• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.026 seconds

A New Multi-layer Multimedia for Copyright Protection (저작권보호를 위한 다중계층 멀티미디어)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.135-145
    • /
    • 2008
  • Needs for copyright protection of multimedia content are getting increased because of the internet growth. In this paper, a new technology which protects the content copyright to provide different content services by user level using the digital watermarking technology was proposed. The service can be provided by two layers of a paid user and a free user. By the proposed method, the paid user can use the high quality content and the free user only can use the low quality content. The digital watermarking technology was used to hide information to be able to improve the content quality.

  • PDF

A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing (비밀 공유 기반의 7×7 스도쿠를 사용한 가역 정보 은닉 기법)

  • Kim, Young-Ju;Kim, Pyung-Han;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.261-270
    • /
    • 2017
  • Data hiding is a way to hide the information in multimedia media such as images or video. The scheme proposed by Nguyen and Chang, was able to embed, extract, and restore the cover image and the secret data using Sudoku. But in the extracting phase, the occurrence of duplicate values in the reference matrix was found to decrease the embedding capacity of secret data. This paper has proposed a reversible data hiding scheme while maintaining the quality of the image to provide high embedding capacity using $7{\times}7$ Sudoku and Shamir's secret sharing scheme.

A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION

  • Han, Seung-Wu;Fujiyoshi, Masaaki;Kiya, Hitoshi
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.572-577
    • /
    • 2009
  • This paper proposes a novel reversible image authentication method that requires neither location map nor memorization of parameters. The proposed method detects image tampering and further localizes tampered regions. Though this method once distorts an image to hide data for tamper detection, it recovers the original image from the distorted image unless no tamper is applied to the image. The method extracts hidden data and recovers the original image without memorization of any location map that indicates hiding places and of any parameter used in the algorithm. This feature makes the proposed method practical. Simulation results show the effectiveness of the proposed method.

  • PDF

Image Contents Encryption Technique for Digital Hologram Broadcasting Service (디지털 홀로그램 방송을 위한 영상 콘텐츠의 암호화)

  • Ha, Jun;Choi, Hyun-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.818-819
    • /
    • 2013
  • This paper propose a contents security technique for digital holographic display service. Digital holographic video system assumes the existing service frame for 2-dimensional or 3-dimensional video, which includes data acquisition, processing, transmission, reception, and reconstruction. In this paper, we perform the encryption of RGB image and depth-map for such a system. The experimental results showed that encrypting only 0.048% of the entire data was enough to hide the constants of the RGB image and depth-map.

  • PDF

Numerical study of Double Hydrofoil motions for thrust and propulsive efficiency (추력 및 효율 향상을 위한 Double Hydrofoil 움직임에 대한 수치해석 연구)

  • Kim, Sue-Jin;Han, Jun-Hee;Lee, Do-Hyung
    • The KSFM Journal of Fluid Machinery
    • /
    • v.17 no.4
    • /
    • pp.59-70
    • /
    • 2014
  • The motion of birds and insects have been studied and applied to MAV(Micro Air Vehicle) and AUV(Autonomous Underwater Vehicle). Most of AUV research is focused on shape and motion of single hydrofoil. However, double hydrofoil system is mostly used in real physics. This system shows completely different hydrodynamic characteristic to single hydrofoil because of wake interaction. The goal of this study is define the trajectory of wake interaction in double hydrofoil system. Moreover, trust and efficiency of various combined motion will be demonstrated. Symmetry airfoil is used for analysis an hydrodynamic characteristic. Forward wing's plunging and pitching motion is fixed, hide wing's Heaving ratio, Pitch phase shift from forward plunging and Heaving shift is changed. This study provide necessary basic data of motion optimization for double hydrofoil system.

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

Reversible Data Hiding in JPEG Images Using Ordered Embedding

  • Qian, Zhenxing;Dai, Shu;Chen, Boyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.945-958
    • /
    • 2017
  • This paper proposes a novel method of reversible data hiding in JPEG images. After analyzing the JPEG features, we provide a new algorithm of selecting appropriate blocks and coefficients to carry secret messages. Instead of embedding data into the histogram of all coefficients, we propose a strategy of ordered embedding to hide data by histogram shifts in several rounds. On the recipient end, secret messages can be exactly extracted, and the original JPEG image can be losslessly recovered. Experimental results show that high embedding rate can be achieved with limited distortions. Most importantly, the marked JPEG file generated by the proposed method requires less storage size than state-of-the-art works.

An Watermarking Method based on Singular Vector Decomposition and Vector Quantization using Fuzzy C-Mean Clustering (특이치 분해와 Fuzzy C-Mean(FCM) 클러스터링을 이용한 벡터양자화에 기반한 워터마킹 방법)

  • Lee, Byung-Hee;Kang, Hwan-Il;Jang, Woo-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.7-11
    • /
    • 2007
  • In this paper the one of image hide method for good compression ratio and satisfactory image quality of the cover image and the embedding image based on the singular value decomposition and the vector quantization using fuzzy c-mean clustering is introduced. Experimental result shows that the embedding image has invisibility and robustness to various serious attacks.

  • PDF

Modeling and Implementation of A Dynamic Reconfiguration Framework (동적 형상조정 프레임워크의 모델링 및 구현)

  • 윤태웅;민덕기
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.83-94
    • /
    • 2003
  • For 24 hours-7 days service on distributed systems, a great deal of efforts are investigated on high availability for seamless operation. In this paper, we propose a dynamic reconfiguration framework of distributed systems, called "hot-swapping" framework. This framework allows us to upgrade and exchange a number of modules of a distributed system without stopping running service as well as the system itself. In order to hide the state of service operation, the framework employes the "proxy" design pattern. Our framework provides two types of proxies: a static proxy and a dynamic proxy, Static proxies can achieve fast execution time, but they need to be changed whenever any minor change exists in the related swappable module. Meanwhile, dynamic proxies takes longer execution time, but do not need to be changed under minor changes of swappable modules. We compare performances of static and dynamic proxies and also apply the framework to a real situation with security management modules. management modules.

  • PDF

For Your Own Good:Korean Mothers' Attitudes Towards Disciplining Their Children (너 잘되라고 때리지 미워서 때리냐?)

  • Kim, Shi Hae;Chung, Soon Hwa
    • Korean Journal of Child Studies
    • /
    • v.19 no.1
    • /
    • pp.55-84
    • /
    • 1998
  • Researchers examined elementary school children's experiences and the way that their mothers scolded them. In their writings, the children reported that their mothers under-estimated them, and assumed that they were not able to do anything by themselves. This reflected on the way that the mothers disciplined their children. The mothers were not a good model of proper behavior and did not treat the siblings fairly. The mothers were directive and valued results over effort. The children confessed that they felt suicidal, miserable and wanted to run away from home. They had a love-hate relationship with their mothers. They had to hide their real feelings and show love and respect towards their mothers. They had conflicts in dealing with these feelings. Their inability to show their real feelings and their dependency on their mothers made them return home, much like a boomerang. As a result, the children learned how to respond quickly in avoiding scolding situations. Furthermore, they learned the most important lesson; that it is all right to be abusive as long as it is for their or anybody else's own good.

  • PDF