• 제목/요약/키워드: Key Image

검색결과 1,432건 처리시간 0.025초

다중 스케일 영상 공간에서 특징점 클러스터를 이용한 영상스케일 예측 (Image Scale Prediction Using Key-point Clusters on Multi-scale Image Space)

  • 류권열
    • 융합신호처리학회논문지
    • /
    • 제19권1호
    • /
    • pp.1-6
    • /
    • 2018
  • 본 논문에서는 다중 스케일 영상 공간에서 특징점 검출을 위해 수행되는 반복적인 과정을 제거하는 방법을 제안한다. 제안한 방법은 원 영상으로부터 특징점을 검출하고, 클러스터 필터를 이용하여 유효한 특징점을 선별하고, 특징점 클러스터를 생성한다. 그리고 특징점 클러스터의 방향 각도를 이용하여 참조 객체를 선별하고, 분산 거리 비율을 이용하여 원 영상의 스케일을 예측한다. 예측한 스케일에 따라 참조 영상의 스케일을 변환하고, 변환된 참조 영상에 대해 특징점 검출을 적용한다. 실험 결과 제안한 방법은 다중 스케일 영상을 사용하는 SIFT 방법 및 Scaled ORB 방법에 비해 특징점 검출 시간이 각각 75% 및 71% 향상됨을 알 수 있었다.

실수값 복원키를 이용한 광 영상 은닉 기술 (Optical Image Hiding Technique using Real-Valued Decoding Key)

  • 조규보;서동환;최은창
    • 대한임베디드공학회논문지
    • /
    • 제6권3호
    • /
    • pp.168-173
    • /
    • 2011
  • In this paper, an optical image hiding technique using real-valued decoding key is proposed. In the embedding process, a each zero-padded original image placed in a quadrants on an input plane is multiplied by a statistically independent random phase pattern and is Fourier transformed. An encoded image is obtained by taking the real-valued data from the Fourier transformed image. And then a phase-encoded pattern, used as a hidden image and a decoding key, is generated by the use of multiple phase wrapping from the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at two quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed technique.

Joint-transform Correlator Multiple-image Encryption System Based on Quick-response Code Key

  • Chen, Qi;Shen, Xueju;Cheng, Yue;Huang, Fuyu;Lin, Chao;Liu, HeXiong
    • Current Optics and Photonics
    • /
    • 제3권4호
    • /
    • pp.320-328
    • /
    • 2019
  • A method for joint-transform correlator (JTC) multiple-image encryption based on a quick-response (QR) code key is proposed. The QR codes converted from different texts are used as key masks to encrypt and decrypt multiple images. Not only can Chinese text and English text be used as key text, but also symbols can be used. With this method, users have no need to transmit the whole key mask; they only need to transmit the text that is used to generate the key. The correlation coefficient is introduced to evaluate the decryption performance of our proposed cryptosystem, and we explore the sensitivity of the key mask and the capability for multiple-image encryption. Robustness analysis is also conducted in this paper. Computer simulations and experimental results verify the correctness of this method.

Side Information Extrapolation Using Motion-aligned Auto Regressive Model for Compressed Sensing based Wyner-Ziv Codec

  • Li, Ran;Gan, Zongliang;Cui, Ziguan;Wu, Minghu;Zhu, Xiuchang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권2호
    • /
    • pp.366-385
    • /
    • 2013
  • In this paper, we propose a compressed sensing (CS) based Wyner-Ziv (WZ) codec using motion-aligned auto regressive model (MAAR) based side information (SI) extrapolation to improve the compression performance of low-delay distributed video coding (DVC). In the CS based WZ codec, the WZ frame is divided into small blocks and CS measurements of each block are acquired at the encoder, and a specific CS reconstruction algorithm is proposed to correct errors in the SI using CS measurements at the decoder. In order to generate high quality SI, a MAAR model is introduced to improve the inaccurate motion field in auto regressive (AR) model, and the Tikhonov regularization on MAAR coefficients and overlapped block based interpolation are performed to reduce block effects and errors from over-fitting. Simulation experiments show that our proposed CS based WZ codec associated with MAAR based SI generation achieves better results compared to other SI extrapolation methods.

SA 알고리듬과 광 상관 시스템을 이용한 영상 암호화 및 복호화 (Image Encryption and Decryption Using SA Algorithm and Optical Correlator System)

  • 김철수;조창섭
    • 한국멀티미디어학회논문지
    • /
    • 제7권3호
    • /
    • pp.349-356
    • /
    • 2004
  • 본 논문에서는 SA(simulated annealing) 알고리듬에 기반한 4-f 광 상관 시스템을 이용하여 실제적인 영상 보안 시스템을 제안하였다. 반복적인 SA알고리듬을 이용하여 이진 위상 성분을 갖는 암호화된 영상과 키 영상을 얻고, 4-f 광 상관 시스템을 이용하여 암호화된 영상과 키 영상과의 상관을 통해 복호화된 영상이 구해진다. 제안된 방법에서는 암호화된 영상 및 키 영상이 이진 위상 성분으로 구성되므로 광 보안 시스템을 구현하기 쉬운 장점이 있다. 그리고 만약 암호화된 영상을 암호화 시스템내에서 고정시키고, 키 영상 정보만을 달리 하면 서로 다른 영상을 복호화할 수 있으므로 차별화된 인증시스템에 응용할 수 있는 장점도 있다. 컴퓨터 시뮬레이션 결과는 두 영상(암호화 및 키 영상)의 이진 위상 성분에도 불구하고, 복호화영상이 생성됨을 보여준다.

  • PDF

Assessment of speckle image through particle size and image sharpness

  • Qian, Boxing;Liang, Jin;Gong, Chunyuan
    • Smart Structures and Systems
    • /
    • 제24권5호
    • /
    • pp.659-668
    • /
    • 2019
  • In digital image correlation, speckle image is closely related to the measurement accuracy. A practical global evaluation criterion for speckle image is presented. Firstly, based on the essential factors of the texture image, both the average particle size and image sharpness are used for the assessment of speckle image. The former is calculated by a simplified auto-covariance function and Gaussian fitting, and the latter by focusing function. Secondly, the computation of the average particle size and image sharpness is verified by numerical simulation. The influence of these two evaluation parameters on mean deviation and standard deviation is discussed. Then, a physical model from speckle projection to image acquisition is established. The two evaluation parameters can be mapped to the physical devices, which demonstrate that the proposed evaluation method is reasonable. Finally, the engineering application of the evaluation method is pointed out.

랜덤 위상 마스크와 2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 영상 이중 암호화 (Double Encryption of Binary Image using a Random Phase Mask and Two-step Phase-shifting Digital Holography)

  • 김철수
    • 한국멀티미디어학회논문지
    • /
    • 제19권6호
    • /
    • pp.1043-1051
    • /
    • 2016
  • In this paper, double encryption technique of binary image using random phase mask and 2-step phase-shifting digital holography is proposed. After phase modulating of binary image, firstly, random phase mask to be used as key image is generated through the XOR operation with the binary phase image. And the first encrypted image is encrypted again through the fresnel transform and 2-step phase-shifting digital holography. In the decryption, simple arithmetic operation and inverse Fresnel transform are used to get the first decryption image, and second decryption image is generated through XOR operation between first decryption image and key image. Finally, the original binary image is recovered through phase modulation.

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.

영상의 양자화 계수를 이용한 DCT 기반 워터마킹 기법 (Improvement of DCT-based Watermarking Scheme using Quantized Coefficients of Image)

  • 임용순;강은영;박재표
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.17-22
    • /
    • 2014
  • 모바일 정지영상 동영상 등의 정보에 디지털 신호를 삽입하여 저작권을 주장하는 방안으로 워터마킹 알고리즘을 들 수 있다. 본 논문에서는 영상의 양자화 계수를 이용한 이산 코사인 변환(DCT)을 기반으로 하는 워터마킹 알고리즘 방법을 제안하였다. 워터마크 삽입 기법은 디지털 원영상의 DCT와 양자화를 통하여 계수들(Quantized Coefficient)를 얻게 되었고, 양자화 계수들은 원하는 위치(Key)에 따라 DCT를 기반으로 한 워터마크(DCT-based watermark)를 삽입하게 되었다. 워터마크가 삽입된 부호화 정보는 역 양자화와 역 DCT를 통하여 워터마크 된 영상을 얻게 된다. 워터마크 추출 기법은 워터마크된 영상과 위치(Key)만을 사용하며, 워터마크 된 영상을 DCT와 양자화를 통하여 원하는 위치(Key)에서 계수를 분리하여 역 DCT하여 원 워터마크를 얻을 수 있었다. 모의실험 결과, 워터마크된 영상과 추출된 워터마크에서 영상의 화질(PSNR)과 워터마크의 정규화 상관도 (NC) 에서 만족할 만한 결과를 확인하였다.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.