1. A portable computer comprising a main body, and a display part having a tablet allowing a user to input information with a pen, and displaying a picture based on a video signal transmitted from the main body, the portable computer comprising:
a pen-mounting portion to which the pen is detachably attached;
an attachmentdetachment sensor for detecting whether the pen is attached to or detached from the pen-mounting portion; and
a controller for controlling the display part to have a portrait display mode when the attachmentdetachment sensor detects that the pen is detached from the pen-mounting portion, and controlling the display part to have a landscape display mode when the attachmentdetachment sensor detects that the pen is attached to the pen-mounting portion.
2. The portable computer according to claim 1, wherein the controller comprises a microcomputer generating a predetermined key code on the basis of the detected result of the attachmentdetachment sensor, and a video driver changing the display mode in correspondence to the key code generated by the microcomputer.
3. The portable computer according to claim 1, wherein the attachmentdetachment sensor comprises a switch for outputting high and low signals according to the attachment or detachment, respectively, of the pen.
4. The portable computer according to claim 1, wherein the attachmentdetachment sensor comprises a switch for outputting low and high signals according to the attachment or detachment, respectively, of the pen.
5. The portable computer according to claim 1, wherein the display part further comprises a tablet that accepts inputs from the detached pen when the display is in portrait display mode.
6. A method of controlling a portable computer comprising a main body, and a display part having a tablet allowing a user to input information with a pen, and displaying a picture based on a video signal transmitted from the main body, the method comprising the steps of:
detecting the attachment and detachment of the pen; and
controlling the display part to have a portrait display mode on the basis of detecting the detachment of the pen and to have a landscape display mode on the basis of detecting the attachment of the pen.
7. The method of claim 6, wherein the controlling step further comprises the steps of:
generating a predetermined key code on the basis of the detected result of the attachmentdetachment sensor; and
changing the display mode in correspondence to the generated key code.
8. The method of claim 6, wherein the sensing step further comprises outputting high and low signals according to the attachment or detachment, respectively, of the pen.
9. The method of claim 6, wherein the sensing step further comprises outputting low and high signals according to the attachment or detachment, respectively, of the pen.
10. The method of claim 7, further comprising the step of accepting inputs from the detached pen when the display is in portrait display mode.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.
1. A method comprising:
providing secure data;
providing a host image;
decomposing the host image into a plurality of color images;
selecting portions of the decomposed host image to embed the secure data; and
embedding the secure data.
2. The method of claim 1, where decomposing comprises decomposing the host image into a plurality of layers.
3. The method of claim 2, where the plurality of layers comprises a plurality of color layers.
4. The method of claim 3, where decomposing the host image comprises converting the host image into several layers using a color model.
5. The method of claim 4, the color model comprising a RGB (red, green, blue) model, a YCbCr (luminance, chrominance blue, chrominance red) model, a YIQ (luminance, intensity, chrominance) model, a HSV (hue, saturation, value) model, a CMY (cyan, magenta, yellow) model, or a CMYK (cyan, magenta, yellow, black) model.
6. The method of claim 2, where selecting portions of the host image comprises selecting a layer from the plurality of layers of the host image to embed the secure data.
7. The method of claim 6, further comprising categorizing the selected layer of the host image.
8. The method of claim 2, wherein the plurality of layers comprises a plurality of least significant bit layers.
9. The method of claim 8, further comprising selecting one of least significant bit layers from the plurality of least significant bit layers.
10. The method of claim 9, further comprising modifying the selected least significant bit layer.
11. The method of claim 1, further comprising compressing the secure data.
12. The method of claim 11, wherein compressing the secure data comprises decomposing the secure data into a binary format.
13. The method of claim 11, further comprising generating a pseudo-noise sequence for encrypting the binary format.
14. A computer program, comprising computer or machine-readable program elements translatable for implementing the method of claim 1.
15. A method comprising:
providing a cover image;
converting the cover image into a binary bit stream;
decomposing the binary bit stream into a plurality of segments;
generating a binary sequence based on a first key;
generating a code matrix based on all combinations within the binary sequence;
determining a distance between the code matrix and each of the plurality of fixed length segments to develop a second key;
combining the first key and second key to produce a compressed and encrypted image of the cover image.
16. The method of claim 15, where converting the cover image comprises:
decomposing the cover image into color layers;
decomposing each color layers into a combination of various binary layers; and
reformatting the various binary layers into a single binary vector.
17. The method of claim 15, where generating a binary sequence comprises generating a binary sequence with M-sequence or a Gold codes.
18. The method of claim 15, where generating a binary sequence comprises generating a binary sequence with low redundancy.
19. The method of claim 15, where decomposing the bit stream comprises decomposing the binary bit stream into a plurality of fixed length segments or varying length segments.
20. A method comprising:
providing a cover image;
converting the cover image into a binary bit steam;
decomposing the binary bit stream into a plurality of segments;
classifying each of the plurality of segments into classes using a redundancy of bits based on a first key to generate a plurality of redundant and non-redundant segments;
compressing the redundant segments;
compressing the non-redundant segments with low redundancy based on a second key;
combined the compressed redundant segments and non-redundant segments to form a compressed image of the cover image.
21. The method of claim 20, where compressing the non-redundant segments comprises:
generating a code matrix based on all possible combinations within the binary bit stream;
determining a distance between the code matrix and each of the plurality of segments to develop a third key; and
combining the first, second, and third keys to form compressed and encrypted segments.
22. The method of claim 20 further comprising transforming the plurality of segments based on a fourth key.
23. The method of claim 20, further comprising error correcting encoding the determined distance and each of the plurality of segments to develop the third key.