• Title/Summary/Keyword: masking

Search Result 747, Processing Time 0.03 seconds

Unsharp masking based on the vector projection for removing color distortion (색차 왜곡 방지를 위한 벡터투사 기반 언샤프 마스킹 기법)

  • Lee, Kwang-Wook;Dan, Byung-Kyu;Kim, Seung-Kyun;Ko, Sung-Jea
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.224-231
    • /
    • 2009
  • Unsharp masking is a popular image enhancement technique used to sharpen an image appearance in gray images. However, the conventional unsharp making techniques amplify the noise and easily cause overshoot artifacts. Moreover, the unsharp masking tends to introduce color distortion when it is applied to the each color component independently. To solve these problems, we propose a novel unsharp masking technique based on human visual system and vector projection. The proposed algorithm consists of two steps. First, the proposed algorithm controls the level of sharpening by exploiting the characteristics of the human visual system and contrast region. Then the vector projection is applied to remove the color distortion. Experiment results show that our proposed algorithm successfully produces sharpened images that are free of noise and color distortion commonly found in the conventional unsharp masking algorithms.

  • PDF

New Power Analysis Attack on The Masking Type Conversion Algorithm (마스킹 형태 변환 알고리즘에 대한 새로운 전력 분석 공격)

  • Cho, Young-In;Kim, Hee-Seok;Han, Dong-Guk;Hong, Seok-Hie;Kang, Ju-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.159-168
    • /
    • 2010
  • In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. The type conversion of masking is unavoidable since Boolean operation and Arithmetic operation are performed together in block cipher. Messerges proposed a masking type conversion algorithm resistant general power analysis attack and then it's vulnerability was reported. We present that some of exiting attacks have some practical problems and propose a new power analysis attack on Messerges's algorithm. After we propose the strengthen DPA and CPA attack on the masking type conversion algorithm, we show that our proposed attack is a practical threat as the simulation results.

Image Quality Assessment by Combining Masking Texture and Perceptual Color Difference Model

  • Tang, Zhisen;Zheng, Yuanlin;Wang, Wei;Liao, Kaiyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2938-2956
    • /
    • 2020
  • Objective image quality assessment (IQA) models have been developed by effective features to imitate the characteristics of human visual system (HVS). Actually, HVS is extremely sensitive to color degradation and complex texture changes. In this paper, we firstly reveal that many existing full reference image quality assessment (FR-IQA) methods can hardly measure the image quality with contrast and masking texture changes. To solve this problem, considering texture masking effect, we proposed a novel FR-IQA method, called Texture and Color Quality Index (TCQI). The proposed method considers both in the masking effect texture and color visual perceptual threshold, which adopts three kinds of features to reflect masking texture, color difference and structural information. Furthermore, random forest (RF) is used to address the drawbacks of existing pooling technologies. Compared with other traditional learning-based tools (support vector regression and neural network), RF can achieve the better prediction performance. Experiments conducted on five large-scale databases demonstrate that our approach is highly consistent with subjective perception, outperforms twelve the state-of-the-art IQA models in terms of prediction accuracy and keeps a moderate computational complexity. The cross database validation also validates our approach achieves the ability to maintain high robustness.

Deep Learning-based Target Masking Scheme for Understanding Meaning of Newly Coined Words

  • Nam, Gun-Min;Kim, Namgyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.157-165
    • /
    • 2021
  • Recently, studies using deep learning to analyze a large amount of text are being actively conducted. In particular, a pre-trained language model that applies the learning results of a large amount of text to the analysis of a specific domain text is attracting attention. Among various pre-trained language models, BERT(Bidirectional Encoder Representations from Transformers)-based model is the most widely used. Recently, research to improve the performance of analysis is being conducted through further pre-training using BERT's MLM(Masked Language Model). However, the traditional MLM has difficulties in clearly understands the meaning of sentences containing new words such as newly coined words. Therefore, in this study, we newly propose NTM(Newly coined words Target Masking), which performs masking only on new words. As a result of analyzing about 700,000 movie reviews of portal 'N' by applying the proposed methodology, it was confirmed that the proposed NTM showed superior performance in terms of accuracy of sensitivity analysis compared to the existing random masking.

Choice of resin cement shades for a high-translucency zirconia product to mask dark, discolored or metal substrates

  • Dai, Shiqi;Chen, Chen;Tang, Mo;Chen, Ying;Yang, Lu;He, Feng;Chen, Bingzhuo;Xie, Haifeng
    • The Journal of Advanced Prosthodontics
    • /
    • v.11 no.5
    • /
    • pp.286-296
    • /
    • 2019
  • PURPOSE. The aim was to study the masking ability of high-translucency monolithic zirconia and provide guidance in selecting resin luting cements in order to mask discolored substrates. MATERIALS AND METHODS. 160 high-translucency zirconia specimens were divided into 32 groups depending on their thickness and shades. Using five shades of try-in paste, the specimens were luted onto the substrates (Co-Cr, precious-metal, opaque porcelain-sintered Co-Cr, opaque porcelain-sintered precious-metal, and 5M3-shade zirconia). All CIELAB color parameters were measured and statistically analyzed. RESULTS. Zirconia shade and thickness and try-in paste shade affected CIELAB color parameters (P=.000) in different substrates groups, and there were interactions among these factors (P=.000). All five try-in paste shades can be chosen to achieve ${\Delta}E$ values of zirconia with 1.2 - 1.5 mm for masking dark-tooth-like 5M3-shade and zirconia with 1.5 mm for masking precious-metal groups < 2.6. Only suitable try-in paste shades were used, can ${\Delta}E$ values that less than 2.6 be achieved when applied translucent monolithic zirconia with 0.7-1.0 mm for masking dark-tooth-like 5M3-shade and zirconia with 0.7 - 1.2 mm for masking precious-metal groups. CONCLUSION. Choosing suitable resin cement shades is necessary for high-translucency monolithic zirconia to achieve ideal masking ability (${\Delta}E$ < 2.6) on the dark-tooth.

Statistical Analysis of High-Order Power Analysis (고차 전력 분석에 대한 통계적 수식의 일반화)

  • Kim, Min-Su;Kim, Hee-Seok;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.27-37
    • /
    • 2011
  • dth-order power analysis can safely be defended by dth-order masking method. However, as the degree of applied masking method increases, it can significantly decrease effectiveness of cryptosystem. The existing statistical analysis on high-order power analysis contains only analysis on second power analysis. However, this means absent of safety standards when crypto engineers apply 3rd or more order masking. this absent of standards can lead to insignificant usage of masking method which can significantly decrease effectiveness of cryptosystem. In this dissertation, we have generalize statistical values on high-order power analysis to establish these standards. In other words, we have generalized the value of a correlation coefficient when calculation of high-order power analysis methods are performed. That is to say, it can greatly be used to indicate a degrees that can be applied on further usage of masking method.

DPA-Resistant Low-Area Design of AES S-Box Inversion (일차 차분 전력 분석에 안전한 저면적 AES S-Box 역원기 설계)

  • Kim, Hee-Seok;Han, Dong-Guk;Kim, Tae-Hyun;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.21-28
    • /
    • 2009
  • In the recent years, power attacks were widely investigated, and so various countermeasures have been proposed, In the case of block ciphers, masking methods that blind the intermediate values in the algorithm computations(encryption, decryption, and key-schedule) are well-known among these countermeasures. But the cost of non-linear part is extremely high in the masking method of block cipher, and so the inversion of S-box is the most significant part in the case of AES. This fact make various countermeasures be proposed for reducing the cost of masking inversion and Zakeri's method using normal bases over the composite field is known to be most efficient algorithm among these masking method. We rearrange the masking inversion operation over the composite field and so can find duplicated multiplications. Because of these duplicated multiplications, our method can reduce about 10.5% gates in comparison with Zakeri's method.

Main causes of missing errors during software testing

  • Young-Mi Kim;Myung-Hwan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.89-100
    • /
    • 2024
  • The primary goal of software testing is to identify and correct errors within software. A key challenge in this process is error masking, where errors disappear internally before reaching the output. This paper investigates the causes and characteristics of error masking, which complicates software testing. The study involved injecting artificial errors into three software programs to examine the extent of error masking by various test cases and to explore the underlying reasons. The experiment yielded four major findings. First, about 50% of the error masking occurred because the errors were not executed. Second, among various operators, logical and arithmetic operators masked errors less frequently, while relational and temporal operators tended to mask errors more extensively. Third, certain test cases demonstrated exceptional effectiveness in propagating errors to the output. Fourth, the type of error injected influenced the masking effect.

A Study on the Masking Data in Camera-Back Method with three-aim-point Control (Camera-Back Method 에 있어서 Masking Data에 관한 연구)

  • ChulWhoiKoo
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.4 no.1
    • /
    • pp.27-35
    • /
    • 1986
  • Following results about Y,M,C Mask are obtained by the Indirect-Screen Color Separation Method. We make use of experimental system which are in use for the student education. In the Camera-Back Method of reflection copy, the results are summerized as follows.

  • PDF

A Study on the Masking Data in All-Projection Method for Transparent Copy (All-Projection Method에 있어서 Masking Data에 관한 연구)

  • ChulWhoiKoo
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 1987
  • Following results about Y, M, C mask are obtained by the Indirect-Screen Color Separation Method. We mark use of experimental system which are in use for the student education. In the All-Projection Method of transparency Copy, the results are summerized as follows; (omitted)

  • PDF