• Title/Summary/Keyword: 복제 기법

Search Result 321, Processing Time 0.027 seconds

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

Electroporation 방법을 이용한 포유동물 세포내 GFP 유전자 도입

  • 양병철;성환후;김동훈;이상기;오현주;임석기;박수봉;이은주;민관식
    • Proceedings of the Korean Society of Embryo Transfer Conference
    • /
    • 2002.11a
    • /
    • pp.70-70
    • /
    • 2002
  • 형질전환 가축을 생산하기 위하여 최근 체세포 복제 기법을 이용하고 있다. 이러한 체세포를 이용한 형질전환 동물의 생산에는 체세포내에 유전자의 도입 효율이 직접적인 영향을 주게 된다. 따라서 본 연구는 세포내 유전자의 transfection 효율을 높이고자 한우의 체세포를 이용하여 여러 가지 조건에서 유전자 도입을 실시하였다. 세포내 유전자 도입 방법은 electroporation (EP) 방법을 이용하였다. 사용한 세포는 소의 귀세포(KbESF), 태아섬유아세포 (KbFF), 그리고 대조구로서 CHO cell을 이용하여 GFP 유전자를 도입하였다. EP는 0.4 cm cuvette을 사용하였고, voltage는 0.25 kV, 그리고 field strength 는 0.625 kV/cm 조건으로 실시하였으며, pulse times은 각각 1, 2, 또는 3회를 사용하였다. KbFF와 KbESF에서는 각각 pulse times을 증가시킬수록 유전자도입 세포수가 증가하였으나 (KbFF: 81, 634, 1,065 cells/$10^{6}$ cells, KbESF: 1,011, 5,567, 15,408 cells/$10^{6}$ cells), CHO cell에서는 pulse times을 증가시킬 수록 오히려 유전자도입 세포수가 감소하였다 (CHO: 1,591, 687, 297 cells/$10^{6}$ cells). 그리고 2주 동안 neo selection을 실시 한 결과 KbFF, KbESF, CHO에서 각각 93, 35, 184 colony가 선발되었으며, 이 중 65.6%, 8.6%, 4.3% 가 GFP 형광 발현 colony로 나타났다. 한편 CHO cell에서 transfection cell수가 감소된 것은 EP의 자극으로 인해 손상된 세포가 많이 발생한 것으로 나타났다. 또한 neo selection에서 선발된 colony중 GFP가 발현되지 않거나 일부만 발현되는 colony들이 많이 발생하였는데, 이것은 세포내 유전자가 transfection되지 않은 세포도 neo selection에서 선발된다는 것을 제시하고 있다. 따라서 체세포를 이용한 형질전환동물 생산을 위해서는 세포내 유전자 도입과 선발 과정에서 나타난 colony에 대하여 보다 엄격한 screen을 하는 것이 필요한 것으로 생각된다.

  • PDF

Web Service Migration based on Contexts (컨텍스트에 기반한 웹 서비스 이동)

  • Kim, Yeon-Seok;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.106-116
    • /
    • 2008
  • It is difficult to provide Web services on a mobile environment because of the intermittent disconnection of a wireless network and the frequent change of context information. To resolve this, Web services must be migrate to devices, which can provide services to users seamlessly. However, researches on hosting, migrating, and replicating Web services on mobile devices are still in an early stage. This paper presents a lightweight Web service framework and an efficient method for establishing a policy of migrating Web services. Based on the WS-Policy standard, the proposed method defines a policy schema, which provides constructs for describing various kinds of contextual information. Specifically, the schema is designed to be extensible enough for different service providers to use different vocabularies to describe their policies. To show the validity, the proposed method for establishing a migration policy has been applied to our mobile Web services framework, resulting in a seamless provisioning of services.

  • PDF

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

Digital Image Watermarking Algorithm using Integer Block Transform (정수 블록 변환을 이용한 디지털 이미지 워터마킹 알고리즘)

  • Oh Kwan-Jung;Ho Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.57-67
    • /
    • 2006
  • Intellectual property rights are gathering strength theses days. Because digital contents are easily reproduced and distributed by advanced computers and networks. Digital watermarking is one of the best solutions for this problem. Generally, frequency-domain watermarking algorithms are preferred since they are more robust than spatial-domain algorithms. However, coefficients in the frequency domain are floating-point numbers. Thus, it is not easy to manipulate those floating-point coefficients and frequency-domain watermarking algorithms have some limitations in their applications. In order to overcome this difficulty, we employ an integer transform in this paper. In addition, our proposed algerian can extract the watermark from both the spatial and frequency domains. We embed the watermark into a specific bit-plane of mid-frequency coefficients. This is equivalent to the differential energy watermarking (DEW) in the spatial domain. Our simulation results show that the proposed algorithm is imperceptible, good for the watermark payload, and robustness against various attacks. Moreover, it is more efficient than any other algorithm working in only one domain.

Study on methodology for the assessment of internal and marginal adaptation on fixed dental prosthesis (고정성 보철물의 내면 및 변연적합도를 평가하는 방법에 대한 고찰)

  • Pyo, Se-Wook;Lee, Jun-Jae;Han, Jung-Suk;Lim, Young-Jun
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.32 no.3
    • /
    • pp.158-168
    • /
    • 2016
  • This article is to review various methods used to investigate internal and marginal adaptation of fixed dental prostheses, and to summarize a merit, worth, and limitation of each method, using some results of previous studies. The methods of measuring internal and marginal gap are divided into two categories in this study; in vivo and in vitro. In vivo methods are clinical evaluations, including exploration, radiography, and impression technique. In vitro methods are laboratory evaluations such as direct view, cross-sectioning, and silicone replica technique using microscope. Measuring by micro computed tomography (CT) or profilometer is also in vitro methods. In recent years, the development of scanning systems is able to analyze 3-dimensional internal and marginal space in detail. As measuring and analyzing technology become more advanced, the ability to thoroughly examine crown adaptation is becoming both simpler and more efficient.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

Realization of Package Software Inspection Service for Software Asset Management (소프트웨어 자산관리를 위한 패키지소프트웨어 점검서비스 구현)

  • Cha, Tea-Won;Ahn, Jae-Kyoung
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.123-132
    • /
    • 2009
  • Even support-and-management efforts by government are enforced with the growing international restrictions for complying with global standard, not a few private enterprises are still suffering software management problems from lack of understanding the software asset management and carelessness of the software management. This is due to the ambiguous scope of software asset management as well as characteristics of software property such as invisibility, easiness of copy and installation. In other words, it is not easy for software managers to comply all the information throughout the software life cycle; from purchasing, procurement. distribution, preservation to disposition. Therefore, Inspector which has been developed for resolving these problems are proposed in this study. The inspection service consists of search algorithms adapted for software characteristics, standardization of software right management information, and practical use of registry information. Inspection time for a PC by using inspector make the inspection time much shorter. It is also shown that effective software management enables the enterprise to curtail software acquisition cost and to help rationalizing its business management.

Detecting Similar Designs Using Deep Learning-based Image Feature Extracting Model (딥러닝 기반 이미지 특징 추출 모델을 이용한 유사 디자인 검출에 대한 연구)

  • Lee, Byoung Woo;Lee, Woo Chang;Chae, Seung Wan;Kim, Dong Hyun;Lee, Choong Kwon
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.162-169
    • /
    • 2020
  • Design is a key factor that determines the competitiveness of products in the textile and fashion industry. It is very important to measure the similarity of the proposed design in order to prevent unauthorized copying and to confirm the originality. In this study, a deep learning technique was used to quantify features from images of textile designs, and similarity was measured using Spearman correlation coefficients. To verify that similar samples were actually detected, 300 images were randomly rotated and color changed. The results of Top-3 and Top-5 in the order of similarity value were measured to see if samples that rotated or changed color were detected. As a result, the VGG-16 model recorded significantly higher performance than did AlexNet. The performance of the VGG-16 model was the highest at 64% and 73.67% in the Top-3 and Top-5, where similarity results were high in the case of the rotated image. appear. In the case of color change, the highest in Top-3 and Top-5 at 86.33% and 90%, respectively.