• Title/Summary/Keyword: 블록 기반 방법

Search Result 1,131, Processing Time 0.029 seconds

Texture Coding in MPEG-4 Using Modified Boundary Block Merging Technique (변형된 경제 블록 병합 기법을 이용한 MPEG-4의 텍스처 부호화)

  • 김두석;고형화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.725-733
    • /
    • 2000
  • In this paper, we propose a modified boundary block merging technique for the texture coding of MPEG-4. We propose an ORP(Optimized Region Partitioning) method that partition the VOP-based reference position to minimize the number of coding blocks. The merging possibility is improved by adding +90。and -90。 Rotation merging. We propose a MRM(Multiple Rotation Merging) method which applies the rotation merging in the order of 180。, +90。and -90。. If a pair of boundary blocks has low correlation, existing BBM's padding technique is not efficient. Our padding after merging method gives better result even if it has low correlation. The proposed method showed 5 ~8(%) coding bit reduction at the same PSNR values compared to BBM method.

  • PDF

Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box (비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.105-108
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on symmetric SPN block cipher with bitslice involution S-box in 2011. The target block cipher was designed using AES block cipher and has advantage about restricted hardware and software environment using the same structure in encryption and decryption. Therefore, the target block cipher must be secure for the side-channel attacks. However, to recover the 128-bit secret key of the targer block cipher, this attack requires only one random byte fault and an exhausted search of $2^8$. This is the first known cryptanalytic result on the target block cipher.

Error-Resilience Enhancement based on Polyphase Down Sampling for the H.264 Video Coding Technology (에러 강인성 향상을 위한 다상 다운 샘플링 적용 H.264 동영상 부호화 기술)

  • Jung, Eun Ku;Jia, Jie;Kim, Hae Kwang;Choi, Hae Chul;Kim, Jae Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.340-347
    • /
    • 2005
  • This paper presents a polyphase down sampling based multiple description coding applied to H.264 video coding standard. For a given macroblock, a residual macroblock is calculated by motion estimation, and before applying DCT, quantization and entrophy coding of the H.264 coding process, the polyphase down sampling is applied to the residual macroblock to code in four separate descriptions. Experiments were performed for all the 9 test sequences of JVT SVC standardization in various packet loss patterns. Experimental results show that the proposed one gives 0.5 to 5 dB enhancement over an error-concealment based on the slice group map technolgoy.

DCGAN-based Compensation for Soft Errors in Face Recognition systems based on a Cross-layer Approach (얼굴인식 시스템의 소프트에러에 대한 DCGSN 기반의 크로스 레이어 보상 방법)

  • Cho, Young-Hwan;Kim, Do-Yun;Lee, Seung-Hyeon;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.430-437
    • /
    • 2021
  • In this paper, we propose a robust face recognition method against soft errors with a deep convolutional generative adversarial network(DCGAN) based compensation method by a cross-layer approach. When soft-errors occur in block data of JPEG files, these blocks can be decoded inappropriately. In previous results, these blocks have been replaced using a mean face, thereby improving recognition ratio to a certain degree. This paper uses a DCGAN-based compensation approach to extend the previous results. When soft errors are detected in an embedded system layer using parity bit checkers, they are compensated in the application layer using compensated block data by a DCGAN-based compensation method. Regarding soft errors and block data loss in facial images, a DCGAN architecture is redesigned to compensate for the block data loss. Simulation results show that the proposed method effectively compensates for performance degradation due to soft errors.

Authentication Model of PKI-based Security Gateway using Blockchain having Integrity (무결성이 보장된 블록체인 기술을 활용한 PKI 기반 보안 게이트웨이의 인증 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.287-293
    • /
    • 2021
  • Recently, public certificates issued by nationally-recognized certification bodies have been abolished, and internet companies have issued their own common certificates as certification authority. The Electronic Signature Act was amended in a way to assign responsibility to Internet companies. As the use of a joint certificate issued by Internet companies as a certification authority is allowed, it is expected that the fraud damage caused by the theft of public key certificates will increase. We propose an authentication model that can be used in a security gateway that combines PKI with a blockchain with integrity and security. and to evaluate its practicality, we evaluated the security of the authentication model using Sugeno's hierarchical fuzzy integral, an evaluation method that excludes human subjectivity and importance degree using Delphi method by expert group. The blockchain-based joint certificate is expected to be used as a base technology for services that prevent reckless issuance and misuse of public certificates, and secure security and convenience.

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.

Motion Vector Recovery Based on Optical Flow for Error Concealment (전송 오류를 은닉하기 위한 옵티컬 플로우 기반의 움직임 벡터 복원)

  • Suh, Jae-Won;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.630-640
    • /
    • 2002
  • The compressed video bitstream is very sensitive to transmission errors. If we lost packet or received with errors during the transmission, not only the current frame will be corrupted, but also errors will propagate to succeeding frames. Error concealment is a data recovery technique that enables the decoder to conceal effects of transmission errors by predicting the lost or corrupted video data from the previously reconstructed error free information. Motion vection recovery and motion compensation with the estimated motion vector is a good approach to conceal the corrupted macroblock data. In this paper, we prove that it is reasonable to use the estimated motion vector to conceal the lost macroblock by providing macroblock distortion models. After we propose a new motion vector recovery algorithm based on optical flow fields, we compare its performance to those of conventional error concealment methods. The proposed algorithm has smaller computational complexity than those of conventional algorithms.

A Study on Adaptive Hexagonal Search Using Motion Activity (움직임 활동도를 이용한 적응형 육각 탐색에 관한 연구)

  • Kim, Myoung-Ho;Park, Kyoung-Wan;Oh, Young-Geol;Kwak, No-Yoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.141-144
    • /
    • 2006
  • 본 논문은 적응형 육각 탐색에 기반한 고속 블록 정합 알고리즘의 성능 개선에 관한 것으로, 이전 프레임의 움직임 활동도를 산출한 후, 웨이블렛 변환의 다단계 저주파 부영상들로 구성된 피라미드 계층 구조상에서 이 움직임 활동도에 따라 초기 움직임 탐색 계층을 적응적으로 선택하면서 적응형 육각 탐색에 기반한 계층적 블록 정합을 수행함으로써 움직임 벡터 추정의 고속화를 실현함과 동시에 국부 최소화를 효과적으로 경감시킬 수 있는 블록 정합 알고리즘을 제안함에 그 목적이 있다. 우선, 초기 연속된 두 프레임에 대해 적응형 육각 탐색을 이용하여 움직임 벡터를 추정한 후 움직임 활동도를 산출한다. 이후, 움직임 활동도가 낮은 경우, 다음 프레임의 움직임 벡터를 추정 시 최하위 계층에서 적응형 육각 탐색을 수행하고, 움직임 활용도가 높은 경우 피라미드 계층 구조상의 최상위 계층에서부터 상하 계층들 간에 움직임 탐색 영역을 중복시키면서 움직임 벡터를 추정한다. 제안된 방법의 타당성과 보편성을 검증하기 위해 서로 다른 움직임 특성을 갖는 복수의 영상 시퀀스들을 대상으로 움직임 보상 화질과 수렴시간 측면에서 그 성능을 평가 분석하였다. 제안된 방법에 따르면, 고속 움직임 탐색이 가능한 적응형 육각 탐색의 장점을 유지하면서도 움직임 활동도가 높은 영상에서 야기되는 국부최소문제를 효과적으로 억제시키고 있음을 확인할 수 있었다.

  • PDF

An Efficient Scheme for Detecting Caption Regions in DCT-Compressed Images (DCT 기반 압축 영상에서 자막 영역을 검출하기 위한 효율적인 방법)

  • 장현성;강경옥
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.127-130
    • /
    • 2002
  • 동영상 장면에서 자막은 흔히 중요한 의미 정보를 나타내기 때문에 영상으로부터 자막 영역을 검출하는 것은 동영상에 대한 의미적인 분석 및 색인 등 다양한 범위에서 널리 응용될 수 있다. 본 논문에서는 DCT 기반으로 압축된 영상에서 자막 후보 영역을 검출하기 위한 고속의 방법을 제안한다. 제안하는 방법은 자막 영역에서 나타나는 수평 밝기 값의 교대 패턴을 검출하기 위하여 각 블록 별로 1회의 1-D IDCT 과정을 필요로 한다

  • PDF

AC and DC Components Embedding DCT-based Watermarking (AC 및 DC 성분 워터마크 삽입하는 DCT기반 워터마킹)

  • 신용달;황의창;권성근;김영춘;장종국;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.362-365
    • /
    • 2003
  • 본 논문은 DCT기반에서 AC 및 DC 성분에 워터마크를 삽입하는 워터마킹 방법을 제안하였다. DCT는 원영상을 8×8 블록으로 나누어서 행하였으며, 삽입한 워터마크 데이터는 평균 0, 분산 1, 길이가 1000인 정규분포 랜덤시퀀스를 사용하였다. 이 워터마크 데이터의 크기에 따라 DCT의 DC 및 AC 성분에 삽입한다. 제안한 워터마킹 알고리듬의 성능을 확인하기 위해서 컴퓨터 시뮬레이션을 수행한 결과, 제안 방법이 기존의 워터마크 방법보다 비가시성 및 견고성 면에서 우수함을 확인하였다

  • PDF