• Title/Summary/Keyword: Jpeg

Search Result 861, Processing Time 0.022 seconds

Implementation and Design of Objective Quality Assurance System for Multimedia Service Video (멀티미디어 서비스 영상의 객관적 품질측정 시스템 설계 및 구현)

  • Joo, Hae-Jong;Hong, Bong-Hwa;On, Jin-Oh;Hong, Suk-Ju
    • 전자공학회논문지 IE
    • /
    • v.45 no.1
    • /
    • pp.58-64
    • /
    • 2008
  • This Paper provides perceptual metrics for video quality based on properties of human visual system, and audio quality based on human audition. All metrics work without reference signals, allowing non-intrusive, in-service measurements. A simple and easy-to-learn user interface displays the metrics and saves them in popular file formats like CSV. In this paper, proposed method was able to various and corrective measurement for the multimedia service video quality. As that it was able to application to set up service guide line and the methode of measurement and system for the set up standardization of the high quality video service.

Implementation of PACS using PDA System on Medical Images (PDA기반 의료영상의 전송시스템 구현)

  • Ji, Yeon-Sang;Dong, Kyung-Rae;Kim, Chang-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.247-253
    • /
    • 2009
  • PACS(Picture archiving communication system) is a system that enables medical images such as X -ray, CT, MRI, PET to be stored electronically viewed on computer screens so that doctors and other authorized people can access search the information as needed. But if they are not in hospital area for example on holiday or at night, that are not able to access the PACS system instantly. We have to solve this problem for more efficient patient care. So we try to suggest a method that use the PDA system that wireless LAN and CDMA cellular phone are equipped. This system may help to access easier to PACS system regardless of the location and can also attribute the development of telemedicne.

New Watermarking Technique Using Data Matrix and Encryption Keys

  • Kim, Il-Hwan;Kwon, Chang-Hee;Lee, Wang-Heon
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.646-651
    • /
    • 2012
  • Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.

High Efficient Entropy Coding For Edge Image Compression

  • Han, Jong-Woo;Kim, Do-Hyun;Kim, Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we analyse the characteristics of the edge image and propose a new entropy coding optimized to the compression of the edge image. The pixel values of the edge image have the Gaussian distribution around '0', and most of the pixel values are '0'. By using this analysis, the Zero Block technique is utilized in spatial domain. And the Intra Prediction Mode of the edge image is similar to the mode of the surrounding blocks or likely to be the Planar Mode or the Horizontal Mode. In this paper, we make use of the MPM technique that produces the Intra Prediction Mode with high probability modes. By utilizing the above properties, we design a new entropy coding method that is suitable for edge image and perform the compression. In case the existing compression techniques are applied to edge image, compression ratio is low and the algorithm is complicated as more than necessity and the running time is very long, because those techniques are based on the natural images. However, the compression ratio and the running time of the proposed technique is high and very short, respectively, because the proposed algorithm is optimized to the compression of the edge image. Experimental results indicate that the proposed algorithm provides better visual and PSNR performance up to 11 times than the JPEG.

A Study on the Design of DCT Module using Distributed Arithmetic Method

  • Yang Dong Hyun;Ku Dae Sung;Kim Phil Jung;Yon Jung Hyun;Kim Sang Duk;Hwang Jung Yeun;Jeong Rae Sung;Kim Jong Bin
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.636-639
    • /
    • 2004
  • In present, there are many methods such as DCT, Wavelet Transform, or Quantization -to the image compression field, but the basic image compression method have based on DCT. The representative thing of the efficient techniques for information compression is DCT method. It is more superior than other information conversion method. It is widely applied in digital signal processing field and MPEG and JPEG which are selected as basis algorithm for an image compression by the international standardization group. It is general that DCT is consisted of using multiplier with main arithmetic blocks having many arithmetic amounts. But, the use of multiplier requires many areas when hardware is embodied, and there is fault that the processing speed is low. In this paper, we designed the hardware module that could run high-speed operation using row-column separation calculation method and Chen algorithm by distributed arithmetic method using ROM table instead of multiplier for design DCT module of high speed.

  • PDF

Robust Person Identification Using Optimal Reliability in Audio-Visual Information Fusion

  • Tariquzzaman, Md.;Kim, Jin-Young;Na, Seung-You;Choi, Seung-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.3E
    • /
    • pp.109-117
    • /
    • 2009
  • Identity recognition in real environment with a reliable mode is a key issue in human computer interaction (HCI). In this paper, we present a robust person identification system considering score-based optimal reliability measure of audio-visual modalities. We propose an extension of the modified reliability function by introducing optimizing parameters for both of audio and visual modalities. For degradation of visual signals, we have applied JPEG compression to test images. In addition, for creating mismatch in between enrollment and test session, acoustic Babble noises and artificial illumination have been added to test audio and visual signals, respectively. Local PCA has been used on both modalities to reduce the dimension of feature vector. We have applied a swarm intelligence algorithm, i.e., particle swarm optimization for optimizing the modified convection function's optimizing parameters. The overall person identification experiments are performed using VidTimit DB. Experimental results show that our proposed optimal reliability measures have effectively enhanced the identification accuracy of 7.73% and 8.18% at different illumination direction to visual signal and consequent Babble noises to audio signal, respectively, in comparison with the best classifier system in the fusion system and maintained the modality reliability statistics in terms of its performance; it thus verified the consistency of the proposed extension.

Implementation of Image Transmission Server System using Embedded Linux (임베디드 리눅스 기반의 영상전송서버 시스템 구현)

  • Jung, Yeon-Sung;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.388-390
    • /
    • 2004
  • In this paper, we performed the implementation of image transmission server system using embedded system that is for the specified object and easy to install at any places and move to wherever. Since the embedded system has lower capability than PC, we have to reduce the quantity of calculation and transmission. The image compression like JPEG, needs that the server calculates for making compressed image, makes the server carry the load. So we compresses the image at the server and transmit the codes to the clients connected, then the received codes from server are decoded and displayed at the clients. In this process to make the image compression and transmission effectively, we decrease the procedure as simple as possible to transmit the data in almost real-time. We used the Redhat linux 9.0 OS at the host PC and the target board based on embedded linux. The image sequences are obtained from the camera attached to the FPGA board with ALTERA chip. For effectiveness and avoiding some constraints, we made the device driver. Generally the image transmission server is PC, but using the embedded system as a server makes the server portable and cheaper than the system based on PC.

  • PDF

A Digital Watermarking Method using the Lifting Based Wavelet Transform (Lifting 기반 웨이블릿 변환을 이용한 디지털 워터마킹)

  • Seo, Yong-Seok;Park, Ha-Joong;Huh, Young;Jung, Ho-Youl;Chung, Hyun-Yeol
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.515-518
    • /
    • 2000
  • 디지털 워터마킹(Digital Watermarking)은 디지털 미디어 창작물에 대해 불법적인 사용과 인위적인 조작으로부터 소유권과 저작권을 보호하기 위하여 입증 가능한 정보(워터마크)를 사람이 인지하지 못하도록 삽입하는 기술이다. 본 논문에서는 JPEG 2000에서 지원하는 Daubechies 9/7 필터를 이용한 lifting 기반의 DWT(Discrete Wavelet Transform) 중간에 임의의 파라메터를 추가한 lifting 단계를 구성하여 이 부분에 워터마크를 삽입한 후, 다양한 신호처리 왜곡을 가하여 제안한 방법의 성능을 평가하였다. 실험은 8-bit 512×512크기의 영상을 사용하였으며, 무작위로 발생시킨 1과-1을 워터마크 신호로 하여 DWT 시 추가한 lifting 단계에서의 임의의 파라메터 값과 워터마크를 삽입할 각 웨이블릿 변환의 해상도 레벨을 조절해 가면서 선택한 웨이블릿 계수값에 무작위로 발생시킨 워터마크 신호를 삽입하였다. 실험 결과 영상의 일반적인 변형(압축, 필터링 등)에 대해서 제안한 방법의 워터마킹 기법의 성능이 전반적으로 강인함을 확인하였다.

  • PDF

Development of Terra MODIS data pre-processing system on WWW

  • Takeuchi, W.;Nemoto, T.;Baruah, P.J.;Ochi, S.;Yasuoka, Y.
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.569-572
    • /
    • 2002
  • Terra MODIS is one of the few space-borne sensors currently capable of acquiring radiometric data over the range of view angles. Institute of Industrial Science, University of Tokyo, has been receiving Terra MODIS data at Tokyo since May 2001 and Asian Institute of Technology at Bangkok since May 2001. They can cover whole East Asia and is expected to monitor environmental changes regularly such as deforestation, forest fires, floods and typhoon. Over eight hundred scenes have been archived in the storage system and they occupy 2 TB of disk space so far. In this study, MODIS data processing system on WWW is developed including following functions: spectral subset (250m, 500m, 1000m channels), radiometric correction to radiance, spatial subset of geocoded data as a rectangular area with latitude-longitude grid system in HDF format, generation of a quick look file in JPEG format. Users will be notified just after all the process have finished via e-mail. Using this system enables us to process MODIS data on WWW with a few input parameters and download the processed data by FTP access. An easy to use interface is expected to promote the use of MODIS data. This system is available via the Internet on the following URL from September 1 2002, "http : //webmodis.iis.u-tokyo.ac.jp/".

  • PDF

Coefficients-Contorlled Watermarking Scheme using Fuzzy Inference (퍼지추론을 이용한 계수조절 워터마킹 기법)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1748-1754
    • /
    • 2004
  • In this paper, We propose a image watermarking method which combine frequence-domain with fuzzy inference. In our method, the original image is transformed and decomposed using DWT. The watermark is added to high-frequency coefficients, which analyzed optimally so as to genarate the fuzzfied data. In order to evaluate the robustness, the embeded watermark is detected in case of attacking by JPEG compression and cropping. Experimental results showed that proposed scheme is superior to the typical method with PSNR and similarity under the same conditions.