• Title/Summary/Keyword: 공간생성 방식

Search Result 351, Processing Time 0.023 seconds

A Location based Two-Factor L-OTP Protocol (위치기반 Two-Factor L-OTP 프로토콜)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.327-330
    • /
    • 2011
  • After releasing the smart phone equipping the strong computational capability compared to traditional mobil phone, a field of services, which is available on the personal computers, is expanded to smart phone. The development of technology reduces the limited service utilization on time and space but it has a venerability exposing an information to malicious user. Especially we need to more attention when using the financial services which communicate the user's private information. To solve the security problem, OTP(One Time Pad), which uses a private key for a session, is recommended. OTP techniques in smart phone having focused on traditional environments have been proposed and implemented. However, security over mobile environments is more vulnerable to attack and has restriction on resources than traditional system. For this reason, definition of proper conceptual OTP on smart phone is required. In the paper, we present the L-OTP(Location-OTP) protocol, using T-OTP(Time One Time Pad) technique with location information. Proposal generates the OTP using unique location information which is obtained in smart phone.

Video Segmentation Using DCT and Guided Filter in real time (DCT와 Guided 필터를 이용한 실시간 영상 분류)

  • Shin, Hyunhak;Lee, Zucheul;Kim, Wonha
    • Journal of Broadcast Engineering
    • /
    • v.20 no.5
    • /
    • pp.718-727
    • /
    • 2015
  • In this paper, we present a novel segmentation method that can extract new foreground objects from a current frame in real-time. It is performed by detecting differences between the current frame and reference frame taken from a fixed camera. We minimize computing complexity for real-time video processing. First DCT (Discrete Cosine Transform) is utilized to generate rough binary segmentation maps where foreground and background regions are separated. DCT shows better result of texture analysis than previous methods where texture analysis is performed in spatial domain. It is because texture analysis in frequency domain is easier than that in special domain and intensity and texture in DCT are taken into account at the same time. We maximize run-time efficiency of DCT by considering color information to analyze object region prior to DCT process. Last we use Guided filter for natural matting of the generated binary segmentation map. In general, Guided filter can enhance quality of intermediate result by incorporating guidance information. However, it shows some limitations in homogeneous area. Therefore, we present an additional method which can overcome them.

Video Segmentation using the Level Set Method (Level Set 방법을 이용한 영상분할 알고리즘)

  • 김대희;호요성
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.303-311
    • /
    • 2003
  • Since the MPEG-4 visual standard enables content-based functionalities, it is necessary to extract video object from natural video sequences. Segmentation algorithms can largely be classified into automatic segmentation and user-assisted segmentation. In this paper, we propose a user-assisted VOP generation method based on the geometric active contour. Since the geometric active contour, unlike the parametric active contour, employs the level set method to evolve the curve, we can draw the initial curve independent of the shape of the object. In order to generate the edge function from a smoothed image, we propose a vector-valued diffusion process in the LUV color space. We also present a discrete 3-D diffusion model for easy implementation. By combining the curve shrinkage in the vector field space with the curve expansion in the empty vector space, we can make accurate extraction of visual objects from video sequences.

Analysis of Topological Invariants of Manifold Embedding for Waveform Signals (파형 신호에 대한 다양체 임베딩의 위상학적 불변항의 분석)

  • Hahn, Hee-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.291-299
    • /
    • 2016
  • This paper raises a question of whether a simple periodic phenomenon is associated with the topology and provides the convincing answers to it. A variety of music instrumental sound signals are used to prove our assertion, which are embedded in Euclidean space to analyze their topologies by computing the homology groups. A commute time embedding is employed to transform segments of waveforms into the corresponding geometries, which is implemented by organizing patches according to the graph-based metric. It is shown that commute time embedding generates the intrinsic topological complexities although their geometries are varied according to the spectrums of the signals. This paper employs a persistent homology to determine the topological invariants of the simplicial complexes constructed by randomly sampling the commute time embedding of the waveforms, and discusses their applications.

Detection of Mass on Dense Mammogram (고밀도 유방영상에서 종양의 추출)

  • Yu, Seung-Hwa;No, Seung-Mu;Park, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.6
    • /
    • pp.721-734
    • /
    • 2001
  • This paper proposed automated methods for the detection of breast mass. We analysed characteristic of the mass by using the features on mammograms. The homogeneity was used to distinguish mass and abnormal homogeneous tissue from the Cooper's ligament and multiple threshold method was used to deal with the high density candidates. By using the 8-connectivity, the first step candidates were selected. We generated the dualistic images of each candidate in which we regard the gray value as topographic height information. From these candidates, the second candidates were selected by comparing the circularity and the distribution rates. The final detection was done with the method in which we generated the template of each candidate and compared each other. From these methods, we grade the order from the candidate. We applied the algorithm to the 136 mammograms and compared to the radiologist's outlines of the leisions. The detection resulted that the sensitivity of the proposed methods was 93.38% and 97.63% FP(False positive) which we can segmented mass in the first grade in the 124 cases.

  • PDF

Parallax Distortion Detection and Correction Method for Video Stitching by using LDPM Image Assessment (LDPM 영상 평가를 활용한 동영상 스티칭의 시차 왜곡 검출 및 정정 방법)

  • Rhee, Seongbae;Kang, Jeonho;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.685-697
    • /
    • 2020
  • Immersive media videos, such as panorama and 360-degree videos, must provide a sense of realism as if the user visited the space in the video, so they should be able to represent the reality of the real world. However, in panorama and 360-degree videos, objects appear to overlap or disappear due to parallax between cameras, and such parallax distortion may interfere with immersion of the user's content. Accordingly, although many video stitching algorithms have been proposed to overcome parallax distortion, parallax distortion still occurs due to the low performance of the Object detection module and limitations of the Seam generation method. Therefore, this paper analyzes the limitations of the existing video stitching technology and proposes a method for detecting and correcting parallax distortion of video stitching using the LDPM (Local Differential Pixel Mean) image evaluation method that overcomes the limitations of the video stitching technique.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

A Study on Immersion and Presence of VR Karaoke Room Implementations in Mobile HMD Environments (HMD 모바일 환경에서 가상현실 기반 노래방 구현물의 실재감과 몰입감 연구)

  • Kim, Ki-Hong;Seo, Beomjoo
    • Journal of Korea Game Society
    • /
    • v.17 no.6
    • /
    • pp.19-28
    • /
    • 2017
  • There exist a variety of VR(Virtual Reality) contents that have been developed by the use of the latest VR technologies. Unlike the rapid advances in the recent VR devices however, the development of VR based game contents that fully utilize such cutting-edge devices has been lackluster. Using more accessible form of smartphone-based HMDs(Head-Mounted Displays), we compare two popular VR presentation methods(a realistic 3D VR karaoke room and a 360 degree video karaoke room) and analyze their users' immersion and realistic perception. We expect that our study can be utilized as a supporting guideline for future smartphone-based VR content developments.

Compressed Sensing Techniques for Millimeter Wave Channel Estimation (밀리미터파 채널 추정을 위한 압축 센싱 기법)

  • Han, Yonghee;Lee, Jungwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • Millimeter wave (mmWave) bands are expected to improve date rate of 5G systems due to the wide available bandwidth. While severe path loss in those bands has impeded the utilization, short wavelength enables a large number of antennas packed in a compact form, which can mitigate the path loss. However, estimating the channel with a conventional scheme requires a huge training overhead, hence an efficient estimation scheme operating with a small overhead needs to be developed. The sparsity of mmWave channels caused by the limited scatterers can be exploited to reduce the overhead by utilizing compressed sensing. In this paper, we introduce compressed sensing techniques for mmWave channel estimation. First, we formulate wideband channel estimation into a sparse recovery problem. We also analyze the characteristics of random measurement matrix constructed using quantized phase shifters in terms of mutual incoherence.

An Image Watermarking Method for Embedding Copyrighter's Audio Signal (저작권자의 음성 삽입을 위한 영상 워터마킹 방법)

  • Choi Jae-Seung;Kim Chung-Hwa;Koh Sung-Shik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.4
    • /
    • pp.202-209
    • /
    • 2005
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding owner's audio signal. Because this method uses an audio signal as a watermark to be embedded, it is very useful to claim the ownership aurally. And it has the advantage of restoring audio signal modified and especially removed by image removing attacks by applying our LBX(Linear Bit-expansion) interleaving. Three basic stages of our watermarking include: 1) Encode . analogue owner's audio signal by PCM and create new digital audio watermark, 2) Interleave an audio watermark by our LBX; and 3) Embed the interleaved audio watermark in the low frequency band on DTn (Discrete Haar Wavelet Transform) of image. The experimental results prove that this method is resistant to lossy JPEG compression as standard image compression and especially to cropping and rotation which remove a part of Image.