• Title/Summary/Keyword: optimal embedding

Search Result 89, Processing Time 0.03 seconds

Adaptive Watermarking Using Successive Subband Quantization and Perceptual Model Based on Mukiwavelet Transform (멀티웨이브릿 변환 기반에서 연속 부대역 양자화 및 지각 모델을 이용한 적응 워터마킹 기술)

  • 권기룡;강균호;조영웅;문광석;이준재
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.121-124
    • /
    • 2002
  • This paper presents an adaptive digital image watermarking scheme that uses successive subband quantization (SSQ) and perceptual modeling. Our approach performs a multiwavelet transform to determine the local image properties optimal and the watermark embedding location. The multiwavelet used in this paper is the DGHM multiwavelet with approximation order 2 to reduce artifacts in the reconstructed image. A watermark is embedded into the perceptually significant coefficients (PSC) of the image in each subband. The PSCs in high frequency subbands are selected by setting the thresholds to one half of the largest coefficient in each subband. After the PSCs in each subband are selected, a perceptual model is combined with a stochastic approach based on the noise visibility function to produce the final watermark.

  • PDF

Analysis of Partial Denture through Topology Optimization Design (위상최적설계를 통한 가공의치의 해석)

  • Lee, Jeong-Ick;Koh, Byung-Kab
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.351-358
    • /
    • 2006
  • Recently, the development of new structural model in fixed partial denture system is required to be started from the conceptual design with low cost, high performance and quality. In this point, a FEM based design of partial denture is used to investigate stress distribution on the durable shape. In this paper, the structural performances of partial dentures were analyzed under three biting forces. The periodontal embedding model is introduced on behalf of the detailed supporting tissue, which is composed of dentin, cortical bone, cancellous bone and periodontal ligament. Using topology optimization, the optimal reinforcement layout of connector was obtained and the detail shape in the fixed partial denture was designed.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

Extra-tidal stars around globular clusters NGC 5024 and NGC 5053 and their chemical abundances

  • Chun, Sang-Hyun;Lee, Jae-Joon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.40.2-40.2
    • /
    • 2018
  • NGC 5024 and NGC 5053 are among the most metal-poor globular clusters in the Milky Way. Both globular clusters are considered to be accreted from dwarf galaxies (like Sagittarius dwarf galaxy or Magellanic clouds), and common stellar envelope and tidal tails between globular clusters are also detected. We present a search for extra-tidal cluster member candidates around these globular clusters from APOGEE survey data. Using 20 chemical elements (e.g., Fe, C, Mg, Al) and radial velocities, t-distributed stochastic neighbour embedding (t-SNE), which identifies an optimal mapping of a high-dimensional space into fewer dimensions, was explored, and we find that globular cluster stars are well separated from the field stars in 2-dimensional map from t-SNE. We also find that some stars selected in t-SNE map are placed outside of the tidal radius of the clusters. The proper motion of stars outside tidal radius is also comparable to that of globular clusters, which suggest that these stars are tidally decoupled from the globular clusters. We manually measure chemical abundances for the clusters and extra-tidal stars, and discuss the association of extra-tidal stars with the clusters.

  • PDF

Hardware-Software Implementation of MPEG-4 Video Codec

  • Kim, Seong-Min;Park, Ju-Hyun;Park, Seong-Mo;Koo, Bon-Tae;Shin, Kyoung-Seon;Suh, Ki-Bum;Kim, Ig-Kyun;Eum, Nak-Woong;Kim, Kyung-Soo
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.489-502
    • /
    • 2003
  • This paper presents an MPEG-4 video codec, called MoVa, for video coding applications that adopts 3G-324M. We designed MoVa to be optimal by embedding a cost-effective ARM7TDMI core and partitioning it into hardwired blocks and firmware blocks to provide a reasonable tradeoff between computational requirements, power consumption, and programmability. Typical hardwired blocks are motion estimation and motion compensation, discrete cosine transform and quantization, and variable length coding and decoding, while intra refresh, rate control, error resilience, error concealment, etc. are implemented by software. MoVa has a pipeline structure and its operation is performed in four stages at encoding and in three stages at decoding. It meets the requirements of MPEG-4 SP@L2 and can perform either 30 frames/s (fps) of QCIF or SQCIF, or 7.5 fps (in codec mode) to 15 fps (in encode/decode mode) of CIF at a maximum clock rate of 27 MHz for 128 kbps or 144 kbps. MoVa can be applied to many video systems requiring a high bit rate and various video formats, such as videophone, videoconferencing, surveillance, news, and entertainment.

  • PDF

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation

  • Zhang, Mingming;Zhou, Quan;Hu, Yanlang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.404-421
    • /
    • 2020
  • A reversible data hiding scheme in JPEG compressed bitstreams is proposed, which could avoid decoding failure and file expansion by means of removing of bitstreams corresponding to high frequency coefficients and embedding of secret data in file header as comment part. We decode original JPEG images to quantified 8×8 DCT blocks, and search for a high frequency as an optimal termination point, beyond which the coefficients are set to zero. These blocks are separated into two parts so that termination point in the latter part is slightly smaller to make the whole blocks available in substitution. Then spare space is reserved to insert secret data after comment marker so that data extraction is independent of recovery in receiver. Marked images can be displayed normally such that it is difficult to distinguish deviation by human eyes. Termination point is adaptive for variation in secret size. A secret size below 500 bits produces a negligible distortion and a PSNR of approximately 50 dB, while PSNR is also mostly larger than 30 dB for a secret size up to 25000 bits. The experimental results show that the proposed technique exhibits significant advantages in computational complexity and preservation of file size for small hiding capacity, compared to previous methods.

Incorporating Fuzzy Inference into Watermarking in the Transform Domain (변환영역에서의 퍼지추론을 적용한 워터마킹)

  • Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.364-370
    • /
    • 2006
  • In this paper, the decision method of optimal sub-band which is supposed to embedded watermark incorporating fuzzy inference into transform-based watermarking is proposed. After performing the DCT, maximum variation of human visual properties, such as text degree, contrast sensitivity function is calculated, and by using these, membership function is generated. After embedding the watermark to the selected bands obtained from fuzzy inference, performance of imperceptibility and robustness are evaluated. In order to testify the proposed scheme, such attacks as JPEG, filtering, cropping are utilized. and in addition, by using an AWGN channel of OFDM/QPSK system, PSNR as well as correlation are calculated, and finally evaluated the performance.

  • PDF

An Interactive Approach Based on Genetic Algorithm Using Ridden Population and Simplified Genotype for Avatar Synthesis

  • Lee, Ja-Yong;Lee, Jang-Hee;Kang, Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.167-173
    • /
    • 2002
  • In this paper, we propose an interactive genetic algorithm (IGA) to implement an automated 2D avatar synthesis. The IGA technique is capable of expressing user's personality in the avatar synthesis by using the user's response as a candidate for the fitness value. Our suggested IGA method is applied to creating avatars automatically. Unlike the previous works, we introduce the concepts of 'hidden population', as well as 'primitive avatar' and 'simplified genotype', which are used to overcome the shortcomings of IGA such as human fatigue or reliability, and reasonable rates of convergence with a less number of iterations. The procedure of designing avatar models consists of two steps. The first step is to detect the facial feature points and the second step is to create the subjectively optimal avatars with diversity by embedding user's preference, intuition, emotion, psychological aspects, or a more general term, KANSEI. Finally, the combined processes result in human-friendly avatars in terms of both genetic optimality and interactive GUI with reliability.

The Study on Ultra-Precision Cutting Characteristics Evaluation of Non-Ferrous Metals Using Attractor Quadrant Method (어트랙터 사분면법을 이용한 비철금속의 초정밀 절삭특성 평가에 관한 연구)

  • 고준빈;김건희;윤인식
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.6
    • /
    • pp.20-26
    • /
    • 2003
  • This study proposes the construction of attractor quadrant method for high-precision cutting characteristics evaluation of non-ferrous metals. Also this paper aims to find the optimal cutting conditions of diamond turning machine by measuring surface form and roughness to perform the cutting experiment of non-ferrous metals, which are aluminum, with diamond tool. As well, according to change cutting conditions such as feed rate, using diamond turning machine to Perform cutting Processing, by measuring cutting force and surface roughness and according to cutting conditions the aluminum about cutting properties. Trajectory changes in the attractor indicated a substantial difference in fractal characteristics and attractor quadrant characteristics. In quantitative quadrant feature extraction, 1,309 point in the case of A17075 (one quadrant) and 1,406 point (one quadrant) in the case of brass were proposed on the basis of attractor reconstruction. Proposed attractor quadrant method can be used for high-precision cutting characteristics evaluation of non-ferrous metals.

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua;Rao, Yunbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.452-472
    • /
    • 2019
  • Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.