• Title/Summary/Keyword: HIDE

Search Result 327, Processing Time 0.031 seconds

An Assessment of the Deterioration of Fabricated Metal Thread with Light, and Temperature and Humidity Factors: A Focused Study of Asian Textile Collections at the Metropolitan Museum of Art, New York

  • Park, Hae Jin;Hwang, Minsun;Chung, Yong Jae
    • Journal of Conservation Science
    • /
    • v.34 no.4
    • /
    • pp.245-257
    • /
    • 2018
  • To investigate the deterioration of textiles with metal thread, I surveyed 40 textile objects, dating from the 11th to the 19th century from Korea, China, Japan, and Central Asia at the Metropolitan Museum of Art, New York. This survey included various types, widths, and thicknesses of metal thread. In addition, deterioration was examined under the microscope and color information was collected using the spectrophotometer. While investigating metal thread in the collections, I fabricated 12 different types of metal samples with metal leaf(24K gold, silver, and copper leaf), adhesive (hide animal glue and a mixture of hide animal glue and iron oxide red), and paper substrate(Korean mulberry and Taiwanese kozo paper). The accelerated deterioration process of those fabricated samples was carried out using a light box(UV and daylight), and a humidity cabinet. In the light experiment with blue scales textile fading card(aka, blue wool standard), the metal leaf began to peel off during the deterioration process with 756,000 lux-hours UV and daylight. In the temperature and humidity experiment, I could observe the reddish tarnish on copper, and some part of it began to peel off. Color reading on the light exposed samples showed that the degree of color change on the surface follows the amount of exposure as it increased over time. On the other hand, color change on the samples after artificial deterioration using temperature and humidity factors showed random change of color with occasional spikes. Distortion of original shape worsened in the samples exposed to temperature and humidity.

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.

Metaphors on Mathematics Teaching (수학 수업을 보는 관점으로서의 은유)

  • Kim, Sang-Mee
    • School Mathematics
    • /
    • v.7 no.4
    • /
    • pp.445-467
    • /
    • 2005
  • The purpose of this study was to investigate mathematics teaching of an elementary school teacher and to understand the meaning of it. This study was a qualitative case study using by analyzing metaphors. The notion of metaphors was newly set up. Traditionally, it had been regarded as a mere tool for better understanding, but it was recognized as the primary source of all of our concept(Sfard, 1998). The subject of this case study was a researcher 'I' and also an elementary school teacher. The three selves named Mee1, Mee2, Mee3, respectively. Mee1 was the 'I' who developed the 4th graders' activities on mathematical patterns in 1996 and wrote mathematics textbook for the 4th graders in 1998-1999. Mee2 was the 'I' who taught mathematical patterns to her students in 2002. Mee3 was the 'I' who criticized the teaching of Mee2 in 2005. [ADVENTURE], [HIDE-AND-SEEK], and [FIREWORKS DISPLAY] were deter-mined to be key metaphors of mathematics teaching. [ADVENTURE] of Mee] was focused on profound understanding of mathematics, [HIDE-AND-SEEK] of Mee2 on construction of mathematics, and [FIRE-WORKS DISPLAY] of Mee3 on making meaning and participating in communities. Studies of metaphors give us the power of understanding mathematics teaching and also generate it. And viewing mathematics teaching via metaphors makes teaching studies open to new ways.

  • PDF

An Extended Frequent Pattern Tree for Hiding Sensitive Frequent Itemsets (민감한 빈발 항목집합 숨기기 위한 확장 빈발 패턴 트리)

  • Lee, Dan-Young;An, Hyoung-Geun;Koh, Jae-Jin
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.169-178
    • /
    • 2011
  • Recently, data sharing between enterprises or organizations is required matter for task cooperation. In this process, when the enterprise opens its database to the affiliates, it can be occurred to problem leaked sensitive information. To resolve this problem it is needed to hide sensitive information from the database. Previous research hiding sensitive information applied different heuristic algorithms to maintain quality of the database. But there have been few studies analyzing the effects on the items modified during the hiding process and trying to minimize the hided items. This paper suggests eFP-Tree(Extended Frequent Pattern Tree) based FP-Tree(Frequent Pattern Tree) to hide sensitive frequent itemsets. Node formation of eFP-Tree uses border to minimize impacts of non sensitive frequent itemsets in hiding process, by organizing all transaction, sensitive and border information differently to before. As a result to apply eFP-Tree to the example transaction database, the lost items were less than 10%, proving it is more effective than the existing algorithm and maintain the quality of database to the optimal.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Information Hiding and Detection in MS Office 2007 file (Microsoft Office 2007 파일에의 정보 은닉 및 탐지 방법)

  • Park, Bo-Ra;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.143-154
    • /
    • 2008
  • Information hiding is a very important technology recently. Having this technology can be a competitive power for secure communication. In this paper, it will be showed that hiding data in MS Office 2007 file is possible. Considering Microsoft (MS) Office 2007 file format is based on Open XML format, the feature of Open XML format makes it possible to hide data in MS Office 2007 file. In Open XML format, unknown XML files and their relationships can be defined by user. These parts and relationships are used to hide data in MS Office 2007 file. Considering unknown parts and unknown relationships are not in normal MS Office 2007 file, the hidden data can be detected by confirming of unknown parts and unknown relationships.

Hiding Shellcode in the 24Bit BMP Image (24Bit BMP 이미지를 이용한 쉘코드 은닉 기법)

  • Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.691-705
    • /
    • 2012
  • Buffer overflow vulnerability is the most representative one that an attack method and its countermeasure is frequently developed and changed. This vulnerability is still one of the most critical threat since it was firstly introduced in middle of 1990s. Shellcode is a machine code which can be used in buffer overflow attack. Attackers make the shellcode for their own purposes and insert it into target host's memory space, then manipulate EIP(Extended Instruction Pointer) to intercept control flow of the target host system. Therefore, a lot of research to defend have been studied, and attackers also have done many research to bypass security measures designed for the shellcode defense. In this paper, we investigate shellcode defense and attack techniques briefly and we propose our new methodology which can hide shellcode in the 24bit BMP image. With this proposed technique, we can easily hide any shellcode executable and we can bypass the current detection and prevention techniques.

A Study on Vibration Characteristics Caused by Backlash of Gearbox in Escalator with Chain-sprocket Drive Mechanism (체인-스프라켓 메커니즘을 갖는 에스컬레이터에서 기어박스 백래시로 인한 이상진동에 관한 연구)

  • 권이석;홍성욱;박노길
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.13 no.5
    • /
    • pp.341-347
    • /
    • 2003
  • This paper presents an improved escalator dynamic model so as to reflect the experimental observation on the pseudo-resonance affected by load applied. The experimental evidence reveals that backlash on gearbox as well as sag of driving Chain are most critical factors to the pseudo-resonance in escalators. The dynamic model effectively reflects vibration characteristics measured in real escalators with respect to different conditions of driving chain and the number of passengers. For validation of the dynamic model developed. numerical results from the model are compared with experimental results. The developed model and its simulation results are used rigorously for the design of escalator systems in enhancing the ride comfort.

Balmer Wing Formation in Active Galactic Nuclei

  • Chang, Seok-Jun;Lee, Hee-Won
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.78.2-78.2
    • /
    • 2015
  • Powered by a supermassive black hole, active galactic nuclei (AGNs) are characterized by prominent emission lines including Blamer lines. The unification scheme of AGNs requires the existence of a thick molecular torus that may hide the broad emission line region. In this configuration, it is expected that the far UV radiation from the central engine can be Raman scattered by neutral hydrogen to reappear around Balmer lines which can be identified observationally with broad Balmer wings. Another mechanism that can form Balmer wings is considered by invoking a fast moving medium around the central engine. In this presentation, we produce Balmer wings that are formed through Raman scattering and also those expected from a fast moving emission flow. It is noted that Raman Balmer wings exhibit stronger red part whereas the opposite behavior is seen in the Balmer wings obtained from a fast moving emission flow.

  • PDF

A Comparative Study on the Repair Performance of Concrete Crack (콘크리트 균열 보수성능에 관한 비교 연구)

  • 박성우;윤성훈
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.10a
    • /
    • pp.817-822
    • /
    • 2002
  • The problem of the crack which occures from the reinforced concrete structure could be caused by the complexed factors. When the crack happen, it caused fatal blemish to manage and maintain the structure such as structural problem, licking, spalling, viewing Even though they study and work hard to solve this kind of problem in the world, there are no countermeasure for perfect prevention of crack. After the crack checked out, a method of repair-reinforcement has been studied and operated actively, Generally, occurance of the crack in the concrete structure could be taken as granted, no need to mention the damage from the crack, domestic construction try to hide it rather than repair basically, In many cases the construction amount for repairing the crack has to be made in the construction area and the amount is very expensive. To save the repaing fee, companys repair it under the meeting of their desire. it can be expected for the effection of the construction. For this reason, we compare a new injection method to solve the demerits of the present method, to save and use the merit of the present method.

  • PDF