• Title/Summary/Keyword: 데이터 삽입

Search Result 765, Processing Time 0.033 seconds

The structure and synthesis of intercalation compound between a layered double hydroxide and an organic compound (유기화합물이 삽입된 층상이중수산화물의 합성과 구조)

  • 우은경;허영덕
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.8 no.1
    • /
    • pp.36-41
    • /
    • 1998
  • Intercalation compounds of alkyl sulfonates into layered double hydroxides (LDH) have been directly synthesized. From the X-ray diffraction data and the alkyl sulfonates size, the orientation of the intercalated alkyl sulfonate into the layered double hydroxide was determined. The intercalated alkyl sulfonate is arranged with molecular chain perpendicular to the hydroxide layer with an antiparallel pattern.

  • PDF

Blind Watermarking System Based on the Modified DCT Coefficient (수정된 DCT 계수 기반의 Blind Watermarking 시스템의 하드웨어 설계 및 구현)

  • 윤승주;정진일;채봉수;조용범
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.871-874
    • /
    • 2003
  • 본 논문에서는 디지털 데이터 내에 사용자의 정보나 저작권 정보를 나타내기 위해 삽입되는 워터마크를 추출할 때 원본 이미지나 개인 키를 필요로 하지 않는 Blind Watermarking 방법을 개선하였다. 기존의 워터마킹 방법에서는 워터마크를 추출하기 위해 원본 이미지를 사용하거나 원본 이미지를 사용하지 않는 경우에는 개인 키를 사용하여 워터마크를 추출하였다. 제안하는 워터마킹 알고리즘은 워터마크를 주파수 대역 별로 삽입하는 것으로써 수정된 DCT 계수를 기반으로 하였고, 삽입 및 추출 연산의 복잡성을 배제하여 속도가 빠르고 하드웨어의 구조가 간단하다. 또한, 워터마크를 저 주파수 대역과 고 주파수 대역에 삽입하여 압축 및 에러 환경에 강인한 성격을 가진다. 제안한 알고리즘의 FPGA와 PCI Interface 를 통한 구현 및 검증에 대해서도 논하였다.

  • PDF

Implementation of Watermarking Processor Using FPGA (FPGA를 이용한 WaterMarking Processor의 구현)

  • Kim Ki Young;Oh Whi-Vin;Lee Yong-Hwan;Rhee Sang-Burm;Lee June-Hwan
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.5-10
    • /
    • 2003
  • 본 논문에서는 wavelet을 이용한 워터마크 삽입 시스템 구현을 제안한다. wavelet 변환 기법은 JPEG2000 이나 MPEG-4와 같은 차세대 데이터 압축 표준의 기본적 연산으로서 DCT연산에 비해 주파수 해상도와 시간해상도를 모두 만족시킨다. 제안한 시스템은 크게 DWT 변환모듈, 워터마크 삽입모듈, IDWT 복원모듈, Main Controller모듈로 구성된다. DWT 변환모듈은 Haar 웨이블렛 변환알고리즘을 기반으로 설계 됐으며 1차 신축을 통해 변환된 주파수 영역에서 중간주파수 대역(LH 및 HL)을 선택하여 워터마크를 삽입하는 워터마크 삽입 모듈, IDWT를 이용 신호를 복원하는 모듈, 전체시스템 구성 블록을 제어하는 Main Controller모듈로 구성된다.

  • PDF

A Study on Optimum Threshold for Robust Watermarking (강인한 워터마킹을 위한 최적 임계치 설정에 관한 연구)

  • Park, Ki-Bum;Lee, Kang-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.739-742
    • /
    • 2005
  • 본 논문은 디지털 영상 데이터를 대상으로 웨이블릿 변환을 이용하여 주파수 영역에서 워터마크를 삽입하는 블라인드 워터마킹 알고리즘을 제안한다. 실험을 통하여 다양한 임계치에 따른 워터마크 정보의 수용력과 영상의 손실 정도(PSNR), 저작권 인증 여부와 검출 값(Correlation response) 사이의 관계(Trade-off)들을 고려하여 최적의 임계치에 관하여 연구한다. 또한 인간의 시각적인 특성을 고려한 HVS(Human visual system) 기법을 적용하여 영상의 비가시도를 유지하면서 시각적으로 중요한 영역에 워터마크를 삽입하여 일반적인 공격에 강인성을 가지는 워터마킹 방법을 연구한다. 워터마크로서 가우시안 랜덤 수열(Gaussian Random sequence)을 삽입하여 최적의 임계값을 적용한 제안된 알고리즘의 성능 평가를 위해 여러 영상에 대하여 실험해 본 결과 워터마크가 삽입된 영상의 화질은 비가시도 측면에서 시각적으로 인지할 수 없을 만큼 측정되었으며, JPEG 손실압축, 선형 필터링, 잡음첨가 그리고 크로핑 등의 공격에 대하여 향상된 상관도와 강인함을 알 수가 있었다.

  • PDF

Digital Image Watermarking using Subband Correlation Wavelet Domain (웨이블릿 영역의 부대역 상관도를 이용한 디지털 영상 워터마킹)

  • 서영호;박진영;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.51-60
    • /
    • 2003
  • The watermarking is the technique that embeds or extracts the certain data without the change of the original data for the copyright protection of the multimedia contents. Watermark-embedded contents must not be distinguished by human's eye and must be robust to the various image processing and the intentional distortions. In this paper, we propose a new watermarking technique applied in the wavelet domain which has both the spatial and frequency information of a image. For both the robustness and the invisibility, the positions for embedding the watermark is selected with the multi-threshold. We search the similarity between highly correlated coefficients in the each subband and decide the mark space after verifying the significance in the specified subband. The similarity is represented by the coefficient difference between the subbands and its distribution is used in the watermark embedding and extracting. The embedded watermark can be extracted without the original image using the relationship of the subbands. By these properties the proposed watermarking algorithm has the invisibility and the robustness to the attacks such as JPEG compression and the general image processing.

New wavelength converter for optical NRZ data signal using SOA-loop-mirror (반도체 광 증폭기가 삽입된 광섬유 루프 미러를 이용한 NRZ 데이터에 대한 새로운 파장 변환기)

  • Lee, Hyuek-Jae
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.1
    • /
    • pp.27-33
    • /
    • 2005
  • In this paper, a new wavelength converter using an SOA(Semiconductor Optical Amplifier)-loop-mirror for NRZ(NonReturn to Zero) optical data has been proposed and experimentally demonstrated. Conventional nonlinear fiber-loop-mirror methods can perform RZ-to-RZ, NRZ-to-RZ, and RZ-to-NRZ data format conversion, but NRZ-to-NRZ conversion has not been demonstrated until now. The experiment for the conversion from a 1300 nm NRZ data signal at 1.5 Gbps to a 1550 nm NRZ data one is successfully performed using a fiber-loop-mirror with 1300 nm-SOA.

Blind Digital Watermarking Methods for Omni-directional Panorama Images using Feature Points (특징점을 이용한 전방위 파노라마 영상의 블라인드 디지털 워터마킹 방법)

  • Kang, I-Seul;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.6
    • /
    • pp.785-799
    • /
    • 2017
  • One of the most widely used image media in recent years, omni-directional panorama images are attracting much attention. Since this image is ultra-high value-added, the intellectual property of this image must be protected. In this paper, we propose a blind digital watermarking method for this image. In this paper, we assume that the owner of each original image may be different, insert different watermark data into each original image, and extract the watermark from the projected image, which is a form of service of omni- directional panorama image. Therefore, the main target attack in this paper is the image distortion which occurs in the process of the omni- directional panorama image. In this method, SIFT feature points of non-stitched areas are used, and watermark data is inserted into data around each feature point. We propose two methods of using two-dimensional DWT coefficients and spatial domain data as data for inserting watermark. Both methods insert watermark data by QIM method. Through experiments, these two methods show robustness against the distortion generated in the panorama image generation process, and additionally show sufficient robustness against JPEG compression attack.

Efficient Index Reconstruction Methods using a Partial Index in a Spatial Data Warehouse (공간 데이터 웨어하우스에서 부분 색인을 이용한 효율적인 색인 재구축 기법)

  • Kwak, Dong-Uk;Jeong, Young-Cheol;You, Byeong-Seob;Kim, Jae-Hong;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.119-130
    • /
    • 2005
  • A spatial data warehouse is a system that stores geographical information as a subject oriented, integrated, time-variant, non-volatile collection for efficiently supporting decision. This system consists of a builder and a spatial data warehouse server. A spatial data warehouse server suspends user services, stores transferred data in the data repository and constructs index using stored data for short response time. Existing methods that construct index are bulk-insertion and index transfer methods. The Bulk-insertion method has high clustering cost for constructing index and searching cost. The Index transfer method has improper for the index reconstruction method of a spatial data warehouse where periodic source data are inserted. In this paper, the efficient index reconstruction method using a partial index in a spatial data warehouse is proposed. This method is an efficient reconstruction method that transfers a partial index and stores a partial index with expecting physical location. This method clusters a spatial data making it suitable to construct index and change treated clusters to a partial index and transfers pages that store a partial index. A spatial data warehouse server reserves sequent physical space of a disk and stores a partial index in the reserved space. Through inserting a partial index into constructed index in a spatial data warehouse server, searching, splitting, remodifing costs are reduced to the minimum.

  • PDF

Digital Watermarking for Three-Dimensional Polygonal Mesh Models in the DCT Framework (DCT영역에서 3차원 다각형 메쉬 모델의 디지헐 워터마킹 방법)

  • Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.156-163
    • /
    • 2003
  • Most watermarking techniques insert watermarks into transform coefficients in the frequency domain because we can consider robust or imperceptible frequency bands against malicious attacks to remove them. However, parameterization of 3-D data is not easy because of irregular attribution of connectivity information, while 1-I) or 2-D data is regular. In this paper we propose a new watermarking scheme for 3-D polygonal mesh models in the DCT domain. After we generate triangle strips by traversing the 3-D model and transform its vertex coordinates into the DCT domain, watermark signals are inserted into mid-frequency bands of AC coefficients for robustness and imperceptibility. We demonstrate that our scheme is robust against additive random noise, the affine transformation, and geometry compression by the MPEG-4 SNHC standard.

Secure Steganography Using a Block Cipher (블록 암호를 이용한 안전한 심층 암호)

  • 유정재;김종현;박종혁;양우일;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.1-15
    • /
    • 2003
  • ${Cachin}^{[1]}$ defined the security of steganography theoretically at first, then ${Katzenbeisser}^{[2]}$ and ${Hopper}^{[3]}$ also discussed it on the different aspects. Unfortunately, because many steganographic systems couldnt overcome the statistical gap between a stego-cover and a pure cover, the secure steganography hasn' been evaluated yet. By the effectivel steganalysis algorithm, statistical test which was suggested by Westfel $d^{[4]}$, the attacker Wendy could select the stego-covers out of suspicious covers. Our newly developed algorithm which minimizes the changes of a pure cover by using the block cipher withstands a statistical test and has a similar embedding capacity in comparison with a simple LSB substitution steganography.