• Title/Summary/Keyword: computer image analysis

Search Result 1,466, Processing Time 0.045 seconds

Hiding Secret Data in an Image Using Codeword Imitation

  • Wang, Zhi-Hui;Chang, Chin-Chen;Tsai, Pei-Yu
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.435-452
    • /
    • 2010
  • This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a difference number table. Finally, this table is compressed by entropy coding and sent to the receiver. The experimental results demonstrate that the proposed scheme can achieve greater hiding capacity, about five bits per index, with an acceptable bit rate. At the receiver end, after the compressed code has been decoded, the image can be recovered to a VQ compressed image.

Automatic Detection of Forgery in Cell phone Images using Analysis of CFA Pattern Characteristics in Imaging Sensor (휴대폰의 CFA 패턴특성을 이용한 사진 위변조 탐지)

  • Shim, Jae-Youen;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1118-1121
    • /
    • 2010
  • With the advent of cell phone digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital camera equipped in cell phones employ a single image sensor in conjunction with a color filter array (CFA), and then interpolates the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed when tampering with an image. We quantify the specific correlations introduced by CFA interpolation, and describe how these correlations, or lack thereof, can be automatically detected in any portion of an image. We show the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms in test cell phones.

An Onboard Image Processing System for Road Images (도로교통 영상처리를 위한 고속 영상처리시스템의 하드웨어 구현)

  • 이운근;이준웅;조석빈;고덕화;백광렬
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.7
    • /
    • pp.498-506
    • /
    • 2003
  • A computer vision system applied to an intelligent safety vehicle has been required to be worked on a small sized real time special purposed hardware not on a general purposed computer. In addition, the system should have a high reliability even under the adverse road traffic environment. This paper presents a design and an implementation of an onboard hardware system taking into account for high speed image processing to analyze a road traffic scene. The system is mainly composed of two parts: an early processing module of FPGA and a postprocessing module of DSP. The early processing module is designed to extract several image primitives such as the intensity of a gray level image and edge attributes in a real-time Especially, the module is optimized for the Sobel edge operation. The postprocessing module of DSP utilizes the image features from the early processing module for making image understanding or image analysis of a road traffic scene. The performance of the proposed system is evaluated by an experiment of a lane-related information extraction. The experiment shows the successful results of image processing speed of twenty-five frames of 320$\times$240 pixels per second.

Pulse wave Measurement System by analyzing a Moving Pulse Image in the Capillary Tube (모세관 맥동파 영상을 이용한 맥파 측정 시스템)

  • Lee, Woo-Beom;Choi, Chang-Yur;Hong, You-Sik;Lee, Sang-Suk;Nam, Dong-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.145-151
    • /
    • 2012
  • The pulsimeter is a representative device in the oriental medicine, which can analysis a risk factor in a cardiovascular diseases. However, most of the previous methods have the limit by the contacted sate of the brachial pulse and sensor in the measuring time, the inaccuracy of detected pulse, and the difficulty of pulse analysis. Accordingly, we propose the moving pulse image analysis based pulsimeter that can acquire a pulse of patient in real time by analyzing a moving image. then this video is shot the state change of the T.S. occurred by a pulse in capillary. In order to evaluate the performance of the our pulsimeter, we measured a respective detecting-rate about the essential 5 feature-points in the pulse analysis from the detected original pulse. As a result, the proposed method is very successful.

Study on Real-time Parallel Processing Simulator for Performance Analysis of Missiles (유도탄 성능분석을 위한 실시간 병렬처리 시뮬레이터 연구)

  • Kim Byeong-Moon;Jung Soon-Key
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.1
    • /
    • pp.84-91
    • /
    • 2005
  • In this paper, we describe the real-time parallel processing simulator developed for the use of performance analysis of rolling missiles. The real-time parallel processing simulator developed here consists of seeker emulator generating infrared image signal on aircraft, real-time computer, host computer, system unit, and actual equipments such as auto-pilot processor and seeker processor. Software is developed from mathematic models, 6 degree-of-freedom module, aerodynamic module which are resided in real-time computer, and graphic user interface program resided in host computer. The real-time computer consists of six TIC-40 processors connected in parallel. The seeker emulator is designed by using analog circuits coupled with mechanical equipments. The system unit provides interface function to match impedance between the components and processes very small electrical signals. Also real launch unit of missiles is interfaced to simulator through system unit. In order to apply the real-time parallel processing simulator to performance analysis equipment of rolling missiles it is essential to perform the performance verification test of simulator.

Real-time Face Detection and Recognition using Classifier Based on Rectangular Feature and AdaBoost (사각형 특징 기반 분류기와 AdaBoost 를 이용한 실시간 얼굴 검출 및 인식)

  • Kim, Jong-Min;Lee, Woong-Ki
    • Journal of Integrative Natural Science
    • /
    • v.1 no.2
    • /
    • pp.133-139
    • /
    • 2008
  • Face recognition technologies using PCA(principal component analysis) recognize faces by deciding representative features of faces in the model image, extracting feature vectors from faces in a image and measuring the distance between them and face representation. Given frequent recognition problems associated with the use of point-to-point distance approach, this study adopted the K-nearest neighbor technique(class-to-class) in which a group of face models of the same class is used as recognition unit for the images inputted on a continual input image. This paper proposes a new PCA recognition in which database of faces.

  • PDF

A Study on Recognition of Operating Condition for Hydraulic Driving Members

  • Park, Heung-Sik;Kim, Young-Hee;Kim, Dong-Ho;Cho, Yon-Sang;Park, Jae-Sang
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.4 no.6
    • /
    • pp.44-49
    • /
    • 2003
  • The morphological analysis of wear debris can provide early a failure diagnosis in lubricated moving system. It can be effective to analyze operating conditions of oil-lubricated tribological system with shape characteristics of wear debris in a lubricant. But, in order to predict and recognize an operating condition of lubricated machine, it is needed to analyze and to identify shape characteristics of wear debris. Therefore, If the morphological characteristics of wear debris are recognized by computer image analysis using the neural network algorithm, it is possible to recognize operating condition of hydraulic driving members. In this study, wear debris in the lubricating oil are extracted by membrane filter (0.45$\mu\textrm{m}$), and the quantitative values of shape parameters of wear debris are calculated by the digital image processing. This shape parameters are studied and identified by the artificial neural network algorithm. The result of study could be applied to prediction and to recognition of the operating condition of hydraulic driving members in lubricated machine systems.

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection

  • Luo, Shi-qi;Ni, Bo;Jiang, Ping;Tian, Sheng-wei;Yu, Long;Wang, Rui-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3654-3670
    • /
    • 2019
  • This paper proposes an Image Texture Median Filter (ITMF) to analyze and detect Android malware on Drebin datasets. We design a model of "ITMF" combined with Image Processing of Median Filter (MF) to reflect the similarity of the malware binary file block. At the same time, using the MAEVS (Malware Activity Embedding in Vector Space) to reflect the potential dynamic activity of malware. In order to ensure the improvement of the classification accuracy, the above-mentioned features(ITMF feature and MAEVS feature)are studied to train Restricted Boltzmann Machine (RBM) and Back Propagation (BP). The experimental results show that the model has an average accuracy rate of 95.43% with few false alarms. to Android malicious code, which is significantly higher than 95.2% of without ITMF, 93.8% of shallow machine learning model SVM, 94.8% of KNN, 94.6% of ANN.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.