• Title/Summary/Keyword: image compression

Search Result 1,582, Processing Time 0.024 seconds

On Robust Principal Component using Analysis Neural Networks (신경망을 이용한 로버스트 주성분 분석에 관한 연구)

  • Kim, Sang-Min;Oh, Kwang-Sik;Park, Hee-Joo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.7 no.1
    • /
    • pp.113-118
    • /
    • 1996
  • Principal component analysis(PCA) is an essential technique for data compression and feature extraction, and has been widely used in statistical data analysis, communication theory, pattern recognition, and image processing. Oja(1992) found that a linear neuron with constrained Hebbian learning rule can extract the principal component by using stochastic gradient ascent method. In practice real data often contain some outliers. These outliers will significantly deteriorate the performances of the PCA algorithms. In order to make PCA robust, Xu & Yuille(1995) applied statistical physics to the problem of robust principal component analysis(RPCA). Devlin et.al(1981) obtained principal components by using techniques such as M-estimation. The propose of this paper is to investigate from the statistical point of view how Xu & Yuille's(1995) RPCA works under the same simulation condition as in Devlin et.al(1981).

  • PDF

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

The Efficient Multimedia Data Transmission Using NMEA-0183 (NMEA-0183을 이용한 효율적인 멀티미디어 데이터 전송)

  • Hong, Sung-Hwa;Yang, Seong-Ryul;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.121-127
    • /
    • 2014
  • The functionality of BNWAS and its operations are investigated through its international standard. But the BNWAS is being used currently in the ship had difficulty in monitoring. Several kinds of data are generated from many equipments in BNWAS, such as NMEA-0183 data or NMEA-2000. In this paper, we have proposed a method of the multimedia data transmission using a communication protocol based on slower NMEA-0183, which is mainly used in BNWAS. Data compression techniques are needed for smooth streaming services of the multimedia data in the low data rate over the NMEA-0183 interface. Although these data are mainly used for the instruments of ship, their efficient transmission may be needed if they are managed to control the BNWAS equipment with sensors.

Digital Image Watermarking using Inner Product and Adaptive Quantization (내적과 적응성 양자화를 이용한 디지털 영상의 워터마킹 방법)

  • 이승욱;김진호;호요성
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.50-57
    • /
    • 2001
  • A digital watermarking is a newly developed scheme to embed invisible or inaudible information Into the host data in order to insist the copyright of the owner or the creator. This paper describes a robust data embedding scheme that employs inner product and adaptive quantization. Compared to the previous works for digital watermarking, our proposed scheme can embed relatively large amount of Information, since a secrete key Is not directly relaxed to the watermark data. A secret key is used for the design of random direction vectors. which are taken Inner product with the DCT transformed feature set data. In odder to achieve robustness against malicious attacks. we exploit the Properties of human visual system In designing the random direction vectors which behave as embedded noises. Experimental results show that we can recover the embedded information without utilizing the original host data. We also demonstrate that the ownership assertion is possible even though The watermarked data may undergo common signal processing operations, such as JPEG compression. clopping. and filtering.

  • PDF

3-D Wavelet Compression with Lifting Scheme for Rendering Concentric Mosaic Image (동심원 모자이크 영상 표현을 위한 Lifting을 이용한 3차원 웨이브렛 압축)

  • Jang Sun-Bong;Jee Inn-Ho
    • Journal of Broadcast Engineering
    • /
    • v.11 no.2 s.31
    • /
    • pp.164-173
    • /
    • 2006
  • The data structure of the concentric mosaic can be regarded as a video sequence with a slowly panning camera. We take a concentric mosaic with match or alignment of video sequences. Also the concentric mosaic required for huge memory. Thus, compressing is essential in order to use the concentric mosaic. Therefore we need the algorithm that compressed data structure was maintained and the scene was decoded. In this paper, we used 3D lifting transform to compress concentric mosaic. Lifting transform has a merit of wavelet transform and reduces computation quantities and memory. Because each frame has high correlation, the complexity which a scene is detected form 3D transformed bitstream is increased. Thus, in order to have higher performance and decrease the complexity of detecting of a scene we executed 3D lifting and then transformed data set was sequently compressed with each frame unit. Each frame has a flexible bit rate. Also, we proposed the algorithm that compressed data structure was maintained and the scene was decoded by using property of lifting structure.

Low Computational Adaptive Expanded Block Search Motion Estimation Method (저연산 적응형 확장 블록 탐색 움직임 추정 기법)

  • Choi, Su-Woo;Yun, Jong-Ho;Cho, Tae-Kyung;Choi, Myung-Ryul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1254-1259
    • /
    • 2010
  • In this paper, Low Computational Adaptive Expanded Block Search Motion Estimation Method is proposed. Proposed method classifies ME blocks as Average Motion Block(AMB) and Local Motion Block(LMB) according to correlation of reference frame. It could reduce the computational complexity with performing Modified Fast Search(MFS). And accuracy of MV is also increased by 4 sub-blocks on LMB and Block Expansion(BE). The experimental results show that the proposed method has better performance that increased 1.8dB than Diamond Search and 0.6dB than Full Search with 7.5 % computation of Full Search. The proposed method could be applied to video compression and Frame Rate Conversion(FRC).

Design of Invisible Watermarking for Biometric Image of Electronic ID Card (전자신분증용 바이오 영상을 위한 비인지 워터마킹 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Kim, Won-Gyum
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1555-1565
    • /
    • 2008
  • Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.

  • PDF

Hardware Design for JBIG2 Huffman Coder (JBIG2 허프만 부호화기의 하드웨어 설계)

  • Park, Kyung-Jun;Ko, Hyung-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.200-208
    • /
    • 2009
  • JBIG2, as the next generation standard for binary image compression, must be designed in hardware modules for the JBIG2 FAX to be implemented in an embedded equipment. This paper proposes a hardware module of the high-speed Huffman coder for JBIG2. The Huffman coder of JBIG2 uses selectively 15 Huffman tables. As the Huffman coder is designed to use minimal data and have an efficient memory usage, high speed processing is possible. The designed Huffman coder is ported to Virtex-4 FPGA and co-operating with a software modules on the embedded development board using Microblaze core. The designed IP was successfully verified using the simulation function test and hardware-software co-operating test. Experimental results shows the processing time is 10 times faster than that of software only on embedded system, because of hardware design using an efficient memory usage.

  • PDF

Correlation of ROI Coding Parameters and ROI Coding Methods in JPEG2000 (JPEG2000에서 ROI 코딩 파라미터와 ROI 코딩 방법의 상관관계)

  • Kim, Ho-Yong;Kim, Hyung-Jun;Seo, Yeong-Geon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.143-152
    • /
    • 2006
  • JPEG2000, the standard of still image compression based on wavelet, will be widely used. One of the greatest characteristics of JPEG2000 is to offer ROI(Region-Of-Interest) coding. This is to compress with high quality the region that the user wants better than the other region. JPEG2000 and ROI have different parameters, which are tile size and ROI size, wavelet filter type and ROI shape and its location, codeblock size and number of ROI, number of DWT decomposition level and ROI importance, and number of quality layer and low resolution sub-band importance. In this paper, we shows the correlation of the parameters and ROI coding methods through experiments. This helps an application select the parameters and the methods to meet the application.

  • PDF

Design and Implementation of Mobile Contents to provide Marine Leisure Information (해양레저정보를 제공하기 위한 모바일 콘텐츠의 설계 및 구현)

  • Jeong, Seong-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2009
  • As a marine leisure industry has being developed and demands for leisure culture have rapidly increased, the needs for services offering marine safety and related information are growing. Accordingly, in the study I developed the contents providing server to support this with ENC agent who presents geographical information of digitalized Electronic Nautical Chart satisfying with the standard(S-57) by International Hydrographic Organization and a web searching agent who builds a database by collecting marine-related information in order to provide a variety of realtime information such as weather, fishing and news. In addition, I designed and embodied network based mobile contents which can be presented on a WIPI(Wireless Internet Platform for Interoperability) based portable handset by receiving an ENC and other processed information from server. With the results produced by such experiments, I measured a compressibility corresponding to a image compression format of electronic nautical chart transmitted and analyzed the correlation between increase in packets of requested information and the cost.

  • PDF