• Title/Summary/Keyword: text file

Search Result 195, Processing Time 0.021 seconds

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

An Effcient Two-Level Hybrid Signature File Method for Large Text Databases (대용량 텍스트 데이터베이스를 위한 효율적인 2단계 합성 요약 화일 방법)

  • Yoo, Jae-Soo;Gang, Hyeong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.923-932
    • /
    • 1997
  • In this paper, we propose a two-level hybrid signature file method(THM) to dffciently deal with large txt databases that use a term discrimination concept.In addition, we apply Yoo's clustering scheme to the two-level hybeid signature file method. The clustering schme groups similar signatures together according to the similarity of the highly discriminatiory tems so that we may achive better performance on retrival. The space-time ana-lyhtical model of the proposed two-level hybrid method is provided. Based on the analytical model and experiments, we compare it with the exsting methods, i.e. the bit-sliced method(BM), the-level method(TM), and the hybrid method(HM). As a result, we show that THM achives the best retrival performance in a large database with 100,000 records when the mumber fo matching records is less than 160.

  • PDF

Mobile Voice Note File Management Service For Improving Accessibility of the Blind (전맹인의 접근성 향상을 위한 모바일 음성 메모 파일 관리 서비스)

  • Lim, Soon-Bum;Lee, Mi Ji;Choi, Yoo Jin;Yook, Juhye;Park, Joo Hyun;Lee, Jongwoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.11
    • /
    • pp.1215-1222
    • /
    • 2019
  • Recently, people with disabilities also search for and collect information from the web through smart devices, and save collected information on smart devices or take notes. For non-disabled people, various memo applications are provided on the market, so it is more convenient to choose according to their preference. However, existing memo services are limited for use by blind people due to the importance of visual information. The problem with blind people when using smart devices is that the screen is not recognized, so it is not possible to check in which location the menu of the application exists. In addition, it is difficult to input and manipulate text, and systematic file management and control are not possible. Therefore, in this paper, we propose the development of voice memo service that blind people can use only voice and hearing information and can operate menu with Bluetooth remote controller. We will develop a system that includes a comprehensive voice file management function for storing, searching, playing, and deleting files, rather than simply storing voice files.

WeXGene: Web-based XML Data Generator (WeXGene: 웹 기반 XML 데이터 생성기)

  • Shin Sun Mi;Jeong Hoe Jin;Lee Sang Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.199-210
    • /
    • 2005
  • We need XML generate various kinds of XML data to evaluate XML database systems. Existing XML data generators are developed to generate XML data that are suitable for particular evaluation methods, and their functionalities are limited in terms of generating XML data This paper introduces a new XML data generator, WeXGene, that not only improves the drawbacks of existing data generators but also adds new data generation functionalities. For generating XML data WeXGene uses the user data files and the structure definition files, which specify SDTD(Symbolic DTD) or input parameters. The user data file is a text data file that has column data or row data. It is also possible that WeXGene generates XML data without accessing the user data file. This paper presents the design details, overall system architecture, and data generation process of WeXGene. An analytic comparison with other XML data generators is also presented.

Design of Visual Tool for Efficient Descripting of Binary ECG File Formats (바이너리 심전도 파일 포맷의 효율적인 디스크립션을 위한 시각적 도구 설계)

  • Koo, Heung-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.1
    • /
    • pp.26-31
    • /
    • 2007
  • In this study, A BED(Binary ECG description) based binary ECG conversion system is that supports the conversion of a binary ECG format into XML-based HL7 aECG for interoperability of ECG. HL7 aECG is a XML based standard lot interoperability of ECG waveform. However, it is difficult for beginners to write the BED document of binary BED conversion system in XML. We implement a BED Studio on the Java Servlet engine that allows beginners to write BED documents more easily. Our system consists of three parts: Visual Editor, Text Editor, and Format Checking Viewer. Format Checking Viewer support users to detect the format errors in the XML files, so-called BED documents, that describe the data format of the targer binary ECG file in the BED-based binary ECG conversion system, so may reduce the format errors in BED documents.

Implementation of a Display and Analysis Program to improve the Utilization of Radar Rainfall (레이더강우 자료 활용 증진을 위한 표출 및 분석 프로그램 구현)

  • Noh, Hui-Seong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1333-1339
    • /
    • 2018
  • Recently, as disasters caused by weather such as heavy rains have increased, interests in forecasting weather and disasters using radars have been increasing, and related studies have also been actively performed. As the Ministry of Environment(ME) has established and operated a radar network on a national scale, utilization of radars has been emphasized. However, persons in charge and researchers, who want to use the data from radars need to understand characteristics of the radar data and are also experiencing a lot of trials and errors when converting and calibrating the radar data from Universal Format(UF) files. Hence, this study developed a Radar Display and Analysis Program(RaDAP) based on Graphic User Interface(GUI) using the Java Programming Language in order for UF-type radar data to be generated in an ASCII-formatted image file and text file. The developed program can derive desired radar rainfall data and minimize the time required to perform its analysis. Therefore, it is expected that this program will contribute to enhancing the utilization of radar data in various fields.

Design and Implementation of An MP4 File Streaming System over IP Networks (IP망을 통한 MP4 파일 스트리밍 시스템의 설계 및 구현)

  • 김현철;민승홍;서덕영;김규헌;김진웅
    • Journal of Broadcast Engineering
    • /
    • v.6 no.3
    • /
    • pp.205-214
    • /
    • 2001
  • In this Paper, we present an MP4 file streaming system over IP networks. Using the proposed system a user can access MP4 contents in the servers via H) networks and interact with the contents. The MP4 file format is designed to contain the media information of MPEG-4 and is object-oriented. The presented streaming server system contains GUI, session manager, splitter, SL- packetizer and transmitter. In addition, we knave implemented the client system based on the GUI -2D player, the MPEG-4 reference software. The Presented streaming system is designed use RTF for the media data requiring real-time streaming RTCP for QoS management and TCP for the data such as IOD(Initial Object Descriptor), OD(Object Descriptor) BIFS(Binary Format for Scene), which should be transmitted for the streaming and the data, such as still image and text, which can be entirely transmitted in a packet.

  • PDF

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

A Development design Image DataBase (디자인 이미지데이터베이스 구축사례 연구)

  • 정지홍
    • Archives of design research
    • /
    • v.13 no.3
    • /
    • pp.313-320
    • /
    • 2000
  • Currently, The new wave of information technology has enormously influenced every field. In the Held of design, it is time to strive possible efforts in order to accumulate the design-related knowledge by maintaining, managing and controlling design information in a systematic manner, getting out of the old stage of mere use of data itself. Due to remarkable progress in communication media and speed, and file compression technology, text-centric data has been shifting to multimedia data such as image and motion picture. So it is currently required that methologies be developed to effectively utilize the related information. With respect to the processing of image data, it is certain that the optimal method should be come up with reflecting the unique characteristics and utilization of image data, apart from the traditional way of processing and storing the legacy text-based data. The study suggests the system of indexing and implementing design image information through the case of analyzing design image data, abstracting data elements of image itself, and finally applying it to building image-oriented database for use.

  • PDF

A Development of Administrative Affairs Supporting System using Call Control Mode of CTI (CTI 호출 제어 방식을 이용한 행정 업무 지원 시스템의 개발)

  • 최준기;조성범;정상수;이상정
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.46-60
    • /
    • 1999
  • Recently, CTI (Computer Telephony Integration) technology has been widely applied to various area such as video conference, file transfer, voice mail, automatic message transfer and automatic redial, integrated messaging and network fax. In this paper, an administrative affairs supporting system using call control mode of CTI is designed. To improve inefficient processing of job due to heavy calling from entrance candidates during entrance examination of a college, the system is developed. The database of the system is desigend using object modeling technique. Also, the automatic calling and response system using CTI call control mode is implemented. Especially, to interface with voice of candidates who ask whether they pass or fail the entrance examination of the college, TTS(Text To Speech) module is developed.

  • PDF