• Title/Summary/Keyword: 잡음 민감성

Search Result 33, Processing Time 0.03 seconds

Chaotic Speech Secure Communication Using Self-feedback Masking Techniques (자기피드백 마스킹 기법을 사용한 카오스 음성비화통신)

  • Lee, Ik-Soo;Ryeo, Ji-Hwan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.6
    • /
    • pp.698-703
    • /
    • 2003
  • This paper presents analog secure communication system about safe speech transmission using chaotic signals. We applied various conditions that happen in actuality communication environment modifying chaotic synchronization and chaotic communication schemes and analyzed restoration performance of speech signal to computer simulation. In transmitter, we made the chaotic masking signal which is added voice signal to chaotic signal using PC(Pecora & Carroll) and SFB(self-feedback) control techniques and transmitted encryption signal to noisy communication channel And in order to calculate the degree of restoration performance, we proposed the definition of analog average power of recovered error signals in receiver chaotic system. The simulation results show that feedback control techniques can certify that restoration performance is superior to quantitative data than PC method about masking degree, susceptibility of parameters and channel noise. We experimentally computed the table of relation of parameter fluxion to restoration error rate which is applied the encryption key values to the chaotic secure communication.

A New Adaptive Kernel Estimation Method for Correntropy Equalizers (코렌트로피 이퀄라이져를 위한 새로운 커널 사이즈 적응 추정 방법)

  • Kim, Namyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.627-632
    • /
    • 2021
  • ITL (information-theoretic learning) has been applied successfully to adaptive signal processing and machine learning applications, but there are difficulties in deciding the kernel size, which has a great impact on the system performance. The correntropy algorithm, one of the ITL methods, has superior properties of impulsive-noise robustness and channel-distortion compensation. On the other hand, it is also sensitive to the kernel sizes that can lead to system instability. In this paper, considering the sensitivity of the kernel size cubed in the denominator of the cost function slope, a new adaptive kernel estimation method using the rate of change in error power in respect to the kernel size variation is proposed for the correntropy algorithm. In a distortion-compensation experiment for impulsive-noise and multipath-distorted channel, the performance of the proposed kernel-adjusted correntropy algorithm was examined. The proposed method shows a two times faster convergence speed than the conventional algorithm with a fixed kernel size. In addition, the proposed algorithm converged appropriately for kernel sizes ranging from 2.0 to 6.0. Hence, the proposed method has a wide acceptable margin of initial kernel sizes.

A Robust Watermarking Method Using Binary Images (이진 영상을 사용하는 강인한 워터마킹 기법)

  • Shin, Chang-Doon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.630-633
    • /
    • 2007
  • In this paper, a blind watermarking method using binary images as watermarks is proposed. In order to enhance the detection capability against various attacks that transform watermarked image, the method uses asymmetric thresholds for inserting and detecting. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring etc.

  • PDF

A Study on Content-based Image Retrieval Technique using Texture Information (영상의 텍스쳐 정보를 이용한 내용 기반 영상 검색에 관한 연구)

  • Park, Kyung-Shik;Park, Kang-Seo;Hong, Min-Suk;Chung, Tae-Yun;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1999.11c
    • /
    • pp.751-753
    • /
    • 1999
  • 본 논문에서는 영상의 텍스쳐 정보를 이용하여 일반 영상에 대한 내용기반 영상 검색을 수행할 수 있는 알고리듬을 제안한다. Gabor 웨이브렛 변환을 이용하여 Gabor 필터 뱅크 내의 각 필터에 의해 필터링된 대역의 평균과 표준편차를 영상의 특징 벡터(Gabor Texture Feature)로 추출하여 영상들간의 유사성을 계산하는데 사용한다. 논문의 목적이 영상에 가해진 외적 변형, 즉 잡음 첨가, 블러링, 샤프닝 등과 같은 변형에 강인하게 동작할 수 있는 텍스쳐 특징 기반 영상 검색 기법을 제안하는 것이므로, 기존의 Gabor 필터만을 사용하여 텍스쳐 특징을 추출하여 검색의 기준으로 삼을 경우에 발생할 수 있는 주파수 성분의 변화에 대한 민감성을 Daubechies의 웨이브렛 필터를 사용하여 낮은 해상도에서 영상을 해석함으로써, 외적 변형에 대하여도 강인하게 동작할 수 있는 알고리듬을 제시하였다. 기존의 텍스쳐를 이용한 검색이 주로 텍스쳐 영역(textured region)에 대한 해석만을 하였지만, 본 논문에서는 이를 일반 영상에 적용하였으며, 일반 영상에 대해서도 효율적인 검색을 수행할 수 있음을 보였다.

  • PDF

A Clinical Study of the Severe Degenerative Diseases of Temporomandibular Joint (퇴행성 악관절 질환에 대한 임상적 연구)

  • Kim, Il-Kyu;Oh, Seong-Seob;Choi, Jin-Ho;Kim, Hyung-Don;Oh, Nam-Sig
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.21 no.3
    • /
    • pp.270-276
    • /
    • 1999
  • 저자등은 1996년 5월 부터 1999년 4월까지 인하대병원 치과에 악관절 질환을 주소로 내원한 958명의 환자 중 병력, 임상소견, 방사선학적 검사 결과 퇴행성 악관절 질환으로 진단된 68명에서 병록지 상에 기록된 환자의 성별, 나이, 주소, 병력, 현증상, 방사선학적 소견 및 치료방법 등에 관해 검사 후 다음과 같은 결론을 얻었다. 1. 남녀 발병 비율은 1:2로 여성에서 높았다. 2. 발병나이는 20대, 30대. 40대, 10대 순이었다. 3. 병력기간은 2년이상, 6개월이하, 1 - 2년 순이었다. 4. 전 환자에서 악관절 동통을, 44명의 환자에서 관절잡음을, 26명의 환자에서 개구제한을 호소하였다. 5. 그밖에 26명의 환자에서 관절부위에 민감성을, 5명의 환자에서 안면 비대칭을, 또한 개교합, 섬유성 악관절강직의 소견이 각각 2명의 환자에서, 양측성질환의 소견이 4명의 환자에서 관찰되었다. 6. 방사선학적 소견상, 15명 환자의 과두부에서 증식성 재성형소견(progressive remodeling)이, 51명의 환자에서 침식성 재성형소견(regressive or erosive remodeling)이 관찰되었으며, 침식성 재성형 환자 중 11명에서 과두주변부 증식성 재성형소견(peripheral remodeling or marginal lipping)이 관찰되었다. 7. 골증식체(osteophyte) 및 소성체(loose body)의 소견이 각각 2명의 환자에서 관찰되었다. 8. 약물에 의한 보존적 치료방법이 1차로 모든 환자에서 시행되었으며, 이중 12명의 환자는 교합안정장치를 병행하여 치료하였다. 9. 관절강내 스테로이드 주사요법에 의한 치료환자가 2명, 관절원판절제술 및 이개연골 이식술을 동반한 악관절성형술 환자가 각각 1명 및 2명이었다.

  • PDF

Encryption Communication Protocol Design Using Unidirectional Synchronization of the Chaos System (혼돈계의 단방향 동기화를 이용한 보안 프로토콜 설계)

  • Cho, Chang-Ho;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1125-1130
    • /
    • 2014
  • The quantity and quality of contents containing information are sharply increasing with the rising network speed. In line with this rapid growth of information volume, a new communication protocol using the chaotic signal that can protect contents in communication is proposed as follows. The chaos system has the characteristic of unpredictability due to the sensitive initial values and the similarity of the signals with noise. We configured two chaos systems $F(X_n,Y_n)$ and $G(A_n,B_n)$ that have such characteristics and designed a data communication method using as encryption channel the same chaos signals generated by synchronizing the chaos system G with the F signals. The proposed method was verified with the encryption and decryption of images. The proposed method is different from the existing encrypted communication methods and is expected to lay the foundation for future studies in related areas.is an example of ABSTRACT format.

A Study on Buttom-up Pyramid Linking(BUPL) Method Combined with 2$\frac{1}{2}$D and Quadratic Model for Segmentation of Optical Flow field (Optical flow field 분할을 위한 2$\frac{1}{2}$D 및 정방형 모델과 결합된 버텀-업 피라미드 링킹 방법에 관 한 연구)

  • 김춘길;이형재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.11
    • /
    • pp.1154-1166
    • /
    • 1991
  • Optical flow is important not only for determining velocity and trajectory of the object but also for image segmentation and three dimensional information. In this paper an algorithm for segmentation of the optical flow field is presented. This method is based on a pyramid linking method combined with the proposed models. In this method each node contained a model of the flow in the region that it represented regions were combined by taking the model that best fit the union of the two regions. Each node linked to one of its fathers based on the error between the pixels represented by the node and the father's model of its flow. A major problem which has emerged in conventional researchs on optical flow field is sensitive to noise the proposed method is relatively insensitive to noise at the result of computer simulation the pyramid algorithm proposed in this paper seem to have useful properties.

  • PDF

Robust 3D Facial Landmark Detection Using Angular Partitioned Spin Images (각 분할 스핀 영상을 사용한 3차원 얼굴 특징점 검출 방법)

  • Kim, Dong-Hyun;Choi, Kang-Sun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.199-207
    • /
    • 2013
  • Spin images representing efficiently surface features of 3D mesh models have been used to detect facial landmark points. However, at a certain point, different normal direction can lead to quite different spin images. Moreover, since 3D points are projected to the 2D (${\alpha}-{\beta}$) space during spin image generation, surface features cannot be described clearly. In this paper, we present a method to detect 3D facial landmark using improved spin images by partitioning the search area with respect to angle. By generating sub-spin images for angular partitioned 3D spaces, more unique features describing corresponding surfaces can be obtained, and improve the performance of landmark detection. In order to generate spin images robust to inaccurate surface normal direction, we utilize on averaging surface normal with its neighboring normal vectors. The experimental results show that the proposed method increases the accuracy in landmark detection by about 34% over a conventional method.

Detection of Repetition Motion Using Neural network (신경망을 이용한 반복운동 검출)

  • Yoo, Byeong-hyeon;Heo, Gyeong-yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1725-1730
    • /
    • 2017
  • The acceleration sensor and the gyroscopic sensor are used as representative sensors to detect repetitive motion and have been used to analyze various sporting components. However, both sensors have problems with noise sensitivity and accumulation of errors. There have been attempts to use two sensors together to overcome hardware problems. The complementary filter has shown successful results in mitigating the problems of both sensors by minimizing the disadvantages of accelerometer and gyroscope sensors and maximizing their advantages. In this paper, we proposed a modified method using neural network to reduce variable. The neural network is an algorithm that can precisely measure even in unexpected environments or situations by pre-learning the number of various cases. The proposed method applies a Neural Network by dividing the repetitive motion into three sections, the first, the middle and the end. As a result, the recognition rate is 96.35%, 98.77%, 96.92% and the accuracy is 97.18%.

A Polarity Based Blind Watermarking Method Considering Wavelet Coefficients Change (웨이블릿 계수 변화량을 고려한 극성 기반 블라인드 워터마킹 기법)

  • 신창둔
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.744-754
    • /
    • 2004
  • In this paper, a polarity based blind watermarking method considering wavelet coefficients modification is proposed. In this proposed method, we use an asymmetric thresholds watermarking(ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. For this purpose, the polarity preservation threshold $\beta$ was set and a watermark was detected based on the polarity only for the difference that was larger than $\beta$. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

  • PDF