• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.028 seconds

Efficient Native Processing Modules for Interactive DTV Middleware Based on the Small Footprint Set-Top Box

  • Shin, Sang-Myeong;Im, Dong-Gi;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1617-1627
    • /
    • 2006
  • The concept of middleware for digital TV receivers is not new one. Using middleware for digital TV development has a number of advantages. It makes it easier for manufacturers to hide differences in the underlying hardware. It also offers a standard platform for application developers. Digital TV middleware enables set-top boxes(STBs) to run video, audio, and applications. The main concern of digital TV middleware is now to reduce its memory usage because most STBs in the market are small footprint. In this paper, we propose several ideas about how to reduce the required memory size on the runtime area of DTV middleware using a new native process technology. Our proposed system has two components; the Efficient Native Process Module, and Enhanced Native Interface APIs for concurrent native modules. With our approach, the required memory reduced from 50% up to 75% compared with the traditional approach. It can be suitable for low end STBs of very low hardware limitation.

  • PDF

Secure Steganographic Model for Audio e-Book Streaming Service (오디오 e-Book 스트리밍을 지원하는 스테가노그래피 모델)

  • Lee, Yun-Jung;Lee, Bong-Kyu;Kim, Chul-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5878-5884
    • /
    • 2011
  • We present steganographic service model and algorism that fit feature of streaming audio book service in order to hide information of copyright and certificate of it. Secret information is encrypted with random numger by secret key that client and server share, so that increase confidentiality. We made secret data distributed randomly and evenly, and improved throughput by simplifying additional computations considering streaming environment.

An Investigation Study on the Architectural Characteristics of Modern Building at Gangneung (강릉의 근대건축물에 관한 건축적 특성 조사연구)

  • Park, Moon-Ho;Choi, Jang-Soon
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.7 no.1
    • /
    • pp.73-87
    • /
    • 2005
  • The purpose of this study is aimed at grasping the architectural characteristics of modern buildings in Gangneung from 1910's to 1970's. The results are as follows. 1) The commercial buildings are mostly unsymmetrical flat type and others except commercial buildings are mostly symmetrical flat type. 2)Up until the 1940's, staircases were located inner of building between the first and the second floor, however after the 1950's, they were separately located in one side of the building to ensure perpendicularly more space and easier mobility than before. 3)Windows were widely used in order to avoid monotonous wall elevation after 1950' s. 4)Striped decorations were put to use to decorate the front elevation of building. 5)Parapet which had decorative stripes to the top was generally used to hide roof.

  • PDF

Performance and Energy Optimization for Low-Write Performance Non-volatile Main Memory Systems (낮은 쓰기 성능을 갖는 비휘발성 메인 메모리 시스템을 위한 성능 및 에너지 최적화 기법)

  • Jung, Woo-Soon;Lee, Hyung-Gyu
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.5
    • /
    • pp.245-252
    • /
    • 2018
  • Non-volatile RAM devices have been increasingly viewed as an alternative of DRAM main memory system. However some technologies including phase-change memory (PCM) are still suffering from relatively poor write performance as well as limited endurance. In this paper, we introduce a proactive last-level cache management to efficiently hide a low write performance of non-volatile main memory systems. The proposed method significantly reduces the cache miss penalty by proactively evicting the part of cachelines when the non-volatile main memory system is in idle state. Our trace-driven simulation demonstrates 24% performance enhancement, compared with a conventional LRU cache management, on the average.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

A Maximum Data Allocation Rule for an Anti-forensic Data Hiding Method in NTFS Index Record

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.17-26
    • /
    • 2017
  • An anti-forensic data hiding method in an NTFS index record is a method designed for anti-forensics, which records data as a file name in index entries and thereafter the index entries are made to remain in the intentionally generated slack area in a 4KB-sized index record[7]. In this paper, we propose a maximum data allocation rule for an anti-forensic data hiding method in an NTFS index record; i.e., a computational method for storing optimal data to hide data in an index record of NTFS is developed and the optimal solution is obtained by applying the method. We confirm that the result of analyzing the case where the number of index entries n = 7 is the maximum case, and show the screen captures of index entries as experimental results.

A Study on the Women's Veil of Yi-Dynasty (내외용 쓰개류에 대한 고찰)

  • Kang Soon Che
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.2 no.2
    • /
    • pp.277-286
    • /
    • 1978
  • The history of the women's veil which was used to hide their face in Yi-Dynasty was discussed. The similar fashion of wearing veil was popular in T'ang China as Myok-li and Yoo-Mo, then it might have influenced the fashion of the women's dress of the Silla Dynasty. It was also found out that the custom was most popular in Koryo and then continued to Yi-Dynasty. The confucianism of Yi-Dynasty requested very strict moral obligation toward women that veil had to be worn by them whenever going out. It might not be their popular fashion but obligation. There were several types of veil so called; Neoul(라원) Jangott(장의) Suege-China(쓰개치마) Chun-eue(천의) Sak-kat(삿갓) Chun-mo(천모)etc., which were used as a part of formal dress for women. From the late 1930, when the new society started to accept women's activities, the customs of wearing veil had been vanishing from the women's dress.

  • PDF

Adaptive Encryption for DWT-based Images by Chaotic system (카오스 시스템에 의한 DWT기반 영상의 적응적 암호화)

  • 김수민;서영호;김동욱
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1859-1862
    • /
    • 2003
  • Security of digital images attracts much attention recently, and many image encryption methods have been proposed. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in the wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image. For ciphering the quantization index we use a novel image encryption Algorithm called BRIE(Bit Recirculation Image Encryption). which was proposed by J. C. Yen and J. I. Guo in 1999. According to a chaotic binary sequence generated by BRIE, the block which is produced by quantization index is cyclically shifted in the right or left direction. Finally, simulation results are included to demonstrate its effectiveness.

  • PDF

A Multiresolution Digital Watermarking Based on Image Statistics (영상의 통계적 특성에 기반한 다해상도 디지털 워터마킹)

  • 한성현
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.2
    • /
    • pp.25-32
    • /
    • 2000
  • Digital watermarking has been recently proposed as the means of intellectual property right protection of multimedia data. We present a novel watermarking scheme to hide a copyright information in a digital image. The method Is based on the 2D DWT(Discrete Wavelet Transform) and image statistics. Gaussian and Laplacian noises as the watermarks are added to the large wavelet coefficients at the high and middle frequency bands in the wavelet domain. Experimental results show that the proposed Laplacian watermark is stronger to several common image distortions, such as noises, JPEG coding as different qualities, Gaussian blurring, and edge enhancement.

  • PDF

Development of a Wavelet Based Optical Instrument Autofocusing algorithm (일차원 웨이브렛 변환을 이용한 광학기기의 자동 초점 조절에 관한 연구)

  • Park, Bong-Kil;Kim, Se-Hoon;Kim, Yoon-Soo;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1997.11a
    • /
    • pp.603-605
    • /
    • 1997
  • A new algorithm using 1-dimensional wavelet transform for autofocusing of optical instrument has been developed. Previous studies based on the conventional frequency analysis have shown that as the lens-object distance approaches the optimum value, the high frequency energy in the corresponding image shows a consistent increase. However, as conventional frequency analysis techniques hide spatial distribution of each band energy, shape information in the original signal cannot be easily utilized. In this paper, a newly devised wavelet based focus measuring scheme is presented. Unlike other frequency domain analysis techniques that simply produce "frequency-only" spectra, wavelet analysis provides a "time-frequency" localized view of a given signal. As a result, both frequency band filtering and spatial distribution filtering can easily be realized. Depending on the proposed focus quality measuring algorithm, a fast and reliable automatic focus adjustment of optical devices could be implemented.

  • PDF