• Title/Summary/Keyword: ghost key

Search Result 21, Processing Time 0.027 seconds

Fine Needle Aspiration Cytology of a Pilomatrixoma Misdiagnosed as Carcinoma - A Case Report - (암종으로 오진하였던 모기질종의 세침흡인 세포학적 소견 - 1예 보고 -)

  • Jung, Ji-Han;Kim, Young-Shin;Lee, Kyo-Young;Kang, Chang-Suk;Shim, Sang-In
    • The Korean Journal of Cytopathology
    • /
    • v.10 no.1
    • /
    • pp.91-96
    • /
    • 1999
  • Sometimes a pilomatrixoma on upper neck can be misdiagnosed as primary salivary gland tumor, skin adnexal tumor or metastatic carcinoma. On fine needle aspiration cytology(FNAC), characteristic features are ghost cells, basaloid cells, and calcium deposits, among which presence of ghost cells seems to be the key to recognize it. Here we present a cytologically misdiagnosed case of pilomatrixoma. A 32-year-old man presented a subcutaneous mass on the right posterior neck. It has grown slowly for 1 year, and was nontender, well circumscribed, hard, and movable mass. An Initial FNAC yielded only monomorphic population of highly mitotic basaloid cells, without anucleated ghost cells, chronic inflammatory cells or foreign-body giant cells, suggestive of a poorly differentiated carcinoma. However, that was inconsistent with patient's clinical findings. For further correct diagnosis, FNAC was repeated, which yielded the basaloid cells and foreign-body giant cells. The diagnosis of pilomatrixoma could be made and the mass was excised. This case demonstrates that the pilomatrixoma should be considered in the differential diagnosis of subcutaneous aspirates containing not ghost cells but a dominant population of basaloid cells.

  • PDF

Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

  • Yuan, Sheng;Liu, Xuemei;Zhou, Xin;Li, Zhongyang
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.476-480
    • /
    • 2016
  • For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.

Multiple-image Encryption and Multiplexing Using a Modified Gerchberg-Saxton Algorithm in Fresnel-transform Domain and Computational Ghost Imaging

  • Peiming Zhang;Yahui Su;Yiqiang Zhang;Leihong Zhang;Runchu Xu;Kaimin Wang;Dawei Zhang
    • Current Optics and Photonics
    • /
    • v.7 no.4
    • /
    • pp.362-377
    • /
    • 2023
  • Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg-Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize "one code, one key"; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.

Odd Fellows: Hannah Arendt and Philip Roth

  • Nadel, Ira
    • Journal of English Language & Literature
    • /
    • v.64 no.2
    • /
    • pp.151-170
    • /
    • 2018
  • This paper examines the relationship and ideas of Hannah Arendt and Philip Roth including how they met, their correspondence and intellectual parallels, particularly in their shared criticism of Jewish ideals and culture in Europe and North America. It analyzes similarities in their careers and texts, especially between Eichmann in Jerusalem and Operation Shylock, as well as The Ghost Writer, while measuring their reception as social commentators and writers. Kafka was an important figure for both writers, Arendt's earliest writing engaged with the significance of Kafka in understanding and criticizing twentieth century political and cultural values in Europe. For Roth, Kafka offered a similar critique of moral principles he found corroded in North American Jewish life. Arendt connected with other writers, notably Isak Dinesen, W. H. Auden, Randall Jarrell and William Styron who further linked the two: he knew both Arendt and Roth and cited, incorrectly, a work by Arendt as the source for the key incident in his 1979 novel Sophie's Choice. He claimed it was Eichmann in Jerusalem; it was Arendt's The Origins of Totalitarianism. Arendt's reaction to Roth's fiction, however, remains a mystery: she died in 1975, before Roth began to seriously and consistently engage with Holocaust issues in works like The Ghost Writer (1979) and Operation Shylock (1993). Yet even in death they are joined. Their graves are only steps apart at the Bard College Cemetery in Annandale-on-Hudson, New York.

Single Low-Light Ghost-Free Image Enhancement via Deep Retinex Model

  • Liu, Yan;Lv, Bingxue;Wang, Jingwen;Huang, Wei;Qiu, Tiantian;Chen, Yunzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1814-1828
    • /
    • 2021
  • Low-light image enhancement is a key technique to overcome the quality degradation of photos taken under scotopic vision illumination conditions. The degradation includes low brightness, low contrast, and outstanding noise, which would seriously affect the vision of the human eye recognition ability and subsequent image processing. In this paper, we propose an approach based on deep learning and Retinex theory to enhance the low-light image, which includes image decomposition, illumination prediction, image reconstruction, and image optimization. The first three parts can reconstruct the enhanced image that suffers from low-resolution. To reduce the noise of the enhanced image and improve the image quality, a super-resolution algorithm based on the Laplacian pyramid network is introduced to optimize the image. The Laplacian pyramid network can improve the resolution of the enhanced image through multiple feature extraction and deconvolution operations. Furthermore, a combination loss function is explored in the network training stage to improve the efficiency of the algorithm. Extensive experiments and comprehensive evaluations demonstrate the strength of the proposed method, the result is closer to the real-world scene in lightness, color, and details. Besides, experiments also demonstrate that the proposed method with the single low-light image can achieve the same effect as multi-exposure image fusion algorithm and no ghost is introduced.

A Study on Characteristic of Ghost-Key Revealed from the 1st Order Correlation Power Analysis on the Practical High Order Side-Channel Attack Countermeasure. (실용적인 고차 부채널공격 대응에 대한 1차 상관전력분석 오류 키 특성 연구)

  • Ahn, Hyun-Jin;Han, Dong-Guk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.659-662
    • /
    • 2013
  • 과거에는 보안디바이스의 안전성을 탑재된 암호알고리즘의 안전성에 의존하였다. 하지만 부채널 분석을 통해 암호알고리즘의 안전성과는 별개로 부채널 정보에 의한 보안디바이스의 물리적 취약성이 존재함이 밝혀졌다. 이러한 보안디바이스의 물리적 취약성을 보완하기 위해서는 최소 2차 상관전력분석에 대한 대응법이 간구되어야 한다. 최근 2차 상관전력분석에 대한 실용적인 대응법으로 1차 마스킹과 셔플링을 혼합한 방법을 많이 활용하고 있다. 하지만 1차 마스킹과 셔플링이 혼합된 부채널 대응법을 1차 상관전력분석으로 분석하였을 경우, 특이한 피크가 발생한다. 본 논문에서는 마스킹과 셔플링이 혼합된 부채널 대응법을 1차 상관전력분석으로 분석하였을 때, 특이한 피트가 발생함을 실험적으로 확인하였고, 그 피크 발생 원인을 소개한다. 뿐만 아니라, 피크 발생 정보를 추가적인 부채널 분석 정보로 활용할 수 있는 방법을 소개한다.

Dynamic Analysis on the Construction of the Innovative City (혁신도시 건설에 관한 동태적 분석)

  • Lee, Man-Hyung;Kim, Yeon-Sik;Kim, Mi-Sung;Hong, Sung-Ho
    • Korean System Dynamics Review
    • /
    • v.8 no.2
    • /
    • pp.141-173
    • /
    • 2007
  • In Korean context, the innovative cities imply new towns or urban clusters in the Non Capital Regions, all of which would accommodate the relocated Capital based public organizations. The central government-initiated innovative cities have provoked pros and cons towards their effectiveness and efficacy for the balanced territorial development. From a broader prospective, this paper firstly examines the current status quo of the innovative cities. Based on their master plans, it analyzes physical and non physical factors which would exert significant impact on the innovative cities. Secondly, it pays attention to how key factors strengthen or weaken their behavioral patterns in terms of dynamic location and implementation policies of the innovative cities. Using System dynamics approaches, it sets up couples of scenarios, categorizing between supporting and opposing arguments towards the innovative cities. Lastly, after divulging systematic structure of the innovative cities, it proposes a series of practical alternatives which would contribute to minimizing unexpected side effects or unwanted social cost in the long run. In order to guarantee reinforcing structure of the innovative cities, the paper suggests that QOL (quality of life) variables, which would require continuous investment in the social infrastructure, are pivotal in achieving original goals of the innovative cities. Otherwise, the innovative cities would not be innovative per se. In the worst case, they might be degraded into the unpopular ghost towns.

  • PDF

Implementation of an LFM-FSK Transceiver for Automotive Radar

  • Yoo, HyunGi;Park, MyoungYeol;Kim, YoungSu;Ahn, SangChul;Bien, Franklin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.4
    • /
    • pp.258-264
    • /
    • 2015
  • The first 77 GHz transceiver that applies a heterodyne structure-based linear frequency modulation-frequency shift keying (LFM-FSK) front-end module (FEM) is presented. An LFM-FSK waveform generator is proposed for the transceiver design to avoid ghost target detection in a multi-target environment. This FEM consists of three parts: a frequency synthesizer, a 77 GHz up/down converter, and a baseband block. The purpose of the FEM is to make an appropriate beat frequency, which will be the key to solving problems in the digital signal processor (DSP). This paper mainly focuses on the most challenging tasks, including generating and conveying the correct transmission waveform in the 77 GHz frequency band to the DSP. A synthesizer test confirmed that the developed module for the signal generator of the LFM-FSK can produce an adequate transmission signal. Additionally, a loop back test confirmed that the output frequency of this module works well. This development will contribute to future progress in integrating a radar module for multi-target detection. By using the LFM-FSK waveform method, this radar transceiver is expected to provide multi-target detection, in contrast to the existing method.

A new lightweight network based on MobileNetV3

  • Zhao, Liquan;Wang, Leilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.1-15
    • /
    • 2022
  • The MobileNetV3 is specially designed for mobile devices with limited memory and computing power. To reduce the network parameters and improve the network inference speed, a new lightweight network is proposed based on MobileNetV3. Firstly, to reduce the computation of residual blocks, a partial residual structure is designed by dividing the input feature maps into two parts. The designed partial residual structure is used to replace the residual block in MobileNetV3. Secondly, a dual-path feature extraction structure is designed to further reduce the computation of MobileNetV3. Different convolution kernel sizes are used in the two paths to extract feature maps with different sizes. Besides, a transition layer is also designed for fusing features to reduce the influence of the new structure on accuracy. The CIFAR-100 dataset and Image Net dataset are used to test the performance of the proposed partial residual structure. The ResNet based on the proposed partial residual structure has smaller parameters and FLOPs than the original ResNet. The performance of improved MobileNetV3 is tested on CIFAR-10, CIFAR-100 and ImageNet image classification task dataset. Comparing MobileNetV3, GhostNet and MobileNetV2, the improved MobileNetV3 has smaller parameters and FLOPs. Besides, the improved MobileNetV3 is also tested on CPU and Raspberry Pi. It is faster than other networks

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.