• Title/Summary/Keyword: 역필터링

Search Result 144, Processing Time 0.025 seconds

Log-Polar Image Watermarking based on Invariant Centroid as Template (불변의 무게중심을 템플릿으로 이용한 대수-극 좌표계 영상 워터마킹 기법)

  • 김범수;유광훈;김우섭;곽동민;송영철;최재각;박길흠
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.341-351
    • /
    • 2003
  • Digital image watermarking is the method that can protect the copyright of the image by embedding copyright information, which is called watermark. Watermarking must have robustness to intentional or unintentional data changing, called attack. The conventional watermarking schemes are robust to waveform attacks such as image compression, filtering etc. However, they are vulnerable to geometrical attacks such as rotation, scaling, translation, and cropping. Accordingly, this paper proposes new watermarking scheme that is robust to geometrical attacks by using invariant centroid. Invariant centroid is the gravity center of a central area in a gray scale image that remains unchanged even when the image is attacked by RST including cropping and proposed scheme uses invariant centroids of original and inverted image as the template. To make geometrically invariant domain, template and angle compensated Log -Polar Map(LPM) is used. Then Discrete Cosine Transform(DCT) is performed and the watermark is embedded into the DCT coefficients. Futhermore, to prevent a watermarked image from degrading due to interpolation during coordinate system conversion, only the image of the watermark signal is extracted and added to the original image. Experimental results show that the proposed scheme is especially robust to RST attacks including cropping.

Application of Residual Statics to Land Seismic Data: traveltime decomposition vs stack-power maximization (육상 탄성파자료에 대한 나머지 정적보정의 효과: 주행시간 분해기법과 겹쌓기제곱 최대화기법)

  • Sa, Jinhyeon;Woo, Juhwan;Rhee, Chulwoo;Kim, Jisoo
    • Geophysics and Geophysical Exploration
    • /
    • v.19 no.1
    • /
    • pp.11-19
    • /
    • 2016
  • Two representative residual static methods of traveltime decomposition and stack-power maximization are discussed in terms of application to land seismic data. For the model data with synthetic shot/receiver statics (time shift) applied and random noises added, continuities of reflection event are much improved by stack-power maximization method, resulting the derived time-shifts approximately equal to the synthetic statics. Optimal parameters (maximum allowable shift, correlation window, iteration number) for residual statics are effectively chosen with diagnostic displays of CSP (common shot point) stack and CRP (common receiver point) stack as well as CMP gather. In addition to removal of long-wavelength time shift by refraction statics, prior to residual statics, processing steps of f-k filter, predictive deconvolution and time variant spectral whitening are employed to attenuate noises and thereby to minimize the error during the correlation process. The reflectors including horizontal layer of reservoir are more clearly shown in the variable-density section through repicking the velocities after residual statics and inverse NMO correction.

Co-registration of PET-CT Brain Images using a Gaussian Weighted Distance Map (가우시안 가중치 거리지도를 이용한 PET-CT 뇌 영상정합)

  • Lee, Ho;Hong, Helen;Shin, Yeong-Gil
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.612-624
    • /
    • 2005
  • In this paper, we propose a surface-based registration using a gaussian weighted distance map for PET-CT brain image fusion. Our method is composed of three main steps: the extraction of feature points, the generation of gaussian weighted distance map, and the measure of similarities based on weight. First, we segment head using the inverse region growing and remove noise segmented with head using region growing-based labeling in PET and CT images, respectively. And then, we extract the feature points of the head using sharpening filter. Second, a gaussian weighted distance map is generated from the feature points in CT images. Thus it leads feature points to robustly converge on the optimal location in a large geometrical displacement. Third, weight-based cross-correlation searches for the optimal location using a gaussian weighted distance map of CT images corresponding to the feature points extracted from PET images. In our experiment, we generate software phantom dataset for evaluating accuracy and robustness of our method, and use clinical dataset for computation time and visual inspection. The accuracy test is performed by evaluating root-mean-square-error using arbitrary transformed software phantom dataset. The robustness test is evaluated whether weight-based cross-correlation achieves maximum at optimal location in software phantom dataset with a large geometrical displacement and noise. Experimental results showed that our method gives more accuracy and robust convergence than the conventional surface-based registration.

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.