• Title/Summary/Keyword: Hiding power

Search Result 23, Processing Time 0.022 seconds

The relationship between knowledge hiding and knowledge sharing : Through determinants of knowledge hiding and knowledge sharing (지식은폐와 지식공유의 영향요인과 관계에 관한 연구)

  • Shin, GaHee;Kwag, Sunhwa
    • Knowledge Management Research
    • /
    • v.18 no.2
    • /
    • pp.129-157
    • /
    • 2017
  • Knowledge is important to both individuals and organizations. Individuals can have the opportunity to have bargaining power within their organisations by having knowledge of know-how and ideas. Having ample knowledge of the organization can bring about advantages in securing competitive advantage. Organization wants to encourage employees to share knowledge. Despite the efforts to enhance knowledge sharing, often the effort failed. Employees are unwilling to share their knowledge or hide their knowledge. The purpose of this study is to clarify the relationship between knowledge hiding and knowledge sharing based on exploring the influence factors of knowledge hiding and knowledge sharing. As a result, the influence factors of knowledge hiding and knowledge sharing were different. The influences of knowledge hiding influenced knowledge hiding only and did not affect knowledge sharing. This implies that knowledge hiding and knowledge sharing do not exist on a single line but exist independently of each other, such as 'Herzberg's two-factor theory'. This study suggests that knowledge hiding is a field of interest as well as knowledge sharing. In practice, it is suggested that the concept of promoting knowledge sharing is not a way to reduce knowledge hiding, so the two concepts should be managed separately.

A Data Hiding Scheme for Grayscale Images Using a Square Function

  • Kwon, Hyejin;Kim, Haemun;Kim, Soonja
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.466-477
    • /
    • 2014
  • Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.

Two-level Information Hiding Method for the Transmission of Military Secret Images (군사용 비밀 영상 전송을 위한 이단계 정보은닉 기법)

  • Kim, In-Taek;Kim, Jae-Cheol;Lee, Yong-Kyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.482-491
    • /
    • 2011
  • The purpose of this study is to design and implement a 2-level secret information transmission system which can be used for information hiding of images transmitted over various IT communication media. To increase the robustness of the hiding power, we combined the steganography method which inserts secret object into cover object to hide the very fact of information hiding itself, and the preprocessing stage to encrypt the secret object before the stego-insertion stage. As a result, even when the stego-image is broken by an attacker, the secret image is protected by encryption. We implemented the 2-level image insertion and extraction algorithm by using C++ programming language. Experiment shows that the PSNR values of stego-images of ours exceed 30.00db which is the threshold of human recognition. The methodology of this study can be applied broadly to the information hiding and protection of the military secret images.

Analysis of the GPGPU Performance for Various Combinations of Workloads Executed Concurrently (동시에 실행되는 워크로드 조합에 따른 GPGPU 성능 분석)

  • Kim, Dongwhan;Eom, Hyeonsang
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.165-170
    • /
    • 2017
  • Many studies have utilized GPGPU (General-Purpose Graphic Processing Unit) and its high computing power to compute complex tasks. The characteristics of GPGPU programs necessitate the operations of memory copy between the host and device. A high latency period can affect the performance of the program. Thus, it is required to significantly improve the performance of GPGPU programs by optimizations. By executing multiple GPGPU programs simultaneously, the latency hiding effect of memory copy is achieved by overlapping the memory copy and computing operations in GPGPU. This paper presents the results of analyzing the latency hiding effect for memory copy operations. Furthermore, we propose a performance anticipation model and an algorithm for the limitations of using pinned memory, and show that the use of the proposed algorithm results in a 41% performance increase.

Information Hiding and Detection in MS Office 2007 file (Microsoft Office 2007 파일에의 정보 은닉 및 탐지 방법)

  • Park, Bo-Ra;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.143-154
    • /
    • 2008
  • Information hiding is a very important technology recently. Having this technology can be a competitive power for secure communication. In this paper, it will be showed that hiding data in MS Office 2007 file is possible. Considering Microsoft (MS) Office 2007 file format is based on Open XML format, the feature of Open XML format makes it possible to hide data in MS Office 2007 file. In Open XML format, unknown XML files and their relationships can be defined by user. These parts and relationships are used to hide data in MS Office 2007 file. Considering unknown parts and unknown relationships are not in normal MS Office 2007 file, the hidden data can be detected by confirming of unknown parts and unknown relationships.

A Study on the Eco-Friendly Durable Pre-Painting for Concrete Structure (콘크리트 구조물의 친환경 내구성 도장에 관한 기초 연구)

  • Jo, Byung Wan;Choi, Ji Sun;Lee, Seong Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.2
    • /
    • pp.110-116
    • /
    • 2013
  • A concrete structure has become bigger and higher because of development of construction technology and a change in construction environment. Also it tends to focus on repairing, reinforcement and exterior in harmony with environment for structure maintenance and performance improvement. The research is about eco friendly durable painting applicable to concrete structure using civil and architecture. it purpose to improve external beauties and durable problems due to flexibility by variation of temperature, adhesion of exterior wall, crack and delamination in existing organic and mineral painting. For those problems, we made a eco friendly pre-paint that is made with preliminary treatment mixture as a highly enriched waterproof agent and adhesive increasing agent in preprocessing mixture. Then we performed an experiment on durability of prevention neutralization of concrete, durability abrasion, hiding power, adhesion, temperature resistance and resistance to chemical attack. The result of an experiment shows that hiding power is over 0.96 in standard test, durability abrasion test got higher value 1mg than water paint 75mg and tensile strength is 6 times higher than standard waterproof specification.

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

입자 크기 분석 원리 및 연구 동향

  • 조금실;신진섭;김중현
    • Polymer Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.198-208
    • /
    • 2004
  • 입자의 크기 및 분산도에 관한 지식은 에멀젼 뿐만 아니라 aerosol, dispersion, suspension을 포함하는 미립자 계에서 중요한 정보이다. 특히 유화 중합에 있어서 입자의 크기 및 분산도의 정확한 측정은 중합 속도론 (입자의 생성, 성장 및 응집)을 다루는데 필수적이며, 입자의 크기 및 분산도는 hiding power, tinting strength 등 최종 물질의 물리$.$화학$.$기계적 성질 결정에 있어서 중요한 변수로 작용한다. 합성 공정에서도 입자의 크기 및 분산도는 콜로이드의 점도에 많은 영향을 미쳐서 공정의 안정성을 좌우하기도 한다.(중략)

  • PDF

Preparation of Bismuth Vanadate Pigment from Aqueous Solutions (습식법에 의한 Bismuth Vanadate 안료의 제조)

  • Kim, Jung-Teag;Kim, Tae-Won;Heo, Jea-Jun;Na, Seog-Eun;Joo, Jung-Pyo;Chun, Jae-Ki;Ju, Chang-Sik
    • Korean Chemical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.114-120
    • /
    • 2006
  • Bismuth vanadate is one of the environmentally benign substitutes for conventional inorganic pigments composed of heavy metals. The effect of process parameters on the physical properties of bismuth vanadate pigment prepared from aqueous solutions of potassium vanadate and bismuth nitrate were experimentally examined. Two aqueous solutions were fed into precipitation chamber at the same flow rate, and precipitates were formed at primary pH of 4.5 and secondary pH of 7.0~7.5. After aging for 3 hours in reaction mixture, 3 hours' calcination at $400^{\circ}C$ gave bismuth vanadate pigment with a good color and hiding power. Increase in molybdenum concentration in reaction mixture increased the hiding power of the pigment, but the other minor constituents had minor effect on the physical properties of the pigment.

A Study on the Transference of Headlines and Types of Preferred Headlines in Offline and Online Newspapers

  • Kim, Man-Ki;Kang, Hyun-Jig
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-106
    • /
    • 2011
  • With the development of the Internet, the media market is experiencing rapid change. The traditional form of offline newspaper markets, which has created the mainstream news delivery market, have been losing large amounts of power due to the emergence of online media. On the other hand, online media armed with its ability to post breaking news almost as it occurs has increased its influence and popularity at a rapid speed. However, since the exposure time and readership of online newspapers are less than their offline counterparts online media has a high dependence on sensational titles and somewhat exaggerating headlines rather than the objective and recapitulative headlines which are preferred. This paper will examine the function and significance of headlines, and conduct a comparative analysis on contents and forms of the headlines in offline newspaper and online newspaper in order to identify the characteristics of each newspaper. Through comparisons, it examines the types of headlines and the transference of headlines. In addition, it examines the differences in recognition of copy editors according to media in determining the headline, and it illuminates which type of headlines is preferred in order to instigate readers to read online newspapers. The analysis results of title-transferring cases in offline newspaper and online newspapers are that offline newspapers try to convey the contents accurately by making use of an information-transferring headline, while attention-attracting headline or subject-hiding headlines tend to be used for attracting the eye of readers. In addition, analysis results of headlines that are put on the top with a click counts in online newspapers are that attention-attracting headlines are the majority, while subject-hiding headlines that are hardly used in offline newspapers, are well-used in online newspapers. In an interview with copy editors, they responded that offline editors focus on the fact-transference in determining the title, while online editors put the weight on immediacy in the delivery of news and the function of guiding readers.