• Title/Summary/Keyword: Digital Image Manipulation

Search Result 31, Processing Time 0.027 seconds

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Physical Interactive Game on the Digital Desk (디지털 데스크상의 체감형 게임 구현)

  • Chung, Jee-Hoon;Yun, Tae-Soo;Lee, Dong-Hoon;Yang, Hwang-Kyu
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.11-18
    • /
    • 2005
  • Recently, as one method of the game manipulation, physical interactive game is increasing, which controls the program by direct human movement. Tangible interface for physical interactive game implementation can control virtual model directly through real world object. A digital desk, one of the tangible interface, offers the interface that human can manipulate virtual object directly, by making projection screen on real world desk as computer display device. In this paper, we implement "Battle Region" game in the form of tangible interface, which can offer game users an efficient and amusing experiences by the use of physical interactive game. Traditional game cannot pursuit the diversity of game background contents but our game can do it through Map image projection. From this, game provider can supply the diversity of choice and users ran set up the difficulty of game. Therefore, our implemented game can offer users an efficient and amusing experiences by making game user's challenge and satisfaction maximum.

  • PDF

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Comparison of Image Quality of the Amorphous Silicon DR System and the Film-screen Systems (비정질 실리콘 디지털 방사선 촬영기와 X-ray film과의 영상질 비교 평가)

  • Youn, Je-Woong;Lee, Hyoung-Koo;Suh, Tae-Suk;Choe, Bo-Young;Shin, Kyung-Sub;Mun, In-K.;Kim, Hong-Kwon;Han, Yong-Woo;Nam, Seung-Bae
    • Journal of Radiation Protection and Research
    • /
    • v.24 no.3
    • /
    • pp.161-170
    • /
    • 1999
  • System performances in terms of image quality between an amorphous silicon DR system and a conventional film-screen system were evaluated. Various aspects of image quality MTF (modulation transfer function), NPS (noise power spectrum), SNR(signal-to-noise ratio) and contrast were measured and calculated. The MTF of the DR system was comparable to the film-screen systems. The noise was mainly dominated by the quantum mottle in both systems and the electronic noise was found in the DR system. The contrast of the DR system was better than the film-screen systems by virtue of high sensitivity and image processing. Compared to the film-screen systems in general radiography, the DR system had similar resolution and showed better contrast with the same exposure condition after contrast manipulation. The results of this study provide some useful information about the performance of the DR system in connection with medical applications.

  • PDF

An Efficient H.264/AVC Entropy Decoder Design (효율적인 H.264/AVC 엔트로피 복호기 설계)

  • Moon, Jeon-Hak;Lee, Seong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.12
    • /
    • pp.102-107
    • /
    • 2007
  • This paper proposes a H.264/AVC entropy decoder without embedded processor nor memory fabrication process. Many researches on H.264/AVC entropy decoders require ROM or RAM fabrication process, which is difficult to be implemented in general digital logic fabrication process. Furthermore, many researches require embedded processors for bitstream manipulation, which increases area and power consumption. This papers proposes hardwired H.264/AVC entropy decoder without embedded processor, which improves data processing speed and reduces power consumption. Furthermore, its CAVLC decoder optimizes lookup table and internal buffer without embedded memory, which reduces hardware size and can be implemented in general digital logic fabrication process without ROM or RAM fabrication process. Designed entropy decoder was embedded in H.264/AVC video decoder, and it was verified to operate correctly in the system. Synthesized in TSMC 90nm fabrication process, its maximum operation frequency is 125MHz. It supports QCIF, CIF, and QVGA image format. Under slight modification of nC register and other blocks, it also support VGA image format.

Aesthetic Strategies in Steina and Woody Vasulka's Video Art (비디오아티스트 슈테이너 바술카와 우디 바술카의 미적 전략)

  • Lim, Shan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.261-266
    • /
    • 2020
  • As pioneers of the early video art, Steina Vasulka(1940-) and Woody Vasulka(1937-2019) had lead not only their own experimental arts, but also entire changes of contemporary avant-garde performance, music, and visual art. Two artists invented and developed electronic machines for video image-processing by collaborating with engineers, and performed creative experiment on transformation of digital image. For them, video art is not just a means of documentation. The Vasulkas' artistic practices were not bounded by conventional canons and rules in art world, and preferably were parts of active aesthetic strategies for coexistence of vision of human and vision of machine. Particularly, their video art recognized the video as the key medium in an era where media technology began to dominate the system of communication, and established artist's authority over manipulation of moving image electronically without depending on video camera. In that regard, we can value on their video art. Therefore, the paper reflects on the Vasulkas' art and life which have not yet been studied, and suggests academic interests in the context of their artistic activities and aesthetic strategies.

Customer participatory design for mass customization(Focused on development of interactive design toolkit) (매스커스터마이제이션을 위한 소비자 참여 디자인 방법(인터랙티브 디자인 툴킷의 개발을 중심으로))

  • 변재형
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.5-14
    • /
    • 2003
  • This study suggest the development and application of the Interactive Design Toolkit as a participatory design method for general customer who are non-expert on design activity to participate in design process of mass customization. In order to let general customers to express their design needs, we have to make a familiar and direct communication method for them. And, customer's design needs should be transformed into digital media. This study define the Interactive Design Toolkit as a design tool for customer participation by direct manipulation of computer system for simulation of design needs by customer themselves. The Interactive Design Toolkit is based on a PC-based image perception system and its application. User can make virtual models in virtual space by manipulating physical objects in real world. And, The toolkit can be used in the field of participatory design for deliverer side customization, especially in system kitchen which is manufactured and distributed in modular system. More improved design toolkit for manipulating 3 dimensional shape is needed for consumer product design and car styling.

  • PDF

Detection method of proximal caries using line profile in digital intra-oral radiography (디지털 구내방사선사진에서 라인 프로파일을 이용한 인접면우증식의 인지 방법)

  • Park, Jeong-Hoon;Choi, Yong-Suk;Kim, Gyu-Tae;Hwang, Eui-Hwan;Lee, Gi-Ja;Choi, Sam-Jin;Park, Hun-Kuk
    • Imaging Science in Dentistry
    • /
    • v.39 no.4
    • /
    • pp.185-189
    • /
    • 2009
  • Purpose : The purpose of this study was to investigate how to detect proximal caries using line profile and validate linear measurements of proximal caries lesions by basic digital manipulation of radiographic images. Materials and Methods : The X-ray images of control group (15) and caries teeth (15) from patients were used. For each image, the line profile at the proximal caries-susceptible zone was calculated. To evaluate the contrast as a function of line profile to detect proximal caries, a difference coefficient (D) that indicates the relative difference between caries and sound dentin or intact enamel was measured. Results : Mean values of D were $0.0354{\pm}0.0155$ in non-caries and $0.2632{\pm}0.0982$ in caries (p<0.001). Conclusion : The mean values of caries group were higher than non-caries group and there was correlation between proximal dental caries and D. It is demonstrated that the mean value of D from caries group was higher than that of control group. From the result, values of D possess great potentiality as a new detection parameter for proximal dental caries.

  • PDF

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.