• Title/Summary/Keyword: pattern concealment

Search Result 13, Processing Time 0.028 seconds

Channel Condition Adaptive Error Concealment using Scalability Coding (채널상태에 적응적인 계층 부호화를 이용한 오류 은닉 방법 연구)

  • Han Seung-Gyun;Park Seung-Ho;Suh Doug-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.8-17
    • /
    • 2004
  • In this paper: we propose the adaptive error concealment technique for scalable video coding over wireless network error prove environment. We prove it is very effective that Error concealment techniques proposed in this paper are applied to scalable video data. In this paper, we propose two methods of error concealment. First one is that the en·or is concealed using the motion vector of base layer and previous VOP data. Second one is that according to existence of motion vector in error position, the error is concealed using the same position data of base layer when the motion vector is existing otherwise using the same position data of previous VOP when the motion vector is 0(zero) adaptively. We show that according to various error pattern caused by condition of wireless network and characteristics of sequence, we refer decoder to base layer data or previous enhancement layer data to effective error concealment. Using scalable coding of MPEG-4 In this paper, this error concealment techniques are available to be used every codec based on DCT.

Content Adaptive Pattern Concealment for Nonintrusive Projection-based AR (비간섭 프로젝션 기반 증강현실을 위한 컨텐츠 적응형 패턴 은닉)

  • Park, Han-Hoon;Lee, Moon-Hyun;Seo, Byung-Kuk;Jin, Yoon-Jong;Park, Jong-Il
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.1
    • /
    • pp.49-56
    • /
    • 2007
  • A nonintrusive projection-based AR approach using complementary pattern has been recently proposed and applied to virtual studio. However, the approach faces the tradeoff between the pattern imperceptibility and compensation accuracy. To alleviate the tradeoff, we propose a content adaptive pattern concealment approach. The projector input images (AR images) are divided into rectangular regions and spatial variation and color distribution are computed in the regions. Based on the spatial variation and color distribution, we embed locally different strength of pattern images into different color channels. It is demonstrated that the proposed approach has two opposite advantages by comparing it with the previous (non-adaptive) approach through a variety of experiments and subjective evaluation. Our content adaptive approach can obtain the same performance using weaker pattern than the previous approach and thus significantly improve the imperceptibility of the pattern. On the contrary, our content adaptive approach can make strong pattern less perceptible and thus produce better compensation results.

  • PDF

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

Error Detection and Concealment of Transmission Error Using Watermark (워터마크를 이용한 전송 채널 에러의 검출 및 은닉)

  • 박운기;전병우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.262-271
    • /
    • 2004
  • There are channel errors when video data are transmitted between encoder and decoder. These channel errors would make decoded image incorrect, so it is very important to detect and recover channel errors. This paper proposes a method of error detection and recovery by hiding specific information into video bitstream using fragile watermark and checking it later. The proposed method requires no additional bits into compressed bitstream since it embeds a user-specific data pattern in the least significant bits of LEVELs in VLC codewords. The decoder can extract the information to check whether the received bitstream has an error or not. We also propose to use this method to embed essential data such as motion vectors that can be used for error recovery. The proposed method can detect corrupted MBs that usually escape the conventional syntax-based error detection scheme. This proposed method is quite simple and of low complexity. So the method can be applied to multimedia communication system in low bitrate wireless channel.

The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process (스마트 폰 잠금 해제 과정에서의 감성적 UX 요소가 전반적 기기 사용 경험과 향후 사용 의도에 미치는 영향)

  • Lee, Sunhwa;Shin, Youngsoo;Im, Chaerin;Beak, Hannah;Lee, Sungho;Kim, Jinwoo
    • Science of Emotion and Sensibility
    • /
    • v.17 no.4
    • /
    • pp.79-88
    • /
    • 2014
  • Smart-phones have become a vital part of our lives, paying a bill online, shopping using applications, using email and office applications. Therefore, the risk of the leakage of personal informations and the misuse of them becomes high, for the cost of loosing smart-phone. Many types of smart-phone security features such as password, slide-lock, and pattern lock have been introduced. However, those security locks make users not to easily access and use a smart-phone. There is tradeoff between security on one hand, and usability and cost on the other. This paper propose Self-Concealment to solve the tradeoff problem and demonstrate the effect through the experiment. In sum, Self-Concealment lowers smart-phone experience; however increases smart-phone use intension. This paper has implication for proposing new User Experience (UX) construct to resolve the trade-off between security and usability.

Adaptive QoS Management for MPEG-4 Streaming Service over Internet (인터넷 기반의 MPEG-4 스트리밍 서비스를 위한 적응적 QoS 관리)

  • 최지훈;이상조;서덕영;김현철;이명호
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.227-238
    • /
    • 2000
  • This paper, at first, provides analysis on loss pattern of Internet based on real experiments of the current Internet. Then, we propose an effective adaptive QoS management technique, in which measured loss pattern as well as PLR (Packet Loss Ratio) are used to select titrate of temporal scalability. level of FEC and retransmission This selection is also incorporated to the MPEG-4 error resilience tools and error concealment techniques. In order to minimize effect of packet loss, multimedia stream is segmented in the unit of group of Pictures (GOP) and interleaving and FEC are applied to the segment. Proposed algorithms are applied to build a VOD system.

  • PDF

Anlaysis of Eukaryotic Sequence Pattern using GenScan (GenScan을 이용한 진핵생물의 서열 패턴 분석)

  • Jung, Yong-Gyu;Lim, I-Suel;Cha, Byung-Heun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.113-118
    • /
    • 2011
  • Sequence homology analysis in the substances in the phenomenon of life is to create database by sorting and indexing and to demonstrate the usefulness of informatics. In this paper, Markov models are used in GenScan program to convert the pattern of complex eukaryotic protein sequences. It becomes impossible to navigate the minimum distance, complexity increases exponentially as the exact calculation. It is used scorecard in amino acid substitutions between similar amino acid substitutions to have a differential effect score, and is applied the Markov models sophisticated concealment of the transition probability model. As providing superior method to translate sequences homologous sequences in analysis using blast p, Markov models. is secreted protein structure of sequence translations.

A Study on the Improvement of Leak Alarm Reliability of Gas Meter for Leak Inspection according to Boiler Usage Pattern (보일러 사용 패턴에 따른 누출점검용 가스계량기 누출 알람 신뢰도 개선 연구)

  • Jin-Du Yang;Seung-Won Lee;Eun-Il Choi;Sung-Hyeon Lim
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.3
    • /
    • pp.72-76
    • /
    • 2023
  • Among urban gas-using facilities, more and more cases are using gas meters for leakage inspection instead of inspection ports for concealment pipes. Leak alarm alarms were continuously generated according to the boiler's special usage pattern in an environment where there was no actual gas leakage among some households where this meter was installed. It does not perform its original function of detecting actual gas leakage. Based on these problems, this study analyzed the conditions under which the gas meter for leakage inspection generates leakage alarms according to the boiler's special gas use pattern, and sought a set value that can generate an alarm only in the case of actual gas leakage. Through this, it is intended to relieve citizens' anxiety about gas use due to malfunction of the alarm and at the same time perform the original function of the meter that can detect leaking gas.

A Study on the Protection Functionality of Supermodern Fashion (슈퍼모던 패션의 보호기능에 관한 연구)

  • Kim, Wan-Joo;Lee, Keum-Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.8
    • /
    • pp.1264-1273
    • /
    • 2008
  • The purpose of this study is to analyze protection functionality of supermodern fashion which is shown by responding to supermodern environment, where non-spaces increases in the 21st modern city. The theoretical background is drawn for supermodern environment theory. For the study, he researcher used existing study and specialized book and analyzed photograph materials by selecting them in specialized fashion book, internet site and designer's collection. The works from 1995 S/S collection to 2008 S/S collection are analyzed. The result of this study is as follow. First, supermodern design is adopting the shape of high-functional element, electronic device, protective device to protect wearer in non-space. Second, in order to mentally protect individual anonymous leadership of interaction is granted by adopting hood, veil or mask. Third, supermodern design is creating independent and user-based space by shape transformation in change of urban environment. Fourth, in order to protect wearer through camouflage or concealment, camouflage pattern or neutral color are used.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.