• Title/Summary/Keyword: edge protection

Search Result 115, Processing Time 0.029 seconds

Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients

  • Chenghua Liu;Anhong Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.412-434
    • /
    • 2023
  • This study discusses the high-order diffusion method in the wavelet domain. It aims to improve the edge protection capability of the high-order diffusion method using wavelet coefficients that can reflect image information. During the first step of the proposed diffusion method, the wavelet packet decomposition is a more refined decomposition method that can extract the texture and structure information of the image at different resolution levels. The high-frequency wavelet coefficients are then used to construct the edge detection function. Subsequently, because accurate wavelet coefficients can more accurately reflect the edges and details of the image information, by introducing the idea of state weight, a scheme for recovering wavelet coefficients is proposed. Finally, the edge detection function is constructed by the module of the wavelet coefficients to guide high-order diffusion, the denoised image is obtained. The experimental results showed that the method presented in this study improves the denoising ability of the high-order diffusion model, and the edge protection index (SSIM) outperforms the main methods, including the block matching and 3D collaborative filtering (BM3D) and the deep learning-based image processing methods. For images with rich textural details, the present method improves the clarity of the obtained images and the completeness of the edges, demonstrating its advantages in denoising and edge protection.

Edge-Preserving Algorithm for Block Artifact Reduction and Its Pipelined Architecture

  • Vinh, Truong Quang;Kim, Young-Chul
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.380-389
    • /
    • 2010
  • This paper presents a new edge-protection algorithm and its very large scale integration (VLSI) architecture for block artifact reduction. Unlike previous approaches using block classification, our algorithm utilizes pixel classification to categorize each pixel into one of two classes, namely smooth region and edge region, which are described by the edge-protection maps. Based on these maps, a two-step adaptive filter which includes offset filtering and edge-preserving filtering is used to remove block artifacts. A pipelined VLSI architecture of the proposed deblocking algorithm for HD video processing is also presented in this paper. A memory-reduced architecture for a block buffer is used to optimize memory usage. The architecture of the proposed deblocking filter is verified on FPGA Cyclone II and implemented using the ANAM 0.25 ${\mu}m$ CMOS cell library. Our experimental results show that our proposed algorithm effectively reduces block artifacts while preserving the details. The PSNR performance of our algorithm using pixel classification is better than that of previous algorithms using block classification.

A Preliminary Study on the Adjustment of Forest-based Wildlife Protection Area (산림기반 야생동식물보호구역 조경을 위한 기초연구)

  • Jang, Gab-Sue
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.1
    • /
    • pp.62-69
    • /
    • 2008
  • This study was conducted in order to recommend forest-based wildlife protection areas in Chung-nam Province using several basic habitat conditions. The conditions used in this study were the forest patch size with the potential to keep wildlife animals safe, the distance from water sources, and the availability of food for wildlife. The fractal dimension index was also used to find the edge line dynamics, which can influence on habitat conditions for edge species. The natural conservation management indices including a forest map (indicating the level of forest age), a slope map, and an elevation map were used to find the forest patches with enough space for wildlife to live on. Water resources and their buffer areas were considered as factors to protect the space as an ecological corridor. Deciduous trees and trees mixed with deciduous trees and conifers were chosen to provide wildlife animals their food. In total, 525 forest patches were chosen and recommended for the wildlife protection area. Five of these forest patches were recommended as wildlife protection areas managed by the provincial government. The other 520 forest patches were recommended to protect local wildlife animals and be managed by each county or city. These forest patches were located around the Geum-buk and Geum-nam mountains, and the forest patches are important resources as habitats to keep wildlife in the area. An ecological network consists of these separate forest patches with the ecological integration. A fractal dimension index was used to divide forest patches into several categories in order to find how patches are shaped. The forest patches with longer edges or more irregular shapes have a much higher possibility of being inhabited by various types of edge species. Through comparison of the wildlife protection areas recommended in this study to the current wildlife protection areas, we recognized that the current wildlife protection areas need boundary adjustments in order for wildlife animals to survive by themselves with water sources and food.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service (에지 컴퓨팅 기반 객체탐지 서비스를 위한 이미지/동영상 데이터 처리 기법에 관한 연구)

  • Jang Shin Won;Yong-Geun Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.319-328
    • /
    • 2023
  • Unlike cloud computing, edge computing technology analyzes and judges data close to devices and users, providing advantages such as real-time service, sensitive data protection, and reduced network traffic. EdgeX Foundry, a representative open source of edge computing platforms, is an open source-based edge middleware platform that provides services between various devices and IT systems in the real world. EdgeX Foundry provides a service for handling camera devices, along with a service for handling existing sensed data, which only supports simple streaming and camera device management and does not store or process image data obtained from the device inside EdgeX. This paper presents a technique that can store and process image data inside EdgeX by applying some of the services provided by EdgeX Foundry. Based on the proposed technique, a service pipeline for object detection services used core in the field of autonomous driving was created for experiments and performance evaluation, and then compared and analyzed with existing methods.

A Study of Euro NCAP Pedestrian Protection Protocol in Upper Leg Area (유럽 신차 안전도 평가방법을 적용한 보행자 대퇴부 상해 영향 분석)

  • Hyungjoon Oh;Hanchun Cho;Junyi Kim;Seungki Kim
    • Journal of Auto-vehicle Safety Association
    • /
    • v.6 no.1
    • /
    • pp.16-21
    • /
    • 2014
  • Recently Korea and many countries are legislated for pedestrian protection as following the GTR(Global Technical Regulation). Most NCAP organization have been applying pedestrian protection results in their own rating system in individual or overall rating. Euro NCAP agency has been introduced it first. From the beginning, Euro NCAP had assessed occupant and pedestrian protection. It has become to strengthen a pedestrian protection protocol every time published. Korea NCAP also has been rating pedestrian protection with overall rating system. This paper proposed to study new pedestrian protection protocol especially upper leg in order to find injury response based on physical test. On Euro NCAP, the upper leg injury are assessed two kind of value which are bending moment and force.

A Watermarking for Text Document Images using Edge Direction Histograms (에지 방향 히스토그램을 이용한 텍스트 문서 영상의 워터마킹)

  • 김영원;오일석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.203-212
    • /
    • 2004
  • The watermarking is a method to achieve the copyright protection of multimedia contents. Among several media, the left documents show very peculiar properties: block/line/word patterning, clear separation between foreground and background areas. So algorithms specific to the text documents are required that meet those properties. This paper proposes a novel watermarking algorithm for the grayscale text document images. The algorithm inserts the watermark signals through the edge direction histograms. A concept of sub-image consistency is developed that the sub-images have similar shapes in terms of edge direction histograms. Using Korean, Chinese, and English document images, the concept is evaluated and proven to be valid over a wide range of document images. To insert watermark signals, the edge direction histogram is modified slightly. The experiments were performed on various document images and the algorithm was evaluated in terms of imperceptibility and robustness.

Crumple Zone Design and Upper Legform Impactor Analysis for Pedestrian Protection (보행자 보호를 위한 크럼플 존 설계 및 상부 다리모형 충격해석)

  • Jeon, Young-Eun;Moon, Hyung-Il;Kim, Yong-Soo;Kim, Heon-Young
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.3
    • /
    • pp.126-132
    • /
    • 2012
  • Recently, pedestrian protection related research topics have been actively studied by automotive designers and engineers due to the enhanced pedestrian protecting regulations. It is required to design an energy absorbing structure, such as crumple zone that can sufficiently absorb the impact energy to reduce the leg injury when accident happens. The structure is designed by reducing the height of front end module, considering the mounting location, and investigating impact characteristics. In this paper, the concept of the crumple zone was introduced and the role of the crumple zone was investigated by analyzing the performance of upper legform impact to a bonnet leading edge test, and the design process was suggested.