• Title/Summary/Keyword: Hides

Search Result 78, Processing Time 0.022 seconds

Watermarking Technique using Image Characteristics

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.187-193
    • /
    • 2021
  • In this paper, we propose an image watermarking technique that effectively hides confidential data in the LSB of image pixels by utilizing the characteristics of the image. In the proposed technique, the image is precisely divided into boundary surface and normal region other than the boundary surface and performs different processing. The boundary surface existing in the image is created by meeting different regions and contains important information of the image. One bit of confidential data is concealed in the LSB of the pixel at the boundary surface to preserve the characteristics of the boundary surface. In normal region other than the boundary surface, the pixel values are similar, and the change with the adjacent pixel values is smooth. Based on this property, even if the 2 bits of confidential data are hidden in the lower 2 bits of the pixel in the normal region, the difference cannot be visually distinguished. When confidential data is concealed in an image as described above, the amount of confidential data concealed in an image can be increased while maintaining excellent image quality. Concealing confidential data by applying the proposed method increases the amount of confidential data concealed by up to 84.6% compared to the existing method. The proposed technique can be effectively used for commercial image watermarking that hides copyright information.

Copyright Protection of Compression Video(MPEG-2) Using Watermark (워터마크를 이용한 동영상미디어(MPEG-2)의 저작권보호)

  • Shin, Jin-Uk;Kim, In-Taek
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.1
    • /
    • pp.26-31
    • /
    • 2002
  • In this paper, an MPEG-2 based technique for embedding digital watermarks into MPEG-2 video is proposed. The technique hides watermarking information into the DCT coefficients of each frame from MPEG-2 video. Several experiments have been conducted to show the performance in different conditions: the location of embedding watermarks, the change of Bitrates, and relocation of I-pictures in the MPEG video.

BioCovi: A Visualization Service for Comparative Genomics Analysis

  • Lee, Jungsul;Park, Daeui;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.3 no.2
    • /
    • pp.52-54
    • /
    • 2005
  • Visualization of the homology information is an important method to analyze the evolutionary and functional meanings of genes. With a database containing model genomes of Homo sapiens, Mus muculus, and Rattus norvegicus, we constructed a web­based comparative analysis tool, BioCovi, to visualize the homology information of mammalian sequences on a very large scale. The user interface has several features: it marks regions whose identity is greater than that specified, it shows or hides gaps from the result of global sequence alignment, and it inverts the graph when total identity is higher than the threshold specified.

Design and Performance Analysis of the Interface Middleware for Embedded Systems (임베디드 시스템 인터페이스용 미들웨어 설계 및 성능분석)

  • Kim, Myoung-Sun;Lee, Su-Won;Lee, Cheol-Hoon;Choi, Hoon;Cho, Kil-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.52-62
    • /
    • 2008
  • As various types of embedded devices are widely used, a technology that supports reuse of applications on multiple platforms is needed in order for time-to-market development of the applications. The interface middleware is one of such technology and it hides platform dependency from application programmers. Existing interface middleware such as the MT project, Xenomai and Legacy2linux have limitation in that the APIs provided by each of these middleware are fixed to a specific operating system, and the middleware does not provide dynamic expansion of its API set. In this paper, we propose a middleware which hides operating system dependencies and enables porting of applications on various operating systems. In addition, the middleware has scalable structure so that it is suitable for resource-limited embedded systems. The overhead of the middleware, i.e., the time delay occurred by the middleware is between $0.3{\mu}sec\;and\;5{\mu}sec$ in most cases. We believe that the amount of overhead is reasonable and does not hurt the performance of applications.

Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids

  • Mulyani, Sri;Setyabudi, Francis.M.C. Sigit;Pranoto, Yudi;Santoso, Umar
    • Food Science of Animal Resources
    • /
    • v.37 no.5
    • /
    • pp.708-715
    • /
    • 2017
  • The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly (p>0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained ${\alpha}$- and ${\beta}$-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

CURRENT STATUS OF THE INSTRUMENTS, INSTRUMENTATION AND OPEN USE OF OKAYAMA ASTROPHYSICAL OBSERVATORY

  • YOSHIDA MICHITOSHI
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.117-120
    • /
    • 2005
  • Current instrumentation activities and the open user status of Okayama Astrophysical Observatory (OAO) are reviewed. There are two telescopes in operation and one telescope under reforming at OAO. The 188cm telescope is provided for open use for more than 200 nights in a year. The typical over-subscription rate of observation proposals for the 188cm telescope is ${\~}$ 1.5 - 2. The 50cm telescope is dedicated to $\gamma$-ray burst optical follow-up observation and is operated in collaboration with Tokyo Institute of Technology. The 91cm telescope will become a new very wide field near-infrared camera in two years. The high-dispersion echelle spectrograph (HIDES) is the current primary instrument for the open use of the 188cm telescope. Two new instruments, an infrared multi-purpose camera (ISLE) and an optical low-dispersion spectrograph (KOOLS), are now under development. They will be open as common use instruments in 2006.

High Performance Implementation of SGCM on High-End IoT Devices

  • Seo, Hwajeong
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.4
    • /
    • pp.212-216
    • /
    • 2017
  • In this paper, we introduce novel techniques to improve the high performance of AE functions on modern high-end IoT platforms (ARM-NEON), which support SIMD and cryptography instruction sets. For the Sophie Germain Counter Mode of operation (SGCM), counter modes of encryption and prime field multiplication are required. We chose the Montgomery multiplication for modular multiplication. We perform Montgomery multiplication in a parallel way by exploiting both the ARM and NEON instruction sets. Specifically, the NEON instruction performed 128-bit integer multiplication and the ARM instruction performed Montgomery reduction, simultaneously. This approach hides the latency for ARM in the NEON instruction set. For a high-speed counter mode of encryptions for both AE functions, we introduced two-level computations. When the tasks were large volume, we switched to the NEON instruction to execute the encryption operations. Otherwise, we performed the encryptions on the ARM module.

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images

  • Lee, Chin-Feng;Chang, Chin-Chen;Li, Guan-Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2554-2575
    • /
    • 2020
  • Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.

Implementation of Context-Aware Middleware for Sensor Network in Ubiquitous Environment

  • Kim Bo-Seong;Lee Byoung-Hoon;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.9-16
    • /
    • 2006
  • Recently many researches are investigating for ubiquitous computing and network. In the real world many sensor devices must be equipped to provide many services for users. To make computing environment easy and more user friendly, middleware system not only hides all complexities (network, system, services, etc), but also needs to have efficient context inference scheme and system reconfiguration capability. In this paper we suggest context-aware middleware design for sensor network which provides efficient computing environment for end-users. We also present XML based implementation of our system.

  • PDF

PREVALENCE AND CONTROL OF GOAT WARBLES

  • Khan, M.Q.;Cheema, A.H.;Inayatullah, C.;Mirza, I.H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.4 no.2
    • /
    • pp.157-159
    • /
    • 1991
  • The prevalence of warbles (Przhevalskiana silenus Brauer) and efficacy of ivomec against naturally occurring warble infestation in goats in Pothowar area of Pakistan was investigated. About 58.4% of the examined goats (total 301), were infedted by the warbles. The number of warbles per animal ranged from 1 to 23 (mean 5.1). Ivomec (ivermectin 1% w/v, Merck Sharp and Dhome, Netherlands) at the dose of 1 ml/50 kg of body weight proved excellent against this pest. The larvae of all the stages died inside the warbles after treatment and no skin perforations were observed in the treated animals. No side-effects of the drug were observed in the treated animals, except 2-3 minutes of bleating in a few animals at the time of injection.