• 제목/요약/키워드: Image information

검색결과 19,609건 처리시간 0.044초

A Novel Image Completion Algorithm Based on Planar Features

  • Xiao, Mang;Liu, Yunxiang;Xie, Li;Chen, Qiaochuan;Li, Guangyao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3842-3855
    • /
    • 2018
  • A novel image completion method is proposed that uses the advantage of planar structural information to fill corrupted portions of an image. First, in estimating parameters of the projection plane, the image is divided into several planes, and their planar structural information is analyzed. Second, in calculating the a priori probability of patch and patch offset regularity, this information is converted into a constraint condition to guide the process of filling the hole. Experimental results show that the proposed algorithm is fast and effective, and ensures the structure continuity of the damaged region and smoothness of the texture.

Image encryption using phase-based virtual image and interferometer

  • Seo, Dong-Hoan;Shin, Chang-Mok;Kim, Jong-Yun;Bae, Jang-Keun;Kim, Jeong-Woo;Kim, Soo-Joong
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -1
    • /
    • pp.631-634
    • /
    • 2002
  • In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, encrypting image and decrypting image, where every pixel in the three images has a phase value of '0' and '$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted image. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access.. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the encrypted image with a decrypting image. Both computer simulations and optical experiments confirmed the effectiveness of the proposed optical technique for optical security applications.

  • PDF

관광지 이미지가 관광안내정보시스템 평가에 미치는 영향에 관한 연구 (A Study on the influence of the tourism destination image on the Tourism Information System evaluation)

  • 신영기
    • 디지털산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.207-220
    • /
    • 2012
  • The goal of the information system in tourism, like that of general information systems, is to create users' information needs so that the users continuously revisit the information system and retrieve the information on a regular basis. However, unlike any other information systems, the primary objective of the tourism information system is to attract tourists to the tourist sites rather than to create the users' needs for their future revisits to the information system. The tourism information system is therefore more closely related to tourists' overall tourism destination image towards the tourism destination. In this respect, the evaluation of the tourism information system should be based on tourists' overall tourism destination image towards the sites. This study examines how tourists' overall tourism destination image towards the sites affect the evaluation of the tourism information system. Specifically, I employ the tourism information system provided by Sokcho and Delone and Mclean(2003)'s the Information System Success Model in order to investigate this research question.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

스마트폰 JPEG 파일의 출처 식별을 위한 DQT 정보 데이터베이스 구축 (Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File)

  • 김민식;정두원;이상진
    • 정보보호학회논문지
    • /
    • 제26권2호
    • /
    • pp.359-367
    • /
    • 2016
  • 스마트폰을 이용한 사진 촬영이 보편화됨에 따라 이미지 조작, 기밀 유출로 인한 사건이 빈번하게 발생되고 있어 이미지 파일의 위변조 여부와 원본 증명에 대한 수요가 꾸준히 증가하고 있다. 일반적으로 스마트폰은 사진 파일을 JPEG 형식의 이미지 파일로 저장하는데 JPEG 이미지의 Header부분에는 이미지의 압축률을 결정하는데 사용되는 DQT가 저장되어 있다. 또한 JPEG 내부 Thumbnail 이미지에도 DQT가 존재한다. 기존의 연구에서는 DQT만을 이용해 이미지를 촬영한 장치를 판별하였다. 하지만 이 연구는 장치를 판별하기에는 정확도가 매우 낮다. 이에 본 논문에서는 DQT 정보뿐만 아니라 Thumbnail 이미지의 DQT 정보에 대한 실험을 통해 사진을 촬영한 스마트폰 기기와 사진 파일을 편집하고 저장한 애플리케이션을 유추할 수 있도록 JPEG 파일의 DQT 정보 및 Thumbnail 이미지의 DQT 정보 데이터베이스를 구축하여 보다 정확한 이미지의 출처 판별을 돕는다.

Influence of Public R&D Information Service Image on the Value and Satisfaction of Users

  • Lee, Sun Young;Suh, Sanghyuk
    • Asian Journal of Innovation and Policy
    • /
    • 제6권2호
    • /
    • pp.192-205
    • /
    • 2017
  • The aim of this study is to investigate the relative impact of the image of information service on customer's perceived value and satisfaction of R&D information. It also seeks to assess the moderating effect of service users' skills on the value of the service image on the customer. For this purpose, a field study was conducted on users of a public R&D information service called NTIS (National Technology Information Service) in Korea. The findings show that the information service image has a significant impact on customers' perceived value and satisfaction. In addition, customers' perceived value is found to be an important indicator in strengthening customer satisfaction. Findings also reveal that individual personal computer skills moderate the relationship between service image and information value. Further research is needed to strengthen the independent variable in view of the increasing pressure to improve public service quality and customer management.

히스토그램 평형 기법을 이용한 자기 공명 두뇌 영상 콘트라스트 향상 (Magnetic Resonance Brain Image Contrast Enhancement Using Histogram Equalization Techniques)

  • ;이수현
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.83-86
    • /
    • 2019
  • Histogram equalization is extensively used for image contrast enhancement in various applications due to its effectiveness and its modest functions. In image research, image enhancement is one of the most significant and arduous technique. The image enhancement aim is to improve the visual appearance of an image. Different kinds of images such as satellite images, medical images, aerial images are affected from noise and poor contrast. So it is important to remove the noise and improve the contrast of the image. Therefore, for this purpose, we apply a median filter on MR image as the median filter remove the noise and preserve the edges effectively. After applying median filter on MR image we have used intensity transformation function on the filtered image to increase the contrast of the image. Than applied the histogram equalization (HE) technique on the filtered image. The simple histogram equalization technique over enhances the brightness of the image due to which the important information can be lost. Therefore, adaptive histogram equalization (AHE) and contrast limited histogram equalization (CLAHE) techniques are used to enhance the image without losing any information.

  • PDF

의료 화상 정보 시스템의 설계 및 구현 (Design and Implementation of Medical Image Information System)

  • 지은미;권용무
    • 대한의용생체공학회:의공학회지
    • /
    • 제15권2호
    • /
    • pp.121-128
    • /
    • 1994
  • In this paper, MIlS (Medical Image Information System) has been designed and implemented using INGRES RDBMS, which is based on a client/server architecture. The implemnted system allows users to register and retrieve patient information, medical images and diagnostic reports. It also provides the function to display these information on workstation windows simultaneously by using the designed menu-driven graphic user interface. The medical image compression! decompression techniques are implemented and integrated into the medical image database system for the efficient data storage and the fast access through the network.

  • PDF

Smart Rectification on Satellite images

  • Seo, Ji-Hun;Jeong, Soo;Kim, Kyoung-Ok
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2002년도 Proceedings of International Symposium on Remote Sensing
    • /
    • pp.75-80
    • /
    • 2002
  • The mainly used technique to rectify satellite images with distortion is to develop a mathematical relationship between the pixel coordinates on the image and the corresponding points on the ground. By defining the relationship between two coordinate systems, a polynomial model is designed and various linear transformations are used. These GCP based geometric correction has performed overall plane to plane mapping. In the overall plane mapping, overall structure of a scene is considered, but local variation is discarded. The highly variant height of region is resampled with distortion in the rectified image. To solve this problem this paper proposed the TIN-based rectification on a satellite image. The TIN based rectification is good to correct local distortion, but insufficient to reflect overall structure of one scene. So, this paper shows the experimental result and the analysis of each rectification model. It also describes the relationship GCP distribution and rectification model. We can choose a geometric correction model as the structural characteristic of a satellite image and the acquired GCP distribution.

  • PDF

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.