• Title/Summary/Keyword: 잡음에 대한 강인함

Search Result 230, Processing Time 0.029 seconds

Synthesis Method for the Adaptive SLB Channel Based on the Spatial DLC (Spatial DLC를 기반으로 한 적응적 SLB 채널 합성에 대한 연구)

  • Jang, Youn Hui;Kim, Whan-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.8
    • /
    • pp.608-614
    • /
    • 2018
  • This paper describes the synthesis method for an adaptive SLB channel, which is robust to interference in the ULA radar system. The SLB channel based on the spatial DLC can be synthesized simply and is effective in blanking the signal coming from the sidelobe. We combined it with adaptive beamforming, which removes the strong interference using its correlation matrix. The adaptive SLB channel would suppress the interference below the noise, so it has good performance in an interference environment. This research will be applicable to planar array systems.

Watermark Algorithm Using Difference Matrix between Successive Blocks (연속 블록간의 화소차이 행렬을 이용한 워터마크 알고리즘)

  • Park, Ki-Hong;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.273-279
    • /
    • 2008
  • In this paper, we proposed a watermarking algorithm by using difference matrix between successive blocks in the transform domain. In the preprocessing, original image is decomposed with 1-level sub-bands by DWT. Then, all sub-bands which are excepted the low-frequency bands are set to normalize and make a reference image after transforming inverse DWT. The statistic variance of successive blocks between the original image and the reference image are calculated and finally, watermark is embedded considering the local characteristic with respect to the high-frequence components. Experimental results showed that the proposed approach is robust and better invisible in such attacks as filtering, JPEG and noise addition.

  • PDF

Novel Optical Image Encryption using Integral Unaging and Random Pixel-scrambling Schemes (집적영상 및 랜덤 픽셀-스크램블링 기법을 이용한 새로운 광 영상 암호화)

  • Piao, Yong-Ri;Kim, Seok-Tae;Kim, Eun-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.380-387
    • /
    • 2009
  • In this paper, optical image encryption using integral imaging and pixel-scrambling technologies is proposed. In the encryption process, we use pixel scrambling to change the order of subsections into which the cover image is divided, and the utilize the integral imaging scheme to obtain the elemental image from the scrambled image. In order to achieve higher security, we reuse pixel scrambling to the elemental image. In the decryption process, we employ optical integral imaging reconstruction technique and inverse pixel scrambling methode. Computer simulation results prove the feasibility of the proposed method and robustness against data loss and noise.

Real-time Implementation of Synchronizing Broadcasting System Using Watermark (워터마크를 이용한 방송동기화 시스템의 실시간 구현)

  • Jeong Yangmo;Shin Donghwan;Kim Jongweon;Choi Jonguk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.203-206
    • /
    • 2004
  • 본 논문에서는 오디오 워터마킹 기술을 이용하여 중앙방송국과 지방방송국간의 방송전환을 용이하게 할 수 있는 시스템을 구현하였다. 방송전환을 위한 동기화 시스템에서의 오 검출은 방송사고를 일으키기 때문에, 오디오 워터마크기술을 이용할 때 신뢰성이 매우 높아야 한다. 달 논문에서는 방송동기화 시스템에 효율적으로 적용할 수 있는 오디오 워터마킹 알고리즘을 개발하고, 이를 실시간으로 적용하여 방송전환에 사용할 수 있는 시스템을 구현하였다. 개발된 오디오 워터마킹 알고리즘에 의해서 워터마크가 삽입된 방송신호의 SNR은 66.1dB로서 워터마크 삽입전의 방송신호와의 구분이 어려웠다. 강인성 테스트에서는 96kbps와 128kbps의 MP3 압축을 하였을 때에도 $100\%$의 검출율을 보였으며, -50dB 이하의 잡음첨가에 대해서도 $100\%$ 검출율을 보였다. 구현된 시스템은 240시간의 실제 방송상황에서 워터마크가 삽입된 방송신호에 대한 검출율이 $100\%$이고, 오검출율이 $0\%$로 방송시스템으로서의 신뢰성을 확보하였다.

  • PDF

Voice Activity Detection Using Ellipse Fitting of the Oral Cavity Region (구강 영역에 대한 타원 근사법을 이용한 음성 구간 검출법)

  • Ryu, Jewoong;Choo, Sung Kwon;Kim, Gibak;Cho, Namik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.271-274
    • /
    • 2012
  • 음성 신호처리에서 많이 쓰이는 음성구간 검출은 주로 음향신호의 분석을 통하여 음향 신호에 음성이 존재하는지 여부를 판단한다. 그러나 음향신호를 이용한 방법은 음성 또는 비음성 잡음이나 주위 음향 환경에 의하여 성능이 결정된다는 단점이 있다. 음향 환경 변화에 강인한 음성구간 검출을 수행하기 위하여, 영상정보를 이용한 음성구간 검출 방법들이 최근에 연구되어 왔는데 기존 방법들은 입술 모양의 변화를 추정하기 위하여 입술 모델 등을 이용하거나 구강(oral cavity) 영역에 해당하는 픽셀 수의 변화를 이용하여 음성 구간을 검출하였다. 위 방법들은 입술의 모양을 추정하는 데 복잡한 계산이 필요하거나, 입술 모양 추정 없이 구강 영역픽셀 수만 이용하기 때문에 다소 정확도가 떨어진다는 단점이 있다. 본 논문에서는, 입술 모양의 변화를 추정하기 위해 밖으로 드러나는 구강 영역의 모양을 타원 근사법으로 추정하고, 타원의 넓이와 높이의 변화를 이용하여 음성 구간을 검출하는 방법을 제안하였다. 비교 실험 결과, 제안하는 방법은 구강영역 픽셀 수의 변화만 이용하는 방법에 비해 우수한 성능을 보임을 확인할 수 있었다.

  • PDF

Digital Watermarking using HVS and Neural Network (HVS와 신경회로망을 이용한 디지털 워터마킹)

  • Lee, Young-Hee;Lee, Mun-Hee;Cha, Eui-Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.101-109
    • /
    • 2006
  • We propose an adaptive digital watermarking algorithm using HVS(human visual system) and SOM(Self-Organizing Map) among neural networks. This method adjusts adaptively the strength of the watermark which is embedded in different blocks according to block classification in DCT(Discrete Cosine Transform) domain. All blocks in 3 classes out of 4 are selected to embed a watermark. Watermark sequences are embedded in 6 lowest frequency coefficients of each block except the DC component. The experimental results are excellent.

  • PDF

Tracking Control using Disturbance Observer and ZPETC on LonWorks/IP Virtual Device Network (LonWorks/IP 가상 디바이스 네트워크에서 외란관측기와 ZPETC를 이용한 추종제어)

  • Song, Ki-Won
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.1
    • /
    • pp.33-39
    • /
    • 2007
  • LonWorks over IP (LonWorks/IP) virtual device network (VDN) is an integrated form of LonWorks device network and IP data network. LonWorks/IP VDN can offer ubiquitous access to the information on the factory floor and make it possible for the predictive and preventive maintenance on the factory floor. Timely response is inevitable for predictive and preventive maintenance on the factory floor under the real-time distributed control. The network induced uncertain time delay deteriorates the performance and stability of the real-time distributed control system on LonWorks/IP virtual device network. Therefore, in order to guarantee the stability and to improve the performance of the networked distributed control system the time-varying uncertain time delay needs to be compensated for. In this paper, under the real-time distributed control on LonWorks/IP VDN with uncertain time delay, a control scheme based on disturbance observer and ZPETC(Zero Phase Error Tracking Controller) phase lag compensator is proposed and tested through computer simulation. The result of the proposed control is compared with that of internal model controller (IMC) based on Smith predictor and disturbance observer. It is shown that the proposed control scheme is disturbance and noise tolerant and can significantly improve the stability and the tracking performance of the periodic reference. Therefore, the proposed control scheme is well suited for the distributed servo control for predictive maintenance on LonWorks/IP-based virtual device network with time-varying delay.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

The Effect of the Telephone Channel to the Performance of the Speaker Verification System (전화선 채널이 화자확인 시스템의 성능에 미치는 영향)

  • 조태현;김유진;이재영;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.12-20
    • /
    • 1999
  • In this paper, we compared speaker verification performance of the speech data collected in clean environment and in channel environment. For the improvement of the performance of speaker verification gathered in channel, we have studied on the efficient feature parameters in channel environment and on the preprocessing. Speech DB for experiment is consisted of Korean doublet of numbers, considering the text-prompted system. Speech features including LPCC(Linear Predictive Cepstral Coefficient), MFCC(Mel Frequency Cepstral Coefficient), PLP(Perceptually Linear Prediction), LSP(Line Spectrum Pair) are analyzed. Also, the preprocessing of filtering to remove channel noise is studied. To remove or compensate for the channel effect from the extracted features, cepstral weighting, CMS(Cepstral Mean Subtraction), RASTA(RelAtive SpecTrAl) are applied. Also by presenting the speech recognition performance on each features and the processing, we compared speech recognition performance and speaker verification performance. For the evaluation of the applied speech features and processing methods, HTK(HMM Tool Kit) 2.0 is used. Giving different threshold according to male or female speaker, we compare EER(Equal Error Rate) on the clean speech data and channel data. Our simulation results show that, removing low band and high band channel noise by applying band pass filter(150~3800Hz) in preprocessing procedure, and extracting MFCC from the filtered speech, the best speaker verification performance was achieved from the view point of EER measurement.

  • PDF

Vector Quantization based Speech Recognition Performance Improvement using Maximum Log Likelihood in Gaussian Distribution (가우시안 분포에서 Maximum Log Likelihood를 이용한 벡터 양자화 기반 음성 인식 성능 향상)

  • Chung, Kyungyong;Oh, SangYeob
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.335-340
    • /
    • 2018
  • Commercialized speech recognition systems that have an accuracy recognition rates are used a learning model from a type of speaker dependent isolated data. However, it has a problem that shows a decrease in the speech recognition performance according to the quantity of data in noise environments. In this paper, we proposed the vector quantization based speech recognition performance improvement using maximum log likelihood in Gaussian distribution. The proposed method is the best learning model configuration method for increasing the accuracy of speech recognition for similar speech using the vector quantization and Maximum Log Likelihood with speech characteristic extraction method. It is used a method of extracting a speech feature based on the hidden markov model. It can improve the accuracy of inaccurate speech model for speech models been produced at the existing system with the use of the proposed system may constitute a robust model for speech recognition. The proposed method shows the improved recognition accuracy in a speech recognition system.