• Title/Summary/Keyword: Image information

Search Result 19,656, Processing Time 0.049 seconds

A Novel Image Completion Algorithm Based on Planar Features

  • Xiao, Mang;Liu, Yunxiang;Xie, Li;Chen, Qiaochuan;Li, Guangyao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3842-3855
    • /
    • 2018
  • A novel image completion method is proposed that uses the advantage of planar structural information to fill corrupted portions of an image. First, in estimating parameters of the projection plane, the image is divided into several planes, and their planar structural information is analyzed. Second, in calculating the a priori probability of patch and patch offset regularity, this information is converted into a constraint condition to guide the process of filling the hole. Experimental results show that the proposed algorithm is fast and effective, and ensures the structure continuity of the damaged region and smoothness of the texture.

Image encryption using phase-based virtual image and interferometer

  • Seo, Dong-Hoan;Shin, Chang-Mok;Kim, Jong-Yun;Bae, Jang-Keun;Kim, Jeong-Woo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.631-634
    • /
    • 2002
  • In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, encrypting image and decrypting image, where every pixel in the three images has a phase value of '0' and '$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted image. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access.. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the encrypted image with a decrypting image. Both computer simulations and optical experiments confirmed the effectiveness of the proposed optical technique for optical security applications.

  • PDF

A Study on the influence of the tourism destination image on the Tourism Information System evaluation (관광지 이미지가 관광안내정보시스템 평가에 미치는 영향에 관한 연구)

  • Shin, Young Kee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.207-220
    • /
    • 2012
  • The goal of the information system in tourism, like that of general information systems, is to create users' information needs so that the users continuously revisit the information system and retrieve the information on a regular basis. However, unlike any other information systems, the primary objective of the tourism information system is to attract tourists to the tourist sites rather than to create the users' needs for their future revisits to the information system. The tourism information system is therefore more closely related to tourists' overall tourism destination image towards the tourism destination. In this respect, the evaluation of the tourism information system should be based on tourists' overall tourism destination image towards the sites. This study examines how tourists' overall tourism destination image towards the sites affect the evaluation of the tourism information system. Specifically, I employ the tourism information system provided by Sokcho and Delone and Mclean(2003)'s the Information System Success Model in order to investigate this research question.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File (스마트폰 JPEG 파일의 출처 식별을 위한 DQT 정보 데이터베이스 구축)

  • Kim, MinSik;Jung, Doowon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.359-367
    • /
    • 2016
  • As taking pictures by using smartphones has become more common in society, there are many incidents which are unexpected manipulation of images and leak of confidential information. Because of those incidents, demands that identify forgery/alteration of image file and proves of the original copy is constantly increasing. In general, smartphone saves image file as JPEG form and it has DQT which determines a compression rate of image in a header part of image. There is also DQT in Thumbnail image which inside of JPEG. In previous research, it identified a smartphone which take image by only using DQT, However, the research has low accuracy to identify the devices. There are two main purposes in this research. First, this research will analogize a smartphone and an application that takes a picture, edits and save an image file by testing not only about a DQT information but also a information of Thumbnail image. Second, the research will build a database of DQT and Thumbnail information in JPEG file to find more accurate image file's origin.

Influence of Public R&D Information Service Image on the Value and Satisfaction of Users

  • Lee, Sun Young;Suh, Sanghyuk
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.2
    • /
    • pp.192-205
    • /
    • 2017
  • The aim of this study is to investigate the relative impact of the image of information service on customer's perceived value and satisfaction of R&D information. It also seeks to assess the moderating effect of service users' skills on the value of the service image on the customer. For this purpose, a field study was conducted on users of a public R&D information service called NTIS (National Technology Information Service) in Korea. The findings show that the information service image has a significant impact on customers' perceived value and satisfaction. In addition, customers' perceived value is found to be an important indicator in strengthening customer satisfaction. Findings also reveal that individual personal computer skills moderate the relationship between service image and information value. Further research is needed to strengthen the independent variable in view of the increasing pressure to improve public service quality and customer management.

Magnetic Resonance Brain Image Contrast Enhancement Using Histogram Equalization Techniques (히스토그램 평형 기법을 이용한 자기 공명 두뇌 영상 콘트라스트 향상)

  • Ullah, Zahid;Lee, Su-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.83-86
    • /
    • 2019
  • Histogram equalization is extensively used for image contrast enhancement in various applications due to its effectiveness and its modest functions. In image research, image enhancement is one of the most significant and arduous technique. The image enhancement aim is to improve the visual appearance of an image. Different kinds of images such as satellite images, medical images, aerial images are affected from noise and poor contrast. So it is important to remove the noise and improve the contrast of the image. Therefore, for this purpose, we apply a median filter on MR image as the median filter remove the noise and preserve the edges effectively. After applying median filter on MR image we have used intensity transformation function on the filtered image to increase the contrast of the image. Than applied the histogram equalization (HE) technique on the filtered image. The simple histogram equalization technique over enhances the brightness of the image due to which the important information can be lost. Therefore, adaptive histogram equalization (AHE) and contrast limited histogram equalization (CLAHE) techniques are used to enhance the image without losing any information.

  • PDF

Design and Implementation of Medical Image Information System (의료 화상 정보 시스템의 설계 및 구현)

  • 지은미;권용무
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.2
    • /
    • pp.121-128
    • /
    • 1994
  • In this paper, MIlS (Medical Image Information System) has been designed and implemented using INGRES RDBMS, which is based on a client/server architecture. The implemnted system allows users to register and retrieve patient information, medical images and diagnostic reports. It also provides the function to display these information on workstation windows simultaneously by using the designed menu-driven graphic user interface. The medical image compression! decompression techniques are implemented and integrated into the medical image database system for the efficient data storage and the fast access through the network.

  • PDF

Smart Rectification on Satellite images

  • Seo, Ji-Hun;Jeong, Soo;Kim, Kyoung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.75-80
    • /
    • 2002
  • The mainly used technique to rectify satellite images with distortion is to develop a mathematical relationship between the pixel coordinates on the image and the corresponding points on the ground. By defining the relationship between two coordinate systems, a polynomial model is designed and various linear transformations are used. These GCP based geometric correction has performed overall plane to plane mapping. In the overall plane mapping, overall structure of a scene is considered, but local variation is discarded. The highly variant height of region is resampled with distortion in the rectified image. To solve this problem this paper proposed the TIN-based rectification on a satellite image. The TIN based rectification is good to correct local distortion, but insufficient to reflect overall structure of one scene. So, this paper shows the experimental result and the analysis of each rectification model. It also describes the relationship GCP distribution and rectification model. We can choose a geometric correction model as the structural characteristic of a satellite image and the acquired GCP distribution.

  • PDF

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.