• Title/Summary/Keyword: Images Hiding

Search Result 127, Processing Time 0.024 seconds

Steganography Software Analysis -Focusing on Performance Comparison (스테가노그래피 소프트웨어 분석 연구 - 성능 비교 중심으로)

  • Lee, Hyo-joo;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1359-1368
    • /
    • 2021
  • Steganography is a science of embedding secret data into innocent data and its goal is to conceal the existence of a carrier data. Many research on Steganography has been proposed by various hiding and detection techniques that are based on different algorithms. On the other hand, very few studies have been conducted to analyze the performance of each Steganography software. This paper describes five different Steganography software, each having its own algorithms, and analyzes the difference of each inherent feature. Image quality metrics of Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are used to define its performance of each Steganography software. We extracted PSNR and SSIM results of a quantitative amount of embedded output images for those five Steganography software. The results will show the optimal steganography software based on the evaluation metrics and ultimately contribute to forensics.

A Female-Centered Community, Racial Other and Its Alienation in Nadine Gordimer's The Pickup (나딘 고디머의 『픽업』에 나타난 여성중심 공동체와 인종적 타자의 고립화 문제)

  • Kim, Min Hoe
    • English & American cultural studies
    • /
    • v.18 no.3
    • /
    • pp.1-29
    • /
    • 2018
  • Nadine Gordimer's The Pickup, published in 2001, well shows how the social issues have been changed in a way to reflect the South African society which is more complicated in the post-apartheid era. Examining the two different geographical territories between Johannesburg, South Africa and an unnamed nation in Middle East, putting aside the domestic racism between white and black, she extends her issue of racial other to global one with new rising issue of immigration in South African society. It seems that Gordimer's such issue is well represented by two main characters: Julie Summers who comes from a wealthy family and falls in love with Abdu, an illegal immigrant who was born from a poor country in Middle East and is now working at a garage in a downtown of Johannesburg with hiding his real name Ibrahim ibn Musa. Having an official relationship with Ibrahim and joining the regular meeting at the El-Ay (L.A.) Cafe where all participants can enjoy the freedom of expression/speech except for Abdu, she begins to have interest in his silence and his presence, orientalized as the Arab Prince for her imagination. Arriving at Abdu 's nation later, she also keeps projecting the 'less civilized' images to his nation where there are only desert, uneducated people, and dirty houses and streets. In doing so, Gordimer leads reader to a never-ending issue of Orientalism in the Western literature. Moreover, the writer attempts to create a female-centered community at the male-centered Islam community by marginalizing the presence of Abdu who finally leaves to America alone. As Julie is successfully acculturated to the unknown Abdu's community, she begins to place herself at the center of the community and plays a role as a mediator/communicator who can change/civilize it with her western knowledge of language and culture. By replacing the male-centered with the female-centered through Julie, Gordimer seems to be creating an idealized community with the notion of matriarchy. However, Gordimer places Abdu as an unstable subject who has to endlessly move back and forth for his undetermined national and cultural identity while Julie achieves the determined identity in both nations.

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

Preparation of Porous PMMA/TiO2 Microspheres by Spray Drying Process (스프레이 건조법을 이용한 PMMA/TiO2 다공성 입자 제조 및 특성 연구)

  • Paik, Dong-Hyun;Lee, Hyunsuk;Gang, Rae-Hyoung;Kim, Yong-Jin;Lee, John Hwan;Choi, Sung-Wook
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.42 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Highly porous polymethyl methacrylate (PMMA) microspheres impregnated by $TiO_2$ powder were prepared by spray drying method. The particle size and the porosity were controlled by optimizing the co-solvent ratio and the polymer concentration. $TiO_2$ powder was impregnated into the microspheres upto 74.6 wt% content based on the weight of the resultant $PMMA/TiO_2$ microspheres. SEM images showed that $TiO_2$ powder was well distributed throughout the inside of the microsphere. EDX mapping showed that the Ti signal was well detected from every part of the microspheres, which was the evidence of the formation of the $PMMA/TiO_2$ composite. Hg porosimetry result showed that the porosity was found to be over 50% regardless of the $TiO_2$ contents. The final product was found to have high oil-absorbing capacity and great hiding power, both of which are key properties in designing the microsphere materials for make-up cosmetics application.

Cat Behavior Pattern Analysis and Disease Prediction System of Home CCTV Images using AI (AI를 이용한 홈CCTV 영상의 반려묘 행동 패턴 분석 및 질병 예측 시스템 연구)

  • Han, Su-yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1266-1271
    • /
    • 2022
  • Cats have strong wildness so they have a characteristic of hiding diseases well. The disease may have already worsened when the guardian finds out that the cat has a disease. It will be of great help in treating the cat's disease if the owner can recognize the cat's polydipsia, polyuria, and frequent urination more quickly. In this paper, 1) Efficient version of DeepLabCut for pose estimation, 2) YOLO v4 for object detection, 3) LSTM is used for behavior prediction, and 4) BoT-SORT is used for object tracking running on an artificial intelligence device. Using artificial intelligence technology, it predicts the cat's next, polyuria and frequency of urination through the analysis of the cat's behavior pattern from the home CCTV video and the weight sensor of the water bowl. And, through analysis of cat behavior patterns, we propose an application that reports disease prediction and abnormal behavior to the guardian and delivers it to the guardian's mobile and the server system.

Cat Behavior Pattern Analysis and Disease Prediction System of Home CCTV Images using AI (AI를 이용한 홈CCTV 영상의 반려묘 행동 패턴 분석 및 질병 예측 시스템 연구)

  • Han, Su-yeon;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.165-167
    • /
    • 2022
  • The proportion of cat cats among companion animals has been increasing at an average annual rate of 25.4% since 2012. Cats have strong wildness compared to dogs, so they have a characteristic of hiding diseases well. Therefore, when the guardian finds out that the cat has a disease, the disease may have already worsened. Symptoms such as anorexia (eating avoidance), vomiting, diarrhea, polydipsia, and polyuria in cats are some of the symptoms that appear in cat diseases such as diabetes, hyperthyroidism, renal failure, and panleukopenia. It will be of great help in treating the cat's disease if the owner can recognize the cat's polydipsia (drinking a lot of water), polyuria (a large amount of urine), and frequent urination (urinating frequently) more quickly. In this paper, 1) Efficient version of DeepLabCut for posture prediction running on an artificial intelligence server, 2) yolov4 for object detection, and 3) LSTM are used for behavior prediction. Using artificial intelligence technology, it predicts the cat's next, polyuria and frequency of urination through the analysis of the cat's behavior pattern from the home CCTV video and the weight sensor of the water bowl. And, through analysis of cat behavior patterns, we propose an application that reports disease prediction and abnormal behavior to the guardian and delivers it to the guardian's mobile and the main server system.

  • PDF