• Title/Summary/Keyword: Host Image

Search Result 192, Processing Time 0.024 seconds

The Impact of Brand Internationalization Image and Country of Origin Brand Image on Consumer Behavior (브랜드 글로벌화 이미지와 원산지국가 브랜드 이미지가 소비자 행위에 미친 영향)

  • Jin-Yan Tian;Zi-Yang Liu;Cong-Ying Sun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.709-710
    • /
    • 2023
  • Consumer attitudes and behaviors towards brands are not only related to the perception of corporate brand image but also to factors such as the image of the country of origin, the characteristics of the host country, and consumer individual traits. This article focuses on Chinese multinational companies and aims to study the impact of brand international image and country-of-origin brand image on consumer behavior. A model is constructed with brand international image and country-of-origin brand image as antecedent variables, host country characteristics and consumer traits as moderators, and consumer behavior as the outcome. This study employs a questionnaire survey method targeting foreign residents living in China as participants. The research findings reveal that during the internationalization process, both brand international image and country-of-origin brand image have a significant positive impact on consumer behavior, while host country characteristics and consumer traits play a moderating role. The conclusions of this research enrich the theoretical understanding of brand internationalization and explore the influencing factors of consumer behavior, providing a basis for decision-making for multinational company executives.

  • PDF

Study On Development of Fast Image Detector System (고속 영상 검지기 시스템 개발에 관한 연구)

  • 임태현;이종민;김용득
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.241-244
    • /
    • 2003
  • Nowadays image processing is very useful for some field of traffic applications. The one reason is we can construct the system in a low price, the other is the improvement of hardware processing power, it can be more fast to processing the data. In this study, I propose the traffic monitoring system that implement on the embedded system environment. The whole system consists of two main part, one is host controller board, the other is image processing board. The part of host controller board take charge of control the total system, interface of external environment. and OSD(On screen display). The part of image processing board takes charge of image input and output using video encoder and decoder, image classification and memory control of using FPGA, control of mouse signal. And finally, fer stable operation of host controller board, uC/OS-II operating system is ported on the board.

  • PDF

Geometrical Distortion-Resilient Watermarking Based on Image Features

  • Shim, Hiuk-Jae;Byeungwoo Jeon;Kim, Rin-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1268-1271
    • /
    • 2002
  • The major threat of geometric manipulations is that they change the positions of watermarks, therefore the detection process fails to extract watermark properly. Since they cause the same effects on the host image as watermarks simultaneously, evaluating the distorted host image can be helpful to measure the nature of distortions. In this paper, we propose a geometrical distortion-resilient watermarking algorithm based on this property. Firstly we evaluate the orientation of a host image by filtering it with directional Gabor kernels, then we insert embedding pattern aligned to the estimated orientation. In its detection step, we evaluate the orientation again by Gabor filtering, then simply project and average the projected value to obtain a 1-D projection average pattern. Finally, auto-correlation function of the 1-D projection average pattern identifies periodic peaks. Analysed are experimental results against geometrical attacks including aspect ratio changes.

  • PDF

Multiple LCD System Development of daisy-chain Method using LVDS (LVDS를 이용한 daisy-chain 방식의 다중 LCD 시스템 개발)

  • Kim, Jae-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2747-2754
    • /
    • 2012
  • This thesis explains the development of multiple LCD system with the additional function to maximize the utilization of PC contents. The newly developed system is composed of host LCD and slave LCD. Host LCD decodes and outputs the image and voice of NTSC, PAL, SECAM signals. It also converts the decoded signals into LVDS signals before transmitting them to slave LCD stage. In addition, the installation of CF Memory and USB Memory helps display multi-media data. Unlike the host LCD, since not including the tuner and memory part, the slave LCD can't receive TV signals and play video signals. It only has the function to receive LVDS image signals and display on a LCD panel. This newly developed multi-LCD system has competitiveness in various aspects. With its simple structure, the failure rate, price and display power are relatively low due to its simplification of the control part. It has price and functional competitiveness as the product whose host LCD can control the entire slave LCD in terms of channel, volume, and video output.

Image Fusion Watermarks Using Multiresolution Wavelet Transform (다해상도 웨이블릿 변환을 이용한 영상 융합 워터마킹 기법)

  • Kim Dong-Hyun;Ahn Chi-Hyun;Jun Kye-Suk;Lee Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.83-92
    • /
    • 2005
  • This paper presents a watermarking approach that the 1-level Discrete Wavelet Transform(DWT) coefficients of a $64{\ast}64$ binary logo image as watermarks are inserted in LL band and other specific frequency bands of the host image using Multi-Resolution Analysis(MRA) Wavelet transform for copyright protection of image data. The DWT coefficients of the binary logo image are inserted in blocks of LL band and specific bands of the host image that the 3-level DWT has been performed in the same orientation. We investigate Significant Coefficients(SCs) in each block of the frequency areas in order to prevent the quality deterioration of the host image and the watermark is inserted by SCs. When the host image is distorted by difference of the distortion degree in each frequency, we set the thresholds of SCs on each frequency and completely insert the watermark in each frequency of the host image. In order to be invisibility of the watermark, the Human Visual System(HVS) is applied to the watermark. We prove the proper embedding method by experiment. Thereby, we rapidly detect the watermark using this watermarking method and because the small size watermarks are inserted by HVS and SCs, the results confirm the superiority of the proposed method on invisibility and robustness.

Effects of Railroad Tourism Contest in Company Image Improvement (철도관광 신상품 경진대회가 기업이미지 향상에 미치는 영향)

  • Lee, Yong-Chul;Ju, Yong-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2409-2414
    • /
    • 2009
  • Hosting the contest in the way of total marketing systems is one of means for host's purpose achievement. So in the research, the improvement of company image by contest will need feature of participant, host and the interested parties. As the 6 factors such as reliability, contribution etc. about Korail image would be driven. We suggest the host must present a intent and purpose of contest, and the development of program that company image improves would be needed.

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms

  • Benyoussef, Meryem;Mabtoul, Samira;El Marraki, Mohamed;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.495-508
    • /
    • 2015
  • In this paper, a novel robust medical images watermarking scheme is proposed. In traditional methods, the added watermark may alter the host medical image in an irreversible manner and may mask subtle details. Consequently, we propose a method for medical image copyright protection that may remedy this problem by embedding the watermark without modifying the original host image. The proposed method is based on the visual cryptography concept and the dominant blocks of wavelet coefficients. The logic in using the blocks dominants map is that local features, such as contours or edges, are unique to each image. The experimental results show that the proposed method can withstand several image processing attacks such as cropping, filtering, compression, etc.

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.