• Title/Summary/Keyword: 블루스크린

Search Result 6, Processing Time 0.02 seconds

Semi-Automatic Video Segmentation Using Virtual Blue Screens (가상의 블루스크린을 이용한 반자동 동영상분할)

  • 신종한;김대희;호요성
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.279-282
    • /
    • 2001
  • 본 논문에서는 가상의 블루스크린(Virtual Blue Screens, VBS)을 이용한 반자동 영상분할 기법을 제안한다. 가상 블루스크린은 동영상에서 배경영역을 특정한 값으로 채워 만든 참조영상으로 정의한다. 반자동 영상 분할 기법은 크게 화면내 영상분할과 화면간 영상분할의 두 단계로 이루어진다. 화면내 영상분할은 VBS와 원영상의 형태학적 분할 기법을 사용하고, 화면간 영상 분할은 두개의 연속하는 화면에서 변화검출(Change Detection)로 이루어진다 [1]. 본 논문에서는 효과적인 변화검출을 위하여 제안된 VBS를 사용한다. VBS를 이용한 영상분할에서는 우선, 이전화면에서 만들어진 VBS를 참조하여 다음화면에서 움직임 영역을 예측한다. 이렇게 예측된 영상과 원영상에 대해 형태학적 분할 기법(Morphological Segmentation Technique)을 이용해서 각각에 대한 레이블 마스크(Label Mask)를 얻는다 [2]. 두개의 레이블 마스크 사이에는 서로 공통된 영역들이 존재하게 되는데, 이런 공통된 영역을 추출함으로써 움직임 객체를 검출한다. 현재화면에서 검출된 움직임 객체는 다음화면을 위한 가상의 블루 스크린을 만드는데 사용한다.

  • PDF

The Extraction of Camera Parameters using Projective Invariance for Virtual Studio (가상 스튜디오를 위한 카메라 파라메터의 추출)

  • Han, Seo-Won;Eom, Gyeong-Bae;Lee, Jun-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2540-2547
    • /
    • 1999
  • Chromakey method is one of key technologies for realizing virtual studio, and the blue portions of a captured image in virtual studio, are replaced with a computer generated or real image. The replaced image must be changed according to the camera parameter of studio for natural merging with the non-blue portions of a captured image. This paper proposes a novel method to extract camera parameters using the recognition of pentagonal patterns that are painted on a blue screen. We extract corresponding points between a blue screen. We extract corresponding points between a blue screen and a captured image using the projective invariant features of a pentagon. Then, calculate camera parameters using corresponding points by the modification of Tsai's method. Experimental results indicate that the proposed method is more accurate compared to conventional method and can process about twelve frames of video per a second in Pentium-MMX processor with CPU clock of 166MHz.

  • PDF

Automatic Video Chromakeying Generation Technology Using Background Modeling (배경 모델링을 이용한 비디오 크로마키 생성기법)

  • Yoo, Gil-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.1-8
    • /
    • 2021
  • In online meetings and classes using webcams, the chromakey technique is a very necessary part to produce content. We proposed a technology that enables background synthesis without using a cloth for chromakey. The proposed method consists of three steps: an HSI image conversion step, a step of detecting a region changed from a background, and a step of replacing the background region with a chromakey and applying it. In the input video, the block average image of each frame is calculated, and the difference between the block average image of the background image and the block average image of the input image is used to detect the change area. The developed chromakey effect technology uses a technique of acquiring a background image without an object from a single camera and extracting only an object by distinguishing the moving object and the background. The proposed method is not only capable of processing even if the background has a variety of colors, but also has the seamless processing of the boundary lines of objects.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study on the Change of Editing Style in YouTube Short-From Content (Youtube 숏폼 콘텐츠의 편집스타일 변화에 대한 연구)

  • Kim, Mimi;Byun, Daniel H.
    • Trans-
    • /
    • v.13
    • /
    • pp.59-90
    • /
    • 2022
  • Short-form content, which means "short video content within 10 minutes," is rapidly emerging as a recent trend among MZ generations based on the fact that it can be viewed whenever there is a short running time, and they are physically short, colorful, and deliver a lot of information in a compressed time, showing differences in both long-form content and format. In addition, entertainment videos such as information delivery videos, eating shows, web entertainment, and dance challenges are mainly produced and distributed, so there is no need to take expertise as a creative work of video experts, and consumers often become producers by directly participating in production using low-end equipment such as smartphones. For these reasons, shortform content creates new image styles rather than general existing image forms such as long-form contents, and this study focuses on changes in editing styles. This study summarized the following five characteristic changes by analyzing the editing style of short form content that has changed compared to long form content according to the 'visual' aspect. The use of frames, memes, screen division, blue screen, and subtitles are included, and by organizing each characteristic, we identified the editing style of shortform content that has emerged as a recent trend and learned about the changes.