• Title/Summary/Keyword: disguise

Search Result 68, Processing Time 0.025 seconds

Generic Training Set based Multimanifold Discriminant Learning for Single Sample Face Recognition

  • Dong, Xiwei;Wu, Fei;Jing, Xiao-Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.368-391
    • /
    • 2018
  • Face recognition (FR) with a single sample per person (SSPP) is common in real-world face recognition applications. In this scenario, it is hard to predict intra-class variations of query samples by gallery samples due to the lack of sufficient training samples. Inspired by the fact that similar faces have similar intra-class variations, we propose a virtual sample generating algorithm called k nearest neighbors based virtual sample generating (kNNVSG) to enrich intra-class variation information for training samples. Furthermore, in order to use the intra-class variation information of the virtual samples generated by kNNVSG algorithm, we propose image set based multimanifold discriminant learning (ISMMDL) algorithm. For ISMMDL algorithm, it learns a projection matrix for each manifold modeled by the local patches of the images of each class, which aims to minimize the margins of intra-manifold and maximize the margins of inter-manifold simultaneously in low-dimensional feature space. Finally, by comprehensively using kNNVSG and ISMMDL algorithms, we propose k nearest neighbor virtual image set based multimanifold discriminant learning (kNNMMDL) approach for single sample face recognition (SSFR) tasks. Experimental results on AR, Multi-PIE and LFW face datasets demonstrate that our approach has promising abilities for SSFR with expression, illumination and disguise variations.

The mutual relations of self-efficacy, proximity of cosmetics to self and proximity of clothing to self (자기효능감, 화장근접도, 의복근접도의 상관관계)

  • 유태순
    • Journal of the Korean Society of Costume
    • /
    • v.32
    • /
    • pp.183-200
    • /
    • 1997
  • The purpose of this study was to find out the mutual relations of self-efficacy proximity of cosmetic to self and proximity of clothing to self. The researcher used the scale of Sherer Mercadante Maddux Rrentice-Dunn Jacobs and Rogers(1982) for a general and social self-efficacy. The scale of Ryckman Roddins Thorton and Cantrell(1982) for a physical self-efficacy. The researcher corrected and supplemented the tools on the basis of Sontag(1987)'s scale for proximity of clothing to self. The researcher developed proximity of cos-metic to self. The subjects of this study were 172 girl students in the university. The research was analyzed by MANOVA Scheff post hoc test and Cronback a. The Results of this study were as follows: 1. The person who had a higher self-efficacy was higher in the hoy and skin-carve in the sub-causes of proximity of cosmetic to self. There was no difference in social-confidence self-satisfaction and disguise. 2. The person who had a higher self-efficacy was high in the self-expression and the physi-cal satisfaction in the sub-causes of proximity of clothing to self. There was no difference in the joy self-consciousness the consciousness of others and the novelity. 3. The person who had a higher proximity of cosmetic to self was higher in the joy, self-ex-pression and self-consciousness of others and the novelity. There was no difference in the physical satisfaction.

  • PDF

A Study on the Costume and Color Image of the Movie - Focusing on Main Actresses' Costumes - (영화의 복식과 색채 이미지 연구 - 여자주인공 복식을 중심으로 -)

  • Hong, Jin-Hee;Cho, Kyu-Hwa
    • Journal of Fashion Business
    • /
    • v.12 no.2
    • /
    • pp.12-27
    • /
    • 2008
  • The purpose of this study is to study main characters' (Roxie Hart, Velma Kelly) costumes and color images in the movie "Chicago". First, regarding the costumes and color images in characters, Roxie's straight silhouette slip in skin tone reflected her frailty and monotonous routines in reality. On the other hand, a white beaded dress showed her fame-hungry and self-absorption in fantasy. Also, a low waistline blue dress and a see-through black dress with a white collar were to disguise her guilt and draw sympathy to win a suitcase. Black and contrasting colors of red and blue body-suit style dresses expressed Velma's sensual attraction, aggressiveness, and desperation. Second, these images were reinforced by color images in the backgrounds in the film. On the scene of Velma's 'cell block tango', black and red showed her strong character. Contrasting colors of the red and blue expressed Velma's desire and despair in her act of 'the desperation'. As for images of black color on Roxie's stages, they represented her self-absorption and frustration of failing to attract public attention. On the ending of duet performance of Roxie and Velma, the yellow of the background expressed success and joy in life.

A Study on Totemism Costume of Europe Local Festival -Based on the Symbolic Theory of C. G. Jung- (유럽의 지역축제에 나타난 토테미즘 복식 연구 -융의 상징이론을 중심으로-)

  • Uh, Kyung Jin;Ha, Ji Soo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.40 no.1
    • /
    • pp.1-11
    • /
    • 2016
  • Traditional costumes have evolved while reflecting the social, cultural and psychological values of the era. Costumes gain meaning by being worn that also allows their various symbolic meanings to be derived. Costumes worn in festivals by specific societies and organizations have especially apparent symbolism pertaining to their purpose. Most countries have traditional festivals that embody the country's distinct culture, history and traditions. These festivals are acts of consciousness expressing a special meaning of the community. Costumes represent a glimpse of life and culture during a festival period; in addition, the costume's style, color elements and decorations are expressions of community values and a distinct symbolic mechanism. Totemism (a significant element of these festivals) has been passed down for many generations. The current costumes for Totemism are distinct (compared to normal festival costumes) and embody a more symbolic meaning. This study deduces the exaggerated style, the concealment and disguise of the human body, and the pursuit of pleasure expressed in the Totemism costumes of regional European festivals. The symbolization theories of C. G. Jung and an analysis of Totemism costumes allow an understanding of their existential significance, their role as the medium between consciousness and unconsciousness, their meaning of symbolic transcendental unity, and their meaning of giving consciousness to the mind.

A Study on Risk and Safety measures of the Improved Explosive Device (사제폭발물의 위험성 및 안전대책에 관한 연구)

  • Han, Jae-Hoon;Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.193-202
    • /
    • 2014
  • Crimes with explosives is one of the mass-destructive crimes that involves the most victims. It is heavily punished under the Korean laws. Mid-eastern area is one of the leading places that are home to improvised explosive device attacks, in the form of religious or political terrorism because of its convenience of use, production and disguise. Improvised bombs are permeating into domestic crimes in Korea as their tools. Use of explosive substances are strictly restricted in this country, but it is not impossible to find its information online and to create private explosives with a bit of interest. And they are being traded in the grey market. For this reason, this thesis offers the method of an efficient safety control of explosive substances, which can be used as raw materials for improvised explosive devices, in order to protect citizens' lives and properties and to promote national security down the road.

William and Ellen Crafts' Eternal Running as Fugitive Performance: From Slavery to Freedom in Running a Thousand Miles for Freedom

  • Park, Jieun
    • Journal of English Language & Literature
    • /
    • v.64 no.1
    • /
    • pp.77-94
    • /
    • 2018
  • This paper examines William and Ellen Craft's Running a Thousand Miles for Freedom (1860)-a narrative of the enslaved couple's escape from Macon to Philadelphia in the guise of a white male master and a colored slave. Expanding Judith Adler's notion of "travel as performed art," my reading of Running focuses on the Crafts' stratagems of transvestism-crossing boundaries not only of gender, but also of race, class, and disability. If travel can be understood as a form of performed art, then why not address a traveler as a performance artist? I present William and Ellen's role-playing in Running as performers of crossing borders and categories, or, as "fugitive performers," since the couple's story never reaches its final arrival but narrates an eternal run-away, far more than "a thousand miles to freedom." Using social stereotypes of race and gender to disguise, William and Ellen plot, write, choreograph, play, and recite on the moving stages and manipulate the others-especially white American audiences-who accompany the couple's run-away and those who were responsible for the cultural drama-a tragedy of American slavery. Becoming "fugitive performers," William and Ellen de-essentialize and debunk the nineteenth-century America's firm belief in distinct color line between black and white, and in the high yet unstable bars between male / female, abled / disabled, master / slave, and freedom / slavery. The Crafts alert their contemporaries and readers by presenting the complex and permeable boundaries of race, gender, class, social and cultural ability.

Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility (보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현)

  • Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Changes of Western Men′s Underclothes - in the First Half of the 20C - (서양 남성 속옷의 변천에 관한 고찰 - 20세기 전기 -)

  • 김주애
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.5
    • /
    • pp.53-64
    • /
    • 2000
  • The purpose of this study was to investigate the historical changes of western men's underclothes in the first half of the 20C and analyze functions and features of men's underclothes. This study was to utilize many literatures in the analysis of historical changes of western men's underclothes. In the 1900's, the attached collar was giving place to the detachable, and the coloured shirt for day wear was becoming accepted. The correct wear fur various occasions was given. Double collar was the favourite for day wear. The dress-shirt protector worn over the dress-shirt front. Men preferred to vest and pants in one as a combined garment. In the 1910's, underclothes were permitting freer movement, but what was still more significant was the glowing inclination to reduce the layers which covered the body. The new conception of decency which was beginning to appear continued to characterize underclothing the symbols of social rank, expect for formal occasion, were declining. For day the white shirt was being displaced by the soft-fronted shirt. In the 1927-1930's, Underclothes were reduced in number, extent and thickness. Underclothing had lost two of its original function : it no longer preserved the warmth of the body, nor did it disguise its essential shape. Both sexes discarded the use of white underwear, In the 1930's, men saw an increasing preference for the coloured shirt. Combinations became increasingly popular and the singlet were displacing the under-vest in the 1930's. All undergarments were very commonly in natural colours. In the 1940's, for evening dress. shirt was plain linen front and square cuffs. Short trunks reached to mid-thigh, had a front waist yoke with three button fastening. Underclothes were pursued ease and activity.

  • PDF

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Design and Implementation of ACM-based Web Security Access Control System for Intranet Security (인트라넷 보안을 위한 ACM기반 웹 보안 접근 제어 시스템의 설계 및 구현)

  • Cho Nam-Deok;Park Hyun-Gun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.643-648
    • /
    • 2005
  • Intranet system for use within an organization, usually a corporation, is to basically pass through user authentication, but information can be leaked, modified, and deleted by malevolent users who disguise an authorized user or due to user's mistakes in using various functions of web browser. Thus, there is a need for measures to protect the information from illegal use, transformation through partial modification, and illegal leakage such as fraudulent use. This paper presents a flexible Web Security Access Control system based ACM which Provide efficient suity Policy to Protect information in intranet. This Web Security Access Control system not only enhances security by Performing encryption/decryption of information in intranet but also, for sharing confidential information among departments, performs effective and useful access control by assigning different authority to the secured web page. And, by controlling the functions of client PC in various ways, information leakage on malicious purpose or by mistake can be prevented.