Grid and Pervasive Computing
8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings
Chapter and Conference Paper
In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...
Chapter and Conference Paper
In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...
Chapter and Conference Paper
In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...
Chapter and Conference Paper
The amount and quality of feedback provided to the learner has an impact on the learning process. Personalized feedback is particularly important to the effective delivery of e-learning courses. E-learning del...
Chapter and Conference Paper
The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...
Chapter and Conference Paper
Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...
Chapter
In this paper, we proposed data hiding method for halftone compressed images based on Ordered dither BTC(block truncation coding) [7]. BTC[9] is a simple and efficient image compression technique. However, it ...
Chapter and Conference Paper
This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...
Chapter and Conference Paper
Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Dire...
Article
A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data si...
Chapter and Conference Paper
We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...
Chapter and Conference Paper
In recent years, scientific studies of traditional oriental medicine are accelrating. Furthermore, researches of medical examinations and treatments through collaboration of oriental medicine and western medic...
Chapter and Conference Paper
In recent years, texture map** techniques have become more advanced as providing real-time rendering tasks. However, few methods have been conducted in optimizing a sub-texture map** for an arbitrary textu...
Book and Conference Proceedings
8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings
Chapter and Conference Paper
In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...
Chapter and Conference Paper
Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...
Chapter and Conference Paper
In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...
Article
In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...
Chapter and Conference Paper
Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding s...
Chapter and Conference Paper
We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding propose...