• Title/Summary/Keyword: Copy & Paste

Search Result 18, Processing Time 0.027 seconds

Dataset Augmentation on Fallen Person Objects in a Autonomous Driving Tractor Environment (자율주행 트랙터 환경에서 쓰러진 사람에 대한 데이터 증강)

  • Hwapyeong Baek;Hanse Ahn;Heesung Chae;Yongwha Chung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.553-556
    • /
    • 2023
  • 데이터 증강은 데이터 불균형 문제를 해결하기 위해 일반화 성능을 향상시킨다. 이는 과적합 문제를 해결하고 정확도를 높이는 데 도움을 준다. 과적합을 해결하기 위해서 본 논문에서는 분할 마스크 라벨링을 자동화하여 효율성을 높이고, RoI를 활용한 분할 Copy-Paste 데이터 증강 기법을 제안한다. 본 논문의 제안 방법을 적용한 결과 YOLOv8 모델에서 기존의 분할, 박스 Copy-Paste 데이터 증강 기법과 비교해서 쓰러진 사람 객체에 대한 정확도가 10.2% 증가함으로써 제안한 방법이 일반화 성능을 높이는 데 효과가 있음을 확인하였다.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Research on the Detection of Image Tampering

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.111-121
    • /
    • 2021
  • As the main carrier of information, digital image is becoming more and more important. However, with the popularity of image acquisition equipment and the rapid development of image editing software, in recent years, digital image counterfeiting incidents have emerged one after another, which not only reduces the credibility of images, but also brings great negative impacts to society and individuals. Image copy-paste tampering is one of the most common types of image tampering, which is easy to operate and effective, and is often used to change the semantic information of digital images. In this paper, a method to protect the authenticity and integrity of image content by studying the tamper detection method of image copy and paste was proposed. In view of the excellent learning and analysis ability of deep learning, two tamper detection methods based on deep learning were proposed, which use the traces left by image processing operations to distinguish the tampered area from the original area in the image. A series of experimental results verified the rationality of the theoretical basis, the accuracy of tampering detection, location and classification.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.

A Fast Editor for MPEG-2 Program Stream (고속 MPEG-2 프로그램 스트림 편집기)

  • 한재웅;손채봉;오승준;정광수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.133-135
    • /
    • 2001
  • 본 논문에서는 MPEG-2 프로그램 스트림(Program Stream)을 위한 A/V(Audio/Video) 편집기를 제안하고 구현하였다. 이 편집기에서는 사용자가 일반 문서를 편집하듯이 간단한 조작만으로 스트림(Stream)을 복사(Copy), 자름(Cut), 삭제(Delete), 붙이기(Paste)가 가능하며, 또한 스트림 내에서 임의로 조합하여 새로운 스트림을 생성할 수 있는 조합기능도 제공된다. 기존 편집기의 복잡성을 감소시키고 사용자가 접근하기 쉽도록 제작되었으며, 계산량을 현저히 줄임으로써 보다 향상된 성능을 제공할 수 있다.

Research and Development of Citation Matcher for Reference Parsing and Cross-Reference Linking (참고문헌 자동파싱 및 참조링킹을 위한 Citation Matcher 연구 및 개발)

  • Lee, Sang-gi;Kim, Sun-tae;Lee, Yong-sik;Yi, Tae-seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.426-429
    • /
    • 2007
  • CrossRef operates a cross-publisher citation linking system based on the DOI(R) global identifier. The number of organization building a reference citations linking structure through CrossRef is increasing. This paper concentrates on developing a Citation Matcher Solution to effectively build the reference linking structure. Citation Matcher automatically builds and processes the reference citation and identifier mapping which used to be handled manually. After the copy & paste of the reference citation, analyzation is processed to parse the journal title, author name, volume, issue, and start pages from the free style text. CrossRef, PubMed, and YesKISTI's identifiers are collected by through a standardized method. Renovation of the building process for domestic scholastic resources' reference linking and matching will be made possible by using a Citation Matcher. The connection between resources and seamless access for the electronic full-text will enhance the usability.

  • PDF

Clip Toaster : Pastejacking Attack Detection and Response Technique (클립 토스터 : 페이스트재킹 공격 탐지 및 대응 기술)

  • Lee, Eun-young;Kil, Ye-Seul;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.192-194
    • /
    • 2022
  • This paper analyzes the attack method of pastejacking and proposes a clip toaster that can effectively defend it. When programming, developers often copy and paste code from GitHub, Stack Overflow, or blogs. Pastejacking is an attack that injects malicious data into the clipboard when a user copies code posted on the web, resulting in security threats by executing malicious commands that the user does not intend or by inserting dangerous code snippets into the software. In this paper, we propose clip toaster to visualize and alertusers of threats to defend pastejacking that threatens the security of the developer's terminal and program code. Clip Toaster can visualize security threat notifications and effectively detect and respond to attacks without interfering with user actions.

  • PDF

An Implementation of Web Image Collector using Drag&Drop Mechanism (Drag&Drop 메커니즘을 이용한 웹 이미지 수집기의 구현)

  • Lee, Seon-Ung;Moon, Il-Young
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 2009
  • Drag&Drop mechanism was formerly the clipboard of Microsoft Windows. Drag&Drop means that copy and paste functions using the clipboard are processed by a mouse event. The touch interface come info the spotlight not to speak of PCs, laptops and mobile phones. Mouse and touch interfaces make an environment to work easier and intuitive through visible interactions. In this paper, we implemented a web image collector to utilize Drag&Drop. And we proposed the how to apply and a utilizable plan from it.

  • PDF

A Design of MPEG-1 Video Editing System at GOP boundaries (GOP 경계의 MPGE-1 편집 시스템 설계)

  • 김준기;이호석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.234-236
    • /
    • 1998
  • 본 논문은 GUI(Graphical User interface) 환경에서 MPGE-1 영상 편집을 위한 시스템 도구(Tool)를 기술한다. 기존에 출시된 제품은 일반적으로 AVI 나 MOV 포맷(format)을 사용하는데 비하여 본 논문에서는 MPGE-1을 압축 영역 상태에서 편집함으로써 영상의 품질과 저장의 효율성 및 처리속도에 많은 이점을 두었다. 편집 작업은 Random Access 의 기본 단위가 되는 GOP(Group of Picture) 단위의 경계 편집을 사용하여 영상 편집 기능인 Copy, Paste, Cut, Undo등을 기술하였다. 또한 효율적인 편집 환경을 위해 편집 윈도우 형태를 클립 청, 클립 정보 창, 편집 창, 재생 창, 미리 보기 창으로 구분하였다. 편집된 영상은 효율적 재생을 위하여 DirectDraw을 사용하였다. 본 논문에서 소개한 편집 시스템은 GUI 기반으로 사용자에게 익숙한 사용자 인터페이스 환경을 기술하였다.

  • PDF

Implementation of Component Support Statechart Tool for a Rapid Design of the Embedded System (내장형 시스템의 신속한 설계를 위한 컴포넌트 지원 Statechart 도구 구현)

  • Park, Hong-Jin;Kim, Yeong-Chan
    • The KIPS Transactions:PartA
    • /
    • v.8A no.2
    • /
    • pp.75-80
    • /
    • 2001
  • The rapid design of the embedded system is crucial for improving the product’s competitiveness. Existing statechart tools used for designing the embedded system rely on the copy and paste of the statechart for reuse. However, such method has a major drawback of wasting both time and cost of the system developer. This paper implements the component supporting tool. A tool that makes efficient reuse of a statechart by adding a component function to the existing functions is implemented in this paper. Also, to add a component function, this paper restructured the contract as protocol of the inter-component. The implemented tool helps not only reduce the life cycle of a product, but also enhance a product’s competitiveness by supporting the product’s time-to-market.

  • PDF