• Title/Summary/Keyword: 이미지훼손

Search Result 96, Processing Time 0.028 seconds

Design and Implementation of AR Model based Automatic Identification and Restoration Scheme for Line Scratches in Old Films (AR 모델 기반의 고전영화의 긁힘 손상의 자동 탐지 및 복원 시스템 설계와 구현)

  • Han, Ngoc-Soc;Kim, Seong-Whan
    • The KIPS Transactions:PartB
    • /
    • v.17B no.1
    • /
    • pp.47-54
    • /
    • 2010
  • Old archived film shows two major defects: line scratch and blobs. In this paper, we present a design and implementation of an automatic video restoration system for line scratches observed in archived film. We use autoregressive (AR) image model because we can make stochastic and specifically autoregressive image generation process with our PAST-PRESENT model and Sampling Pattern. We designed locality maximizing scanning pattern, which can generate nearly stationary time-like series of pixels, which is a strong requirement for a stochastic series to be autoregressive. The sampled pixel series undergoes filtering and model fitting using Durbin-Levinson algorithm before interpolation process. We designed three-stage film restoration system, which includes (1) film acquisition from VHS tapes, (2) simple line scratch detection and restoration, and (3) manual blob identification and sophisticated inpainting scheme. We implemented film acquisition and simple inpainting scheme on Texas Instruments DSP board TMS320DM642 EVM, and implemented our AR inpainting scheme on PC for sophisticated restoration. We experimented our scheme with two old Korean films: "Viva Freedom" and "Robot Tae-Kwon-V", and the experimental results show that our scheme improves Bertalmio's scheme for subjective quality (MOS), objective quality (PSNR), and especially restoration ratio (RR), which reflects how much similar to the manual inpainting results.

A Study of a Fast Booting Technique for a New memory+DRAM Hybrid Memory System (뉴메모리+DRAM 하이브리드 메모리 시스템에서의 고속부팅 기법 연구)

  • Song, Hyeon Ho;Moon, Young Je;Park, Jae Hyeong;Noh, Sam H.
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.434-441
    • /
    • 2015
  • Next generation memory technologies, which we denote as 'new memory', have both non-volatile and byte addressable properties. These characteristics are expected to bring changes to the conventional computer system structure. In this paper, we propose a fast boot technique for hybrid main memory architectures that have both new memory and DRAM. The key technique used for fast booting is write-tracking. Write-tracking is used to detect and manage modified data detection and involves setting the kernel region to read-only. This setting is used to trigger intentional faults upon modification requests. As the fault handler can detect the faulting address, write-tracking makes use of the address to manage the modified data. In particular, in our case, we make use of the MMU (Memory Management Unit) translation table. When a write occurs to the boot completed state, write-tracking preserves the original state of the modified address of the kernel region to a particular location, and execution continues. Upon booting, the fast booting process restores the preserved data to the original kernel region allowing rapid system boot-up. We develop the fast booting technique in an actual embedded board equipped with new memory. The boot time is reduced to less than half a second compared to around 15 seconds that is required for the original system.

Impact of Solar Energe Facility on the Landscape Experience of Traditional Temple - Focused on the Entrance Way of Tongdosa - (태양열시설이 전통사찰의 경관경험에 미치는 영향 - 통도사 진입경관을 중심으로 -)

  • Yi, Young-Kyoung;Kim, Jeong-Eun;Lee, Seo-Youl
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.114-121
    • /
    • 2010
  • Traditional temples in Korea are the important cultural heritage because of artistic traditonal buildings and structures, paintings, sculptures, and big forest areas which are most ecological and beautiful in Korea. Since traditional temples still function as religious places for very long time, the sense of places intrinsic to the temples are very strong and vivid. The sense of place is very closely related to the conservation of the original landscape type. Recently however, there is a strong tendency to use solar energy in traditional temples because of the low energy efficiency of the old traditional architecture which may have negative impact on landscape which again in turn may lead to the destruction of the sense of place. The purpose of this study was to suggest some landscape design guidelines to protect the sense of place of traditional temple by investigating the impact of solar energy facility on the landscape experience of traditional temple. In order to do perform this purpose, Tongdosa was selected as a study site and four kinds of measurement tools(landscape image, temple identity, landscape satisfaction, degree of landscape improvement) were used as questionnaire items. 180 college students participated in the questionnaire survey. The analysis showed that the solar energy facility had very negative impact on landscape experience such as three landscape image factors(scenic beauty, openness, complexity), landscape satisfaction, temple identity, and landscape improvement. Based on the results, three landscape improvement plans were suggested. First, solar energy facility should be built in the forest in order not to be exposed to visitors, if possible. Second, the landscape management of traditional temple should emphasize on sustaining scenic beauty and temple identity along with the provision of openness. Lastly, detailed landscape guideline should be prepared to regulate the scale, ratio, and the form of the artificial buildings and structures to protect the sense of place of traditional temple.

A Survey of Yeosu Sado Dinosaur Tracksite and Utilization of Educational Materials using 3D Photogrammetry (3D 사진측량법을 이용한 여수 사도 공룡발자국 화석산지 조사 및 교육자료 활용방안)

  • Jo, Hyemin;Hong, Minsun;Son, Jongju;Lee, Hyun-Yeong;Park, Kyeong-Beom;Jung, Jongyun;Huh, Min
    • Journal of the Korean earth science society
    • /
    • v.42 no.6
    • /
    • pp.662-676
    • /
    • 2021
  • The Yeosu Sado dinosaur tracksite is well known for many dinosaur tracks and research on the gregarious behavior of dinosaurs. In addition, various geological and geographical heritage sites are distributed on Sado Island. However, educational field trips for students are very limited due to accessibility according to its geological location, time constraints due to tides, and continuous weathering and damage. Therefore, this study aims to generate 3D models and images of dinosaur tracks using the photogrammetric method, which has recently been used in various fields, and then discuss the possibility of using them as paleontological research and educational contents. As a result of checking the obtained 3D images and models, it was possible to confirm the existence of footprints that were not previously discovered or could not represent details by naked eyes or photos. Even previously discovered tracks could possibly present details using 3D images that could not be expressed by photos or interpretive drawings. In addition, the 3D model of dinosaur tracks can be preserved as semi-permanent data, enabling various forms of utilization and preservation. Here we apply 3D printing and mobile augmented reality content using photogrammetric 3D models for a virtual field trip, and these models acquired by photogrammetry can be used in various educational content fields that require 3D models.

김 양식에 있어 붉은갯병 억제를 위한 고염분해수 처리 효과

  • 박찬선;위미영;일본명
    • Proceedings of the Korean Aquaculture Society Conference
    • /
    • 2003.10a
    • /
    • pp.23-23
    • /
    • 2003
  • 김 붉은갯병은 김 엽체에 난균류 Pythium속의 Pythium porphyrae의 기생에 의해 발생되어 매년 김 양식에 큰 피해를 주는 매우 심각한 김 갯병중의 하나이다. 최근에는 이들 병해의 발생 및 억제를 위한 김 산처리제 (활성처리제) 남용에 따른 연안 양식어장의 생태계 파괴 및 김의 자연식품에 대한 이미지 훼손 등의 문제점이 대두되고 있다. 따라서 본 연구에서는 김 양식시 발생되는 붉은갯병의 병해를 억제하고자 활성처리제 처리시 고염분해수 처리를 병용함으로써 활성처리제의 사용을 최소화하면서 처리효과를 배가시키고자 하였다. 시험에 사용한 김 엽체는 2002년 10월에 전라남도 해남군 황산면 지선에서 채묘한 방사무늬김 (Porphyra yezoensis)을 육묘해 엽장 1cm 내외에서 냉동망을 제작하여 -2$0^{\circ}C$에 저장한 엽체를 자연해수 (약 27$\textperthousand$), 15$^{\circ}C$, 100$\mu$mol photon m$^{-2}$ s$^{-1}$, 광주기 9L : 15D의 배양조건하에서 15일간 배양한 엽장 3-4cm 정도의 것이었다. 활성처리제와 고염분해수처리제의 병용에 의한 붉은 갯병 억제효과는 붉은갯병 병원균의 유주자를 김 엽체에 감염시킨 후 27$\textperthousand$의 자연해수에 12일간 배양하면서 염분농도를 3-25%, 처리주기를 1-2회로 하여 각 시험구별 병해정도로 평가하였다. 고염분해수 처리에 의한 붉은갯병균 균사의 생장억제 효과는 김 엽체를 붉은갯병 병원균의 유주자로 감염시킨 다음 감염 12시간 후 염분농도를 3-25%로 처리한 후 27$\textperthousand$의 자연해수에 4일간 배양하면서 각 시험구별 배양시간에 따른 병원균 균사에 의한 김 엽체의 감염세포수로 평가하였다. 활성처리제와 고염분해수처리제의 병용이 김 엽체 생장에 미치는 영향은 건전한 김 엽체의 절편을 27$\textperthousand$의 자연해수에 배양하면서 시험구별로 활성처리와 고염분해수 (5, 10, 15, 20, 25%) 처리를 3일 간격으로 하면서 12일간 배양한 후 엽체의 엽면적 증가율로 평가하였다. 활성처리제와 고염분해수처리제의 병용에 의한 붉은갯병의 억제효과는 대조구 (활성처리 1회)와 비교해 주 2회의 활성처리구와 염분농도 20, 25% 처리구에서 병해 억제효과가 월등히 높았다. 고염분해수 처리에 의한 붉은갯병균 균사의 생장억제 효과는 염분농도 5, 10% 처리구의 경우 무처리구에 가까운 감염세포수를 보였으나, 염분농도 20, 25% 처리구의 경우 활성처리제 처리와 비슷한 감염세포수를 보여 뚜렷한 생장 억제효과를 나타냈다. 활성처리와 고염분해수 처리의 병용이 김 엽체 생장에 미치는 영향은 대조구 (활성처리 1회)의 3.4배 생장율과 활성처리와 염분농도 5-20%의 고염분해수 병용 처리구의 3.1-3.6배 생장율은 유의한 생장차이를 보이지 않았다 (P<0.05).

  • PDF

The U.S. Government's Book Translation Program in Korea in the 1950s (1950년대 한국에서의 미국 도서번역 사업의 전개와 의미)

  • Cha, Jae Young
    • Korean journal of communication and information
    • /
    • v.78
    • /
    • pp.206-242
    • /
    • 2016
  • This study dealt with the U.S. government's book translation project as a part of its public diplomacy to gain the Korean people's 'minds and thoughts' in the midst of cultural Cold War from the end of World War II to the late 1950s. It was found that the U.S. book translation project was begun during the U.S. military occupation of South Korea, though with minimum efforts, and reached its peak in the late 1950s, In general, the purposes of the U.S. book translation project in South Korea was as follows: to emphasize the supremacy of American political and economic systems; to criticize the irrationality of communism and conflicts in the communist societies; to increase the Korean people's understanding of the U.S. foreign policies; to publicize the achievement of the U.S. people in the areas of arts, literature, and sciences. In the selection of books for translation, any ones were excluded which might contradict to U.S. foreign policy or impair U.S. images abroad. It must be noted that publications of a few Korean writers' books were supported by the project, if they were thought to be in service for its purposes. Even some Japanese books, which were produced by the U.S. book translation project in Japan, were utilized for the best effects of the project in South Korea. It may be conceded that the U.S. book translation project contributed a little bit to the compensation for the dearth of knowledge and information in South Korea at that time. However, the project may have distorted the Korean people's perspectives toward the U.S. and world, owing to the book selection in accordance with the U.S. government's policy guidance.

  • PDF

An Efficient Kernel Introspection System using a Secure Timer on TrustZone (TrustZone의 시큐어 타이머를 이용한 효율적인 커널 검사 시스템)

  • Kim, Jinmok;Kim, Donguk;Park, Jinbum;Kim, Jihoon;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.863-872
    • /
    • 2015
  • Kernel rootkit is recognized as one of the most severe and widespread threats to corrupt the integrity of an operating system. Without an external monitor as a root of trust, it is not easy to detect kernel rootkits which can intercept and modify communications at the interfaces between operating system components. To provide such a monitor isolated from an operating system that can be compromised, most existing solutions are based on external hardware. Unlike those solutions, we develop a kernel introspection system based on the ARM TrustZone technology without incurring extra hardware cost, which can provide a secure memory space in isolation from the rest of the system. We particularly use a secure timer to implement an autonomous switch between secure and non-secure modes. To ensure integrity of reference, this system measured reference from vmlinux which is a kernel original image. In addition, the flexibility of monitoring block size can be configured for efficient kernel introspection system. The experimental results show that a secure kernel introspection system is provided without incurring any significant performance penalty (maximum 6% decrease in execution time compared with the normal operating system).

The Effect of Information Security Breach and Security Investment Announcement on the Market Value of Korean Firms (정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향)

  • Kwon, Young-Ok;Kim, Byung-Do
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.105-120
    • /
    • 2007
  • With the fast development of the Internet and the increasing dependence on information infrastructures, companies are faced with various information security threats such as information leakages, modifications, and information breaches. South Korea is one of the leading countries in the Internet usage, but is ranked relatively low when it comes to information security. In fact, many Korean firms have suffered financial losses and damaged corporate images from the information security breaches. However, because of the difficulties in quantifying the costs of the information security breaches, Korean companies tend to delay their investment decisions on information security. The purpose of this study is to measure the cost of information security breach and the economic value of security investment using the event study methodology. Our results show that the announcement of an information security breach negatively influenced the market value of the corresponding company. The effect was statistically significant at the significance level of p=0.05. The breached companies lose, on average, 0.86% of their market values on the day of the announcement - an average loss in market capitalization of $55 million. On the other hand, the investment on information security had no effect on the stock price or the market value of the firm.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.