• Title/Summary/Keyword: embedding efficiency

Search Result 84, Processing Time 0.024 seconds

Low-Complexity Watermarking into SAO Offsets for HEVC Videos

  • Wu, Xiangjian;Jo, Hyun-Ho;Sim, Donggyu
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.243-249
    • /
    • 2016
  • This paper proposes a new watermarking algorithm to embed watermarks in thr process of sample adaptive offsets (SAO) for high efficiency video coding (HEVC) compressed videos. The proposed method embeds two-bit watermark into the SAO offsets for each coding tree unit (CTU). To minimize visual quality degradation caused by embedding watermark, watermark bits are embedded into SAO offset depending on the SAO types of block. Furthermore, the embedded watermark can be extracted by simply adding four offsets and checking their least significant bits (LSB) at the decoder side. The experimental results show that the proposed method achieves 0.3% BD-rate increase without much visual quality degradation. Two-bit watermark for each CTU is embedded for more bit watermarking. In addition, the proposed method requires negligible computational load for watermark insertion and extraction.

A Study on the Wavelet-based Watermarking Techniques Comparison for Digital Image (웨이블릿 기반의 영상 워터마킹 기법 비교 연구)

  • 김선우;최연성;박한엽;김현주
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.629-632
    • /
    • 2001
  • In this paper, We compared with advantage and disadvantage about several wavelet-basis watermarking techniques for digital image. Watermarking is embedding a digital signal called as 'watermark' into images to claim the ownership. In this study, simulation performed using wavelet based method among the various watermarking techniques proposed on domestic and foreign country. The experimental results show that the efficiency watermarking techniques among the proposed various techniques with good quality and robustness property.

  • PDF

Memory-Efficient NBNN Image Classification

  • Lee, YoonSeok;Yoon, Sung-Eui
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Naive Bayes nearest neighbor (NBNN) is a simple image classifier based on identifying nearest neighbors. NBNN uses original image descriptors (e.g., SIFTs) without vector quantization for preserving the discriminative power of descriptors and has a powerful generalization characteristic. However, it has a distinct disadvantage. Its memory requirement can be prohibitively high while processing a large amount of data. To deal with this problem, we apply a spherical hashing binary code embedding technique, to compactly encode data without significantly losing classification accuracy. We also propose using an inverted index to identify nearest neighbors among binarized image descriptors. To demonstrate the benefits of our method, we apply our method to two existing NBNN techniques with an image dataset. By using 64 bit length, we are able to reduce memory 16 times with higher runtime performance and no significant loss of classification accuracy. This result is achieved by our compact encoding scheme for image descriptors without losing much information from original image descriptors.

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

A semi-automatic cell type annotation method for single-cell RNA sequencing dataset

  • Kim, Wan;Yoon, Sung Min;Kim, Sangsoo
    • Genomics & Informatics
    • /
    • v.18 no.3
    • /
    • pp.26.1-26.6
    • /
    • 2020
  • Single-cell RNA sequencing (scRNA-seq) has been widely applied to provide insights into the cell-by-cell expression difference in a given bulk sample. Accordingly, numerous analysis methods have been developed. As it involves simultaneous analyses of many cell and genes, efficiency of the methods is crucial. The conventional cell type annotation method is laborious and subjective. Here we propose a semi-automatic method that calculates a normalized score for each cell type based on user-supplied cell type-specific marker gene list. The method was applied to a publicly available scRNA-seq data of mouse cardiac non-myocyte cell pool. Annotating the 35 t-stochastic neighbor embedding clusters into 12 cell types was straightforward, and its accuracy was evaluated by constructing co-expression network for each cell type. Gene Ontology analysis was congruent with the annotated cell type and the corollary regulatory network analysis showed upstream transcription factors that have well supported literature evidences. The source code is available as an R script upon request.

Integrated Char-Word Embedding on Chinese NER using Transformer (트랜스포머를 이용한 중국어 NER 관련 문자와 단어 통합 임배딩)

  • Jin, ChunGuang;Joe, Inwhee
    • Annual Conference of KIPS
    • /
    • 2021.05a
    • /
    • pp.415-417
    • /
    • 2021
  • Since the words and words in Chinese sentences are continuous and the length of vocabulary is huge, Chinese NER(Named Entity Recognition) always based on character representation. In recent years, many Chinese research has been reconsidered how to integrate the word information into the Chinese NER model. However, the traditional sequence model has complex structure, the slow inference speed, and an additional dictionary information is needed, which is difficult to implement in the industry. The approach in this paper has the state of the art and parallelizable, which is integrated the char-word embeddings, so that the model learns word information. The proposed model is easy to implement, and outperforms traditional model in terms of speed and efficiency, which is improved f1-score on two dataset.

A Study on the Project Governance and the Project Performance (PMO의 프로젝트 거버넌스 역할이 프로젝트 성과에 미치는 영향에 관한 연구)

  • Kim, Min-Sun;Lim, Byung-Woo;Lee, Jae-Beum
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.115-131
    • /
    • 2008
  • As the innovation of computer and communication technology, IT has played a role of increasing the business efficiency and offering new business opportunities. Many organizations have tried to launch IT projects, and the investment scale has been getting bigger. However, a lot of IT projects have been failed because of the difficulties of project management. Therefore, the purpose of this study is to know how the roles of project governance affect the project performance and what role of the project governance will be affected to solve the problems which might be taken place while developing the project. As the results of this study, the roles of project governance - linking, coordination, control, strategic direction, support, societal embedding, highly affect the project performance. To solve the problems which might be occurred while implementing the project, the control and the societal embedding roles playa crucial role compared to the other roles of the project governance. In other words, the roles of project governance should be utilized for the success of IT project, and the control and the societal embedding of the project governance should be modified and complemented to solve the problems which might be occurred while developing the project.

  • PDF

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

Enhancement of β-cyclodextrin Production and Fabrication of Edible Antimicrobial Films Incorporated with Clove Essential Oil/β-cyclodextrin Inclusion Complex

  • Farahat, Mohamed G.
    • Microbiology and Biotechnology Letters
    • /
    • v.48 no.1
    • /
    • pp.12-23
    • /
    • 2020
  • Edible films containing antimicrobial agents can be used as safe alternatives to preserve food products. Essential oils are well-recognized antimicrobials. However, their low water solubility, volatility and high sensitivity to oxygen and light limit their application in food preservation. These limitations could be overcome by embedding these essential oils in complexed product matrices exploiting the encapsulation efficiency of β-cyclodextrin. This study focused on the maximization of β-cyclodextrin production using cyclodextrin glucanotransferase (CGTase) and the evaluation of its encapsulation efficacy to fabricate edible antimicrobial films. Response surface methodology (RSM) was used to optimize CGTase production by Brevibacillus brevis AMI-2 isolated from mangrove sediments. This enzyme was partially purified using a starch adsorption method and entrapped in calcium alginate. Cyclodextrin produced by the immobilized enzyme was then confirmed using high performance thin layer chromatography, and its encapsulation efficiency was investigated. The clove oil/β-cyclodextrin inclusion complexes were prepared using the coprecipitation method, and incorporated into chitosan films, and subjected to antimicrobial testing. Results revealed that β-cyclodextrin was produced as a major product of the enzymatic reaction. In addition, the incorporation of clove oil/β-cyclodextrin inclusion complexes significantly increased the antimicrobial activity of chitosan films against Staphylococcus aureus, Staphylococcus epidermidis, Salmonella Typhimurium, Escherichia coli, and Candida albicans. In conclusion, B. brevis AMI-2 is a promising source for CGTase to synthesize β-cyclodextrin with considerable encapsulation efficiency. Further, the obtained results suggest that chitosan films containing clove oils encapsulated in β-cyclodextrin could serve as edible antimicrobial food-packaging materials to combat microbial contamination.