• Title/Summary/Keyword: Image decomposition

Search Result 368, Processing Time 0.024 seconds

The efficient coding of the upper bands in subband image coding (대역분할 부호화에서 상위대역의 효율적인 부호화)

  • Han, Young-Oh;Park, Hyun-Soo;Shin, Joong-In;Kim, Hyung-Suk;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1993.11a
    • /
    • pp.346-349
    • /
    • 1993
  • A method for image compression based on decomposition is presented. We design the efficient coding technique for upper band image signals. This coding technique with directive 1-D DPCM is based on the statistical properties of upper bands. Lower band image signals is encoded using 2-D DPCM. The directive 1-D DPCM is performed, scanning upper bands according to edge direction. And then the predicted error signals of upper band sis coded using B1 and Huffman code, and the predicted error signals of lower band is coded using Huffman code. The proposed system shows improved performance when compared with other existing methods with respect to peak signal to noise ratio(PSMR) and human visual system(HVS) properties.

  • PDF

Object Recognition Using the Edge Orientation Histogram and Improved Multi-Layer Neural Network

  • Kang, Myung-A
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.142-150
    • /
    • 2018
  • This paper describes the algorithm that lowers the dimension, maintains the object recognition and significantly reduces the eigenspace configuration time by combining the edge orientation histogram and principle component analysis. By using the detected object region as a recognition input image, in this paper the object recognition method combined with principle component analysis and the multi-layer network which is one of the intelligent classification was suggested and its performance was evaluated. As a pre-processing algorithm of input object image, this method computes the eigenspace through principle component analysis and expresses the training images with it as a fundamental vector. Each image takes the set of weights for the fundamental vector as a feature vector and it reduces the dimension of image at the same time, and then the object recognition is performed by inputting the multi-layer neural network.

A Study on SVD & DWT -based watermarking for protecting rightful ownership (정당한 소유권 보호를 위한 DWT와 SVD기반의 디지털 워터마킹에 대한 연구)

  • 구대욱;한수영;이동규;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1815-1818
    • /
    • 2003
  • Digital watermarking is technique, which owner's information is inserted in digital image, with intention to protecting a copyright of digital image. In watermarking for copyright and authentication, watermark shouldn't be distorted or disappeared after general image processes like a compression and filtering. In this paper, we present a new digital image watermarking algorithm which combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD). Simulation results show that the newly proposed algorithm is not only robust nevertheless variable attacks like noise, filtering and JPEG compression but also secure in application.

  • PDF

Digital Watermarking Scheme based on SVD and Triplet (SVD 및 트리플릿 기반의 디지털 워터마킹 기법)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.5
    • /
    • pp.1041-1046
    • /
    • 2009
  • In this paper, we proposed a robust watermark scheme for image based on SVD(Singular Value Transform) and Triplet. First, the original image is decomposed by using 3-level DWT, and then used the singular values changed for embedding and extracting of the watermark sequence in LL3 band. Since the matrix of singular values is not easily altered with various signal processing noises, the embedded watermark sequence has the ability to withstand various signal processing noise attacks. Nevertheless, this method does not guarantee geometric transformation(such as rotation, cropping, etc.) because the geometric transformation changes the matrix size. In this case, the watermark sequence cannot be extracted. To compensate for the above weaknesses, a method which uses the triplet for embedding a barcode image watermark in the middle of frequency band is proposed. In order to generate the barcode image watermark, the pattern of the watermark sequence embedded in a LL3 band is used. According to this method, the watermark information can be extracted from attacked images.

Moving image coding with variablesize block based on the segmentation of motion vectors (움직임 벡터의 영역화에 의한 가변 블럭 동영상 부호화)

  • 김진태;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.3
    • /
    • pp.469-480
    • /
    • 1997
  • For moving image coding, the variable size of region coding based on local motion is more efficient than fixed size of region coding. It can be applied well to complex motions and is more stable for wide motions because images are segmented according to local motions. In this paper, new image coding method using the segmentation of motion vectors is proposed. First, motion vector field is smoothed by filtering and segmented by smoothed motion vectors. The region growing method is used for decomposition of regions, and merging of regions is decided by motion vector and prediction errors of the region. Edge of regions is excluded because of the correlation of image, and neighbor motion vectors are used evaluation of current block and construction of region. The results of computer simulation show the proposed method is superior than the existing methods in aspect of coding efficiency.

  • PDF

A Study on Bubble Behavior Generated by an Air-driven Ejector for ABB (Air Bubble Barrier) (II): Comparison of Bubble Behavior with and without Ejector (공기구동 이젝터를 이용한 ABB (Air Bubble Barrier)의 기포거동 특성 연구 (II): 기포거동 특성의 비교 분석)

  • Seo, Hyunduk;Aliyu, Aliyu Musa;Kim, Hyogeum;Kim, Kyung Chun
    • Journal of the Korean Society of Visualization
    • /
    • v.15 no.2
    • /
    • pp.59-67
    • /
    • 2017
  • To verify floatability of ABB (Air bubble barrier), we compared bubble swarm behavior with and without the air-driven ejector. Experiment was conducted using the fabricated air-driven ejector with 5 mm nozzle on the bottom of 1 m3 water tank. Reynolds number of air in the nozzle was ranged 1766-13248. We analyzed data with statistical method using image processing, particle mage velocimetry (PIV) and proper orthogonal decomposition (POD) analysis. As a result of POD analysis, there was no significant eigenmode in bubbly flow generated from the ejector. It means that more complex turbulent flows were formed by the ejector, thereby (1) making bubbles finer, (2) promoting three-dimensional energy transfer between bubble and water, and (3) making evenly distributed velocity profile of water. It is concluded that the air-driven ejector could enhance the performance of ABB.

A Blind Watermarking Scheme Using Singular Vector Based On DWT/RDWT/SVD (DWT/RDWT/SVD에 기반한 특이벡터를 사용한 블라인드 워터마킹 방안)

  • Luong, Ngoc Thuy Dung;Sohn, Won
    • Journal of Broadcast Engineering
    • /
    • v.21 no.2
    • /
    • pp.149-156
    • /
    • 2016
  • We proposed a blind watermarking scheme using singular vectors based on Discrete Wavelet Transform (DWT) and Redundant Discrete Wavelet Transform (RDWT) combined with Singular Value Decomposition (SVD) for copyright protection application. We replaced the 1st left and right singular vectors decomposed from cover image with the corresponding ones from watermark image to overcome the false-positive problem in current watermark systems using SVD. The proposed scheme realized the watermarking system without a false positive problem, and shows high fidelity and robustness.

Super Resolution Algorithm using TV-G Decomposition (TV-G 분해를 이용한 초해상도 알고리즘)

  • Eum, Kyoung-Bae;Beom, Dong-Kyu
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1517-1522
    • /
    • 2017
  • Among single image SR techniques, the TV based SR approach seems most successful in terms of edge preservation and no artifacts. But, this approach achieves insufficient SR for texture component. In this paper, we proposed a new TV-G decomposition based SR method to solve this problem. We proposed the SVR based up-sampling to get better edge preservation in the structure component. The NNE used the relaxed constraint to improve the NE. We used the NNE based learning method to improve the resolution of the texture component. Through experimental results, we quantitatively and qualitatively confirm the improved results of the proposed SR method when comparing with conventional interpolation method, ScSR, TV and NNE.

Estimation of Circularly Symmetric Point Spread Function for Digital Auto-Focusing (디지털 자동 초점을 위한 등방성 점확산함수 추정)

  • Kim, Dong-Gyun;Park, Young-Uk;Lee, Jin-Hee;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.7-13
    • /
    • 2009
  • This paper presents a circularly symmetric point spread function (PSF) estimation technique for a fully digital auto-focusing system. The proposed algorithm provides realistic, unsupervised PSF estimation by establishing the relationship between one-dimensional ideal step response and two-dimensional circularly symmetric PSF.

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.