• 제목/요약/키워드: image_key

검색결과 1,401건 처리시간 0.028초

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

  • Hussain, Israr;Zeng, Jishen;Qin, Xinhong;Tan, Shunquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1228-1248
    • /
    • 2020
  • Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. Finally, technical challenges of current methods and several promising directions on deep learning steganography and steganalysis are suggested to illustrate how these challenges can be transferred into prolific future research avenues.

Mobile Palmprint Segmentation Based on Improved Active Shape Model

  • Gao, Fumeng;Cao, Kuishun;Leng, Lu;Yuan, Yue
    • Journal of Multimedia Information System
    • /
    • 제5권4호
    • /
    • pp.221-228
    • /
    • 2018
  • Skin-color information is not sufficient for palmprint segmentation in complex scenes, including mobile environments. Traditional active shape model (ASM) combines gray information and shape information, but its performance is not good in complex scenes. An improved ASM method is developed for palmprint segmentation, in which Perux method normalizes the shape of the palm. Then the shape model of the palm is calculated with principal component analysis. Finally, the color likelihood degree is used to replace the gray information for target fitting. The improved ASM method reduces the complexity, while improves the accuracy and robustness.

영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹 (User Key-based Fragile Watermarking for Detecting Image Modification)

  • 임재현;심혁재;전병우
    • 대한전자공학회논문지SP
    • /
    • 제38권5호
    • /
    • pp.474-485
    • /
    • 2001
  • 본 논문은 영상변형 검출을 목적으로 한 사용자 Key기반 Fragile 워터마크 삽입방법을 제안한다. 원 영상은 8×8 DCT를 거쳐 DCT 계수값으로 변환된 뒤, 사용자가 미리 준비한 워터마크 (Embedding 또는 Authentication Data) 이진 영상이 삽입된다. 이때, 삽입여부 및 삽입위치의 노출을 최소화시키기 위해, 사용자의 Key를 이용한 랜덤화 방법을 사용하도록 제안하였다. 각 DCT 블록에는 한 비트의 데이터가 감추어지게 되며, 각 블록에 삽입된 한 비트 데이터들은 전체적으로 저작권자 고유의 이진영상을 나타나게 된다. 5개의 실제 영상으로 실험한 결과, 제안한 방법은 영상변형 여부뿐만 아니라 그 위치도 알 수 있음을 실험적으로 확인하였다. 그러나, 50%이상의 압축이 가해지는 경우, 삽입된 워터마크가 많이 소실되어, 향후 압축공격에 대한 성능 개선이 필요한 것으로 나타났다.

  • PDF

Scale Invariant Auto-context for Object Segmentation and Labeling

  • Ji, Hongwei;He, Jiangping;Yang, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2881-2894
    • /
    • 2014
  • In complicated environment, context information plays an important role in image segmentation/labeling. The recently proposed auto-context algorithm is one of the effective context-based methods. However, the standard auto-context approach samples the context locations utilizing a fixed radius sequence, which is sensitive to large scale-change of objects. In this paper, we present a scale invariant auto-context (SIAC) algorithm which is an improved version of the auto-context algorithm. In order to achieve scale-invariance, we try to approximate the optimal scale for the image in an iterative way and adopt the corresponding optimal radius sequence for context location sampling, both in training and testing. In each iteration of the proposed SIAC algorithm, we use the current classification map to estimate the image scale, and the corresponding radius sequence is then used for choosing context locations. The algorithm iteratively updates the classification maps, as well as the image scales, until convergence. We demonstrate the SIAC algorithm on several image segmentation/labeling tasks. The results demonstrate improvement over the standard auto-context algorithm when large scale-change of objects exists.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • 제43권6호
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Method of Making the Distribution of Voxels Uniform within the Volumetric 3D image Space

  • Lin, Yuanfang;Liu, Xu;Xie, Xiaoyan;Liu, Xiangdong;Li, Haifeng
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 한국정보디스플레이학회 2008년도 International Meeting on Information Display
    • /
    • pp.1138-1141
    • /
    • 2008
  • By defining a uniform reference point array corresponding to the 3D voxel array and abandoning voxels whose deviations from their respective reference points exceed a given tolerance, the distribution of voxels within the volumetric 3D image space gets uniform, effects of non-uniform distribution upon the image reconstructing are eased.

  • PDF

멀티미디어 검색을 위한 shot 경계 및 대표 프레임 추출 (Shot boundary Frame Detection and Key Frame Detection for Multimedia Retrieval)

  • 강대성;김영호
    • 융합신호처리학회논문지
    • /
    • 제2권1호
    • /
    • pp.38-43
    • /
    • 2001
  • 본 논문에서는 MPEG 비디오 스트림을 분석하여 DCT DC 계수를 추출하고 이들로 구성된 DC 이미지로부터 제안하는 robust feature를 이용하여 shot 검출을 수행한 후 각 feature들의 통계적 특성을 이용하여 스트림의 특징에 따라 weight를 부가하여 구해진 characterizing value의 시간 변화량을 구한다. 추해진 변화량의 local maxima와 local minima는 비디오 스트림에서 각각 가장 특징적인 frame과 평균적인 frame을 나타낸다. 이 순간의 shot을 구함으로서 효과적이고 빠른 시간 내에 key frame을 추출한다. 추출되어진 key frame에 대하여 원영상을 복원한 후, 색인을 위하여 다수의 parameter를 구하고, 사용자가 질의한 영상에 대해서 이들 파라메터를 구하여 key frame들과 가장 유사한 대표영상들을 검색한다. 실험결과 일반적인 방법보다 더 나은 결과를 보였고, 높은 검색율을 보였다.

  • PDF

광 암호화를 이용한 안전한 지문 인식 시스템 (Secure Fingerprint Identification System based on Optical Encryption)

  • 한종욱;김춘수;박광호;김은수
    • 한국통신학회논문지
    • /
    • 제24권12B호
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

유사한 색상과 질감영역을 이용한 객체기반 영상검색 (Object-Based Image Search Using Color and Texture Homogeneous Regions)

  • 유헌우;장동식;서광규
    • 제어로봇시스템학회논문지
    • /
    • 제8권6호
    • /
    • pp.455-461
    • /
    • 2002
  • Object-based image retrieval method is addressed. A new image segmentation algorithm and image comparing method between segmented objects are proposed. For image segmentation, color and texture features are extracted from each pixel in the image. These features we used as inputs into VQ (Vector Quantization) clustering method, which yields homogeneous objects in terns of color and texture. In this procedure, colors are quantized into a few dominant colors for simple representation and efficient retrieval. In retrieval case, two comparing schemes are proposed. Comparing between one query object and multi objects of a database image and comparing between multi query objects and multi objects of a database image are proposed. For fast retrieval, dominant object colors are key-indexed into database.

패션 이미지어(語)의 연상 어휘 분석을 통한 디자인 발상차원에 관한 연구 -클래식, 아방가르드 이미지어를 중심으로- (A Study on the Dimension of Design Idea through the Analysis of Words that Remind of Fashion Image Words -Focusing on Classic and Avant-garde Imaged Language-)

  • 김윤경
    • 한국의류학회지
    • /
    • 제44권3호
    • /
    • pp.413-426
    • /
    • 2020
  • This study researches the association between associative vocabulary and fashion image language in order to extract ideas that can be used as basic data for design ideas. Classic - avant-garde imaged language were chosen as theme words and each 70 questionnaires per a final image word were used for analysis. We obtained the following results by researching keywords that explained classic image words through a word cloud technique. It was found to have high central representation in the order of suit, classical, basic, music, Chanel, black and traditional. The core key words explaining avant-garde image language were found to have a central representation in the order of : peculiar, huge, Comme des Garçons, artistic, creative, deconstruction and individuality. We extracted the necessary idea dimensions needed for design ideas through associative network graph analysis. In the case of classical image language, it was named as the Mannish Item, Music, Modern Color, and the Traditional Classicality dimensions. In the case of avant-garde image language, it was named as the Key Image, Artistic Aura, Key Design and Designers dimensions.