• Title/Summary/Keyword: The Masking Method

Search Result 334, Processing Time 0.025 seconds

A Study on the difference in the sharpness of venous images between individual algorithms and combinations (개별 알고리즘과 조합 간 정맥 영상의 선명화 차이에 관한 연구)

  • Jin-Hyoung Jeong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.441-447
    • /
    • 2023
  • Intravenous infusion therapy is a standard nursing procedure in medical institutions that provides patients with drugs, fluids, blood, and nutrients into the patient's mucus. It is mainly performed and managed by nurses. Additionally, it is an injection method that injects drugs directly into the blood vessels, and is used to achieve rapid results in emergency situations, and quick and accurate effects can be expected. Even experienced nurses through education and training often make mistakes, which can not only cause discomfort to patients but also cause various problems that threaten patient safety. Various studies are being conducted to reduce the pain caused by these mistakes. This paper acquired images of veins on the back of the hands of three subjects through an image detection device and conducted a study to derive an algorithm to provide clear vein images through image processing of the collected images. To sharpen the acquired vein images, existing algorithms Histogram Equalization, CLAHE, and Unsharp Masking were selected and combined. A histogram graph was used to compare images derived by applying individual algorithms and algorithm combinations to images. The histogram graph was checked by calculating the difference between the minimum and maximum values of distributed pixels and averaging them. The algorithm combination presented in this paper was 209.1, which was higher than the average values of individual algorithms of 138.7, 132.3, and 126.2, and it was confirmed that visibility was good even in actual images.

The Study on the Medical Image Compression using the Characteristics of Human Visual System (인간 시각 장치의 특성을 이용한 의학 영상 압축에 관한 연구)

  • Chee, Young-Joon;Park, Kwang-Seok
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1993 no.05
    • /
    • pp.38-41
    • /
    • 1993
  • For efficient transmission and storage of digital images, the requirements of image compression is incresing. Because the medical images contain diagnostic information small distortion has been more important factor than the low rate in such images. Generally the distortion in image is the difference of pixel values. However the image is percieved by human visual systems. So it is reasonable that human visual system characteristics be used as criteria of the image compression. In this paper, the Just Noticeable Difference curve is used as criteria of determining the homogeniety of a block and acceptibility of distortions. And Block Truncation Coding using spatial masking effect of eyes is adopted to code the blocks which contain line components. And small blocks which varies slowly can be approximated to polynomial functions successfully. We proposed the hybrid block coding scheme based on the block characteristics and human visual system characteristics. Simulation to several kinds of the medical images using this method showed that medical images can be compressed 5:1 - 10:1 without noticeable distortion.

  • PDF

Robust Image Watermarking via Perceptual Structural Regularity-based JND Model

  • Wang, Chunxing;Xu, Meiling;Wan, Wenbo;Wang, Jian;Meng, Lili;Li, Jing;Sun, Jiande
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1080-1099
    • /
    • 2019
  • A better tradeoff between robustness and invisibility will be realized by using the just noticeable (JND) model into the quantization-based watermarking scheme. The JND model is usually used to describe the perception characteristics of human visual systems (HVS). According to the research of cognitive science, HVS can adaptively extract the structure features of an image. However, the existing JND models in the watermarking scheme do not consider the structure features. Therefore, a novel JND model is proposed, which includes three aspects: contrast sensitivity function, luminance adaptation, and contrast masking (CM). In this model, the CM effect is modeled by analyzing the direction features and texture complexity, which meets the human visual perception characteristics and matches well with the spread transform dither modulation (STDM) watermarking framework by employing a new method to measure edge intensity. Compared with the other existing JND models, the proposed JND model based on structural regularity is more efficient and applicable in the STDM watermarking scheme. In terms of the experimental results, the proposed scheme performs better than the other watermarking scheme based on the existing JND models.

Opto-electronic Implementation of an Edge Detection System Using Diffusion Neural Network (확산신경회로망을 이용한 윤곽선 검출 시스템의 광전자적 구현)

  • Cho, Cheol-Soo;Kim, Jae-Chang;Yoon, Tae-Hoon;Nam, Ki-Gon;Park, Ui-Yul
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.11
    • /
    • pp.136-141
    • /
    • 1994
  • In this paper, we implemented an opto-electronical signal processing system for the edge detection using the diffusion neural network. The diffusion neural network performs a Gaussian and DOG operation efficiently by the diffusion process. The diffusion neural network is more efficient than the LOG masking method in hardware implementation because it has a few connections and the connection weights are fixed-valued. We implemented a diffusion neural network using the characteristics of the light intensity distribution function which is similar to the Gaussian function. We have shown that the system can detect the edge of an image exactly through the experimental results.

  • PDF

Extraction of tire information markings using a surface reflection model (표면의 반사 특성을 이용한 타이어 정보 마크의 추출)

  • Ha, Jong-Eun;Lee, Jae-Yong;Gwon, In-So
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.4
    • /
    • pp.324-329
    • /
    • 1996
  • In this paper, we present a vision algorithm to extract the tire information markings on the sidewall of tires. Since the appearance of tire marks is the same as its background, a primary feature to distinguish tire marks from their background is the roughness. Generally, the roughness of tire marks is different from that of its bakground: the surface of tire marks is smoother than the backgrounds. Light incident on the tire surface is reflected differently according to the roughness. For smoother surfaces, the surface irradiance is much stronger than that of rough surfaces. Based on these phenomena and observation, we propose an optimal illumination condition based on Torrance-Sparrow reflection model. We also develop an efficient reflectance-ratio based operator to extract the boundary of tire marks. Even with a very simple masking operation, we were able to obtain remarkable boundary extraction results from real experiments using many tires. By explicitly using the surface reflection model to explain the intensity variation on the black tire surface, we demonstrate that a physics-based vision method is powerful and feasible in extracting surface markings on tires.

  • PDF

Patterns of Anger Expression among Middle-aged Korean Women: Q methodology

  • Lee, Yong Mi;Kim, Geun Myun
    • Journal of Korean Academy of Nursing
    • /
    • v.42 no.7
    • /
    • pp.1001-1008
    • /
    • 2012
  • Purpose: The purpose of this study was to identify the characteristics of anger expression in middle-aged Korean women by categorizing their patterns of expression while considering the complexity and multidimensionality of anger, and by investigating the characteristics relative to the patterns. Methods: The research design was a descriptive design using Q methodology, which is a method of measuring subjectivity. A convenience sample of 42 participants aged 40-60 years and living in the community in Korea was recruited. The PC-QUANL software program (a factor analysis program for the Q technique) was used to analyze the Q-sort data. Results: Four factors were extracted that described different expressions of anger among middle-aged Korean women; these factors explained 50.1% of the total variance. The frames of reference of the four factors were a) direct diversion, b) silent masking with remaining anger, c) self digestion, and d) controlling anger with objectification. Conclusion: In this study has identified patterns and characteristics of anger expression among middle-aged Korean women were identified, which will aid the development of effective anger-management programs for controlling anger in this population. In future studies, it would be helpful to investigate how the patterns of anger expression established herein are associated with specific health problems such as cardiovascular disorder and cancer.

Digital Audio Watermarking in The Cepstrum Domain (켑스트럼 영역에서의 오디오 워터마킹 방법)

  • 이상광;호요성
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.13-20
    • /
    • 2001
  • In this paper, we propose a new digital audio watermarking scheme In the cepstrum domain. We insert a digital watermark signal Into the cepstral components of the audio signal using a technique analogous to spread spectrum Communications, hiding a narrow band signal in a wade band channel. In our proposed method, we use pseudo-random sequences to watermark the audio signal. The watermark Is then weighted in the cepstrum domain according to the distribution of cepstral coefficients and the frequency masking characteristics of the human auditory system. The proposed watermark embedding scheme minimizes audibility of the watermark signal. and the embedded watermark is robust to mu1tip1e watermarks, MPEG audio ceding and additive noose.

  • PDF

Effective Decontamination and Remediation After Elemental Mercury Exposure: A Case Report in the United States

  • Johnson-Arbor, Kelly;Schultz, Brian
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.5
    • /
    • pp.376-379
    • /
    • 2021
  • Elemental mercury exposure can result in significant toxicity. Source decontamination and remediation are often required after larger elemental mercury exposures, but the details of these processes are infrequently reported. In the case described herein, a 64-year-old woman and her husband were exposed to elemental mercury in their home after the husband purchased it online for the purpose of recreational barometer calibration. After the mercury reportedly spilled during the calibration process, a vacuum cleaner was used to decontaminate the affected surface; this led to extensive mercury contamination of the home. The couple was relocated from the home while remediation occurred over the course of several weeks. Vacuum cleaning of an elemental mercury spill can lead to extensive volatilization and recirculation of mercury vapor. For smaller mercury spills, careful removal of visible mercury beads by using an eyedropper, cardboard, and masking tape is recommended. Larger spills require professional decontamination and remediation and may necessitate involvement of governmental resources. Vacuum cleaning should not be used as an initial method of decontamination after elemental mercury exposure. Careful attention to source decontamination can reduce the emotional and financial costs associated with extensive remediation after elemental mercury exposure.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Implementing M-SIDH: Performance and Efficiency Evaluation (M-SIDH 구현 및 성능 평가를 통한 효율성 연구)

  • Suhri Kim;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.591-599
    • /
    • 2023
  • Due to the recent attack by Castryck-Decru, the private key of SIDH can be recovered in polynomial time so several methods have been proposed to prevent the attack. Among them, M-SIDH proposed by Fouotsa et al, counteracts the attack by masking the torsion point information during the key exchange. In this paper, we implement M-SIDH and evaluate its performance. To the best of our knowledge, this is the first implementation of M-SIDH in C language. Toward that end, we propose a method to select parameters for M-SIDH instantiation and propose a 1024-bit prime for implementation. We implemented the square-root Velu formula over the extension field for further optimization. As a result, 1129 ms is required for a key exchange in the case of MSIDH-1024, providing the classic 64-bit security level.