• Title/Summary/Keyword: Transformed image

Search Result 630, Processing Time 0.024 seconds

Blind Watermarking by Using Circular Input Method and Binary Image (이진영상과 Circular Input 방식을 이용한 Blind 워터마킹)

  • Kim Tae-Ho;Kim Young-Hee;Jin Kyo-Hong;Ko Bong-Jin;Park Mu-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1407-1413
    • /
    • 2006
  • The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorism is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. This method don't have any loss when image didn't have any attack. As a result Watermark can be perfectly extracted by using this algorithm. And Maximam PSNR value is improved 3.35dB. This algorithm will be improved by using gray level image and color image.

Priority based Image Transmission Technique with DPCM in Wireless Multimedia (무선 멀티미디어 센서 네트워크에서 예측부호화를 통한 우선순위 기반 이미지 전송 기법)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1023-1031
    • /
    • 2010
  • With recent advances in hardware and wireless communication techniques, wireless multimedia sensor network which collects multimedia data through wireless sensor network has started to receive a lot of attentions from many researchers. Wireless multimedia sensor network requires a research of efficient compression and transmission to process the multimedia data which has large size, in the wireless sensor network that has very low network bandwidth. In this paper, we propose PIT protocol for the transmission based on the priority that classified by the DPCM compression. The PIT protocol sets different priority to the each subbands which are divided by the wavelet transform. The PIT protocol transmits the data with higher priority to guarantee the high image quality. The PIT protocol uses the characteristic of wavelet transform that the transformed image is very insensible to the data loss. In PIT protocol, each subbands of wavelet transformed image has fair weight in the compressed image to utilize the prioriy based transmission. The experiment results show that the PIT protocol improves the quality of image in spite of data loss.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

Adaptive Quantization of Difference Wavelet Image for Close-Range Low-Bitrate Transmission (근거리 저전송률 통신을 위한 차영상 웨이브릿 적응 양자화)

  • Jeong Won-Kyo;Leef Kyeong-Hwan;Lee Yong-Doo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1246-1254
    • /
    • 2004
  • This paper presents a image coding method that is well adaptive to close-range video transmission because of its low titrate and simple coding procedure. At first, it reduces temporal redundancies by performing image DPCM between previous frame and current frame, and makes wavelet transformed image of this difference image. Then, the coefficients are quantized selectively by using the coefficient values of base level and mid-frequency level because inter-level redundancies are widely exists in multi-resolution images. Finally quantized coefficients are made iron the function that implies the target bitrate, the average coefficient energy, and the value of the level. The proposed method shows the effective Performance in the experiments using the continuous motion images and transition images.

  • PDF

Recording and Retrieving a Color Image Using Binary Image Precessing in Holographic Optical Memory (홀로그래픽 광메모리에서 이진 영상 처리를 이용한 컬러 영상 기록 및 복원)

  • Kim, Jung-Hoi;An, Jun-Won;Kim, Nam;Lee, Kwon-Yeon
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.11
    • /
    • pp.71-81
    • /
    • 1999
  • In this paper, digital holographic data storage system is implemented to record and retrieve the color images using new direct access method and binary image processing. As a result of applying image processing via a proposed direct access method, we can reduce the number of data page than binary image processing using raw file and replay color image of resolution of $128{\times}80{\times}256$ (6.6KB). Also it is showed that the input data can be transformed into digital holograms regardless of any kinds of file such as character data, moving picture. etc.

  • PDF

Color Image Retrieval from Database Using Graph Representation (그래프 표현을 이용한 컬러 영상 데이터베이스 검색기법)

  • 박인규;윤일동;이상욱
    • Journal of Broadcast Engineering
    • /
    • v.1 no.1
    • /
    • pp.74-83
    • /
    • 1996
  • In this paper, an effective color image retrieval algorithm is proposed based on the graph representation. Also we propose a color constancy algorithm to remove the effect of illumination change. Illumination condition of an image can be transformed to that of reference image using the proposed color constancy algorithm, so that the effect of dirrerent lighting is significantly alleviated. Then, we represent a color image as a graph with several nodes and edges in the histogram space, and finally two images are matched by compared two graphs representing them. The simulation results show that the proposed 3-step algorithm performs well for various conditions, including different lighting, translation, rotation, and scaling of the object in the image. In addition, the proposed algorithm is very fast compared to the geometry-based matching technique.

  • PDF

Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates

  • Shin, Sang-Wook;Lee, Mun-Kyu;Moon, Dae-Sung;Moon, Ki-Young
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.628-630
    • /
    • 2009
  • Recently, Ratha and others proposed a cancelable biometrics scheme which transforms an original fingerprint template into a new one using a noninvertible transformation. However, we show that the original template is recovered by a dictionary attack if two transformed templates originating from it are revealed. In our attack, we simulate the transformation and construct a set of possible pre-images for each transformed template. Then, we find the correct pre-image by computing the intersection of these sets. We present an algorithm implementing this idea as well as successful experimental results.

A Study of Spectral Domain Electromagnetic Scattering Analysis Applying Wavelet Transform (웨이블릿을 이용한 파수영역 전자파 산란 해석법 연구)

  • 빈영부;주세훈;이정흠;김형동
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.3
    • /
    • pp.337-344
    • /
    • 2000
  • The wavelet analysis technique is applied in the spectral domain to efficiently represent the multi-scale features of the impedance matrices. In this scheme, the 2-D quadtree decomposition (applying the wavelet transform to only the part of the matrix) method often used in image processing area is applied for a sparse moment matrix. CG(Conjugate-Gradient) method is also applied for saving memory and computation time of wavelet transformed moment matrix. Numerical examples show that for rectangular cylinder case the non-zero elements of the transformed moment matrix grows only as O($N^{1.6}$).

  • PDF

Process of Thinking on the Form in Product Design (제품디자인의 형용사고과정)

  • 조종호
    • Archives of design research
    • /
    • v.4 no.1
    • /
    • pp.31-37
    • /
    • 1991
  • Process of thinking on the form in product design includes the process in which unclear requirements are transformed into defined concepts, and the process in which the design as a form conforming to the concepts in conc1uded.(The former is called fconceptualizationJ which deals with abstract matters, and the latter "manipulation of the formJ which deals with more embodied matters) In conceptualization process the operation which transform the diverse requirements in the initial phase of de\ulcornersign to related linguistic expressions or to an image that directly suggests the form is executed. In the process of manipulation of the form the transformation to design as the description of relationships between the formal elements of the design solution resulted from the transformed requirements. It is the job of selecting the most suitable formal elements, balancing the relationships between them, out 01 the possibilities that reside in the individual attributes of formal elements, and finally leading to the design as the end solution. This writing focuses down to the wilfulness and ambiguity of design, and the diversity of design solution after the requirements, formal elements, and the process of relating the formal attributes to each other is built up the two phases.ases.

  • PDF

Changeable Biometrics for PCA based Face recognition (주성분 분석 기반의 얼굴 인식을 위한 가변 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chul-Han;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.331-332
    • /
    • 2006
  • To enhance security and privacy in biometrics, changeable (or cancelable) biometrics have recently been introduced. The idea is to transform a biometric signal or feature into a new one for enrollment and matching. In this paper, we proposed changeable biometrics for face recognition using on PCA based approach. PCA coefficient vector extracted from an input face image. The vector is scrambled randomly and removed. When a transformed template is compromised, it is replaced by a new scrambling rule. In our experiment, we compared the performance between when PCA coefficient vectors are used for verification and when the transformed coefficient vectors are used for verification.

  • PDF