• Title/Summary/Keyword: transform domain processing

Search Result 233, Processing Time 0.034 seconds

Digital Watermarking of JPEG Image Based on Human Visual System (인간 시각 시스템에 기반 한 JPEG 영상의 디지털 워터마킹)

  • Bae, Sung-Ho
    • The KIPS Transactions:PartB
    • /
    • v.11B no.2
    • /
    • pp.125-132
    • /
    • 2004
  • In this paper, a watermark inserting method according to the sensitivity of human visual system and minimizing distortion of original DCT coefficients in DCT transform domain is proposed. The proposed method inserts a more robust watermark in the insensitive block of human vision by reordering the blocks according to the human visual system which is appropriate to the JPEG image compression. It also enhances the invisibility and robustness in high compression rate in terms of the watermark inserting method within the block which minimizes distortions of original DCT coefficients. The computer simulation results show that the proposed method maintains high image quality and good robustness in high compression rate compared with conventional watermarking method.

A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images (정지영상에서 저작권 보호 및 위변조 검출을 위한 하이브리드 디지털 워터마킹 기법)

  • Yoo Kil-Sang;Song Geun-Sil;Choi Hyuk;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.27-34
    • /
    • 2003
  • Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Therefore. copyright protection of digital contents and insurance of digital image integrity become major issues. In this paper, we propose a hybrid watermarking method to identify locations of tampered region as well as copyright. Our proposed algorithms embed the PN-sequence into low frequency sub-band of the wavelet transform domain and it doesn't need the original image in extraction procedure. The experimental results show good robustness against any signal processing with tamper detection on still image.

  • PDF

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Joint FrFT-FFT basis compressed sensing and adaptive iterative optimization for countering suppressive jamming

  • Zhao, Yang;Shang, Chaoxuan;Han, Zhuangzhi;Yin, Yuanwei;Han, Ning;Xie, Hui
    • ETRI Journal
    • /
    • v.41 no.3
    • /
    • pp.316-325
    • /
    • 2019
  • Accurate suppressive jamming is a prominent problem faced by radar equipment. It is difficult to solve signal detection problems for extremely low signal to noise ratios using traditional signal processing methods. In this study, a joint sensing dictionary based compressed sensing and adaptive iterative optimization algorithm is proposed to counter suppressive jamming in information domain. Prior information of the linear frequency modulation (LFM) and suppressive jamming signals are fully used by constructing a joint sensing dictionary. The jamming sensing dictionary is further adaptively optimized to perfectly match actual jamming signals. Finally, through the precise reconstruction of the jamming signal, high detection precision of the original LFM signal is realized. The construction of sensing dictionary adopts the Pei type fast fractional Fourier decomposition method, which serves as an efficient basis for the LFM signal. The proposed adaptive iterative optimization algorithm can solve grid mismatch problems brought on by undetermined signals and quickly achieve higher detection precision. The simulation results clearly show the effectiveness of the method.

Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients

  • Chenghua Liu;Anhong Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.412-434
    • /
    • 2023
  • This study discusses the high-order diffusion method in the wavelet domain. It aims to improve the edge protection capability of the high-order diffusion method using wavelet coefficients that can reflect image information. During the first step of the proposed diffusion method, the wavelet packet decomposition is a more refined decomposition method that can extract the texture and structure information of the image at different resolution levels. The high-frequency wavelet coefficients are then used to construct the edge detection function. Subsequently, because accurate wavelet coefficients can more accurately reflect the edges and details of the image information, by introducing the idea of state weight, a scheme for recovering wavelet coefficients is proposed. Finally, the edge detection function is constructed by the module of the wavelet coefficients to guide high-order diffusion, the denoised image is obtained. The experimental results showed that the method presented in this study improves the denoising ability of the high-order diffusion model, and the edge protection index (SSIM) outperforms the main methods, including the block matching and 3D collaborative filtering (BM3D) and the deep learning-based image processing methods. For images with rich textural details, the present method improves the clarity of the obtained images and the completeness of the edges, demonstrating its advantages in denoising and edge protection.

Evaluation of bonding state of tunnel shotcrete using impact-echo method - numerical analysis (충격 반향 기법을 이용한 숏크리트 배면 접착 상태 평가에 관한 수치해석적 연구)

  • Song, Ki-Il;Cho, Gye-Chun;Chang, Seok-Bue
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.10 no.2
    • /
    • pp.105-118
    • /
    • 2008
  • Shotcrete is one of the main support materials in tunnelling. Its bonding state on excavated rock surfaces controls the safety of the tunnel: De-bonding of shotcrete from an excavated surface decreases the safety of the tunnel. Meanwhile, the bonding state of shotcrete is affected by blasting during excavation at tunnel face as well as bench cut. Generally, the bonding state of shotcrete can be classified as void, de-bonded, or fully bonded. In this study, the state of the back-surface of shotcrete is investigated using impact-echo (IE) techniques. Numerical simulation of IE technique is performed with ABAQUS. Signals obtained from the IE simulations were analyzed at time, frequency, and time-frequency domains, respectively. Using an integrated active signal processing technique coupled with a Short-Time Fourier Transform (STFT) analysis, the bonding state of the shotcrete can be evaluated accurately. As the bonding state worsens, the amplitude of the first peak past the maximum amplitude in the time domain waveform and the maximum energy of the autospectral density are increasing. The resonance frequency becomes detectable and calculable and the contour in time-frequency domain has a long tail parallel to the time axis. Signal characteristics with respect to ground condition were obtained in case of fully bonded condition. As the ground condition worsens, the length of a long tail parallel to the time axis is lengthened and the contour is located in low frequency range under 10 kHz.

  • PDF

Remote Sensing of Wave Trajectory in Surf Zone using Oblique Digital Videos (해안 디지털 비디오를 이용한 쇄파지역에서의 파랑궤적 측정)

  • Yoo, Je-Seon;Shin, Dong-Min;Cho, Yong-Sik
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.20 no.4
    • /
    • pp.333-341
    • /
    • 2008
  • A remote sensing technique to identify trajectories of breaking waves in the surf zone using oblique digital nearshore videos is proposed. The noise arising from white foam induced by wave breaking has hindered accurate remote sensing of wave properties in the surf zone. For this reason, this paper focuses on image processing to remove the noise and wave trajectory identification essential for wave property estimation. The nearshore video imagery sampled at 3 Hz are used, covering length scale(100 m). Original image sequences are processed through image frame differencing and directional low-pass image filtering to remove the noise characterized by high frequencies in the video imagery. The extraction of individual wave crest features is conducted using a Radon transform-based line detection algorithm in the processed cross-shore image timestacks having a two-dimensional space-time domain. The number of valid wave crest trajectories identified corresponds to about 2/3 of waves recorded by the in-situ sensors.

High Quality Audio Watermarking using Spread Spectrum and Psychoacoustic Model (대역확산과 심리음향 모델을 이용한 고음질 오디오 워터마킹)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.48-56
    • /
    • 2006
  • In this paper, we proposed the high quality audio watermarking algorithm using MDCT/IMDCT (Modified DCT/Inverse Modified DCT) with psychoacoustic model. Generally, a digital audio watermark is embedding the frequency domain after frequency transform of the digital audio data but the digital audio quality is affected by watermarking. In our scheme, the digital audio data is spread with PN((Pseudo Noise) code and then audio watermark is embedded in MDCT processing that refers psychoacoustic model. In MDCT processing, according to the shape of filter bank output, the block switching selects a window sequence that has 256, 1,024 or 2,048 points interval for high quality audio. The author confirm that when watermark weight ${\alpha}$ is 2.5 below, the detection ratio of watermark is a satisfied to SDMI's(Secure Digital Music Initiative) recommendation 50% above and SM is $50{\sim}68dB$ range with mainly 4 kind of attacks(Compression, Cropping, FFT and Echo).

Optimal Design of a Continuous Time Deadbeat Controller (연속시간 유한정정제어기의 최적설계)

  • Kim Seung Youal;Lee Keum Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.169-176
    • /
    • 2000
  • Deadbeat property is well established in digital control system design in time domain. But in continuous time system, deadbeat is impossible because of it's ripples between sampling points inspite of designs using the related digital control system design theory. But several researchers suggested delay elements. A delay element is made from the concept of finite Laplace Transform. From some specifications such as internal model stability, physical realizations as well as finite time settling, unknown coefficents and poles in error transfer functions with delay elements can be calulted so as to satisfy these specifications. For the application to the real system, robustness property can be added. In this paper, error transfer function is specified with 1 delay element and robustness condition is considered additionally. As the criterion of the robustness, a weighted sensitive function's $H_{infty}$ norm is used. For the minimum value of the criterion, error transfer function's poles are calculated optimally. In this sense, optimal design of the continuous time deadbeat controller is obtained.

  • PDF

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.