• Title/Summary/Keyword: Adjacency information

Search Result 103, Processing Time 0.024 seconds

Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image (위·변조 영상의 에지 에너지 정보를 이용한 영상 포렌식 판정 알고리즘)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.75-81
    • /
    • 2014
  • In a distribution of the digital image, there is a serious problem that is distributed an illegal forgery image by pirates. For the problem solution, this paper proposes an image forensic decision algorithm using an edge energy information of forgery image. The algorithm uses SA (Streaking Artifacts) and SPAM (Subtractive Pixel Adjacency Matrix) to extract the edge energy informations of original image according to JPEG compression rate(QF=90, 70, 50 and 30) and the query image. And then it decides the forge whether or not by comparing the edge informations between the original and query image each other. According to each threshold in TCJCR (Threshold by Combination of JPEG Compression Ratios), the matching of the edge informations of original and query image is excused. Through the matching experiments, TP (True Positive) and FN (False Negative) is 87.2% and 13.8% respectively. Thus, the minimum average decision error is 0.1349. Also, it is confirmed that the performed class evaluation of the proposed algorithm is 'Excellent(A)' because of the AUROC (Area Under Receiver Operating Characteristic) curve is 0.9388 by sensitivity and 1-specificity.

High Speed Korean Morphological Analysis based on Adjacency Condition Check (인접 조건 검사에 의한 초고속 한국어 형태소 분석)

  • 심광섭;양재형
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.89-99
    • /
    • 2004
  • This paper proposes a morphological analysis method that enables morphological analysis by checking conditions between two adjacent morphemes. These conditions are fed from a dictionary. This method eliminates a code conversion module and the application of transformational rules for candidate generation. The method claims that very high speed morphological analysis is attainable through simple bit operations for adjacency condition check. MACH, an implementation of the proposed method, is a supersonic Korean morphological analyzer which is able to analyze a document of 1 GB in 5 minutes on a PC with 1.13 GHz Pentium III CPU. The analysis accuracy of MACH is 99.2 %.

Optimal CNF Encoding for Representing Adjacency in Boolean Cardinality Constraints (이진 기수 조건에서 인접성 표현을 위한 최적화된 CNF 변환)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.11
    • /
    • pp.661-670
    • /
    • 2008
  • In some applications of software engineering such as the verification of software model or embedded program, SAT solver is used. To practical use a SAT solver, a problem is encoded to a CNF formula, but because the formula has lower expressiveness than software models or source codes, optimal CNF encoding is required. In this paper, we propose optimal encoding techniques for the problem of "Selecting adjacent $k{\leq}n$ among n objects," Through experimental results we show the proposed constraint is efficient and correct to solve Japanese puzzle. As we know, this paper is the first study about CNF encoding for adjacency in BCC.

Implementation of Search Method based on Sequence and Adjacency Relationship of User Query (사용자 검색 질의 단어의 순서 및 단어간의 인접 관계에 기반한 검색 기법의 구현)

  • So, Byung-Chul;Jung, Jin-Woo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.724-729
    • /
    • 2011
  • Information retrieval is a method to search the needed data by users. Generally, when a user searches some data in the large scale data set like the internet, ranking-based search is widely used because it is not easy to find the exactly needed data at once. In this paper, we propose a novel ranking-based search method based on sequence and adjacency relationship of user query by the help of TF-IDF and n-gram. As a result, it was possible to find the needed data more accurately with 73% accuracy in more than 19,000 data set.

A Divide-and-Conquer Algorithm for Rigging Elections Problem

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.101-106
    • /
    • 2015
  • This paper suggests heuristic algorithm with polynomial time complexity for rigging elections problem that can be obtain the optimal solution using linear programming. The proposed algorithm transforms the given problem into adjacency graph. Then, we divide vertices V into two set W and D. The set W contains majority distinct and the set D contains minority area. This algorithm applies divide-and-conquer method that the minority area D is include into majority distinct W. While this algorithm using simple rule, that can be obtains the optimal solution equal to linear programing for experimental data. This paper shows polynomial time solution finding rule potential in rigging elections problem.

A Study of Routing based on Adjacency Matrix in Ad hoc Networks (애드 혹 네트워크에서 인접 행렬 기반의 라우팅 연구)

  • Lee, Sung-Soo;Kim, Jeong-Mi;Park, Hee-Joo;Kim, Chong-Gun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.531-538
    • /
    • 2008
  • With the dynamic and mobile nature of ad hoc networks, links may fail due to topology changes. So, a major challenge in ad hoc network is dynamically to search paths from a source to destination with an efficient routing method, which is an important issue for delay-sensitive real-time application. The main concerns of graph theory in communications are finding connectivity and searching paths using given nodes. A topology of the nodes in ad hoc networks can be modeled as an adjacency matrix. In this paper, based on this adjacency matrix, we propose new path search algorithms using a sequence of matrix calculation. The proposed algorithms can search paths from a destination to a source using connectivity matrix. Two matrix-based algorithms for two different purposes are proposed. Matrix-Based Backward Path Search(MBBS) algorithm is designed for shortest path discovery and Matrix-Based Backward Multipath Search(MBBMS) algorithm is for multipath search.

Digital Video Steganalysis Based on a Spatial Temporal Detector

  • Su, Yuting;Yu, Fan;Zhang, Chengqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.360-373
    • /
    • 2017
  • This paper presents a novel digital video steganalysis scheme against the spatial domain video steganography technology based on a spatial temporal detector (ST_D) that considers both spatial and temporal redundancies of the video sequences simultaneously. Three descriptors are constructed on XY, XT and YT planes respectively to depict the spatial and temporal relationship between the current pixel and its adjacent pixels. Considering the impact of local motion intensity and texture complexity on the histogram distribution of three descriptors, each frame is segmented into non-overlapped blocks that are $8{\times}8$ in size for motion and texture analysis. Subsequently, texture and motion factors are introduced to provide reasonable weights for histograms of the three descriptors of each block. After further weighted modulation, the statistics of the histograms of the three descriptors are concatenated into a single value to build the global description of ST_D. The experimental results demonstrate the great advantage of our features relative to those of the rich model (RM), the subtractive pixel adjacency model (SPAM) and subtractive prediction error adjacency matrix (SPEAM), especially for compressed videos, which constitute most Internet videos.

Adaptive Target Detection Algorithm Using Gray Difference, Similarity and Adjacency (밝기 차, 유사성, 근접성을 이용한 적응적 표적 검출 알고리즘)

  • Lee, Eun-Young;Gu, Eun-Hye;Yoo, Hyun-Jung;Park, Kil-Houm
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.736-743
    • /
    • 2013
  • In IRST(infrared search and track) system, the small target detection is very difficult because the IR(infrared) image have various clutter and sensor noise. The noise and clutter similar to the target intensity value produce many false alarms. In this paper. We propose the adaptive detection method which obtains optimal target detection using the image intensity information and the prior information of target. In order to enhance the target, we apply the human visual system. we determine the adaptive threshold value using image intensity and distance measure in target enhancement image. The experimental results indicate that the proposed method can efficiently extract target region in various IR images.

Fault-Tolerant Algorithm using Multi-Connectivity of Communication Networks (통신망의 다중연결성을 이용한 결함허용 알고리즘)

  • Moon, Yun-Ho;Kim, Byung-Ki
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.1
    • /
    • pp.53-60
    • /
    • 2000
  • The purpose of this paper is to propose new recovery algorithm for case of a system element raises communication obstacle due to faults in networks, Also we are simulate the algorithm using adjacency matrix. We recover one faulty node per each excution of proposed algorithm so that we can be reconstruct the faulty system gradually to communicatable network. For that, this paper propose a new recovery algorithm named MATRECO which connect the recovery process is simulated by use of adjacency matrix.

  • PDF

Building Recognition using Image Segmentation and Color Features (영역분할과 컬러 특징을 이용한 건물 인식기법)

  • Heo, Jung-Hun;Lee, Min-Cheol
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.2
    • /
    • pp.82-91
    • /
    • 2013
  • This paper proposes a building recognition algorithm using watershed image segmentation algorithm and integrated region matching (IRM). To recognize a building, a preprocessing algorithm which is using Gaussian filter to remove noise and using canny edge extraction algorithm to extract edges is applied to input building image. First, images are segmented by watershed algorithm. Next, a region adjacency graph (RAG) based on the information of segmented regions is created. And then similar and small regions are merged. Second, a color distribution feature of each region is extracted. Finally, similar building images are obtained and ranked. The building recognition algorithm was evaluated by experiment. It is verified that the result from the proposed method is superior to color histogram matching based results.