• Title/Summary/Keyword: 이미지훼손

Search Result 96, Processing Time 0.023 seconds

Multi-Cutting Machine for TJ Coupler production (NFC 텀블러 시스템 설계 및 구현)

  • Park, Heewan;Lee, Won Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.735-736
    • /
    • 2022
  • 최근 환경 보호를 위해서 정부의 주도하에 커피전문점에서는 1회용품 대신 텀블러 사용을 장려하고 있다. 하지만 세척이 불편하고 휴대성이 좋지 않아서 효과가 크지 않은 것이 현실이다. 또한 유명 커피전문점에서는 조잡한 가품 텀블러 문제로 브랜드 이미지가 훼손되고 있다. 본 논문에서는 이러한 문제점을 해결하고자 NFC 텀블러 시스템을 설계 및 구현하였다. NFC 텀블러는 기존 적립카드를 대체할 수 있기 때문에 텀블러 이용률을 높일 수 있으며 가품 텀블러를 쉽게 구분할 수 있어서 브랜드 이미지 관리에도 도움이 될 것으로 기대한다.

  • PDF

Application of Digital Photogrammetry to Dinosaur Tracks from the Namhae Gain-ri Tracksite (남해 가인리 공룡발자국 화석에 대한 디지털 사진 측량 기법의 활용)

  • Kong, Dal-Yong;Lim, Jong-Deock;Kim, Jeong-Yul;Kim, Kyung Soo
    • Journal of the Korean earth science society
    • /
    • v.31 no.2
    • /
    • pp.129-138
    • /
    • 2010
  • A number of dinosaur tracksites located at southern coast of the Korean Peninsula have continuously been damaged by sea-waves and weathering. To protect the dinosaur tracksites from the damage permanently and safely, we need to develop conservation programs as well as to collect data documenting the sites. We specifically applied digital photogrammetry to extensively record and document dinosaur tracks in the Namhae Gain-ri tracksite (Natural Monument No. 499) and were able to obtain 3D images data with it. The data of 3D images enable us to produce permanent documentation and preservation of the morphology of dinosaur tracks and tracksites. Moreover the weathering rate on time can be numerically analyzed by periodic measurements of the dinosaur tracksite and comparison of those measurements. The 3D modeling techniques also can be used in various ways including analyzing morphology of tracks, duplicating replicas for museum exhibitions, and posting the results on the Internet homepage.

Long Term Monitoring of Deterioration Condition for the Rock-carved Buddha Triad in Seosan, Korea (서산 용현리 마애여래삼존상의 장기 모니터링과 훼손상태 변화)

  • Chun, Yu Gun;Lee, Jae Man;Lee, Mi Hye;Park, Sung Mi;Lee, Sun Myung;Lee, Myeong Seong
    • Journal of Conservation Science
    • /
    • v.30 no.4
    • /
    • pp.439-446
    • /
    • 2014
  • We carried out monitoring of deterioration condition for the Rock-carved Buddha Triad in Seosan after dismantlement of protective facilities and conservation treatment. As the results of ultrasonic velocity measurement, physical properties of rock were evaluated to maintain similar the past. Result of digital image analysis, white discoloration was reoccured after four years of conservation treatments. And biodeterioration of unknown in the past was generated left side on the Rock-carved Buddha. Phenomenon of biodeterioration on the surface rocks was estimated by variation of sunshine and water contents according to topography condition.

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.

A Comparative Study on the Preference and Visual Characteristics of Stream Landscape According to Hydromorpological Structures (하천의 물리적 구조에 따른 하천경관의 선호도 및 시각적 이미지 비교 연구)

  • Choi, Yun Eui;Lee, Jung A;Chon, Jinhyung
    • Journal of Wetlands Research
    • /
    • v.15 no.3
    • /
    • pp.301-315
    • /
    • 2013
  • The purpose of this study is to investigate characteristics of hydromorpological structures that affect landscape preference and visual characteristics on the sections of the designated streams where have dynamic ecological characteristics. We evaluated the ecological status of the streams utilizing LAWA to assess hydromorpological structures of streams. We also investigated preference and visual characteristics of stream landscapes through Semantic Differential Scale(SD scale). The differences of visual images according to the characteristics of hydromorpological structures in the sites were analyzed by descriptive statistics, One-way ANOVA, and t-test. As a result, this study showed that sections represented as "good" ecological status are shown to be harmonious, beautiful, natural, and clean comparing to sections represented as "poor" ecological status. The hydromorpological structures that have significant impacts on the visual characteristics are considered as riparian vegetation, cross-sectional shape, and the artificial structures. Results of this study can help guide the stream restoration of the damaged stream to improving ecological function and positive landscape.

A Visual Enhancement of Web Content Adaptation for Mobile Devices (무선 단말기를 위한 웹 콘텐츠 적응의 시각적인 개선)

  • Kim, Won-Seop;Chai, Young-Joon;Kim, Tae-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1229-1239
    • /
    • 2007
  • In conversion of web pages for mobile devices, since existing web conversion systems eliminate unnecessary objects indiscriminately or only convert the layout of a page, the original intention of a web designer is spoiled. In spite of great advances in device technology, there still remain the problems of limited display sire and insufficient CPU power. In this paper, we propose an adaptation method that minimizes the loss of information and preserves the original intention of a web designer from the visual aspect. In image conversion, the proposed method extracts meaningful information from the background against conventional resizing methods, and performs layout-based conversion for the arrangement of image components. Experimental results show the efficiency of the method on the accuracy and the usability in comparison with existing methods.

  • PDF

A Study on the Shape of the Portrait of King Taejo Using Digital Restoration (디지털 복원을 통한 태조어진太祖御眞의 형태 고찰)

  • Kwak, Eun Gyung;Sohn, Theo;Yi, Hyeon Ju
    • Journal of Conservation Science
    • /
    • v.32 no.1
    • /
    • pp.51-61
    • /
    • 2016
  • 'Eojin', king's portraits, had been produced during the Joseon dynasty. The portrait of King Taejo, the founder of the Joseon dynasty, remain at National Palace Museum of Korea and Gyeonggijeon portrait hall in Jeonju and Junwonjeon portrait hall in North Korea that has been recorded in original glass plate photo in 1911. Many replica of Eojin have been made since it is important to preserve and protect original one. In this study, the portrait of King Taejo, which is possessed by National Palace Museum of Korea, was researched for making replication standard version of the original form. It was focused on derivations of each artefacts and drawing lines those had been described on the picture including comparison among three portraits of King Taejo. Producing the replication standard version of King Taejo's portrait, the digital restoration techniques by the method of partition area scanning was applied. Accurate and precise detail result that is taken by digital imaging technique gives additional information regarding the relations among three portraits of King Taejo.

Image Restoration using GAN (적대적 생성신경망을 이용한 손상된 이미지의 복원)

  • Moon, ChanKyoo;Uh, YoungJung;Byun, Hyeran
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.503-510
    • /
    • 2018
  • Restoring of damaged images is a fundamental problem that was attempted before digital image processing technology appeared. Various algorithms for reconstructing damaged images have been introduced. However, the results show inferior restoration results compared with manual restoration. Recent developments of DNN (Deep Neural Network) have introduced various studies that apply it to image restoration. However, if the wide area is damaged, it can not be solved by a general interpolation method. In this case, it is necessary to reconstruct the damaged area through contextual information of surrounding images. In this paper, we propose an image restoration network using a generative adversarial network (GAN). The proposed system consists of image generation network and discriminator network. The proposed network is verified through experiments that it is possible to recover not only the natural image but also the texture of the original image through the inference of the damaged area in restoring various types of images.

Adjacent Pixels based Noise Mitigation Filter in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 인접 픽셀 기반 잡음 완화 필터)

  • Seong, Chi Hyuk;Shin, Soo Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.65-71
    • /
    • 2017
  • Digital images and videos are subject to various types of noise during storage and transmission. Among these noises, Salt & Pepper noise degrades the compression efficiency of the original data and causing deterioration of performance in edge detection or segmentation used in an image processing method. In order to mitigate this noise, there are many filters such as Median Filter, Weighted Median Filter, Center Weighted Median Filter, Switching Weighted Median Filter and Adaptive Median Filter. However these methods are inferior in performance at high noise density. In this paper we propose a new type of filter for noise mitigation in wireless communication environment where Salt & Pepper noise occurs. The proposed filter detects the location of the damaged pixel by Salt & Pepper noise detection and mitigates the noise by using adjacent pixel values which are not damaged in a certain area. Among the proposed filters, the performance of the filter using the $3{\times}3$ error mask is compared with that of the conventional methods and it is confirmed that when density of noise in the image is 95%, their performances are improved as 13.24 dB compared to MF and 13.09 dB compared to AMF.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.