• Title/Summary/Keyword: Noise Attack

Search Result 136, Processing Time 0.026 seconds

A Study on the design of Video Watermarking System for TV Advertisement Monitoring (TV광고 모니터링을 위한 비디오 워터마킹 시스템의 설계에 관한 연구)

  • Shin, Dong-Hwan;Kim, Sung-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.1
    • /
    • pp.206-213
    • /
    • 2007
  • In this paper, The monitoring system for TV advertisement is implemented using video watermark. The functions of the advertisement monitoring system are monitoring the time, length, and index of the on-air advertisement, saving the log data, and reporting the monitoring result. The performance of the video watermark used in this paper is tested for TV advertisement monitoring. This test includes LAB test and field test. LAB test is done in laboratory environment and field test in actually broadcasting environment. LAB test includes PSNR, distortion measure in image, and the watermark detection rate in the various attack environment such as AD/DA(analog to digital and digital to analog) conversion, noise addition, and MPEG compression. The result of LAB test is good for the TV advertisement monitoring. KOBACO and SBS are participated in the field test. The watermark detection rate is 100% in both the real-time processing and the saved the processing. The average deviation of the watermark detection time is 0.2 second, which is good because the permissible average error is 0.5 second.

Experimental study on identification of stiffness change in a concrete frame experiencing damage and retrofit

  • Zhou, X.T.;Ko, J.M.;Ni, Y.Q.
    • Structural Engineering and Mechanics
    • /
    • v.25 no.1
    • /
    • pp.39-52
    • /
    • 2007
  • This paper describes an experimental study on structural health monitoring of a 1:3-scaled one-story concrete frame subjected to seismic damage and retrofit. The structure is tested on a shaking table by exerting successively enhanced earthquake excitations until severe damage, and then retrofitted using fiber-reinforced polymers (FRP). The modal properties of the tested structure at trifling, moderate, severe damage and strengthening stages are measured by subjecting it to a small-amplitude white-noise excitation after each earthquake attack. Making use of the measured global modal frequencies and a validated finite element model of the tested structure, a neural network method is developed to quantitatively identify the stiffness reduction due to damage and the stiffness enhancement due to strengthening. The identification results are compared with 'true' damage severities that are defined and determined based on visual inspection and local impact testing. It is shown that by the use of FRP retrofit, the stiffness of the severely damaged structure can be recovered to the level as in the trifling damage stage.

Improved Visual Cryptography Using Cover Images (커버영상을 이용한 개선된 시각암호)

  • Jang, Si-Hwan;Choi, Yong Soo;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.531-538
    • /
    • 2012
  • Visual cryptography is a scheme that recovers secret image through human vision by overlapping distributed share images without cryptographic operations. Distribution methods are still being developed for improving quality of shared images keeping size of images invariant and enhancing robustness against resize of images. Since visual cryptography only uses shared images, this fact is exploited to attack. From this fact, a scheme safe for sharing distributed images is needed. In this paper, a new visual cryptographic scheme using cover image is proposed. This scheme reduces the chance of detection against steganalysis and increases security. In addition, this paper shows that the proposed scheme can completely decrypt secret image without creating noise.

COMPARISON OF CFD SIMULATION AND EXPERIMENT OF CAVITATING FLOW PAST AXISYMMETRIC CYLINDER (전산해석과 실험의 비교검증을 통한 원통형 수중운동체 주위의 캐비테이션 유동현상 연구)

  • Park, H.M.;Park, W.G.;Jung, C.M.
    • Journal of computational fluids engineering
    • /
    • v.17 no.1
    • /
    • pp.78-85
    • /
    • 2012
  • Cavitation causes a great deal of noise, damage to components, vibrations, and a loss of efficiency in devices, such as propellers, pump impellers, nozzles, injectors, torpedoes, etc., Thus, cavitating flow simulation is of practical importance for many engineering systems. In this study, a two-phase flow solver based on the homogeneous mixture model has been developed. The flow characteristics around an axisymmetric cylinder were calculated and then validated by comparing with the experimental results in the cavitation water tunnel at the Korea Ocean Research & Development Institute. The results show that this solver is highly suitable for simulating the cavitating flows. After the code validation, the cavity length with changes of water depth, angle of attack and velocity were obtained.. Cavitation inception was also calculated for various operational conditions.

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.42-54
    • /
    • 2016
  • A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.

High-resolution MR Imaging of Carotid Atherosclerotic Plaques (경동맥 경화판의 고해상도 자기공명영상)

  • Shin, Won-Seon;Kim, Sung-Mok;Choe, Yeon-Hyeon
    • Investigative Magnetic Resonance Imaging
    • /
    • v.16 no.2
    • /
    • pp.97-102
    • /
    • 2012
  • High-resolution carotid MRI allows visualization of carotid atherosclerotic plaque characteristics. MRI serves as a noninvasive option for the detection of active plaque inflammation and intraplaque hemorrhage. Significant gains in signal-tonoise ratio and contrast-to-noise ratio can be obtained for carotid atheroma imaging at 3T compared with 1.5T. Normalized wall index or wall area on MRI has shown its efficacy in monitoring the response after medical therapy. $T(2)^*$ quantification in carotid plaques before and after the administration of ultrasmall superparamagnetic iron oxide particles shows difference in response to treatment according to drug doses. In conclusion, high-resolution MRI is useful in the diagnosis and monitoring of carotid atherosclerotic plaques prone to transient ischemic attack and stroke.

3D Face Image Watermarking using Wavelet Transform (웨이브렛 변환을 이용한 3차원 얼굴영상 워터마킹)

  • 이정환;박세훈;이시웅
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.691-694
    • /
    • 2003
  • This paper proposes an 3D face image watermarking method based on discrete wavelet transform(DWT). First, 3D face image are transformed by DWT and inserted gaussian watermark into frequency domain. To increase the robustness and perceptual invisibility of watermark, the proposed algorithm is combined with the characteristics of 3D face image and human visual system. The proposed method is invisible and blind watermarking which the original image is not required. Simulation results show that the proposed method is robust to the general attack such as JPEG compression, enhancement, noise, cropping, and filtering etc.

  • PDF

GPS Jamming Techniques and Anti-Jamming GPS Technologies (GPS 재밍 기법과 항재밍 GPS 기술)

  • Jo, In-hwa;Kim, Hyeong-suk;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.573-575
    • /
    • 2015
  • Positioning system using satellite GPS is used at positioning, navigation, acquisition time information and other various field and taking an important part precision guided weapon such as missile. But commercial code(C/A code) do not have ECCM. Therefore commercial code is vulnerable to various jamming techniques and noise jamming from near station can attack even the encrypted military code(P code) GPS. In this paper, GPS jamming techniques, North Korean GPS jamming cases and anti-jamming GP S technologies are surveyed and described.

  • PDF

CAPTCHA Analysis using Convolution Filtering (Convolution Filtering을 이용한 캡차 분석)

  • Kim, Keun-Young;Shin, Dong-Oh;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1129-1138
    • /
    • 2014
  • CAPTCHA is a technique which distinguishes human and machine using what human can judge easily but machine can't. Though Text-based-CAPTCHA has been widely used and can be implemented easily, it is less security than other CAPTCHAs such as image-based, or audio-based CAPTCHAs. To enhance the security of text-based CAPTCHA, many techniques have been developed. One of them is making CAPTCHA recognized hard using complex background or noise. In this paper, we introduce how to apply convolution filtering effectively to attack CAPTCHA and actually analyze Naver's CAPTCHA which has been used for joining a cafe with this method.

Digital Image Watermarking based on Wavelet Transform and Spatial (웨이브렛 변환 및 공간지각특성을 이용한 디지털영상 워터마킹)

  • Bae, Mi-Young;Lee, Jeong-Hwan;Kim, Yun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1165-1168
    • /
    • 2005
  • This paper proposes an digital image watermarking method based on discrete wavelet transform(DWT) and spatial perceptual properties of human visula system. first, an digital image is transformed by DWT and inserted gaussian watermark into the frequency domain. To increase the robustness and perceptual invisibility of watermark, the proposed algorithm is combined with the characteristics of digital image and human visual system. The proposed method is invisible and blind watermarking which the original image is not required to detect watermarks. Simulation results show that the proposed method is robust to the general attack such as JPEG compression, enhancement, noise, cropping, and filtering etc.

  • PDF