• Title/Summary/Keyword: Selective vector

Search Result 97, Processing Time 0.034 seconds

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Recognition of Superimposed Patterns with Selective Attention based on SVM (SVM기반의 선택적 주의집중을 이용한 중첩 패턴 인식)

  • Bae, Kyu-Chan;Park, Hyung-Min;Oh, Sang-Hoon;Choi, Youg-Sun;Lee, Soo-Young
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.123-136
    • /
    • 2005
  • We propose a recognition system for superimposed patterns based on selective attention model and SVM which produces better performance than artificial neural network. The proposed selective attention model includes attention layer prior to SVM which affects SVM's input parameters. It also behaves as selective filter. The philosophy behind selective attention model is to find the stopping criteria to stop training and also defines the confidence measure of the selective attention's outcome. Support vector represents the other surrounding sample vectors. The support vector closest to the initial input vector in consideration is chosen. Minimal euclidean distance between the modified input vector based on selective attention and the chosen support vector defines the stopping criteria. It is difficult to define the confidence measure of selective attention if we apply common selective attention model, A new way of doffing the confidence measure can be set under the constraint that each modified input pixel does not cross over the boundary of original input pixel, thus the range of applicable information get increased. This method uses the following information; the Euclidean distance between an input pattern and modified pattern, the output of SVM, the support vector output of hidden neuron that is the closest to the initial input pattern. For the recognition experiment, 45 different combinations of USPS digit data are used. Better recognition performance is seen when selective attention is applied along with SVM than SVM only. Also, the proposed selective attention shows better performance than common selective attention.

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Encryption Algorithm using Polyline Simplification for GIS Vector Map

  • Bang, N.V.;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1453-1459
    • /
    • 2016
  • Recently, vector map has developed, used in many domains, and in most cases vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the manufacturing process of a vector map is complex and the maintenance of a digital map requires substantial monetary and human resources. This paper presents the selective encryption scheme based on polyline simplification methods for GIS vector map data protection to store, transmit or distribute to authorized users. Main advantages of our algorithm are random vertices and transformation processes but it still meets requirements of security by random processes, and this algorithm can be implement to many types of vector map formats.

Stabilities of Plasmid Vectors in Zymomonas mobilis (Zymomonas mobilis Plasmid Vector의 숙주세포 내에서의 안정성에 관한 연구)

  • 이상기;박은숙;황덕주;박무영
    • Microbiology and Biotechnology Letters
    • /
    • v.15 no.5
    • /
    • pp.328-333
    • /
    • 1987
  • The stabilities of plasmid vectors in Zymomonas mobilis were tested in batch and continuous cultures. It was found that the growth of the host Zymomonas strain was greatly affected by the size of plasmids as well as the composition of nutrient media: the host cells grew taster when harboring plasmids of smaller sizes and in n non-selective medium. All the Zymomonas plasmid vectors containing antibiotics selective markers and Zymomonas replication origins could be maintained in a stable manner over 30 generations without being integrated into host chromosomes.

  • PDF

Development of a Multicopy Integration Vector in Yarrowia lipolytica (Yarrowia lipolytica의 Multicopy Integration Vector 개발)

  • Kim, Jeong-Yoon;Woo, Moon-Hee;Ryu, Dewey D.Y.
    • Microbiology and Biotechnology Letters
    • /
    • v.23 no.5
    • /
    • pp.536-543
    • /
    • 1995
  • Multicopy integration vector is a very useful vector system in that they can be integrated into chromosomal DNA in several copies and stably maintained under non-selective conditions. To develop a multicopy integration vector system in the yeast Yarrowia lipolytica, P-type ribosomal DNA was cloned from Y lipolytica. A HindIII-BglII fragment of the cloned rDNA and a promoterless URA3 gene were inserted into pGEM1, generating multicopy integration vectors, pMIYL-1 and pMIYL-2. The rDNA fragment is for targeted homologous recombination between the vector and the chromosomal DNA of Y. lipolytica, and the promoterless URA3 gene is a defective selection marker for inducing multicopy integration. pMIYL-1 and pMIYL-2 have an unique restriction enzyme site, KpnI, and two unique restriction enzyme sites, KpnI and EcoRI, repectively, which can be used for targeting of the vectors into the rDNA of Y. lipolytica chromosomal DNA. After transformation of the vectors into Y. lipolytica, copy number and stability were analyzed by Southern hybridization. The vectors were found to be present in less than 5 copies per cell and were stably maintained during growth in non-selective media.

  • PDF

The Utility of TAR Vectors Used for Selective Gene Isolation by TAR Cloning. (TAR Cloning에 의한 선별적 유전자 분리에 사용되는 TAR Vectors의 유용성에 관한 연구)

  • 박정은;이윤주;정윤희;김재우;김승일;김수현;박인호;선우양일;임선희
    • Microbiology and Biotechnology Letters
    • /
    • v.31 no.4
    • /
    • pp.322-328
    • /
    • 2003
  • The Transformation-Associated Recombination (TAR) cloning technique allows selective isolation of chromosomal regions and genes from complex genomes. The procedure requires knowledge of relatively small genomic sequences that reside adjacent to the chromosomal region of interest. This technique involves homologous recombination during yeast spheroplast transformation between genomic DNA and a TAR vector that has 5'and 3' gene targeting sequences. In this study, we examined the minimum size of specific hooks required for a single-copy gene isolation and compared the utility of different TAR vectors, radial and unique vectors, by cloning the same single-copy gene. The efficiency of TAR cloning of the hHPRT gene was same using hooks varying from 750 to 63 bp. The number of transformants decreased approximately 20-fold when the TAR vector contained two unique hooks versus using a radial vector, but the percentage of positive recombinants increased over 2-fold when a unique TAR vector was used. Therefore, we suggest that the two-unique TAR vector is suitable for general TAR cloning given its high selectivity, and the radial TAR vector is more suitable when genomic DNA is in limited quantity, for example, DNA isolated from pathological specimens. Moreover, we confirm the minimal length of a unique sequence in a TAR vector is approximately 60 bp for a single-copy gene isolation.

Multispectral Image Compression Using Classification in Wavelet Domain and Classified Inter-channel Prediction and Selective Vector Quantization in Wavelet Domain (웨이브릿 영역에서의 영역분류와 대역간 예측 및 선택적 벡터 양자화를 이용한 다분광 화상데이타의 압축)

  • 석정엽;반성원;김병주;박경남;김영춘;이건일
    • Proceedings of the IEEK Conference
    • /
    • 2000.06d
    • /
    • pp.31-34
    • /
    • 2000
  • In this paper, we proposed multispectral image compression method using CIP (classified inter-channel prediction) and SVQ (selective vector quantization) in wavelet domain. First, multispectral image is wavelet transformed and classified into one of three classes considering reflection characteristics of the subband with the lowest resolution. Then, for a reference channel which has the highest correlation with other channels, the variable VQ is performed in the classified intra-channel to remove spatial redundancy. For other channels, the CIP is performed to remove spectral redundancy. Finally, the prediction error is reduced by performing SVQ. Experiments are carried out on a multispectral image. The results show that the proposed method reduce the bit rate at higher reconstructed image quality and improve the compression efficiency compared to conventional method.

  • PDF