have volatile DRAM caches to hide long latency for non-volatile media. However, as logs that are only written to the volatile DRAM cache don't ensure durability, logging latency cannot be hidden. Recently, a flash SSD with capacitor-backed DRAM cache was developed to overcome the shortcoming. Storage devices, like those with a non-volatile cache, will increase transaction throughput because transactions can commit as soon as the logs reach the cache. In this paper, we analyzed performance in terms of transaction throughput when the SSD with capacitor-backed DRAM cache was used as log storage. The transaction throughput can be improved over three times, by committing right after storing the logs to the DRAM cache, rather than to a secondary storage device. Also, we showed that it could acquire over 73% of the ideal logging performance with proper tuning.

Mosaic Detection Based on Edge Projection in Digital Video (비디오 데이터에서 에지 프로젝션 기반의 모자이크 검출)

  • Jang, Seok-Woo;Huh, Moon-Haeng
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.339-345
    • /
    • 2016
  • In general, mosaic blocks are used to hide some specified areas, such as human faces and disgusting objects, in an input image when images are uploaded on a web-site or blog. This paper proposes a new algorithm for robustly detecting grid mosaic areas in an image based on the edge projection. The proposed algorithm first extracts the Canny edges from an input image. The algorithm then detects the candidate mosaic blocks based on horizontal and vertical edge projection. Subsequently, the algorithm obtains real mosaic areas from the candidate areas by eliminating the non-mosaic candidate regions through geometric features, such as size and compactness. The experimental results showed that the suggested algorithm detects mosaic areas in images more accurately than other existing methods. The suggested mosaic detection approach is expected to be utilized usefully in a variety of multimedia-related real application areas.

Poetic Imagination and Self-Image in Haizi's Poems (하이즈(海子) 시의 시적 상상력과 자아 이미지)

  • Kim, Sujin
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.33-52
    • /
    • 2013
  • Haizi, who ended his life with suicide on the railroad at the age of 25, is a poet who implemented his unique poetic world alone without belonging to any of the existing Chinese poetry schools in the 1980s. The process that Haizi reveals self-inside through a poetic work is rather to hide self-inside paradoxically, too. Accordingly, even a work of figuring out the real intention, which is hidden in poetic dictions that he selected, will be meaningful. In this sense, this study tried to inquire into the poetic imagination and self-image that were revealed in poetry focusing on "Spring, Haizi of 10 People", which is a work of having his name as topic, with having been written at the time of suicide, among Haizi's many poetic works. In addition, it figured out Haizi's private conscious world through analyzing the poem titled "Facing the sea with spring blossoms", which was created ahead of death same as "Spring, Haizi of 10 People". Thus, the aim was to look back on significance of his death and to broaden the width of understanding about Haizi's poetry. As for Haizi, the death can be regarded as the completion of 'performance,' which is a kind of Haizi's own final art form. Hence, Haizi's suicide needs to be seen from the perspective dubbed the continuity of creation through this performance, not the discontinuance of creation caused by 'intended death' that the poet himself selected. In the wake of pursuing the poetic world of a gifted poet Haizi, who died early, that this study examined, there will be any poet of Korea who is recalled naturally. One poet will be first recalled Yi Sang, who is a poet and a novelist of having been broadly known. Another poet is overlapped Gi Hyeong-do, who had been active as a poet and a journalist of having been dead after living in the similar period to Haizi. A comparative analysis among works by these Korean and Chinese poets has similarity beyond the temporal space. A research on this is thought to have value of being considered a little more deeply and generally hereafter. Still, this study mentioned only possibility of a comparative research on this.

Qualitative Case Study on the Rearing Experience of Parents who Adopted a Child from Foster Care (위탁아동 입양부모의 양육경험에 관한 질적 사례연구)

  • Kwon, Ji-Sung;Chung, Ick-Joong;Min, Sung-Hye;Shin, Hye-Won
    • Journal of the Korean Society of Child Welfare
    • /
    • no.40
    • /
    • pp.73-107
    • /
    • 2012
  • The purpose of this study is to understand the rearing experience of parents who adopted a child for whom they were foster parents. Several cases of foster care adoption were found. We carried out individual interviews for data collection. Within-case and across-case analyses were conducted based on the data gathered from individual interviews of four cases. As a result, we were able to grasp significant issues from each case and find out common subjects found in all cases. The common subjects were 'special encounter: accident, connection, and inevitability', 'my child already', 'fundamental but insignificant difference', 'discontinuity in social support: things that are lost, and things that are gained', 'truth that is unable to hide, and truth that needs to be hidden', and 'family's destiny'. Based on the results of this study, policy recommendations and practice guidelines were suggested to help families undergoing adoption from foster care. Also, recommendations for further research were provided to overcome the study limitations.

Optical encryption system using random divided image and joint transform correlator (무작위 분할 영상과 결합변환 광 상관기를 이용한 암호화 시스템)

  • 최상규;서동환;신창목;김수중;배장근
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.636-642
    • /
    • 2003
  • We proposed the optical system using two divided halftone images to hide the original image and a joint transform correlator. The encryption procedure is performed by the Fourier transform of the product of each divided image by visual cryptography and the same random image which is generated by computer processing. As a result, we can obtain two Fourier divided images which are used as the encrypted image and the decrypting key, respectively. In the decryption procedure, both the encrypted image and the decrypting key are located on the joint input plane. Then the original image is reconstructed on a CCD camera which is located in the output plane. An autocorrelation term of joint transform correlator contributes to decrypt the original image. To demonstrate the efficiency of the proposed system, computer simulations and noise analysis are performed. The result show that the proposed system is a very useful optical certification system.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

A Comparative Study of the Humidifier Disinfectant Disaster and Minamata Disease (가습기살균제 참사와 미나마타병 사건의 비교 고찰)

  • Choi, Yeyong;Lee, Inhyun
    • Journal of Environmental Health Sciences
    • /
    • v.45 no.4
    • /
    • pp.326-339
    • /
    • 2019
  • Objectives: Minamata disease was an environmental health disaster of worldwide notoriety that occurred in Japan. The acknowledged patients total roughly 3,000, and the relieved victims currently include 77,099 cases. Still, many cases await acknowledgment or relief. The humidifier disinfectant issue is an environmental health catastrophe that took place in Korea. Over 9.98 million products spanning 43 brands of humidifier disinfectant have been sold and 835, cases have been recognized to date as relevant victims by the government. So far, 2,144 cases have been relieved by the fund of the producing companies. Four million consumers and 560,000 victims are estimated. Finding hints as to how to develop solutions in terms of fact-finding and prevention are the objectives of this study. Methods: Fields visits, interviews, and workshops as well as reference reviews have been conducted. A comparison was attempted to show the similarities and differences between the two disasters on 38 items. Results: Apparent similarities in the two disasters are the failure of industrial safety measures and governmental safety systems as well as relief systems for the victims. No comprehensive investigation was performed for all of the affected areas in Japan and all of the consumers in Korea. Both governments have tried to hide the faults and responsibilities of the companies and minimize the scale of the victims. Only after the government was changed through a general election did the new governments apologize and attempt to find political and social solutions through special relief laws. Conclusions: Over the process of each event, in the beginning, debates took place regarding the cause and the heath damages involved. For both, medical and toxicological relations are the keys while afterward finding a social solution became the subsequent issue.