• Title/Summary/Keyword: Masking

Search Result 747, Processing Time 0.024 seconds

Smart Glasses Technologies for Trustworthy, Augmented Reality, See-Through Eyes-Direct Communications as Substitute for Smart Phones (스마트폰 대체재로서의 신뢰증강보는통신용 스마트안경 기술)

  • Song, K.B.;Lee, J.K.;Kim, K.Y.;Kim, G.W.;Park, S.H.;Kim, T.Y.;Yoon, H.S.;Lee, J.H.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.58-70
    • /
    • 2019
  • In this paper, we present the R&D status of ETRI's Trusted Reality (TR) project and its core technologies. ETRI's TR project focuses on the next-generation paradigm of smart phones, ETRI-TR Smart Glasses, which aims to provide the same features as those of smart phones without the involvement of any handheld device. Furthermore, they are characterized by additional features enabled by trustworthy VR/AR/MR/XR, such as privacy masking/unmasking, distributed structure of thin-client computing/networking among TR-Glasses, TR-LocalEdge, and TR-RemoteEdge, with novel see-through eyes-direct communication between IoT real/virtual objects and human eyes. Based on these core technologies of the ETRI's TR project, the human-held ETRI-TR Smart Glasses is expected to aid in the realization of XR vision with particularly more XR's safe_privacy on social life in the near future.

Robust Image Watermarking via Perceptual Structural Regularity-based JND Model

  • Wang, Chunxing;Xu, Meiling;Wan, Wenbo;Wang, Jian;Meng, Lili;Li, Jing;Sun, Jiande
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1080-1099
    • /
    • 2019
  • A better tradeoff between robustness and invisibility will be realized by using the just noticeable (JND) model into the quantization-based watermarking scheme. The JND model is usually used to describe the perception characteristics of human visual systems (HVS). According to the research of cognitive science, HVS can adaptively extract the structure features of an image. However, the existing JND models in the watermarking scheme do not consider the structure features. Therefore, a novel JND model is proposed, which includes three aspects: contrast sensitivity function, luminance adaptation, and contrast masking (CM). In this model, the CM effect is modeled by analyzing the direction features and texture complexity, which meets the human visual perception characteristics and matches well with the spread transform dither modulation (STDM) watermarking framework by employing a new method to measure edge intensity. Compared with the other existing JND models, the proposed JND model based on structural regularity is more efficient and applicable in the STDM watermarking scheme. In terms of the experimental results, the proposed scheme performs better than the other watermarking scheme based on the existing JND models.

Construction of UOWHF: New Parallel Domain Extender with Optimal Key Size (UOWHF 구생방법 : 최적의 키 길이를 가자는 새로운 병렬 도메인 확장기)

  • Wonil Lee;Donghoon Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.57-68
    • /
    • 2004
  • We present a new parallel algorithm for extending the domain of a UOWHF. Our algorithm is based on non-complete l-ary tree and has the same optimal key length expansion as Shoup's which has the most efficient key length expansion known so far. Using the recent result [8], we can also prove that the key length expansion of this algorithm and Shoup's sequential algorithm are the minimum possible for any algorithms in a large class of "natural" domain extending algorithms. But its prallelizability performance is less efficient than complete tree based constructions. However if l is getting larger then the parallelizability of the construction is also getting near to that of complete tree based constructions.tructions.

Implementing M-SIDH: Performance and Efficiency Evaluation (M-SIDH 구현 및 성능 평가를 통한 효율성 연구)

  • Suhri Kim;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.591-599
    • /
    • 2023
  • Due to the recent attack by Castryck-Decru, the private key of SIDH can be recovered in polynomial time so several methods have been proposed to prevent the attack. Among them, M-SIDH proposed by Fouotsa et al, counteracts the attack by masking the torsion point information during the key exchange. In this paper, we implement M-SIDH and evaluate its performance. To the best of our knowledge, this is the first implementation of M-SIDH in C language. Toward that end, we propose a method to select parameters for M-SIDH instantiation and propose a 1024-bit prime for implementation. We implemented the square-root Velu formula over the extension field for further optimization. As a result, 1129 ms is required for a key exchange in the case of MSIDH-1024, providing the classic 64-bit security level.

AI-based Masking Service For Personal Information Protection On Drone-shooting Videos (드론 촬영물에서의 개인정보 보호를 위한 AI 기반 마스킹 서비스)

  • Shin, Dayeon;Kim, Hyoin;Ryu, Hyewon;Lee, Siyoung;Kim, Myungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.401-404
    • /
    • 2020
  • 최근 드론 산업은 미래를 이끌어갈 신산업으로 부상하고 있다. 이러한 기대에도 불구하고 드론으로 인해 생기는 여러 문제들 중에서 개인정보침해 관련 문제는 기술적으로 쉽게 풀리지 않아서 드론 사용에 대한 법적인 규제만 더 강화하고 있는 실정이다. 본 논문은 드론 촬영물이 묵시적으로 가지고 있는 개인정보 침해문제를 클라우드 환경 가운데 기술적으로 풀어내었다. 사용자는 자신의 개인정보 침해 요소가 제거된 안전한 영상을 이용할 수 있도록 실시간 촬영 시 특정 사람 객체에 대한 마스킹을 진행할 수 있다. 라즈베리파이 카메라와 드론을 이용해 동영상을 촬영한 뒤 소켓 통신을 통해 이를 클라우드 환경에서의 서버로 전송하면 서버는 실시간으로 마스킹 처리를 진행하며 마스킹이 완료된 영상은 최종적으로 서버에 저장된다. 사용자는 모든 사람 객체 마스킹과 특정인을 제외한 모든 사람 객체 마스킹이라는 두 가지 옵션 중에서 원하는 옵션을 선택하여 개인정보 마스킹 처리를 진행할 수 있다.

Side-Channel analysis and masking scheme for domestic lightweight cipher PIPO (국산 경량 암호 PIPO에 대한 부채널 분석과 마스킹 기법 제안)

  • Sim, Min-Joo;Kim, Hyun-Jun;Kwon, Hyeok-Dong;Jang, Kyung-Bae;Kim, Hyun-Ji;Park, Jae-Hoon;Eum, Si-Woo;Song, Gyeong-Ju;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.171-174
    • /
    • 2021
  • 최근 사물인터넷(IoT) 환경에서 다양한 장비의 인터넷 통신이 가능하여 이에 적절한 경량 블록 암호 알고리즘에 대한 연구가 활발히 진행되고 있다. ICISC 2020에서 새로 발표된 국산 경량 블록 암호 알고리즘인 PIPO는 새로운 경량 S-Box를 조합한 unbalanced-Bridge 구조로 효율적인 비트슬라이싱 구현을 제공한다. IoT 환경에 PIPO가 적용되기 위해서는 부채널 분석에 대한 안전성이 보장되어야 한다. 따라서 본 논문에서는 PIPO가 1차 CPA 공격에 취약함을 확인한다. 그리고 부채널 공격에 대응하기 위해 1차 마스킹 기법을 제안한다. 제안한 마스킹 기법은 1차 CPA 공격에 안전하였으며, 마스킹 적용 전보다 -375%의 성능을 보였다. 그리고 기존 기법보다 1287% 속도가 빨라진 것을 확인하였다.

A WWMBERT-based Method for Improving Chinese Text Classification Task (중국어 텍스트 분류 작업의 개선을 위한 WWMBERT 기반 방식)

  • Wang, Xinyuan;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.408-410
    • /
    • 2021
  • In the NLP field, the pre-training model BERT launched by the Google team in 2018 has shown amazing results in various tasks in the NLP field. Subsequently, many variant models have been derived based on the original BERT, such as RoBERTa, ERNIEBERT and so on. In this paper, the WWMBERT (Whole Word Masking BERT) model suitable for Chinese text tasks was used as the baseline model of our experiment. The experiment is mainly for "Text-level Chinese text classification tasks" are improved, which mainly combines Tapt (Task-Adaptive Pretraining) and "Multi-Sample Dropout method" to improve the model, and compare the experimental results, experimental data sets and model scoring standards Both are consistent with the official WWMBERT model using Accuracy as the scoring standard. The official WWMBERT model uses the maximum and average values of multiple experimental results as the experimental scores. The development set was 97.70% (97.50%) on the "text-level Chinese text classification task". and 97.70% (97.50%) of the test set. After comparing the results of the experiments in this paper, the development set increased by 0.35% (0.5%) and the test set increased by 0.31% (0.48%). The original baseline model has been significantly improved.

Effect of ${\beta}-Carotene$ on Flavor and Oxidation Stability in Seasoning Oil (${\beta}-Carotene$이 향미유의 풍미 및 산화 안정성에 미치는 영향)

  • Koo, Bon-Soon;Kim, Jong-Seung
    • Journal of the Korean Society of Food Culture
    • /
    • v.21 no.1
    • /
    • pp.81-85
    • /
    • 2006
  • Seasoning oil(SO-1) was manufactured from soybean oil, with ${\beta}-carotene$, oleoresin paprika and 3 kinds of flavors. Color of it's SO-1 was red. Total content of trans fatty acid of SO-1 was low level 0.84%, compare to the butter's and margarine's 1.35%, 28.31%, respectively. Total volatile components of SO-1 was 201,313.11ppm, was higher than soybean oil's, butter's, margarine's and SO-2's(removed 3 kinds of flavors from SO-1), it's value of 63.54ppm, 481.24ppm, 168.95ppm and 205.73ppm, respectively. And smoke point(SP) of SO-1 was higher than others. SP of SO-1, after 6 months later at room temperature, was 240, in contrast with soybean oil's 228. This SO-1, added ${\beta}-carotene$ and flavor components, had a masking effect of burnt flavor. From these results, SO-1 can be replaced of butter or margarine as a substituted oil.

A study on the effect of leading sound and following sound on sound localization (선행음 및 후속음이 음원의 방향지각에 미치는 영향에 관한 연구)

  • Lee, Chai-Bong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.2
    • /
    • pp.40-43
    • /
    • 2015
  • In this paper, the effects of the leading and the following sounds with single frequency on sound localization are investigated. The sounds with different levels and ISIs(Inter Stimuli Intervals) were used. The width of test sound is 2ms, and those of the leading and the following sounds are 10ms. 1 kHz of the test sound is utilized. The arrival time difference in the subject's ears is set to be 0.5ms. The four kinds of level differences used for one ISI are 0, -10, -15, and -20dB interval. The leading sound is found to have more effect on sound localization than the following sound is. The effect of the leading sound is also found to be dependent on the value of ISI. When the value of the ISI is small, different effects affecting the sound localization are observed.

The Simulation of Selective Emitter Formation for Crystalline Silicon Solar Cell by Growing Thermal Oxide (Thermal oxidation을 이용한 결정질 실리콘 태양전지의 selective emitter 형성 방법에 대한 simulation)

  • Choe, Yonghyon;Son, Hyukjoo;Lee, Inji;Park, Jeagun;Park, Yonghwan
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.53.1-53.1
    • /
    • 2010
  • 결정질 실리콘 태양전지의 효율을 향상시키기 위하여 수광면에 서로 다른 도핑농도를 가지는 고농도 도핑영역과 저농도 도핑영역으로 이루어진 emitter를 형성하는 것이 요구되며 이를 selective emitter라 칭한다. Selective emitter를 형성하면 고농도 도핑영역에서 금속전극과 저항 접촉이 잘 형성되기 때문에 직렬 저항이 최소화되고 저농도 도핑영역에서는 전하 재결합의 감소로 인하여 태양전지의 변환효율이 상승하는 이점이 있다. Selective emitter의 형성방법은 이미 다양한 방법이 제안되고 있으나, 본 연구에서는 기존에 제시된 방법과는 다르게 열산화 시 dopant redistribution에 의한 Boron depletion 현상을 이용하여 selective emitter를 형성하는 방법을 제안하였고, 이를 Simulation을 통하여 검증하였다. 초기 emitter 확산 후 junction depth는 0.478um, 면저항은 $104.2{\Omega}/sq.$ 이었으며, nitride masking layer 두께는 0.3um로 설정하였다. $1100^{\circ}C$에서 30분간 습식산화 공정을 거친 후 nitride mask가 있는 부분의 junction depth는 1.48um, 면저항은 $89.1{\Omega}/sq$의 값을 보였고, 산화막이 형성된 부분의 junction depth는 1.16um, 면저항은 $261.8{\Omega}/sq$의 값을 보였다. 위 조건의 구조를 가진 태양전지의 변환 효율은 19.28%의 값을 나타내었고 Voc, Jsc 및 fill factor는 각각 645.08mV, $36.26mA/cm^2$, 82.42%의 값을 보였다. 한편 일반적인 구조로 설정한 태양전지의 변환 효율, Voc, Isc 및 fill factor는 각각 18.73%, 644.86mV, $36.26mA/cm^2$, 80.09%의 값을 보였다.

  • PDF