• Title/Summary/Keyword: dctA

Search Result 846, Processing Time 0.023 seconds

Embedding Method a Secret Data into JPEG Algorithm (JPEG 알고리즘에 기밀 데이터 합성법)

  • 박지환;박태진
    • Review of KIISC
    • /
    • v.6 no.1
    • /
    • pp.65-78
    • /
    • 1996
  • 본 논문에서는 JPEG 알고리즘을 이용하여 화상데이터를 부호화할때 디지털 서명문과 같은 기밀 데이터를 몰래 집어넣어 합성하는 방식에 대하여 고찰한다 그 기본원리는 DCT 계수를 양자화 할 때 필연적으로 생기는 오차를 이용하는 것으로 0이 아닌 양자화 계수를 합성하고자 하는 기밀데이터에 따라 근처의 정수로 조절하는 것이다. 이 방식을 SIDBA 표준화상에 적용하여 화상의 열화는 무시할 정도로 작으면서 원하는 크기의 기밀 데이터를 합성할 수 있음을 보인다. 또한, 화질의 열화를 최소화시키면서 일정량의 기밀 데이터를 합성시키기 위하여 블록당 1화소를 적절히 선택하여 제3자의 공격에 대한 안전성을 향상시키는 방법을 제시하고 컴퓨터 시뮬레이션을 통하여 성능을 분석한다.

  • PDF

DCT-Based Images Retrieval for Rotated Images (회전에 견고한 DCT 기반 영상 검색)

  • Kim, Nam-Yee;Song, Ju-Whan;You, Kang-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.67-73
    • /
    • 2011
  • The image retrieval generally shows the same or similar images to a query image as a result. In the case of rotated image, however, its performance tends to be debased significantly. We propose a method to ensure a reliable image retrieval of rotated images as follows; First, to obtain feature points of query/DB images by Harris Corner Detector; and then, utilizing the feature points, to find the object's axis and query/DB images into rotation invariant images with Principal Components Analysis algorithm. We have experimented with 6,000 natural images which are 256 pixels in diameter. They are 1,000 Wang's images and their rotated images by $30^{\circ}$, $45^{\circ}$, $90^{\circ}$, $135^{\circ}$ and $180^{\circ}$. The simulation results show that the proposed method retrieves rotated images more effectively than the conventional method.

A study on the image transmission through CDMA (CDMA 채널을 통한 영상 전송에 대한 연구)

  • 허도근;김용욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2543-2551
    • /
    • 1997
  • This paper proposes a compression technique of image data, a variable length PN code and channel models which are required in CDMA communication system. It also analyzes their performances. Original images is compressed by 2-D DCT and its coefficients are quantized by optimal quantizer at compression rate 0.84bit/pel. Channel model 1 and 2 which are composed of 5 and 4 channels respectively are employed to be used in CDMA. Such a situation forces us to empoly variable length PN code, such as Chebyshev map for spread spectrum system. When average PN code length of model 1 and 2 is 44.4 and 26.7 chips respectively, the received image through these models under Gaussian noise with variance 1.75 is visually of the same quality as the transmitting image. Thus, the model 2 appears to be better in channel efficiency, comparing with channel model 1 and channel model which uses fixed length PN code.

  • PDF

Block Loss Recovery Using Fractal Extrapolation for Fractal Coded Images (프랙탈 외삽을 이용한 프랙탈 부호화 영상에서의 블록 손실 복구)

  • 노윤호;소현주;김상현;김남철
    • Journal of Broadcast Engineering
    • /
    • v.4 no.1
    • /
    • pp.76-85
    • /
    • 1999
  • The degradation of image quality by block loss is more serious in fractal coded images with the error propagation due to mapping from the lost blocks than in DCT coded images. Therefore. a new algorithm is presented for recovering the blocks lost in the transmission through the lossy network as A TM network of the images coded by Jacquins fractal coding. Jacquins fractal code is divided into two layers of header code and main code according to its importance. The key technique of the proposed BLRA (block loss recovery algorithm) is a fractal extrapolation that estimates the lost pixels by using the contractive mapping parameters of the neighboring range blocks whose characteristics are similar to a lost block. The proposed BLRA is applied to the lost blocks in the iteration of decoding. Some experimental results show the proposed BLRA yields excellent performance in PSNR as well as subjective quality.

  • PDF

A Real Time Deblocking Technique Using Adaptive Filtering in a Mobile Environment (모바일 환경에서 적응적인 필터링을 이용한 실시간 블록현상 제거 기법)

  • Yoo, Jae-Wook;Park, Dae-Hyun;Kim, Yoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.4
    • /
    • pp.77-86
    • /
    • 2010
  • In this paper, we propose a real time post-processing visual enhancement technique to reduce the blocking artifacts in block based DCT decoded image for mobile devices that have allocation of the restricted resource. In order to reduce the blocking artifacts effectively even while preserving the image edge to the utmost, the proposed algorithm uses the deblocking filtering or the directional filtering according to the edge detection of the each pixel. After it is discriminated that the pixel to apply the deblocking filtering belongs again to the monotonous area, the weighted average filter with the adaptive mask is applied for the pixel to remove the blocking artifacts. On the other hand, a new directional filter is utilized to get rid of staircase noise and preserve the original edge component. Experimental results show that the proposed algorithm produces better results than those of the conventional algorithms in both subjective and objective qualities.

  • PDF

An Efficient Requantization Method for INTRA Frames in Heterogeneous Transcoding (이종의 영상부호화 표준간의 변환부호화에서 화면내 부호화를 위한 효율적인 재양자화 기법)

  • Seo, Kwang-Deok;Kim, Jae-Kyoon
    • Journal of IKEEE
    • /
    • v.5 no.2 s.9
    • /
    • pp.221-231
    • /
    • 2001
  • In this paper, we propose an efficient requantization method for INTRA frames in heterogeneous transcoding from MPEG-1 to MPEG-4 simple profile. The quantizer for MPEG-1 INTRA MB usually uses a quantization weighting matrix while the quantizer for MPEG-4 simple profile doesn't. As a result, the quantization step sizes of the two quantizers may not be the same even for the same quantization parameter. Due to this mismatch in the quantization step site, the transcoded MPEG-4 sequence suffers from serious quality degradation and the number of bits produced by transcoding increases from the original MPEG-1 video sequence. To solve these problems, we propose an efficient method to find a near-optimum reconstruction level in the transcoder. We also present a PDF (probability distribution function) estimation method for the original DCT coefficients of MPEG-1 video sequence, which is required for the proposed requantization. Experimental results show that the proposed method gives $0.3{\sim}0.6dB$ improvement in PSNR over the conventional method, even at the reduced bit-rate about $5{\sim}7%$ from the conventional method.

  • PDF

A Collusion-secure Fingerprinting Scheme for Three-dimensional Mesh Models (삼차원 메쉬 모델에 적용한 공모방지 핑거프린팅 기법)

  • Hur, Yung;Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.113-123
    • /
    • 2004
  • This paper presents a new collusion-secure fingerprinting scheme to embed fingerprints into three-dimensional(3-D) mesh models efficiently. In the proposed scheme, we make the same number of fingerprints as the number of customers based on the finite projective geometry, partition a 3-D mesh model related to the number of bits assigned to each fingerprint and then embed a watermark representing copyright information into each submesh to be marked. Considering imperceptibility and robustness of the watermarking algorithm we embed the watermark signal into mid-frequency DCT coefficients obtained by transforming vertex coordinates in the triangle strips which are generated from the submeshes to be marked. Experimental results show that our scheme is robust to additive random noises, MPEG-4 SNHC 3-D mesh coding, geometrical transformations, and fingerprint attacks by two traitors' collusion. In addition, we can reduce the number of bits assigned to each fingerprint significantly.

A Robust Watermarking Method against Partial Damage and Geometric Attack (부분 손상과 기하학적 공격에 강인한 워터마킹 방법)

  • Kim, Hak-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1102-1111
    • /
    • 2012
  • In this paper, we propose a robust watermarking method against geometric attack even though the watermarked image is partially damaged. This method consists of standard image normalization which transforms any image into a predefined standard image and embedding watermark in DCT domain of standard normalized image using spread spectrum technique. The proposed standard image normalization method has an improvement over existing image normalization method, so it is robust to partial damage and geometric attack. The watermark embedding method using spread spectrum technique also has a robustness to image losses such as blurring, sharpening and compressions. In addition, the proposed watermarking method does not need an original image to detect watermark, so it is useful to public watermarking applications. Several experimental results show that the proposed watermarking method is robust to partial damage and various attacks including geometric deformation.

Influence of modification in core building procedure on fracture strength and failure patterns of premolars restored with fiber post and composite core

  • Kim, Young-Hoi;Lee, Jong-Hyuk
    • The Journal of Advanced Prosthodontics
    • /
    • v.4 no.1
    • /
    • pp.37-42
    • /
    • 2012
  • PURPOSE. The influence of the modified process in the fiber-reinforced post and resin core foundation treatment on the fracture resistance and failure pattern of premolar was tested in this study. MATERIALS AND METHODS. Thirty-six human mandibular premolars were divided into 4 groups (n = 9). In group DCT, the quartz fibre post (D.T. Light-post) was cemented with resin cement (DUO-LINK) and a core foundation was formed with composite resin (LIGHT-CORE). In group DMO and DMT, resin cement (DUO-LINK) was used for post (D.T. Lightpost) cementation and core foundation; in group DMO, these procedures were performed simultaneously in one step, while DMT group was accomplished in separated two steps. In group LCT, the glass fiber post (LuxaPost) cementation and core foundation was accomplished with composite resin (LuxaCore-Dual) in separated procedures. Tooth were prepared with 2 mm ferrule and restored with nickel-chromium crowns. A static loading test was carried out and loads were applied to the buccal surface of the buccal cusp at a 45 degree inclination to the long axis of the tooth until failure occurred. The data were analyzed with MANOVA (${\alpha}$= .05). The failure pattern was observed and classified as either favorable (allowing repair) or unfavorable (not allowing repair). RESULTS. The mean fracture strength was highest in group DCT followed in descending order by groups DMO, DMT, and LCT. However, there were no significant differences in fracture strength between the groups. A higher prevalence of favorable fractures was detected in group DMT but there were no significant differences between the groups. CONCLUSION. The change of post or core foundation method does not appear to influence the fracture strength and failure patterns.

The design of phase error detector based on delayed n-tap rising edge clock:It's DP-PLL system application (지연된 n-탭 상승 에지 클럭을 이용한 위상 오차 검출기의 설계와 DP-PLL에의 적용)

  • 박군종;구광일;윤정현;윤대희;차일환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.1100-1112
    • /
    • 1998
  • In this paper, a novel method of minimizing the phase error is proposed. A DP-PLL system using this method is implemented and its performacnce is investigated, too. The DP-PLL system detects the phase error between reference clock and locally generated system clock. The phase difference is then reported as a PEV(Phase Error Variation), which is propoced from the delayted n-tap rising dege clock circuit with 5ns resolution in the phase detector. The algorithm is used to track the optimal DAC coefficients, which are adjusted from sample to sample in such a way as to minimize the PEV. The proposed method is found to have remarkable good potential for fast and accurate phase error tracking characteristic. The algorithm shows good performance to supress the low frequency jitter.-ending points, we design new basis functions based on the Legendre polynomial and then transform the error signals with them. When applied to synthetic images such as circles, ellipses and etc., the proposed method provides, in overall, outstanding results in respect to the transform coding gain compared with DCT and DST. And in the case when applied to natural images, the proposed method gives better image quality over DCT and comparable results with DST.

  • PDF