• 제목/요약/키워드: Feature Detect

검색결과 851건 처리시간 0.024초

Real-Time Face Avatar Creation and Warping Algorithm Using Local Mean Method and Facial Feature Point Detection

  • Lee, Eung-Joo;Wei, Li
    • 한국멀티미디어학회논문지
    • /
    • 제11권6호
    • /
    • pp.777-786
    • /
    • 2008
  • Human face avatar is important information in nowadays, such as describing real people in virtual world. In this paper, we have presented a face avatar creation and warping algorithm by using face feature analysis method, in order to detect face feature, we utilized local mean method based on facial feature appearance and face geometric information. Then detect facial candidates by using it's character in $YC_bC_r$ color space. Meanwhile, we also defined the rules which are based on face geometric information to limit searching range. For analyzing face feature, we used face feature points to describe their feature, and analyzed geometry relationship of these feature points to create the face avatar. Then we have carried out simulation on PC and embed mobile device such as PDA and mobile phone to evaluate efficiency of the proposed algorithm. From the simulation results, we can confirm that our proposed algorithm will have an outstanding performance and it's execution speed can also be acceptable.

  • PDF

SAR 영상에서 MRF 기반 도로 검출에 관한 연구 (A Study on Road Detection Based on MRF in SAR Image)

  • 김순백;김두영
    • 융합신호처리학회논문지
    • /
    • 제2권2호
    • /
    • pp.7-12
    • /
    • 2001
  • 본 논문에서는 스페클 노이즈를 포함하는 SAR 영상에서 도로망과 같은 선형 구조를 검출하기 위하여 하이브리드 특징 검출 방법을 사용하였다. 먼저 국소적으로 이웃한 영역에 대하여 평균 밝기 비율 또는 통계적 특성을 고려하여 국소적 에지를 검출하였고, 도로에 대한 많은 정보를 위하여 양 검출기로부터 검출된 응답을 결합하였으며, 결합된 에지 세그먼트 중 도로에 일치하는 세그먼트를 결정하고, 연결하여 완전한 도로망을 검출하였다. 본 논문에서 도로망의 검출 방법으로 도로에 대한 일반적인 사전 지식을 MRF 모델로 정의하고, 제안한 세그먼트의 상호 작용 포인터 프로세서에 의한 에너지 함수를 최적화하여 도로망을 검출하였다.

  • PDF

시선 응시 점 기반의 관심영역 확장을 통한 원 거리 얼굴 검출 (Far Distance Face Detection from The Interest Areas Expansion based on User Eye-tracking Information)

  • 박희선;홍장표;김상열;장영민;김철수;이민호
    • 전자공학회논문지
    • /
    • 제49권9호
    • /
    • pp.113-127
    • /
    • 2012
  • 영상처리 기법을 이용한 얼굴검출에 관한 많은 다양한 방법들이 제시되어 왔다. 일반적으로 가장 많이 쓰이는 얼굴 검출 방식은 Viola와 Jones이 제안한 Adaboost 방식이다. 이 방식은 Haar-like feature을 이용하여 얼굴영상을 선행 학습하고, 검출 성능은 학습된 DB에 의존한다. 이는 일정 거리 범위 안의 학습된 얼굴 크기에서는 얼굴 검출을 잘 수행하지만, 카메라에서 객체(얼굴)의 거리가 멀어지면 얼굴 크기가 작아져 기존에 학습한 Haar-like feature로 얼굴 검출을 하지 못하는 경우가 발생한다. 이에 본 논문에서는 생물학 기반의 선택적 주의집중 기반의 Haar-like feature 정보를 이용한 Adaboost 모델과 사용자의 시선 응시 점 정보를 이용하여, 사용자의 관심영역 확장을 통한 원거리 얼굴 검출 모델을 제안한다. 생물학적 기반의 선택적 주의 집중 모델인 돌출맵(Saliency map) 정보를 이용하여 입력 영상에 대하여 얼굴 후보 영역을 검출하고, 검출된 얼굴 후보 영역 중에서 선행 학습된 Haar-like feature 정보로 Adaboost 알고리즘을 이용하여 최종 얼굴 영상을 검출한다. 그리고 사용자의 시선 응시 점 정보는 관심영역을 선택 하는데 이용된다. 피 실험자가, 카메라로부터 멀리 거리 떨어져 얼굴의 크기가 얼굴검출이 힘들더라도 사용자 시선 응시 점 영역을 선형 보간법으로 확대하여 입력영상으로 재사용함으로써 얼굴 검출 성능을 높일 수 있다. 제안된 방법이 기존의 Adaboost 방법보다 얼굴 검출 성능과 수행시간 면에서 우수함을 실험을 통해 확인하였다.

A person detection in HEVC bitstream domain based on bits density feature and YOLOv3 framework

  • Wiratama, Wahyu;Sim, Donggyu
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송∙미디어공학회 2019년도 추계학술대회
    • /
    • pp.169-171
    • /
    • 2019
  • This paper proposes an algorithm to detect persons in bitstream domain by skipping a reconstruction picture process in HEVC decoding. A new 3-channel feature extraction map is introduced in this paper by modelling the relationship between bits per CU density, average PU shape in CU, and total transform coefficients in CU from syntax elements. A state-of-the-art of YOLOv3 detection algorithm is used to detect and localize person on extracted feature maps. Based on the experimental results, the proposed person detection framework can achieve mAP of 0.68 and be able to find persons on feature maps. In addition, the proposed person detection can save decoding time about 60% by removing reconstruction picture process.

  • PDF

Efficient Signal Feature Detection method using Spectral Correlation Function in the Fading channel

  • Song, Chang-Kun;Kim, Kyung-Seok
    • International Journal of Contents
    • /
    • 제3권2호
    • /
    • pp.35-39
    • /
    • 2007
  • The cognitive radio communication is taking the attentions because the development of the technique came to be possible to analyze wireless signals. In the IEEE 802.22 WRAN Systems[1], how to detect a spectrum and signals is continuously studied. In this paper, we propose the efficient signal detection method using SCF (Spectral Correlation Function). It is easy to detect the signal feature when we are using the SCF. Because most modulated signals have the cyclo-stationarity which is unique for each signal. But the fading channel effected serious influence even though it detects the feature of the signal. We applied LMS(Least Mean Square) filter for the compensation of the signal which is effected the serious influence in the fading channel. And we analyze some signal patterns through the SCF. And we show the unique signal feature of each signal through the SCF method. It is robust for low SNR(Signal to Noise Ratio) environment and we can distinguish it in the fading channel using LMS Filter.

A Feature-Based Malicious Executable Detection Approach Using Transfer Learning

  • Zhang, Yue;Yang, Hyun-Ho;Gao, Ning
    • 인터넷정보학회논문지
    • /
    • 제21권5호
    • /
    • pp.57-65
    • /
    • 2020
  • At present, the existing virus recognition systems usually use signature approach to detect malicious executable files, but these methods often fail to detect new and invisible malware. At the same time, some methods try to use more general features to detect malware, and achieve some success. Moreover, machine learning-based approaches are applied to detect malware, which depend on features extracted from malicious codes. However, the different distribution of features oftraining and testing datasets also impacts the effectiveness of the detection models. And the generation oflabeled datasets need to spend a significant amount time, which degrades the performance of the learning method. In this paper, we use transfer learning to detect new and previously unseen malware. We first extract the features of Portable Executable (PE) files, then combine transfer learning training model with KNN approachto detect the new and unseen malware. We also evaluate the detection performance of a classifier in terms of precision, recall, F1, and so on. The experimental results demonstrate that proposed method with high detection rates andcan be anticipated to carry out as well in the real-world environment.

모바일 앱 악성코드 분석을 위한 학습모델 제안 (Proposal of a Learning Model for Mobile App Malicious Code Analysis)

  • 배세진;최영렬;이정수;백남균
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.455-457
    • /
    • 2021
  • 앱(App) 또는 어플리케이션이라고 부르는 응용 프로그램은 스마트폰이나 스마트TV와 같은 스마트 기기에서 사용되고 있다. 당연하게도 앱에도 악성코드가 있는데, 악성코드의 유무에 따라 정상앱과 악성앱으로 나눌 수 있다. 악성코드는 많고 종류가 다양하기 때문에 사람이 직접 탐지하기 어렵다는 단점이 있어 AI를 활용하여 악성앱을 탐지하는 방안을 제안한다. 기존 방법에서는 악성앱에서 Feature를 추출하여 악성앱을 탐지하는 방법이 대부분이었다. 하지만 종류와 수가 기하급수적으로 늘어 일일이 탐지할 수도 없는 상황이다. 따라서 기존 대부분의 악성앱에서 Feature을 추출하여 악성앱을 탐지하는 방안 외에 두 가지를 더 제안하려 한다. 첫 번째 방안은 기존 악성앱 학습을 하여 악성앱을 탐지하는 방법과 는 반대로 정상앱을 공부하여 Feature를 추출하여 학습한 후 정상에서 거리가 먼, 다시 말해 비정상(악성앱)을 찾는 것이다. 두 번째 제안하는 방안은 기존 방안과 첫 번째로 제안한 방안을 결합한 '앙상블 기법'이다. 이 두 기법은 향후 앱 환경에서 활용될 수 있도록 연구를 진행할 필요가 있다.

  • PDF

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권10호
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

Hand Gesture Recognition using Optical Flow Field Segmentation and Boundary Complexity Comparison based on Hidden Markov Models

  • Park, Sang-Yun;Lee, Eung-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제14권4호
    • /
    • pp.504-516
    • /
    • 2011
  • In this paper, we will present a method to detect human hand and recognize hand gesture. For detecting the hand region, we use the feature of human skin color and hand feature (with boundary complexity) to detect the hand region from the input image; and use algorithm of optical flow to track the hand movement. Hand gesture recognition is composed of two parts: 1. Posture recognition and 2. Motion recognition, for describing the hand posture feature, we employ the Fourier descriptor method because it's rotation invariant. And we employ PCA method to extract the feature among gesture frames sequences. The HMM method will finally be used to recognize these feature to make a final decision of a hand gesture. Through the experiment, we can see that our proposed method can achieve 99% recognition rate at environment with simple background and no face region together, and reduce to 89.5% at the environment with complex background and with face region. These results can illustrate that the proposed algorithm can be applied as a production.

An Intelligent Framework for Feature Detection and Health Recommendation System of Diseases

  • Mavaluru, Dinesh
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.177-184
    • /
    • 2021
  • All over the world, people are affected by many chronic diseases and medical practitioners are working hard to find out the symptoms and remedies for the diseases. Many researchers focus on the feature detection of the disease and trying to get a better health recommendation system. It is necessary to detect the features automatically to provide the most relevant solution for the disease. This research gives the framework of Health Recommendation System (HRS) for identification of relevant and non-redundant features in the dataset for prediction and recommendation of diseases. This system consists of three phases such as Pre-processing, Feature Selection and Performance evaluation. It supports for handling of missing and noisy data using the proposed Imputation of missing data and noise detection based Pre-processing algorithm (IMDNDP). The selection of features from the pre-processed dataset is performed by proposed ensemble-based feature selection using an expert's knowledge (EFS-EK). It is very difficult to detect and monitor the diseases manually and also needs the expertise in the field so that process becomes time consuming. Finally, the prediction and recommendation can be done using Support Vector Machine (SVM) and rule-based approaches.