• Title/Summary/Keyword: Multimedia Security

Search Result 737, Processing Time 0.024 seconds

A Cluster-Based Channel Assignment Algorithm for IEEE 802.11b/g Wireless Mesh Networks (IEEE 802.11b/g 무선 메쉬 네트워크를 위한 클러스터 기반 채널 할당 알고리즘)

  • Cha, Si-Ho;Ryu, Min-Woo;Cho, Kuk-Hyun;Jo, Min-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.87-93
    • /
    • 2009
  • Wireless mesh networks (WMNs) are emerging technologies that provide ubiquitous environments and wireless broadband access. The aggregate capacity of WMNs can be improved by minimizing the effect of channel interference. The IEEE 802.11b/g standard which is mainly used for the network interface technology in WMNs provides 3 multiple channels. We must consider the channel scanning delay and the channel dependency problem to effectively assign channels in like these multi-channel WMNs. This paper proposes a cluster-based channel assignment (CB-CA) algorithm for multi-channel WMNs to solve such problems. The CB-CA does not perform the channel scanning and the channel switching through assigning co-channel to the inter-cluster head (CH) links. In the CB-CA, the communication between the CH and cluster member (CM) nodes uses a channel has no effect on channels being used by the inter-CH links. Therefore, the CB-CA can minimize the interference within multi-channel environments. Our simulation results show that CB-CA can improve the performance of WMNs.

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

HSE System Safety Management Using Wearable Based on Accident Scenario of High Place Work (고소작업 사고 시나리오 기반 웨어러블 응용 HSE 시스템 안전관리 방안)

  • Cho, Yun-Jeong;Im, Ki-Chang;Lim, Dong-Sun;Park, Jeong-Ho;Kim, Jong-Myon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.417-425
    • /
    • 2018
  • This paper proposes a safety management method that extracts ETA (event tree analysis) based scenario and combines ICT technology to reduce serious disasters occurring workplace for shipbuilding and offshore plant. The statistics of Safety and Health Agency and (previous)Ministry of Public Safety and Security show that the most frequent accident among the serious disasters related to shipbuilding and offshore plant is falling. The main cause of accidents is absence of a safety belt and safety belt ring. To solve these problems, we create ETA based scenarios to derive results based on safety considerations. Based on these results, we propose a solution by applying ICT technology for accident prevention. Deriving ETA based scenarios and ICT technology, the proposed solutions include a system for detecting the wearing of safety belts and safety helmets, a system for detecting whether or not the safety belts are connected, and a hook system for measuring safety distances. These safety related systems can reduce the probability of death of workers. By preventing accidents using the proposed method, we can reduce serious disasters in shipbuilding and offshore plant and establish systematic safety management.

Analysis on Subjective Image Quality Assessments for 4K-UHD Video Viewing Environments (4K-UHD 비디오 시청환경 특성분석을 위한 주관적 화질평가 분석)

  • Park, In-Kyung;Ha, Kwang-Sung;Kim, Mun-Churl;Cho, Suk-Hee;Cho, Jin-Soo
    • Journal of Broadcast Engineering
    • /
    • v.15 no.4
    • /
    • pp.563-581
    • /
    • 2010
  • In this paper, we perform subjective visual quality assessments on UHD video for UHD TV services and analyze the assessment results. Demands for video services have been increased with availabilities of DTV, Internet and personal media equipments. With this trend, the demands for high definition video have also been increasing. Currently, 2K-HD ($1920{\times}1080$) video have been widely consumed over DTV, DVD, digital camcoders, security cameras and other multimedia terminals in various types, and recently digital cinema contents of 4K-UHD($3840{\times}2160$) have been popularly produced and the cameras, beam projects, display panels that support for 4K-UHD video start to come out into multimedia markets. Also it is expected that 4K-UHD service will appear soon in broadcasting and telecommunications environments. Therefore, in this paper, subjective assessments of visual quality on resolutions, color formats, frame rates and compression rates have been carried to provide basis information for standardization of signal specification of UHD video and viewing environments for future UHDTV. As the analysis on the assessments, UHD video exhibits better subjective visual quality than HD by the evaluators. Also, the 4K-UHD test sequences in YUV444 shows better subjective visual quality than the 4K-UHD test sequences in YUV422 and YUV420, but there is little perceptual difference on 4K-UHD test sequences between YUV422 and YUV420 formats. For the comparison between different frame rates, 4K-UHD test sequences of 60fps gives better subjective visual quality than those of 30fps. For bit-depth comparison, HD test sequences in 10-bit depth were little differentiated from those in 8-bit depth in subject visual quality assessment. Lastly, the larger the PSNR values of the reconstructed 4K-UHD test sequences are, the higher the subjective visual quality is. Against the viewing distances, the differences among encoded 4K-UHD test sequences were less distinguished in longer distances from the display.

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).