• Title/Summary/Keyword: masking method

Search Result 331, Processing Time 0.034 seconds

A study on the Masking Data in Indirect Screen Color Separation with three-aim-point Control (간접 색분해에 있어서 Masking의 Data 에 관한 연구)

  • 구철회
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.3 no.1
    • /
    • pp.27-41
    • /
    • 1985
  • Following results about Y,M,C mask are obtained by the Indirect-Screen Color Separation Method. We make use of experimental systems which are in use for the student education. In the Camera-back Method of reflection copy, the results are summerized as follows; In the projection Method of transparency copy, the results are summerized as follows; Table moitted.

  • PDF

Local image enhancement using adaptive unsharp masking and noise filter

  • Ha, Tae-Ok;Song, Byung-Soo;Moon, Seong-Hak
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08b
    • /
    • pp.1692-1695
    • /
    • 2007
  • We describe the image enhancement method of applying two spatial filters with different characteristics adaptively. An adaptive method is introduced so that sharpness enhancement is performed only in regions where the image exhibits significant dynamics, while noise reduction is achieved in smooth regions. Simulation results show that the proposed method improved the image quality.

  • PDF

Binary Tree Vector Quantization Using Spatial Masking Effect (공간 마스킹 효과를 적용한 이진트리 벡터양자화)

  • 유성필;곽내정;윤태승;안재형
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.369-372
    • /
    • 2003
  • In this paper, we propose impr oved binary tree vector quantization based on spatial sensitivity which is one of the human visual properties. We combine the weights based on spatial masking effect according to changes of three primary colors in blocks of images with the process of splitting nodes using eigenvector in binary tree vector quantization. The test results show that the proposed method generates the quantized images with fine color and performs better than the conventional method in terms of clustering the similar regions. Also the proposed method can get the better result in subjective qualify test and PSNR.

  • PDF

Image Enhancement Using Multi-scale Gradients of the Wavelet Transform

  • Okazaki, Hidetoshi;Nakashizuka, Makoto
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.180-183
    • /
    • 2002
  • In this paper, we propose new unsharp masking technique based on the multiscale gradient planes. The unsharp masking technique is implemented as a high-pass filter and improves the sharpness of degraded images. However, the conventional unsharp masking enhances the noise component simultaneously. To reduce the noise influence, we introduce the edge information from the difference of the gradient values between two consecutive scales of the multiscale gradient. The multiscale gradient indicates the presence of image edges as the ratio between the gradients between two different scales by its multiscale nature. The noise reduction of the proposed method does not depend on the variance of images and noises. In experiment, we demonstrate enhancement results for blurred noisy images and compare with the conventional cubic unsharp masking technique.

  • PDF

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

  • Kim, Hee-Seok;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.370-379
    • /
    • 2010
  • In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.

Correlation Power Analysis Attack on Lightweight Block Cipher LEA and Countermeasures by Masking (경량 블록암호 LEA에 대한 상관관계 전력분석 공격 및 마스킹 대응 기법)

  • An, Hyo-Sik;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1276-1284
    • /
    • 2017
  • Lightweight Encryption Algorithm (LEA) that was standardized as a lightweight block cipher was implemented with 8-bit data path, and the vulnerability of LEA encryption processor to correlation power analysis (CPA) attack was analyzed. The CPA used in this paper detects correct round keys by analyzing correlation coefficient between the Hamming distance of the computed data by applying hypothesized keys and the power dissipated in LEA crypto-processor. As a result of CPA attack, correct round keys were detected, which have maximum correlation coefficients of 0.6937, 0.5507, and this experimental result shows that block cipher LEA is vulnerable to power analysis attacks. A masking method based on TRNG was proposed as a countermeasure to CPA attack. By applying masking method that adds random values obtained from TRNG to the intermediate data of encryption, incorrect round keys having maximum correlation coefficients of 0.1293, 0.1190 were analyzed. It means that the proposed masking method is an effective countermeasure to CPA attack.

A Method of Masking Based on Multiplicative Noise (잡음을 이용한 가계조사자료의 정보노출제한방법)

  • Jeong, Dong-Myeong;Kim, Jay-J.;Kim, Kyung-Mi
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.1
    • /
    • pp.141-151
    • /
    • 2009
  • According to the type of microdata, the various methods have been in use for masking microdata. Multiplicative noise is the one of popular schemes for masking continuous variables. In this paper, we introduce the method of masking based on multiplicative noise and show some results of the application on the 2006 Householder Income and Expenditure Survey (HIES) data. To create the multiplicative noise factor, we used the triangular distribution. truncated triangular distribution, trapezoidal distribution, and double triangular distribution. Also, formulas for the domain estimation for the data masked by the multiplicative noise are developed.

A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack (저메모리 환경에 적합한 마스킹기반의 ARIA 구현)

  • Yoo Hyung-So;Kim Chang-Kyun;Park Il-Hwan;Moon Sang-Jae;Ha Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.143-155
    • /
    • 2006
  • ARIA is a 128-bit block cipher, which became a Korean Standard in 2004. According to recent research, this cipher is attacked by first order DPA attack. In this paper, we propose a new masking technique as a countermeasure against first order DPA attack and apply it to the ARIA. The proposed method is suitable for low memory environment. By using this countermeasure, we verified that it is secure against first order DPA attack. In addition, our method based on precomputation of inverse table can reduce the computational cost as increasing the number of S-BOX masking.

Velocity Field Masking Technique for Coastal Engineering Experiments

  • Adibhusana, Made Narayana;Ryu, Yong-Uk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.154-154
    • /
    • 2021
  • Since the development of Bubble Image Velocimetry (BIV) technique as the complementary technique of Particle Image Velocimetry (PIV), the application of digital imaging technique in the field of hydraulic and coastal engineering increased rapidly. BIV works very well in multi-phase flow (air-water) flows where the PIV technique doesn't. However, the velocity field obtained from BIV technique often resulted in a velocity vector on the outside of the flow (false velocity) since the Field of View (FOV) usually not only cover the air-water flow but also the area outside the flow. In this study, a simple technique of post processing velocity field was developed. This technique works based on the average of the pixel value in the interrogation area. An image of multi-phase flow of wave overtopping was obtained through physical experiment using BIV technique. The velocity calculation was performed based on the similar method in PIV. A velocity masking technique developed in this study then applied to remove the false velocity vector. Result from non-masking, manually removed and auto removed false velocity vector were presented. The masking technique show a similar result as manually removed velocity vector. This method could apply in a large number of velocity field which is could increase the velocity map post-processing time.

  • PDF

Visibility Evaluation for Agricultural Tractor Operators According to ISO 5006 and 5721-1 Standards

  • Kabir, Md. Shaha Nur;Song, Mingzhang;Chung, Sun-Ok;Kim, Yong-Joo;Kim, Su-Chul;Ha, Jong-Kyou
    • Journal of Biosystems Engineering
    • /
    • v.40 no.1
    • /
    • pp.19-27
    • /
    • 2015
  • Purpose: A system to measure the visibility of agricultural tractor operators was designed and evaluated according to ISO standards, and a blind area diagram around the tested tractor was created based on the manual method recommended by the National Institute for Occupational Safety and Health (NIOSH). Methods: A visibility measurement system was designed and evaluated based on the ISO 5006 and ISO 5721-1 standards. Two bulbs used to simulate the operator's eyes were mounted on a bar with a supporting frame. A wooden frame was used to determine the seat index point position. The 12-m visibility test circle was divided into six sectors of vision, and the test tractor was placed at the center of the circle. Artificial light was supplied in the darkened environment, and shadow or masking effects were measured manually around the 12-m circle. Results: When the bulbs were placed at the operator's eye level, front visibility was good; no masking was found in the "A" vision sector, but larger masking widths were found in the "B" and "C" vision sectors. Since the masking width exceeded 700 mm, additional tests, such as movement of the light sources to both sides of the operator's eye level, were performed. Less than six masking effects were found in the semi-circle of vision to the front, and more than one masking was found in the "B" and "C" visual fields. The minimum distance between the centers of two masking effects exceeded 2500 mm when measured as a chord on the semi-circle of vision. A blind area diagram was created to define the exact nature of the blind spots and mirror visibility. Conclusions: Visibility evaluation is an effective way to enable proper and safe operation for agricultural tractor operators. Inclusion of this visibility evaluation test in the general testing process might aid tractor manufacturers.