• Title/Summary/Keyword: multimedia distribution

Search Result 508, Processing Time 0.032 seconds

A Light Exposure Correction Algorithm Using Binary Image Segmentation and Adaptive Fusion Weights (이진화 영상분할기법과 적응적 융합 가중치를 이용한 광노출 보정기법)

  • Han, Kyu-Phil
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1461-1471
    • /
    • 2021
  • This paper presents a light exposure correction algorithm for less pleasant images, acquired with a light metering failure. Since conventional tone mapping and gamma correction methods adopt a function mapping with the same range of input and output, the results are pleasurable for almost symmetric distributions to their intensity average. However, their corrections gave insufficient outputs for asymmetric cases at either bright or dark regions. Also, histogram modification approaches show good results on varied pattern images, but these generate unintentional noises at flat regions because of the compulsive shift of the intensity distribution. Therefore, in order to sufficient corrections for both bright and dark areas, the proposed algorithm calculates the gamma coefficients using primary parameters extracted from the global distribution. And the fusion weights are adaptively determined with complementary parameters, considering the classification information of a binary segmentation. As the result, the proposed algorithm can obtain a good output about both the symmetric and the asymmetric distribution images even with severe exposure values.

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Design and Implementation of Customized Farming Applications using Public Data (공공데이터를 이용한 맞춤형 영농 어플리케이션 설계 및 구현)

  • Ko, Jooyoung;Yoon, Sungwook;Kim, Hyenki
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.772-779
    • /
    • 2015
  • Advancing information technology have rapidly changed our service environment of life, culture, and industry. Computer information communication system is applied in medical, health, distribution, and business transaction. Smart is using new information by combining ability of computer and information. Although agriculture is labor intensive industry that requires a lot of hands, agriculture is becoming knowledge-based industry today. In agriculture field, computer communication system is applied on facilities farming and machinery Agricultural. In this paper, we designed and implemented application that provides personalized agriculture related information at the actual farming field. Also, this provides farmer a system that they can directly auction or sell their produced crops. We designed and implemented a system that parsing information of each seasonal, weather condition, market price, region based, crop, and disease and insects through individual setup on ubiquitous environment using location-based sensor network and processing data.

Implementation of Play and Copy Control of DMB contents using Watermarking and Encryption on PMP (워터마킹과 암호화를 이용한 DMB 콘텐츠의 재생 및 복사 제어를 PMP에 구현)

  • Jeong, Yong-Jae;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.52-57
    • /
    • 2009
  • Recently, the regular service of a terrestrial digital multimedia broadcasting(T-DMB) made faster distribution of T-DMB receiver. The problem of an illegal distribution is increasing owing to a large distribution of T-DMB receiver. In this paper, we propose a watermarking and encryption method on T-DMB bit-stream for a copy and Play control to prevent an illegal distribution of T-DMB contents. We implement our proposed method on a portable multimedia player (PMP) which has T-DMB receiver. The proposed method insert the encrypted information for control of copy and play after finding padding area of program map table (PMT) and program association table (PAT) from analysis of transport stream (TS) of T-DMB. In implementation result, we can control use of contents according to information of copy and play control. The proposed method can be used to content Protection software for blocking of an illegal distribution of T-DMB contents on a mobile T-DMB receivers.

Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments (양자 컴퓨팅 환경에 안전한 NTRU 기반 인증 및 키 분배 프로토콜)

  • Jeong, SeongHa;Lee, KyungKeun;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1321-1329
    • /
    • 2017
  • A quantum computer, based on quantum mechanics, is a paradigm of information processing that can show remarkable possibilities of exponentially improved information processing. This paradigm can be solved in a short time by calculating factoring problem and discrete logarithm problem that are typically used in public key cryptosystems such as RSA(Rivest-Shamir-Adleman) and ECC(Elliptic Curve Cryptography). In 2013, Lei et al. proposed a secure NTRU-based key distribution protocol for quantum computing. However, Lei et al. protocol was vulnerable to man-in-the-middle attacks. In this paper, we propose a NTRU(N-the truncated polynomial ring) key distribution protocol with mutual authentication only using NTRU convolution multiplication operation in order to maintain the security for quantum computing. The proposed protocol is resistant to quantum computing attacks. It is also provided a secure key distribution from various attacks such as man-in-the middle attack and replay attack.

Lip Shape Representation and Lip Boundary Detection Using Mixture Model of Shape (형태계수의 Mixture Model을 이용한 입술 형태 표현과 입술 경계선 추출)

  • Jang Kyung Shik;Lee Imgeun
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1531-1539
    • /
    • 2004
  • In this paper, we propose an efficient method for locating human lips. Based on Point Distribution Model and Principle Component Analysis, a lip shape model is built. Lip boundary model is represented based on the concatenated gray level distribution model. We calculate the distribution of shape parameters using Gaussian mixture. The problem to locate lip is simplified as the minimization problem of matching object function. The Down Hill Simplex Algorithm is used for the minimization with Gaussian Mixture for setting initial condition and refining estimate of lip shape parameter, which can refrain iteration from converging to local minima. The experiments have been performed for many images, and show very encouraging result.

  • PDF

TFT-LCD Defect Detection based on Histogram Distribution Modeling (히스토그램 분포 모델링 기반 TFT-LCD 결함 검출)

  • Gu, Eunhye;Park, Kil-Houm;Lee, Jong-Hak;Ryu, Gang-Soo;Kim, Jungjoon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1519-1527
    • /
    • 2015
  • TFT-LCD automatic defect inspection system for detecting defects in place of the visual tester does pre-processing, candidate defect pixel detection, and recognition and classification through a blob analysis. An over-detection result of defects acts as an undue burden of blob analysis for recognition and classification. In this paper, we propose defect detection method based on the histogram distribution modeling of TFT-LCD image to minimize over-detection of candidate defective pixels. Primary defect candidate pixels are detected estimating the skewness of the luminance distribution histogram of the background pixels. Based on the detected defect pixels, the defective pixels other than noise pixels are detected using the distribution histogram model of the local area. Experimental results confirm that the proposed method shows an excellent defect detection result on the image containing the various types of defects and the reduction of the degree of over-detection as well.

Visually Lossless Image Compression for Digital Cinema Distribution Based on DCI Specification (DCI 규격을 만족하는 디지털시네마 배급을 위한 시각적 무손실 압축 연구)

  • Kim, Chul-Hyun;Paik, Joon-Ki
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.99-108
    • /
    • 2008
  • This raper analyzes the effect of visually lossless image compression for efficient distribution of digital cinema. Currently, distribution of digital cinema is carried out based on JPEG 2000 standard that has been selected by DCI. We first summarize characteristics of JPEG 2000, and then define the concept of visually lossless coding that plays an important role in digital cinema distribution. We provide a test for JPEG 2000 compression performance according to DCI specification for visually lossless. Based on the experiment, the result satisfies high quality for cinema distribution.

Estimations in a Generalized Uniform Distribution

  • Lee, Chang-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.11 no.2
    • /
    • pp.319-325
    • /
    • 2000
  • In this paper, we shall derive MLE's, modified MLE, MRE and UMVUE's of the shape and scale parameters in a generalized uniform distribution, and propose several estimators for the right-tail probability in a generalized uniform distribution using the proposed estimators for the shape and scale parameters. And we shall compare exactly MSE of the proposed estimators for the shape and the scale parameters, and compare numerically efficiencies for the several proposed estimators of the right-tail probability in a generalized uniform distribution by Monte Caslo methods.

  • PDF

Creating Personality and Behavior of NPC Using Probability Distribution (성격 확률 분포를 이용한 NPC의 성격 및 행동 생성)

  • Min, Kyung-Hyun;Lee, Chang-Sook;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.8 no.4
    • /
    • pp.95-105
    • /
    • 2008
  • In virtual games, Non-Playing Character(NPC)s as game elements tend to frequently communicate with game players. Although the artificial-intelligence (AI) algorithm widely used for games has been greatly developed, basic roles of NPCs have remained on the same. In a life game whose goal is to observe the actions and behaviors of the human-like NPCs, for example, their straightahead actions cause boredom. Actually, NPCs fail to display their various expressions that are characterized by humans. To make NPCs act like humans, several characters with a greater variety of characteristics need to be created. this paper proposes how NPCs both express the wide range of emotions using probability distribution and react based on their different characteristics. To verify the change of NPC actions, personalities were assigned according to the probability distribution and this algorithm was applied to a 3D game to validate the method suggested in this paper.

  • PDF