• Title/Summary/Keyword: Binary Image

Search Result 972, Processing Time 0.028 seconds

Digital watermarking using binary phase hologram and optical interferometer (이진 위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹)

  • 김병열;서동환;조규보;신창목;김수중;김철수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.377-382
    • /
    • 2003
  • We propose a new optical watermarking method, which can protect the copyright of digital data, using a binary phase hologram and a Mach-Zehnder interferometer. Using a simulated annealing algorithm, the binary phase hologram of the mark image to be hidden is designed. We obtained a watermarked image by linearly superposing the hologram, which is the watermark, in the original image. The extraction processing of the mark image from the watermarked image is achieved by placing the phase-modulated watermarked image on a LCD in one path and the phase-modulated original image on another LCD in the other path in the Mach-Zehnder interferometer. The mark image was obtained by inverse Fourier transforming the phase modulated interference intensity. We confirmed that the proposed method is robust for the cropped images through computer simulation, and we implemented it optically using LCDs which are phase modulation devices.

A New Binary Thresholding Method using Bit-plane Information (비트평면 정보를 사용한 새로운 2진 임계화 방법)

  • 김하식;조남형;김윤호;이주신
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.6
    • /
    • pp.1169-1174
    • /
    • 2001
  • A new approach for determining global threshold value of binary image is proposed in this paper. In the proposed algorithm, bit-plane information which involve the shapes of original image is used for dividing image into two parts; object and background. Optimal threshold value are selected based on difference values of average between two regions, which is considered in global binary thresholding. Proposed method is no need to set a initial value, and consequently, it is relatively simple as well as robust. Experimental results showed a good performance in preserving edge not only continuous tone images but also document image.

  • PDF

A Study on the Fingerprint Recognition Preprocessing using adaptive binary method (적응 이진화를 이용한 지문인식 전처리에 관한 연구)

  • Cho, Seong-Wong;Kim, Jae-Min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.3
    • /
    • pp.227-230
    • /
    • 2002
  • An important preprocessing for fingerprint recognition is the binarization operation, which takes as an input gray-scale image and returns a binary image as the output. The difficult in performing binarization is to find an appropriate threshold value. This paper presents a new adaptive binarization method, which determines the threshold value according to the brightness of local ridges and valleys. We experimentally show that the presented method results in better performance than a traditional method.

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

A Pattern Recognition Based on Co-occurrence among Median Local Binary Patterns (중간값 국소이진패턴 사이의 동시발생 빈도 기반 패턴인식)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.316-320
    • /
    • 2016
  • In this paper, we presents a pattern recognition by considering the spatial co-occurrence among micro-patterns of texture images. The micro-patterns of texture image have been extracted by local binary pattern based on median(MLBP) of block image, and the recognition process is based on co-occurrence among MLBPs. The MLBP is applied not only to consider the local character but also analyze the pattern in order to be robust noise, and spatial co-occurrence is also applied to improve the recognition performance by considering the global space of image. The proposed method has been applied to recognized 17 RGB images of 120*120 pixels from Mayang texture image based on Euclidean distance. The experimental results show that the proposed method has a texture recognition performance.

Image Encryption and Decryption Using SA Algorithm and Optical Correlator System (SA 알고리듬과 광 상관 시스템을 이용한 영상 암호화 및 복호화)

  • 김철수;조창섭
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.349-356
    • /
    • 2004
  • In this paper, a practical image security system using SA algorithm and 4-f optical correlator system is proposed. The encrypted image and key image with binary phase components are generated using an iterative SA algorithm. a decrypted image is found through the correlation of the encrypted and key images using 4-f optical correlator system. The encrypted and key images are consisted of binary phase components. So, it is easy to implement the optical security system using the proposed technique. And if we fix the encrypted image in the optical security system and change the key images, we get different images, so it is possible to apply to the distinguished authorization system using different key images. Computer simulations show that despite the binary phase components of the two images(encrypted and key image), decrypted images are generated.

  • PDF

Binary Phase-based Optical Encryption System Using the Principle of Interference (간섭의 원리를 이용한 이진 위상의 광학적 암호화 시스템)

  • 서동환;신창목;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.1
    • /
    • pp.29-35
    • /
    • 2003
  • In this paper, we propose an improved image decryption system using a phase-encoded image and the principle of interference. An original image and a random image consist of only binary values. The phase-encoded original image is encrypted into a binary phase-only image by multiplying with a phase-encoded random key. Therefore the phase-encoded images have two phase values 0 or $\pi$. The proposed decryption technique is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping of the encrypted image with a decrypting key. Optical experiments confirmed that the proposed technique is a simple and robust architecture for optical encryption.

Implementation of Stable Optical Information Security System using Interference Hologram and Photorefractive Material (간섭 홀로그램과 광굴절매질을 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.64-76
    • /
    • 2001
  • In this paper, A simple image hologram encryption and decryption technique based on the principle of interference are proposed. The technique using the photorefractive material for getting a stable interference pattern is also proposed. And combine these two techniques, I would like to implement a stable optical information security system. In the encrypting process, I would generate binary phase hologram which can reconstruct original image perfectly, and regard this hologram as original image to be encrypted image. And then the hologram is encrypted as randomly generated binary phase image. Reference image is also generated from the encrypted image by applying interference rule. In the decrypting process, I can get a interference intensity by interfering the reference image and the encrypted image in the interferometer. and transform inferference intensity information into phase information. I recover original image by inverse Fourier transforming the phase information. In this process, the intensity information generated by interference of two images is very sensitive to external vibrations. So, I would like to get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) in photorefractive materials, especially BaTiO₃.

  • PDF

A Boundary-based Marker Binary Coding Method for Augmented Reality Games (증강현실 게임을 위한 경계선 기반 마커 이진화 방법)

  • Yun, Yo-Seop;Kim, Tae-Young
    • Journal of Korea Game Society
    • /
    • v.10 no.4
    • /
    • pp.63-71
    • /
    • 2010
  • In this paper, we propose a boundary based marker binary coding method for augmented reality games, which enables the marker-area to be binary coded well in any lighting environments. First, it detects the boundary after transforming an original marker image to a gray scale image, and it executes 4 way pixel extensions for all boundary pixels in order to make the boundary to closed area. Next, for all boundary pixels it compares the brightness of right and left ones of each pixel and allocates black for the lower side and white for the higher side by filling inside area thru the seeded region growing. Experimental results showed that our proposed method produces a good binary marker image recognizable in various light environments. In addition, it showed the possibility of real-time calculation by considering the result of operation speed which is 51 fps for VGA image.

A Probabilistic Dissimilarity Matching for the DFT-Domain Image Hashing

  • Seo, Jin S.;Jo, Myung-Suk
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.76-82
    • /
    • 2017
  • An image hash, a discriminative and robust summary of an image, should be robust against quality-preserving signal processing steps, while being pairwise independent for perceptually different inputs. In order to improve the hash matching performance, this paper proposes a probabilistic dissimilarity matching. Instead of extracting the binary hash from the query image, we compute the probability that the intermediate hash vector of the query image belongs to each quantization bin, which is referred to as soft quantization binning. The probability is used as a weight in comparing the binary hash of the query with that stored in a database. A performance evaluation over sets of image distortions shows that the proposed probabilistic matching method effectively improves the hash matching performance as compared with the conventional Hamming distance.