• Title/Summary/Keyword: SEED 알고리즘

Search Result 190, Processing Time 0.031 seconds

A Method of Image Matching by 2D Alignment of Unit Block based on Comparison between Block Content (단위블록의 색공간 내용비교 기반 2차원 블록정렬을 이용한 이미지 매칭방법)

  • Jang, Chul-Jin;Cho, Hwan-Gue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.611-615
    • /
    • 2009
  • Due to the popular use of digital camera, a great number of photos are taken at every usage of camera. It is essential to reveal relationship between photos to manage digital photos efficiently. We propose a method that tessellates image into unit blocks and applies 2D alignment to extend content-based similar region from seed block pair having high similarity. Through an alignment, we can get a block region scoring best matching value on whole image. The method can distinguish whether photos are sharing the same object or background. Our result is less sensitive to transition or pause change of objects. In experiment, we show how our alignment method is applied to real photo and necessities for further research like photo clustering and massive photo management.

Algorithms of the VLSI Layout Migration Software (반도체 자동 이식 알고리즘에 관한 연구)

  • Lee, Yun-Sik;Kim, Yong-Bae;Sin, Man-Cheol;Kim, Jun-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.10
    • /
    • pp.712-720
    • /
    • 2001
  • Algorithms from the research of the layout migration were proposed in the paper. These are automatic recognition algorithm for the VLSI devices from it, graph based construction algorithm to maintain the constraints, dependencies, and design rule between the devices, and high speed compaction algorithm to reduce size of the VLSI area and reuse the design with compacted size for the new technology. Also, this paper describes that why proposed algorithms are essential for the era of the SoC (System on a Chip), design reuse, and IP DB, which are the big concerns in these days. In addition to introduce our algorithms, the benchmark showed that our performance is superior by 27 times faster than that of the commercial one, and has better efficiency by 3 times in disk usage.

  • PDF

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.

The Implementation of Integrity Verification Tool for Fingerprint Recognition Systems (지문인식시스템 무결성 검증 도구 구현)

  • 윤덕현;김기욱;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.941-946
    • /
    • 2002
  • 지문인식 시스템이 네트워크 기반에서 서버 매칭 형식으로 운영될 경우 클라이언트 매칭과는 달리 데이터의 전송과정에 많은 취약성이 존재한다. 지문인식은 휴대의 불편함이 없고, 분실이나 도난의 위험성도 없으며, 추측이 거의 불가능하므로 높은 안전성을 제공하는 장점을 가지고 있다. 그러나 지문데이터는 한 번 도난을 당하거나 네트워크 상에서 전송 도중 공격자를 통해 도청이 된다면 그 사용자는 앞으로 지문인식을 이용할 수 없다는 단점이 존재한다. 이에 대하여 전송 포맷 기술과 전송 데이터 보안의 표준화가 이루어지고 있다. 따라서 본 논문에서는 클라이언트에서 추출한 지문 특징점 데이터를 매칭을 위해 서버로 데이터를 전송할 경우 무결성의 적합성을 검증하기 위한 도구를 구현하였다. 신분위장 및 재전송 공격들의 위협으로부터 안전한 사용자 신분 확인을 보장하기 위해서 전송되는 지문 데이터의 인중, 무결성, 기밀성이 요구되며, 이를 위해 지문 데이터의 MAC(Message Authentication Code)과 암호화 기법을 이용하였다. 이때 전송 데이터의 기밀성을 위해서 Triple-DES와 SEED 암호 알고리즘을 사용하였고 무결성을 위해 MD5와 SHA-1 해쉬 함수를 사용하였다. 클라이언트에서 데이터를 전송할 때 두 가지의 지문데이터를 전송하는 실험을 통하여 결과를 비교하였다. 첫째, 변조된 지문데이터를 전송하였을 경우 데이터가 변조되었음을 알려주는 결과를 보여준다. 둘째, 변조되지 않은 지문데이터를 전송하였을 경우 이 데이터는 변조되었다는 메시지를 출력함으로써 무결성 검증 실험은 이루어진다.

  • PDF

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1005-1008
    • /
    • 2007
  • 모바일 네트워크 환경은 언제 어디서나 네트워크를 사용하는 모바일 서비스를 편리하게 사용할 수 있도록 해준다. 그러나 언제 어디서나 서비스를 제공받을 수 있다는 것은 언제 어디서든지 정보가 누출되거나 왜곡될 위험성 또한 존재하기 마련이다. 특히, 프라이버시 문제가 해결되지 않고서는 우리 일상생활과 융합되어 편리함을 제공해주는 모바일 네트워크 환경이 오히려 모바일 네트워크 감시 체제를 구축하는 심각한 역기능을 초래하게 될 것이다. 모바일 단말기들은 크기와 모양이 다양하고 컴퓨팅 연산 능력이 적은 저성능 휴대 장치들이 많기 때문에, 컴퓨팅 연산이 많이 요구되는 공개키 암호 기술을 저성능 모바일 단말기에 적용하기는 힘든 상황이다. 이에 본 논문에서는 프라이버시 문제를 해결하면서, 컴퓨팅 연산 능력이 적은 저성능 모바일 단말기에 적용할 수 있는 자바 기반의 암호 모듈 및 PKI 기반의 사용자 인증을 제안하고자 한다. 국내 표준 암호 알고리즘(SEED)과 인증서를 기반으로 세션키와 공개키를 조합함으로서 최소한의 암복호화 연산을 통해 인증 및 전자 서명을 제공하며, 이를 대표적인 모바일 단말기인 PDA 환경에서 세션키 분배 및 사용자 인증이 안전하게 이루어짐을 확인할 수 있었다.

  • PDF

Uncertainty assessment of point and regional frequency analysis using Bayesian method (베이지안기법을 이용한 지점 및 지역빈도해석의 불확실성 평가)

  • Lee, Jeonghoon;Lee, Okjeong;Kim, Sangdan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.406-406
    • /
    • 2021
  • 극한강우사상의 분석은 다양한 극치 분포로 구성된 극치이론을 통해 가능하다. 일반적으로 단일 지점의 극한사상의 분석을 위한 지점빈도해석 (Point Frequency Analysis, PFA)이 다양한 재현기간에 해당하는 강우량을 추정하는데 널리 사용되어왔다. 하지만 수문기후학적 극치기록은 시간적 그리고 공간적으로 제한적이다. 따라서 모의 불확실성을 줄이고 신뢰성 높은 결과를 도출하기 위해 서로 유사한 분포를 가질 수 있는 인근 지점의 활용하는 지역빈도해석 (Regional Frequency Analysis, RFA) 방법이 개발되어 적용되고 있다. 본 연구에서는 부산, 울산, 경남지역의 기상청 종관기상관측시스템(Automated Synoptic Observing System, ASOS) 울산, 부산, 통영, 진주, 거창, 합천, 밀양, 산청, 거제, 남해지점 일강수량을 자료를 기반으로 Metropolis-Hasting 알고리즘을 사용하여 일반극치분포(Generalized Extreme Value, GEV)의 매개변수를 추정하고 PFA 및 RFA의 불확실성을 평가하고자 한다. 이러한 연구는 공간적 구성 요소(예, 지리적 좌표, 고도)를 고려하지 못하며 추가변수 (예, 공변량)를 분석에 결합할 수 없는 등의 RFA의 한계를 극복하고, 명시적으로 불확실성을 추정하여 결과의 신뢰성을 확보 할 수 있는 계층적 베이지안 모델의 개발에 도움이 되리라 기대된다.

  • PDF

Rock Joint Trace Detection Using Image Processing Technique (영상 처리를 이용한 암석 절리 궤적의 추적)

  • 이효석;김재동;김동현
    • Tunnel and Underground Space
    • /
    • v.13 no.5
    • /
    • pp.373-388
    • /
    • 2003
  • The investigation on the rock discontinuity geometry has been usually undergone by direct measurement on the rock exposures. But this sort of field work has disadvantages, which we, for example, restriction of surveying areas and consuming excessive times and labors. To cover these kinds of disadvantages, image processing could be regarded as an altemative way, with additional advantages such as automatic and objective tools when used under adequate computerized algorithm. This study was focused on the recognition of the rock discontinuities captured in the image of rock exposure by digital camera and the production of the discontinuity map automatically. The whole process was written using macro commands builtin image analyzer, ImagePro Plus. ver 4.1(Media Cybernetic). The procedure of image processing developed in this research could be divided with three steps, which are enhancement, recognition and extraction of discontinuity traces from the digital image. Enhancement contains combining and applying several filters to remove and relieve various types of noises from the image of rock surface. For the next step, recognition of discontinuity traces was executed. It used local topographic features characterized by the differences of gray scales between discontinuity and rock. Such segments of discontinuity traces extracted from the image were reformulated using an algorithm of computer decision-making criteria and linked to form complete discontinuity traces. To verify the image processing algorithms and their sequences developed in this research, discontinuity traces digitally photographed on the rock slope were analyzed. The result showed about 75~80% of discontinuities could be detected. It is thought to be necessary that the algorithms and computer codes developed in this research need to be advanced further especially in combining digital filters to produce images to be more acceptable for extraction of discontinuity traces and setting seed pixels automatically when linking trace segments to make a complete discontinuity trace.

Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security (DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현)

  • Park Sung-Ho;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.27-36
    • /
    • 2005
  • This thesis proposed an effective encryption method for the DCT-based image/video contents and made it possible to operate in a high speed by implementing it as an optimized hardware. By considering the increase in the amount of the calculation in the image/video compression, reconstruction and encryption, an partial encryption was performed, in which only the important information (DC and DPCM coefficients) were selected as the data to be encrypted. As the result, the encryption cost decreased when all the original image was encrypted. As the encryption algorithm one of the multi-mode AES, DES, or SEED can be used. The proposed encryption method was implemented in software to be experimented with TM-5 for about 1,000 test images. From the result, it was verified that to induce the original image from the encrypted one is not possible. At that situation, the decrease in compression ratio was only $1.6\%$. The hardware encryption system implemented in Verilog-HDL was synthesized to find the gate-level circuit in the SynopsysTM design compiler with the Hynix $0.25{\mu}m$ CMOS Phantom-cell library. Timing simulation was performed by Verilog-XL from CadenceTM, which resulted in the stable operation in the frequency above 100MHz. Accordingly, the proposed encryption method and the implemented hardware are expected to be effectively used as a good solution for the end-to-end security which is considered as one of the important problems.

Headword Finding System Using Document Expansion (문서 확장을 이용한 표제어 검색시스템)

  • Kim, Jae-Hoon;Kim, Hyung-Chul
    • Journal of Information Management
    • /
    • v.42 no.4
    • /
    • pp.137-154
    • /
    • 2011
  • A headword finding system is defined as an information retrieval system using a word gloss as a query. We use the gloss as a document in order to implement such a system. Generally the gloss is very short in length and then makes very difficult to find the most proper headword for a given query. To alleviate this problem, we expand the document using the concept of query expansion in information retrieval. In this paper, we use 2 document expansion methods : gloss expansion and similar word expansion. The former is the process of inserting glosses of words, which include in the document, into a seed document. The latter is also the process of inserting similar words into a seed document. We use a featureless clustering algorithm for getting the similar words. The performance (r-inclusion rate) amounts to almost 100% when the queries are word glosses and r is 16, and to 66.9% when the queries are written in person by users. Through several experiments, we have observed that the document expansions are very useful for the headword finding system. In the future, new measures including the r-inclusion rate of our proposed measure are required for performance evaluation of headword finding systems and new evaluation sets are also needed for objective assessment.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.