• Title/Summary/Keyword: embedded coding

Search Result 162, Processing Time 0.026 seconds

Region-based scalable self-recovery for salient-object images

  • Daneshmandpour, Navid;Danyali, Habibollah;Helfroush, Mohammad Sadegh
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.109-119
    • /
    • 2021
  • Self-recovery is a tamper-detection and image recovery methods based on data hiding. It generates two types of data and embeds them into the original image: authentication data for tamper detection and reference data for image recovery. In this paper, a region-based scalable self-recovery (RSS) method is proposed for salient-object images. As the images consist of two main regions, the region of interest (ROI) and the region of non-interest (RONI), the proposed method is aimed at achieving higher reconstruction quality for the ROI. Moreover, tamper tolerability is improved by using scalable recovery. In the RSS method, separate reference data are generated for the ROI and RONI. Initially, two compressed bitstreams at different rates are generated using the embedded zero-block coding source encoder. Subsequently, each bitstream is divided into several parts, which are protected through various redundancy rates, using the Reed-Solomon channel encoder. The proposed method is tested on 10 000 salient-object images from the MSRA database. The results show that the RSS method, compared to related methods, improves reconstruction quality and tamper tolerability by approximately 30% and 15%, respectively.

An Analysis of Image Use in Twitter Message (트위터 상의 이미지 이용에 관한 분석)

  • Chung, EunKyung;Yoon, JungWon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.4
    • /
    • pp.75-90
    • /
    • 2013
  • Given the context that users are actively using social media with multimedia embedded information, the purpose of this study is to demonstrate how images are used within Twitter messages, especially in influential and favorited messages. In order to achieve the purpose of this study, the top 200 influential and favorited messages with images were selected out of 1,589 tweets related to "Boston bombing" in April 2013. The characteristics of the message, image use, and user are analyzed and compared. Two phases of the analysis were conducted on three data sets containing the top 200 influential messages, top 200 favorited messages, and general messages. In the first phase, coding schemes have been developed for conducting three categorical analyses: (1) categorization of tweets, (2) categorization of image use, and (3) categorization of users. The three data sets were then coded using the coding schemes. In the second phase, comparison analyses were conducted among influential, favorited, and general tweets in terms of tweet type, image use, and user. While messages expressing opinion were found to be most favorited, the messages that shared information were recognized as most influential to users. On the other hand, as only four image uses - information dissemination, illustration, emotive/persuasive, and information processing - were found in this data set, the primary image use is likely to be data-driven rather than object-driven. From the perspective of users, the user types such as government, celebrity, and photo-sharing sites were found to be favorited and influential. An improved understanding of how users' image needs, in the context of social media, contribute to the body of knowledge of image needs. This study will also provide valuable insight into practical designs and implications of image retrieval systems or services.

Hardware Implementation of DCT and CAVLC for H.264/AVC based on Co-design (병행설계를 이용한 H.264/AVC의 DCT 및 CAVLC 하드웨어 구현)

  • Wang, Duck-Sang;Seo, Seok-Yong;Ko, Hyung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.69-79
    • /
    • 2013
  • In this paper, DCT(Discrete Cosine Transform) and CAVLC(Context Adaptive Variable Length Coding) are co-designed as hardware IP with software operation of the other modules in H.264/AVC codec. In order to increase the operation speed, a new method using SHIFT table is proposed. As a result, enhancement of about 16(%) in the operation speed is obtained. Designed Hardware IPs are downloaded into Virtex-4 FX60 FPGA in the ML-410 development board and H.264/AVC encoding is performed with Microblaze CPU implemented in FPGA. Software modules are developed from JM13.2 to make C code. In order to verify the designed Hardware IPs, Modelsim program is used for functional simulation. As a result that all Hardware IPs and software modules are downloaded into the FPGA, improvement of processing speed about multiples of 16 in case of DCT hardware IP and multiples of 10 in case of CAVLC compared with software-only processing. Although this paper deals with co-design of H/W and S/W for H.264, it can be utilized for the other embedded system design.

A Digital Image Watermarking Using A Bottom-up Attention Module (상향식 주의 모듈을 사용한 디지털 워터마킹 기법)

  • Cheoi, Kyung-Joo
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.293-300
    • /
    • 2008
  • This paper takes a bottom-up attention module into consideration for digital image watermarking. A bottom-up attention module is employed to obtain the region of interest, and watermark information is embedded into the obtained region. Previous studies in digital image watermarking have been focused on the signal processing techniques, especially in waveform coding spreading watermarks over the entire target image. However, we notice that the third party's visual attention is usually concentrated on a few regions in an image but not on all of them. These regions are easy to be the target of attacks. If watermark information is inserted into these regions from the beginning, it can be detected with high correlation. Various kinds of images are tested, and the results showed good quality.

Secure methodology of the Autocode integrity for the Helicopter Fly-By-Wire Control Law using formal verification tool (정형검증 도구를 활용한 Fly-By-Wire 헬리콥터 비행제어법칙 자동코드 무결성 확보 방안)

  • An, Seong-Jun;Cho, In-Je;Kang, Hye-Jin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.5
    • /
    • pp.398-405
    • /
    • 2014
  • Recently the embedded software has been widely applied to the safety-critical systems in aviation and defense industries, therefore, the higher level of reliability, availability and fault tolerance has become a key factor for its implementation into the systems. The integrity of the software can be verified using the static analysis tools. And recent developed static analysis tool can evaluate code integrity through the mathematical analysis method. In this paper we detect the autocode error and violation of coding rules using the formal verification tool, Polyspace(R). And the fundamental errors on the flight control law model have been detected and corrected using the formal verification results. As a result of verification process, FBW helicopter control law autocode can ensure code integrity.

Efficient Image Upsampling using Frequency Resolution Expansion Schemes in DCT Domain (DCT 도메인에서의 주파수 해상도 화장 기법을 이용한 효과적인 이미지 업샘플링)

  • Park Seung-Wook;Park Ji-Ho;Jeon Byeong-Moon;Park Hyun Wook
    • Journal of Broadcast Engineering
    • /
    • v.10 no.4 s.29
    • /
    • pp.505-514
    • /
    • 2005
  • Image upsampling can be performed in both spatial and frequency (transform) domain. In the spatial domain, various upsampling techniques are developed and 6-tap FIR interpolation filter is most well known method, which is embedded in many video coding standards. It can provide high subjective quality but shows low objective quality. In the transform domain, simple zero padding method can produce upsampled image easily. It shows better objective quality than 6-tap filtering, but it yields ringing effects which annoy eyes. In this paper, we present efficient upsampling method using frequency addition method in transform domain to provide better subjective and objective quality than conventional method Extensive simulation results show that the proposed algorithm produces visually fine images with high PSNR.

Study on the Generation of Inaudible Binary Random Number Using Canonical Signed Digit Coding (표준 부호 디지트 코딩을 이용한 비가청 이진 랜덤 신호 발생에 관한 연구)

  • Nam, MyungWoo;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.4
    • /
    • pp.263-269
    • /
    • 2015
  • Digital watermarking is imperceptible and statistically undetectable information embeds into digital data. Most information in digital audio watermarking schemes have used binary random sequences. The embedded binary random sequence distorts and modifies the original data while it plays a vital role in security. In this paper, a binary random sequence to improve imperceptibility in perceptual region of the human auditory system is proposed. The basic idea of this work is a modification of a binary random sequence according to the frequency analysis of adjacent binary digits that have different signs in the sequence. The canonical signed digit code (CSDC) is also applied to modify a general binary random sequence and the pair-matching function between original and its modified version. In our experiment, frequency characteristics of the proposed binary random sequence was evaluated and analyzed by Bark scale representation of frequency and frequency gains.

Robust Blind- Video Watermarking against MPEG-4 Scalable Video Coding and Multimedia Transcoding (MPEG-4 스케일러블 비디오 코딩 및 멀티미디어 트랜스코딩에 강인한 블라인드 비디오 워터마킹)

  • Yoon, Ji-Sun;Lee, Suk-Hwan;Song, Yoon-Chul;Jang, Bong-Joo;Kwon, Ki-Ryong;Kim, Min-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1347-1358
    • /
    • 2008
  • A blind video watermarking scheme for providing safety, authenticity, and copyright protection is proposed in this paper, which is robust to MPEG-4 SVC and multimedia transcoding. In proposed method, embedding and detecting of watermark is performed based on base layer with considering spatial SVC. To be robust from temporal SVC, our method embeds repeatedly a permutated character with ordering number per one frame. Also for robustness from multimedia transcoding and FGS, the method is embedded watermark in low middle frequency of each frame adaptively based on DCT in ROI. Through experimental results, invisibility of the watermark is confirmed and robustness of the watermark against the spatial SVC, temporal SVC, FGS and video transcoding between MPEG-2 and MPEG-4 SVC is also verified.

  • PDF

Population Analysis of Iranian Potato virus Y Isolates Using Complete Genome Sequence

  • Pourrahim, Reza;Farzadfar, Shirin
    • The Plant Pathology Journal
    • /
    • v.32 no.1
    • /
    • pp.33-46
    • /
    • 2016
  • In this study, the full-length nucleotide sequences of four Iranian PVY isolates belonging to $PVY^N$ strain were determined. The genome of Iranian PVY isolates were 9,703-9,707 nucleotides long encoding all potyviral cistrons including P1, HC-Pro, P3, 6K1, CI, 6K2, VPg, NIa-Pro, NIb and CP with coding regions of 825, 1,395, 1,095, 156, 1,902, 156, 564, 732, 1,557 and 801 nucleotides in length, respectively. The length of pipo, embedded in the P3 cistron, was 231 nucleotides. Phylogenetic analysis showed that the Iranian isolates clustered with European recombinant NTN isolates in the N lineage. Recombination analysis demonstrated that Iranian $PVY^N$ isolates had a typical European $PVY^{NTN}$ genome having three recombinant junctions while $PVY^N$ and $PVY^O$ were identified as the parents. We used dN/dS methods to detect candidate amino acid positions for positive selection in viral proteins. The mean ${\omega}$ ratio differed among different genes. Using model M0, ${\omega}$ values were 0.267 (P1), 0.085 (HC-Pro), 0.153 (P3), 0.050 (CI), 0.078 (VPg), 0.087 (NIa-pro), 0.079 (NIb) and 0.165 (CP). The analysis showed different sites within P1, P3 and CP were under positive selection pressure, however, the sites varied among PVY populations. To the best of our knowledge, our analysis provides the first demonstration of population structure of $PVY^N$ strain in mid-Eurasia Iran using complete genome sequences and highlights the importance of recombination and selection pressure in the evolution of PVY.

Embedded Zerotree Wavelet Image Compression using Daubechies Filtering (Daubechies Filtering을 이용한 EZW 영상 압축)

  • Kim, Jang-Won;Song, Dae-Geon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.4
    • /
    • pp.19-28
    • /
    • 2009
  • This paper is a study on method that the EZW algorithm is proposed effective compression technique of wavelet transformed image. The EZW algorithm is encoded by zerotree coding technique using self-similarity of wavelet coefficients. If the coefficient is larger than the threshold a POS coded, if the coefficients is smaller than minus the threshold a NEG is coded. If the coefficient is the root of a zerotree than a ZTR is coded and finally, if the coefficient is smaller then the threshold but it is not the root of a zerotree, than an IZ is coded. This process is repeated until all the wavelet coefficients have been encoded completely. This paper was compared to EZW algorithm and a widely available version of JPEG. As the results of compare, it is shown that the PSNR of the EZW algorithm is better than JPEG.

  • PDF