• Title/Summary/Keyword: protection technique.

Search Result 902, Processing Time 0.025 seconds

A Study on Invisibility Improvement of Watermarking Image (워터마킹 영상의 비가시성 개선에 관한 연구)

  • Kim, Hyeong-Gyun;Lee, Yang-Weon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.329-336
    • /
    • 2007
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the digital watermarking algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

  • PDF

The Effective Protection Mechanism for Digital Images using Transform of the Wavelet in Frequency Domain (주파수 영역에서 웨이브릿 변환을 이용한 디지털 이미지의 효과적인 보호)

  • 최우진;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.937-942
    • /
    • 2002
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

Effects of viscous damping models on a single-layer latticed dome during earthquakes

  • Zhang, Huidong;Wang, Jinpeng;Zhang, Xiaoshuai;Liu, Guoping
    • Structural Engineering and Mechanics
    • /
    • v.62 no.4
    • /
    • pp.455-464
    • /
    • 2017
  • Rayleigh damping model is recommended in the recently developed Performance-Based Earthquake Engineering (PBEE) methodology, but this methodology does not provide sufficient information due to the complexity of the damping mechanism. Furthermore, each Rayleigh-type damping model may have its individual limitations. In this study, Rayleigh-type damping models that are used widely in engineering practice are discussed. The seismic performance of a large-span single-layer latticed dome subjected to earthquake ground motions is investigated using different Rayleigh damping models. Herein a simulation technique is developed considering low cycle fatigue (LCF) in steel material. In the simulation technique, Ramberg-Osgood steel material model with the low cycle fatigue effect is used to simulate the non-uniformly distributed material damping and low cycle fatigue damage in the structure. Subsequently, the damping forces of the structure generated by different damping models are compared and discussed; the effects of the damping ratio and roof load on the damping forces are evaluated. Finally, the low cycle fatigue damage values in sections of members are given using these damping models. Through a comparative analysis, an appropriate Rayleigh-type damping model used for a large span single-layer latticed dome subjected to earthquake ground motions is determined in terms of the existing damping models.

APP-MAC-PHY Cross-Layer Video Streaming Technique over Wireless Channels

  • Park, Jaeyoung;Kim, Jaekwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.398-400
    • /
    • 2014
  • In this letter, we propose a cross-layer technique jointly considering modulation coding schemes (MCSs) of medium access control (MAC) layer, source significance information (SSI) and error concealment unit of application (APP) layer, and channel quality information (CQI) of physical (PHY) layer. We demonstrate the improved video quality by the proposed technique when H.264 videos are streamed over Rayleigh fading wireless channels.

Watermarking Algorithm using LSB for Color Image with Spatial Encryption

  • Jung, Soo-Mok
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.242-245
    • /
    • 2019
  • In this paper, watermark embedding technique was proposed to securely conceal the watermark in color cover image by applying the spatial encryption technique. The embedded watermak can be extracted from stego-image without loss. The quality of the stego-image is very good. So it is not possible to visually distinguish the difference between the original cover image and the stego-image. The validity of the proposed technique was verified by mathematical analysis. The proposed watermark embedding technique can be used for intellectual property protection, military, and medical applications that require high security.

An Analytical Methodology for Evaluating Radiological Protection Alternatives Using Analytical Hierarchy Process (계층화 의사결정법을 이용한 방사선방호선택 대안결정에 관한 해석적 방법론)

  • Sa, Sang-Duk;Narita, Masakuni
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.2
    • /
    • pp.99-107
    • /
    • 1994
  • This study aims to introduce a prescriptive methodology to comprehensively support the analysis of decision process by the use of Saaty's Analytical Hierarchy Process for the optimization of radiation protection. The analytical Hierarchy Process for the optimization of radiation protection. The analytical process for the problem of selecting options among given protection alternatives is illustrated with the data of the uranium mine example in ICRP Publ. 55. This technique, unlike other conventional selection method, is considered to provide a useful tool for the protection manager with respect to its ease of use and simplification in the choice of optimal alternative associated with radiological protection.

  • PDF

A Layered Protection Scheme for Scalable Video Coding (스케일러블 비디오 부호화에 대한 계층적 보호 기법)

  • Hendry, Hendry;Kim, Mun-Churl;Hahm, Sang-Jin;Lee, Keun-Sik;Park, Keung-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.307-312
    • /
    • 2006
  • Protection to the multimedia contents is inevitable to ensure that only authorized users be able to access the protected contents for consumption. Since protection mechanisms need to be designed efficiently by exploiting the type of the contents, we propose a protection scheme for the video bitstream encoded by Scalable Video Coding (SVC) technique. Our scheme exploits the property of SVC in which a video is encoded into spatial, temporal, and quality scalability layers. By applying our proposed protection scheme to the appropriate scalability layers we can effectively control the SVC contents completely or partially. Each layer can be flexibly protected with different encryption keys or even with different encryption algorithms. The algorithms that are used to protect each layer are described by the standardized protection description tool, which is the MPEG-21 Intellectual Property Management and Protection (IPMP) Components. In this paper, we present the design of the proposed layered SVC protection scheme, its implementation and experimental results. The experiment result shows that the proposed layered SVC protection scheme is very effective and can easily be applied.

  • PDF

A Study on the Application of Cathodic Protection for Anti-Corrosion of Automobile Body

  • Sohn, DaeHong;lee, Yongho;Jang, HeeJin;Cho, SooYeon
    • Corrosion Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.1-8
    • /
    • 2022
  • The use of cathodic protection for metals can be achieved by sacrificial anode CP or impressed current CP, or a combination of both. Cathodic protection is a highly effective anti-corrosion technique for submerged metals or metals in soil. But because the non-immersion atmospheric automobile environment is a high resistance environment, it is limited by fundamental cathodic protection. However, the application of cathodic protection to automobiles is attractive because of the possibility of maintaining corrosion resistance while using lower-cost materials. A commercially available product for automobiles that uses both sacrificial anode CP and impressed current CP was tested in a periodic salt spray environment to investigate the performance of the devices. Experimental results show that the metal to be protected has different anti-corrosion effects depending on the distance from the anode of the device, but it is effective for the entire 120 cm long specimen exposed with one anode. The cathodic protection is effective because the conductive tape attached to the anode of the structure to be protected acts as a constant electrolyte in wet and dry conditions. The results show that the entire standard passenger car can be protected by cathodic protection with 4 anodes.

Robust watermarking technique in geometric distortion and authentication of digital images (기하학적인 변형에 강건한 워터마킹 기법과 디지털 영상의 인증)

  • Lee, Na-Young;Kim, Won;Kim, Gye-Young; Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.367-372
    • /
    • 2003
  • The existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and it is hard to detect whether it was manipulated artificially. In this paper, we proposed the new copyright protection system that can authorize a digital mage and :an embed or extract a robust watermark in a artificial manipulation in order to solve these problems. In a watermarking part, the proposed a watermarking technique embeds a watermark in a phase component after a Complex Wavelet Transform (CWT) with an original image, and a watermark is extracted from an watermarked image by stages. A copyright about an image can be insisted on than a threshold after comparing a correlation of an original watermark with an extracted watermark if large. In an authentication part of a digital image, EZW (Embedded Zerotree Wavelet) is used, and an authentication cord of an watermarked image is generated. An authentication code of an image to have been distribute to is compared with a generated authentication cord, and artificial operation isn´t than a threshold if large. The proposed copyright protection system through performance evaluation display that it was robust in geometric distortion and a artificial operation was able to be detected.