• Title/Summary/Keyword: 데이터 삽입

Search Result 766, Processing Time 0.023 seconds

Numerical Analysis on the Heat Transfer and Pressure Drop Characteristics of a Channel with Pin-fin Structure (핀-휜 구조물을 삽입한 채널의 열전달 특성과 압력강하에 관한 수치해석)

  • Heo, Joo-Nyoung;Kim, Ji-Hoon;Son, Young-Seok;Shin, Jee-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.35 no.2
    • /
    • pp.224-231
    • /
    • 2011
  • Heating and/or cooling of the channel with pin-fin structure is a promising choice for the efficient heat transfer. Complex pin-fin structure shows highly irregular behavior like porous media. This study shows the numerical analysis on the characteristic of heat transfer and pressure drop of a channel with pin-fin structure. It predicts the experimental data quite well at the high porosity region with large diameter. Low porosity activates the rigorous flow disturbance and, consequently, the enhanced heat transfer. However, the concept of optimum design should be carefully reviewed because the pressure drop is also increased with decreasing porosity at low porosity region.

High Quality Audio Watermarking using Spread Spectrum and Psychoacoustic Model (대역확산과 심리음향 모델을 이용한 고음질 오디오 워터마킹)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.48-56
    • /
    • 2006
  • In this paper, we proposed the high quality audio watermarking algorithm using MDCT/IMDCT (Modified DCT/Inverse Modified DCT) with psychoacoustic model. Generally, a digital audio watermark is embedding the frequency domain after frequency transform of the digital audio data but the digital audio quality is affected by watermarking. In our scheme, the digital audio data is spread with PN((Pseudo Noise) code and then audio watermark is embedded in MDCT processing that refers psychoacoustic model. In MDCT processing, according to the shape of filter bank output, the block switching selects a window sequence that has 256, 1,024 or 2,048 points interval for high quality audio. The author confirm that when watermark weight ${\alpha}$ is 2.5 below, the detection ratio of watermark is a satisfied to SDMI's(Secure Digital Music Initiative) recommendation 50% above and SM is $50{\sim}68dB$ range with mainly 4 kind of attacks(Compression, Cropping, FFT and Echo).

A Pilot Symbol Insertion Method for SC-FDMA Mobile Communication Systems (SC-FDMA 이동통신 시스템을 위한 파일럿 심벌 삽입 방법)

  • Rim, Min-Joong;Ryu, Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.6 s.360
    • /
    • pp.48-56
    • /
    • 2007
  • OFDMA (Orthogonal Frequency Division Multiple Access) is widely used as multiple access techniques for next generation mobile communication systems. However, OFDMA has a disadvantage of high peak-to-average power ratio and SC-FDMA (Single-Carrier Frequency Division Multiple Access) was proposed for uplink systems to overcome the drawback. SC-FDMA also has several demerits including degraded performance with high-order modulations or with multiple antenna techniques, and less flexibility in resource allocation and pilot patterns. In order to achieve the best performance over a wide range of environments, each mobile station should select either of OFDMA and SC-FDMA according to the given condition and a pilot structure for SC-FDMA systems should be similar to that of OFDMA to maintain the same frame structure. While conventional SC-FDMA schemes require an entire SC-FDMA symbol or a separate short symbol for pilots, this paper proposes a method which supports the pilots included in SC-FDMA data parts and enables a SC-FDMA frame to hold the same structure as an OFDMA frame.

A Robust Digital Watermarking based on Virtual Optics (가상 광학에 기반한 강인한 디지털 워터마킹)

  • Lee, Geum-Boon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1073-1080
    • /
    • 2011
  • In this paper, we propose a novel digital watermarking method by virtual optics which secures multimedia information such as images, videos and sounds. To secure the multimedia data, we use Fresnel transform which describes the diffraction phenomena of the waves. Also, this method attaches the random phase function to Fresnel transform so that original image and watermark image would be gaussian random vectors. The complex numbers of watermark by Fresnel transform are separated the real part and the imaginary part. The former is embedded in original image as a encoding key imperceptibly and the latter is used for detecting the watermark as a decoding key. This method for digital watermarking ensures that watermark can be successfully registered and extracted from the watermarked image. Further, it provides the robustness to signal processing operation and geometric distortion and proves the strong resilience against cropping attack. The performance evaluation of the experiment is carried out with PSNR, and the numerical simulation results show the efficiency of the proposed method.

Digital Watermarking using ART2 Algorithm (ART2 알고리즘을 이용한 디지털 워터마킹)

  • 김철기;김광백
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.81-97
    • /
    • 2003
  • In this paper, we suggest a method of robust watermarking for protection of multimedia data using the wavelet transform and artificial neural network. for the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except fur the lowest subband LL$_3$, we apply a calculated threshold about chosen cluster as the biggest. We used binary logo watermarks to make sure that it is true or not on behalf of the Gaussian Random Vector. Besides, we tested a method of dual watermark insertion and extraction. For the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except for the lowest subband LL$_3$, we apply a above mentioned watermark insert method. In the experimental results, we found that it has a good quality and robust about many attacks.

  • PDF

Swap-Insert Algorithm for Driver Scheduling Problem (운전기사 일정계획 문제의 교환-삽입 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.175-181
    • /
    • 2014
  • This paper suggests O(m) polynomial time heuristic algorithm to obtain the solution for the driver scheduling problem, DSP, that has been classified as NP-complete problem. The proposed algorithm gets the initial assignment of n minimum number of drivers from given m schedules. Nextly, this algorithm gets the minimum total time (TC) using 5 rules of swap and insert for decrease of over times (OT) and idle times (IT). Although this algorithm is a heuristic polynomial time algorithm with O(m) time complexity rules to be find a optimal (or approximate) solution, this algorithm is equal to metaheuristic methods for the 5 experimental data. To conclude, this paper shows the DSP is not NP-complete problem but Polynomial time (P)-problem with polynomial time rules.

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.

Binary Image Watermarking for Preserving Feature Regions (특징영역을 보존한 이진영상의 워터마킹)

  • 이정환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.624-631
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First a binary image is grouped into feature regions which has geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

A Steganography for the Medical Images using Block Similarity (블록 유사도를 이용한 의료영상 스테가노그라피)

  • Moon, Il-Nam;Lee, Sin-Joo;Lee, Kwang-Man
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.952-958
    • /
    • 2009
  • Recently, due to problems in terms of illegal copying of medical image and the right ownership and authentication of data, it is necessary for us to study about those problems. In this study, we propose steganography with a method of the hiding information of high-resolution in digital medical image. The proposed algorithm is one of the way that inserts secret information by protecting ROI area which is regarded as and important feature of high-resolution digital medical image. As a result, the proposed method made it possible to insert secret information of massive storage and didn't affect the imperceptibility in medical image quality based on capacity and PSNR showed the all image quality of about 33.33dB.

An Algorithm on Predicting Syllable Numbers of English Monosyllabic Loanwords in Korean (영어 단음절 차용어의 음절수 예측을 위한 알고리즘)

  • Cho Mi-Hui
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.251-256
    • /
    • 2005
  • When English monosyllabic words are adapted to the Korean language, the loanwords tend to carry extra syllables. The purpose of this paper is to find the syllable augmentation conditions in loanword adaptation and further to provide an algorithm to predict the syllable numbers of English monosylabic loanwords. Three syllable augmentation conditions are found as follows: 1) the existence of diphthong, 2) the existence of consonant clusters, and 3) the quality of the final consonant (and the preceding vowel). Based on these three conditions, an algorithm to predict the syllable number of English monosyllabic loanwords are proposed as three rules applied iteratively with ordering. In addition, the applications of the algorithm to data are given.

  • PDF