• Title/Summary/Keyword: Quad-tree decomposition

Search Result 10, Processing Time 0.023 seconds

New Path Planning Algorithm based on the Visibility Checking using a Quad-tree on a Quantized Space, and its improvements (격자화된 공간상에서 4중-나무 구조를 이용한 가시성 검사를 바탕으로 한 새로운 경로 계획 알고리즘과 그 개선 방안들)

  • Kim, Jung-Tae;Kim, Dai-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.1
    • /
    • pp.48-52
    • /
    • 2010
  • In this paper, we introduce a new path planning algorithm which combines the merits of a visibility graph algorithm and an adaptive cell decomposition. We quantize a given map with empty cells, blocked cells, and mixed cells, then find the optimal path on the quantized map using a visibility graph algorithm. For reducing the number of the quantized cells we use the quad-tree technique which is used in an adaptive cell decomposition, and for improving the performance of the visibility checking in making a visibility graph we propose a new visibility checking method which uses the property of the quad-tree instead of the well-known rotational sweep-line algorithm. For the more efficient visibility checking, we propose two additional improvements for our suggested method. Both of them are used for reducing the visited cells in the quad-tree. The experiments for a performance comparison of our algorithm with other well-known algorithms show that our proposed method is superior to others.

Color Image Encryption Technique Using Quad-tree Decomposition Method (쿼드트리 분할 기술을 이용한 컬러 영상 암호화 기술)

  • Choi, Hyunjun
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.625-630
    • /
    • 2016
  • Recently, various types of image contents are being produced, and interest in copyright protection technology is increasing. In this paper, we propose an image encryption technology for color images. This technique divides the image into RGB color components and then performs quad-tree decomposition based on the edge of image. After the quad-tree partitioning, encryption is performed on the selected blocks. Encryption is performed on color components to measure encryption efficiency, and encryption efficiency is measured even after reconstitution into a color image. The encryption efficiency uses a visual measurement method and an objective image quality evaluation method. The PSNR values were measured as 7~10 dB for color difference components and 16~19 dB for color images. The proposed image encryption technology will be used to protect copyright of various digital image contents in the future.

A study on N-dimensional quad-tree decomposition

  • Yi, Cheon-Hee;Yi, Jae-Young
    • Journal of the Semiconductor & Display Technology
    • /
    • v.8 no.1
    • /
    • pp.43-48
    • /
    • 2009
  • We have examined the problem of the number of quad-tree blocks that an n-dimensional rectangle will be decomposed into on the average. the contribution of this paper are both practical and theoretical. In this paper, we develops the overlapping multi-scale models and the region quad-tree models which is useful in computer graphics animation, image processing, pattern recognition and also for modeling three dimensional objects. These models, which represent something of a conceptual departure from other models developed for multi-scale framework were developed with the specific interest of producing smooth estimates.

  • PDF

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

An Efficient Contact Detection Algorithm for Contact Problems with the Boundary Element Method (경계요소법을 이용한 접촉해석의 효율적인 접촉면 검출기법)

  • Kim, Moon-Kyum;Yun, Ik-Jung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.22 no.5
    • /
    • pp.439-444
    • /
    • 2009
  • This paper presents an efficient contact detection algorithm for the plane elastostatic contact problem of the boundary element method(BEM). The data structures of the boundary element method are dissected to develop an efficient contact detection algorithm. This algorithm is consists of three parts as global searching, local searching and contact relation setting to reflect the corner node problem. Contact master and slave type elements are used in global searching step and quad-tree is selected as the spatial decomposition method in local searching step. To set up contact relation equations, global contact searching is conducted at node level and local searching is performed at element level. To verify the efficiency of the proposed contact detection algorithm of BEM, numerical example is presented.

A Semi-blind Digital Watermarking Scheme Based on the Triplet of Significant Wavelet Coefficients

  • Chu, Hyung-Suk;Batgerel, Ariunzaya;An, Chong-Koo
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.4
    • /
    • pp.552-558
    • /
    • 2009
  • We proposed a semi-blind digital image watermarking technique for copyright protection. The proposed algorithm embedded a binary sequence watermark into significant wavelet coefficients by using a quantization method. The main idea of the quantization method was to quantize a middle coefficient of the triplet of a significant wavelet coefficient according to the watermark's value. Unlike an existing algorithm, which used a random location table to find a coefficient in which the watermark bit will be embedded: the proposed algorithm used quad-tree decomposition to find a significant wavelet coefficient for embedding. For watermark detection, an original host image was not required. Thanks to the usage of significant wavelet coefficients, the proposed algorithm improved the correlation value, up to 0.43, in comparison with the existing algorithm.

실시간 사분트리 방식에 기초한 이동로봇의 경로계획

  • 강승준;송재복
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.17-17
    • /
    • 2004
  • 자율 이동로봇은 현재 각광을 받고 있는 서비스로봇의 연구와 더불어 활발히 연구되고 있다. 그 중 경로계획 부분에 대한 연구는 Roadmap Method, Cell Decomposition, Potential Field Method로 크게 구분하여 연구되고 있다. 그러나 경로계획 기법에 있어서 기존의 정형화된 방법 이외에 다른 방법들이 제시 되지 않고 있다. 기존 경로계측의 문제점들은 다음과 같다. 국부최소(local minimum)를 회피하지 못하거나, 많은 계산량으로 인해 넓은 범위에 적용시킬 수 없다는 문제점, 오프라인으로 경로의 최적성에만 치중하여 실시간으로 적용하기가 쉽지 않으며, 돌발적인 상황에 대처하기 어렵다는 문제점 등을 가지고 있다.(중략)

  • PDF

Two-dimensional Binary Search Tree for Packet Classification at Internet Routers (인터넷 라우터에서의 패킷 분류를 위한 2차원 이진 검색 트리)

  • Lee, Goeun;Lim, Hyesook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.6
    • /
    • pp.21-31
    • /
    • 2015
  • The Internet users want to get real-time services for various multi-media applications. Network traffic rate has been rapidly increased, and data amounts that the Internet has to carry have been exponentially increased. A packet is the basic unit in transferring data at the Internet, and packet classification is one of the most challenging functionalities that routers should perform at wire-speed. Among various known packet classification algorithms, area-based quad-trie (AQT) algorithm is one of the efficient algorithms which can lookup five header fields simultaneously. As a representative space decomposition algorithm, the AQT requires a small amount of memory in storing classification rules, but it does not provide high-speed classification performance. In this paper, we propose a new packet classification algorithm by applying a binary search for the codewords of the AQT to overcome the issue of the AQT. Throughout simulation, it is shown that the proposed algorithm provides a better performance than the AQT in the number of rule comparisons with each input packet.

A Color Image Coding by Estimating Spectral Correlation Based on Wavelet Transform (웨이블렛 변환 기반 스펙트럴 상관성 추정에 의한 칼라 영상 부호화)

  • Kwak, No-Yoon;Jeong, Dae-Gwon;Hwang, Byong-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.1
    • /
    • pp.49-58
    • /
    • 2000
  • This paper presents a new color Image coding method which estimates color component Images from luminance image using spectral correlation m wavelet transformed domain More specifically, the wavelet transform is performed to the luminance image(Y), and then, for an efficient quad-tree division to encompass the varying block size, a cost function IS defined using high frequency coefficients generated by wavelet decomposition Next, a scale factor and an offset factor for each the block to minimize the estimation error between luminance image(Y) and R, B Images, are iteratively calculated With respect to the varying block size With associated cost function.

  • PDF

3D Point Clouds Encryption Method and Analysis of Encryption Ratio in Holographic Reconstruction Image (3D 공간정보 암호화 기법과 홀로그래픽 복원영상의 암호화 효율 분석)

  • Choi, Hyun-Jun;Seo, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1703-1710
    • /
    • 2017
  • This paper propose a 3D point clouds (depth) security technique for digital holographic display service. Image contents encryption is a method to provide only authorized right owners with the original image information by encrypting the entire image or a part of the image. The proposed method detected an edge from a depth and performed quad tree decomposition, and then performed encryption. And encrypts the most significant block among the divided blocks. The encryption effect was evaluated numerically and visually. The experimental results showed that encrypting only 0.43% of the entire data was enough to hide the constants of the original depth. By analyzing the encryption amount and the visual characteristics, we verified a relationship between the threshold for detecting an edge-map. As the threshold for detecting an edge increased, the encryption ratio decreased with respect to the encryption amount.