• Title/Summary/Keyword: 엔트로피 제한

Search Result 47, Processing Time 0.022 seconds

Deblocking Filter for Low-complexity Video Decoder (저 복잡도 비디오 복호화기를 위한 디블록킹 필터)

  • Jo, Hyun-Ho;Nam, Jung-Hak;Jung, Kwang-Su;Sim, Dong-Gyu;Cho, Dae-Sung;Choi, Woong-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • This paper presents deblocking filter for low-complexity video decoder. Baseline profile of the H.264/AVC used for mobile devices such as mobile phones has two times higher compression performance than the MPEG-4 Visual but it has a problem of serious complexity as using 1/4-pel interpolation filter, adaptive entropy model and deblocking filter. This paper presents low-complexity deblocking filter for decreasing complexity of decoder with preserving the coding efficiency of the H.264/AVC. In this paper, the proposed low-complexity deblocking filter decreased 49% of branch instruction than conventional approach as calculating value of BS by using the CBP. In addition, a range of filtering of strong filter applied in intra macroblock boundaries was limited to two pixels. According to the experimental results, the proposed low-complexity deblocking filter decreased -0.02% of the BDBitrate comparison with baseline profile of the H.264/AVC, decreased 42% of the complexity of deblocking filter, and decreased 8.96% of the complexity of decoder.

A Design and Implementation of a Content_Based Image Retrieval System using Color Space and Keywords (칼라공간과 키워드를 이용한 내용기반 화상검색 시스템 설계 및 구현)

  • Kim, Cheol-Ueon;Choi, Ki-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1418-1432
    • /
    • 1997
  • Most general content_based image retrieval techniques use color and texture as retrieval indices. In color techniques, color histogram and color pair based color retrieval techniques suffer from a lack of spatial information and text. And This paper describes the design and implementation of content_based image retrieval system using color space and keywords. The preprocessor for image retrieval has used the coordinate system of the existing HSI(Hue, Saturation, Intensity) and preformed to split One image into chromatic region and achromatic region respectively, It is necessary to normalize the size of image for 200*N or N*200 and to convert true colors into 256 color. Two color histograms for background and object are used in order to decide on color selection in the color space. Spatial information is obtained using a maximum entropy discretization. It is possible to choose the class, color, shape, location and size of image by using keyword. An input color is limited by 15 kinds keyword of chromatic and achromatic colors of the Korea Industrial Standards. Image retrieval method is used as the key of retrieval properties in the similarity. The weight values of color space ${\alpha}(%)and\;keyword\;{\beta}(%)$ can be chosen by the user in inputting the query words, controlling the values according to the properties of image_contents. The result of retrieval in the test using extracted feature such as color space and keyword to the query image are lower that those of weight value. In the case of weight value, the average of te measuring parameters shows approximate Precision(0.858), Recall(0.936), RT(1), MT(0). The above results have proved higher retrieval effects than the content_based image retrieval by using color space of keywords.

  • PDF

A Study on the Development of Visual Arts Convergence Education Model with the Formless Concept (비정형 개념에 따른 시각예술 융합교육 모형 개발)

  • Cho, Hyun Geun
    • Korea Science and Art Forum
    • /
    • v.37 no.2
    • /
    • pp.275-292
    • /
    • 2019
  • This study was initiated with the attention of demanding new and diverse approaches, we're talking familiar with imitations in the design process like a way to draw a image. So I studied a convergence of humanities and visual arts with the understanding and conceptual approach of the formless. The purpose of this study is to develop formless languages and to organize practical courses which are to enable deeper research and design expression on theoretical approaches and explanations of outcomes required before and after the process when we practice in connection with the formless. The method of this study is to draw detailed items from selected words through advanced researches, work and author researches and practice teaching. The results of the study I proposed the formless language that is related to the horizontality in spatial positioning system, and pulse in the separation of space and time, and entropy in structural orders of the system, and base materialism in the limitation of matter as the operating mechanism and parent item of formless. And those elements are related with shape, size, shading, color, texture, space, structure as visual elements of formative elements and those have various adjectival meanings as the subordinate concept. So I presented an education materials of basic design which is to enable understanding and expressing the formless language in the overall process of formless visual art(theoretical approach, practice course, presentation, etc.). Based on these study results, I hope that this educational materials will be used as educational contents that makes them express and understand different new beauties, and a role that reveals social identity, and a reference for research on a formless visual arts.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Applicability of Theoretical Adsorption Models for Studies on Adsorption Properties of Adsorbents(III) (흡착제의 흡착특성 규명을 위한 흡착모델의 적용성 평가(III) - 열역학적 특성을 중심으로)

  • Na, Choon-Ki;Jeong, Jin-Hwa;Park, Hyun-Ju
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.4
    • /
    • pp.260-269
    • /
    • 2012
  • The aim of this study is to evaluate the applicability of adsorption models for understanding the thermodynamic properties of adsorption process. For this study, the adsorption isotherm data of $NO_3$-N ion onto a commercial anion exchange resin obtained at various experimental conditions, i.e. different initial concentrations of adsorbate, different dosages of adsorbent, and different temperatures, were used in calculating the thermodynamic parameters and the adsorption energy of adsorption process. The Gibbs free energy change (${\Delta}G^0$) of adsorption process could be calculated using the Langmuir constant $b_M$ as well as the Sips constant, even though the results were significantly dependant on the experimental conditions. The thermodynamic parameters such as standard enthalpy change (${\Delta}H^0$), standard entropy change (${\Delta}S^0$) and ${\Delta}G^0$ could be calculated by using the experimental data obtained at different temperatures, if the adsorption data well fitted to the Langmuir isotherm model and the plot of ln b versus 1/T gives a straight line. As an alternative, the empirical equilibrium constant(K) defined as $q_e/C_e$ could be used for evaluating the thermodynamic parameters instead of the Langmuir constant. The results from the applications of D-R model and Temkin model to evaluate the adsorption energy suggest that the D-R model is better than Temkin model for describing the experimental data, and the availability of Temkin model is highly limited by the experimental conditions. Although adsorption energies determined using D-R model show significantly different values depending on the experimental conditions, they were sufficient to show that the adsorption of $NO_3$-N onto anion exchange resin is an endothermic process and an ion-exchange process.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.