3 resultados para Hiding-proofness

em Dalarna University College Electronic Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines a popular music song (Heartbeats by Jose Gonzalez) as a sign system in television advertising. The study was conducted through qualitative questionnaires in connection to an audio-visual method of analysis called Masking. The method facilitates the analysis of isolated parts in the audio-visual spectrum by masking/hiding parts of the audio-visual totality.The survey had seven respondents where a hermeneutic epistemological approach was used. For the analysis Cooper's theory of brand identity (Practical and Symbolic Attitudes to Buying Brands) was used together with an interaction model for music in audio-visual advertising called "Modes of music-image interaction”. The results showed that the music was associated with values as genuine, honest, responsibility, purity, independence and innovation. The music's symbolic values helped to position the brand in a lifestyle context. The music also helped to express the target group’s identity and attitudes by being innovative and independent. It also enhanced the perception of the visual colour rendition in the film. In general the television advertisement perceived more positive and entertaining when the music was present. In other words the music's social and cultural position contributed to raise the film's credibility. A deeper social and cultural value was created in the movie through resonance between symbolic values of the music and symbolic values of the film.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ce mémoire traite du débat entre le coeur et le devoir et des différentes influences qui ont conduit à la fameuse question : Pourquoi la princesse n’épouse-t-elle pas le duc de Nemours alors que tous les obstacles sont levés ? À défaut de pouvoir répondre définitivement à cette énigme dont seule Madame de La Fayette possède la clé, nous nous sommes concentrée sur les influences qui auraient pu pousser la princesse à sacrifier son coeur pour son devoir. La méthode de recherche utilisée est l’approche de la biographie intellectuelle. Il est évident que le vécu de l'auteure a teinté le contenu de son oeuvre ainsi que l'âme de son héroïne. Nous nous sommes également inspirée de la méthode sociocritique quant aux influences et mouvements de l'époque. Dans le but de simplifier la collecte des sources et l’organisation de la recherche, nous avons regroupé les influences en trois grandes catégories : les influences personnelles, internes et externes. Cette étude a mis en évidence que les moeurs, dans La Princesse de Clèves, sont le miroir de la société du XVIIe siècle. Chaque influence présentée forme le dessin d’une princesse cachant en elle le secret de son renoncement à l'amour.