• Title/Summary/Keyword: Binary image

Search Result 987, Processing Time 0.028 seconds

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.

Facial Feature Detection and Facial Contour Extraction using Snakes (얼굴 요소의 영역 추출 및 Snakes를 이용한 윤곽선 추출)

  • Lee, Kyung-Hee;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.7
    • /
    • pp.731-741
    • /
    • 2000
  • This paper proposes a method to detect a facial region and extract facial features which is crucial for visual recognition of human faces. In this paper, we extract the MER(Minimum Enclosing Rectangle) of a face and facial components using projection analysis on both edge image and binary image. We use an active contour model(snakes) for extraction of the contours of eye, mouth, eyebrow, and face in order to reflect the individual differences of facial shapes and converge quickly. The determination of initial contour is very important for the performance of snakes. Particularly, we detect Minimum Enclosing Rectangle(MER) of facial components and then determine initial contours using general shape of facial components within the boundary of the obtained MER. We obtained experimental results to show that MER extraction of the eye, mouth, and face was performed successfully. But in the case of images with bright eyebrow, MER extraction of eyebrow was performed poorly. We obtained good contour extraction with the individual differences of facial shapes. Particularly, in the eye contour extraction, we combined edges by first order derivative operator and zero crossings by second order derivative operator in designing energy function of snakes, and we achieved good eye contours. For the face contour extraction, we used both edges and grey level intensity of pixels in designing of energy function. Good face contours were extracted as well.

  • PDF

Three-Dimensional Image Display System using Stereogram and Holographic Optical Memory Techniques (스테레오그램과 홀로그래픽 광 메모리 기술을 이용한 3차원 영상 표현 시스템)

  • 김철수;김수중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6B
    • /
    • pp.638-644
    • /
    • 2002
  • In this paper, we implemented a three dimensional image display system using stereogram and holographic optical memory techniques which can store many images and reconstruct them automatically. In this system, to store and reconstruct stereo images, incident angle of reference beam must be controlled in real time, so we used BPH(binary phase hologram) and LCD(liquid crystal display) for controlling reference beam. The reference beams are acquired by Fourier transform of BPHs which designed with SA(simulated annealing)algorithm, and the BPHs are represented on the LCD with the 0.05 seconds time interval using application software for reconstructing the stereo images. And input images are represented on the LCD without polarizer/analyzer for maintaining uniform beam intensities regardless of the brightness of input images. The input images and BPHs are edited using application software(Photoshop) with having the same recording scheduled time interval in storing. The reconstructed stereo images are acquired by capturing the output images with CCD camera at the behind of the analyzer which transforms phase information into brightness information of images. In output plane, we used a LCD shutter that is synchronized to a monitor that display alternate left and right eye images for depth perception. We demonstrated optical experiment which store and reconstruct four stereo images in BaTiO$_3$ repeatedly using the proposed holographic optical memory techniques.

Development of an Integrated DataBase System of Marine Geological and Geophysical Data Around the Korean Peninsula (한반도 해역 해양지질 및 지구물리 자료 통합 DB시스템 개발)

  • KIM, Sung-Dae;BAEK, Sang-Ho;CHOI, Sang-Hwa;PARK, Hyuk-Min
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.47-62
    • /
    • 2016
  • An integrated database(DB) system was developed to manage the marine geological data and geophysical data acquired from around the Korean peninsula from 2009 to 2013. Geological data such as size analysis data, columnar section images, X-ray images, heavy metal data, and organic carbon data of sediment samples, were collected in the form of text files, excel files, PDF files and image files. Geophysical data such as seismic data, magnetic data, and gravity data were gathered in the form of SEG-Y binary files, image files and text files. We collected scientific data from research projects funded by the Ministry of Oceans and Fisheries, data produced by domestic marine organizations, and public data provided by foreign organizations. All the collected data were validated manually and stored in the archive DB according to data processing procedures. A geographic information system was developed to manage the spatial information and provide data effectively using the map interface. Geographic information system(GIS) software was used to import the position data from text files, manipulate spatial data, and produce shape files. A GIS DB was set up using the Oracle database system and ArcGIS spatial data engine. A client/server GIS application was developed to support data search, data provision, and visualization of scientific data. It provided complex search functions and on-the-fly visualization using ChartFX and specially developed programs. The system is currently being maintained and newly collected data is added to the DB system every year.

Extraction of Renal Glomeruli Region using Genetic Algorithm (유전적 알고리듬을 이용한 신장 사구체 영역의 추출)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.2
    • /
    • pp.30-39
    • /
    • 2009
  • Extraction of glomeruli region plays a very important role for diagnosing nephritis automatically. However, it is not easy to extract glomeruli region correctly because the difference between glomeruli region and other region is not obvious, simultaneously unevennesses that is brought in the sampling process and in the imaging process. In this study, a new method for extracting renal glomeruli region using genetic algorithm is proposed. The first, low and high resolution images are obtained by using Laplacian-Gaussian filter with ${\sigma}=2.1$ and ${\sigma}=1.8$, then, binary images by setting the threshold value to zero are obtained. And then border edge is detected from low resolution images, the border of glomeruli is expressed by a closed B-splines' curve line. The parameters that decide the closed curve line with this low resolution image prevent the noises and the border lines from breaking off in the middle by searching using genetic algorithm. Next, in order to obtain more precise border edges of glomeruli, the number of node points is increased and corrected in order from eight to sixteen and thirty two from high resolution images. Finally, the validity of this proposed method is shown to be effective by applying to the real images.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

A Study on the Sensibility Analysis of School Life and the Will to Farming of Students at Korea National College of Agricultural and Fisheries (한국농수산대학 재학생의 학교생활 감성 분석 및 영농의지에 관한 연구)

  • Joo, J.S.;Lee, S.Y.;Kim, J.S.;Shin, Y.K.;Park, N.B.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.21 no.2
    • /
    • pp.103-114
    • /
    • 2019
  • In this study we examined the preferences of college life factors for students at Korea National College of Agriculture and Fisheries(KNCAF). Analytical techniques of unstructured data used opinion mining and text mining techniques, and the results of text mining were visualized as word cloud. And those results were used for statistical analysis of the students' willingness to farm after graduation. The items of the favorable survey consisted of 10 items in 5 areas including university image, self-capacity, dormitory, education system, and future vision. After classifying the emotions of positive and negative in the collected questionnaire, a dictionary of positive and negative was created to evaluate the preference. The items of 'college image' at the time of university support, 'self after 10 years' after graduation, 'self-capacity' and 'present KNCAF' showed high positive emotion. On the other hand, positive emotion was low in the items of 'college dormitory', 'educational course', 'long-term field practice' and 'future of Korean agriculture'. In the cross-analysis of the difference in the will to farming according to gender, farming base, and entrance motivation, the will to farm according to gender and entrance motivation showed statistically significant results, but it was not significant in farming base. Also in binary logistic regression analysis on the will to farming, the statistically significant variable was found to be 'motivation for admission'

A Study on the Change of Image Quality According to the Change of Tube Voltage in Computed Tomography Pediatric Chest Examination (전산화단층촬영 소아 흉부검사에서 관전압의 변화에 따른 화질변화에 관한 연구)

  • Kim, Gu;Kim, Gyeong Rip;Sung, Soon Ki;Kwak, Jong Hyeok
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.4
    • /
    • pp.503-508
    • /
    • 2019
  • In short a binary value according to a change in the tube voltage by using one of VOLUME AXIAL MODE of scanning techniques of chest CT image quality evaluation in order to obtain high image and to present the appropriate tube voltage. CT instruments were GE Revolution (GE Healthcare, Wisconsin USA) model and Phantom used Pediatric Whole Body Phantom PBU-70. The test method was examined in Volume Axial mode using the pediatric protocol used in the Y university hospital of mass-produced material. The tube voltage was set to 70kvp, 80kvp, 100kvp, and mAs was set to smart mA-ODM. The mean SNR difference of the heart was $-4.53{\pm}0.26$ at 70 kvp, $-3.34{\pm}0.18$ at 80 kvp, $-1.87{\pm}0.15$ at 100 kvp, and SNR at 70 kvp was about -2.66 higher than 100 kvp and statistically significant (p<0.05) In the Lung SNR mean difference analysis, $-78.20{\pm}4.16$ at 70 kvp, $-79.10{\pm}4.39$ at 80 kvp, $-77.43{\pm}4.72$ at 100 kvp, and SNR at 70 kvp at about -0.77 higher than 100 kvp were statistically significant. (p<0.05). Lung CNR mean difference was $73.67{\pm}3.95$ at 70 kvp, $75.76{\pm}4.25$ at 80 kvp, $75.57{\pm}4.62$ at 100 kvp and 20.9 CNR at 80 kvp higher than 70 kvp and statistically significant (p<0.05) At 100 kvp of tube voltage, the SNR was close to 1 while maintaining the quality of the heart image when 70 kvp and 80 kvp were compared. However, there is no difference in SNR between 70 kvp and 80 kvp, and 70 kvp can be used to reduce the radiation dose. On the other and, CNR showed an approximate value of 1 at 70 kvp. There is no difference between 80 kvp and 100 kvp. Therefore, 80 kvp can reduce the radiation dose by pediatric chest CT. In addition, it is possible to perform a scan with a short scan time of 0.3 seconds in the volume axial mode test, which is useful for pediatric patients who need to move or relax.

Performance Evaluation of Chest X-ray Image Deep Learning Classification Model according to Application of Optimization Algorithm and Learning Rate (최적화 알고리즘과 학습률 적용에 따른 흉부 X선 영상 딥러닝 분류 모델 성능평가)

  • Ji-Yul Kim;Bong-Jae Jeong
    • Journal of the Korean Society of Radiology
    • /
    • v.18 no.5
    • /
    • pp.531-540
    • /
    • 2024
  • Recently, research and development on automatic diagnosis solutions in the medical imaging field using deep learning are actively underway. In this study, we sought to find a fast and accurate classification deep learning modeling for classification of pneumonia in chest images using Inception V3, a deep learning model based on a convolutional artificial neural network. For this reason, after applying the optimization algorithms AdaGrad, RMS Prop, and Adam to deep learning modeling, deep learning modeling was implemented by selectively applying learning rates of 0.01 and 0.001, and then the performance of chest X-ray image pneumonia classification was compared and evaluated. As a result of the study, in verification modeling that can evaluate the performance of the classification model and the learning state of the artificial neural network, it was found that the performance of deep learning modeling for classification of the presence or absence of pneumonia in chest X-ray images was the best when applying Adam as the optimization algorithm with a learning rate of 0.001. I was able to. And in the case of Adam, which is mainly applied as an optimization algorithm when designing deep learning modeling, it showed excellent performance and excellent metric results when selectively applying learning rates of 0.01 and 0.001. In the metric evaluation of test modeling, AdaGrad, which applied a learning rate of 0.1, showed the best results. Based on these results, when designing deep learning modeling for binary-based medical image classification, in order to expect quick and accurate performance, a learning rate of 0.01 is preferentially applied when applying Adam as an optimization algorithm, and a learning rate of 0.01 is preferentially applied when applying AdaGrad. I recommend doing this. In addition, it is expected that the results of this study will be presented as basic data during similar research in the future, and it is expected to be used as useful data in the health and bio industries for the purpose of automatic diagnosis of medical images using deep learning.

Patient Setup Aid with Wireless CCTV System in Radiation Therapy (무선 CCTV 시스템을 이용한 환자 고정 보조기술의 개발)

  • Park, Yang-Kyun;Ha, Sung-Whan;Ye, Sung-Joon;Cho, Woong;Park, Jong-Min;Park, Suk-Won;Huh, Soon-Nyung
    • Radiation Oncology Journal
    • /
    • v.24 no.4
    • /
    • pp.300-308
    • /
    • 2006
  • $\underline{Purpose}$: To develop a wireless CCTV system in semi-beam's eye view (BEV) to monitor daily patient setup in radiation therapy. $\underline{Materials\;and\;Methods}$: In order to get patient images in semi-BEV, CCTV cameras are installed in a custom-made acrylic applicator below the treatment head of a linear accelerator. The images from the cameras are transmitted via radio frequency signal (${\sim}2.4\;GHz$ and 10 mW RF output). An expected problem with this system is radio frequency interference, which is solved utilizing RF shielding with Cu foils and median filtering software. The images are analyzed by our custom-made software. In the software, three anatomical landmarks in the patient surface are indicated by a user, then automatically the 3 dimensional structures are obtained and registered by utilizing a localization procedure consisting mainly of stereo matching algorithm and Gauss-Newton optimization. This algorithm is applied to phantom images to investigate the setup accuracy. Respiratory gating system is also researched with real-time image processing. A line-laser marker projected on a patient's surface is extracted by binary image processing and the breath pattern is calculated and displayed in real-time. $\underline{Results}$: More than 80% of the camera noises from the linear accelerator are eliminated by wrapping the camera with copper foils. The accuracy of the localization procedure is found to be on the order of $1.5{\pm}0.7\;mm$ with a point phantom and sub-millimeters and degrees with a custom-made head/neck phantom. With line-laser marker, real-time respiratory monitoring is possible in the delay time of ${\sim}0.17\;sec$. $\underline{Conclusion}$: The wireless CCTV camera system is the novel tool which can monitor daily patient setups. The feasibility of respiratory gating system with the wireless CCTV is hopeful.