• Title/Summary/Keyword: wavelet.

Search Result 3,585, Processing Time 0.031 seconds

Face Recognition Under Ubiquitous Environments (유비쿼터스 환경을 이용한 얼굴인식)

  • Go, Hyoun-Joo;Kim, Hyung-Bae;Yang, Dong-Hwa;Park, Jang-Hwan;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.431-437
    • /
    • 2004
  • This paper propose a facial recognition method based on an ubiquitous computing that is one of next generation intelligence technology fields. The facial images are acquired by a mobile device so-called cellular phone camera. We consider a mobile security using facial feature extraction and recognition process. Facial recognition is performed by the PCA and fuzzy LDA algorithm. Applying the discrete wavelet based on multi-resolution analysis, we compress the image data for mobile system environment. Euclidean metric is applied to measure the similarity among acquired features and then obtain the recognition rate. Finally we use the mobile equipment to show the efficiency of method. From various experiments, we find that our proposed method shows better results, even though the resolution of mobile camera is lower than conventional camera.

Implementation of JBIG2 CODEC with Effective Document Segmentation (문서의 효율적 영역 분할과 JBIG2 CODEC의 구현)

  • 백옥규;김현민;고형화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.575-583
    • /
    • 2002
  • JBIG2 is an International Standard fur compression of Bi-level images and documents. JBIG2 supports three encoding modes for high compression according to region features of documents. One of which is generic region coding for bitmap coding. The basic bitmap coder is either MMR or arithmetic coding. Pattern matching coding method is used for text region, and halftone pattern coding is used for halftone region. In this paper, a document is segmented into line-art, halftone and text region for JBIG2 encoding and JBIG2 CODEC is implemented. For efficient region segmentation of documents, region segmentation method using wavelet coefficient is applied with existing boundary extraction technique. In case of facsimile test image(IEEE-167a), there is improvement in compression ratio of about 2% and enhancement of subjective quality. Also, we propose arbitrary shape halftone region coding, which improves subjective quality in talc neighboring text of halftone region.

Performance Enhancement of Face Detection Algorithm using FLD (FLD를 이용한 얼굴 검출 알고리즘의 성능 향상)

  • Nam, Mi-Young;Kim, Kwang-Baek
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.783-788
    • /
    • 2004
  • Many reported methods assume that the faces in an image or an image sequence have been identified and localization. Face detection from image is a challenging task because of the variability in scale, location, orientation and pose. The difficulties in visual detection and recognition are caused by the variations in viewpoint, viewing distance, illumination. In this paper, we present an efficient linear discriminant for multi-view face detection and face location. We define the training data by using the Fisher`s linear discriminant in an efficient learning method. Face detection is very difficult because it is influenced by the poses of the human face and changes in illumination. This idea can solve the multi-view and scale face detection problems. In this paper, we extract the face using the Fisher`s linear discriminant that has hierarchical models invariant size and background. The purpose of this paper is to classify face and non-face for efficient Fisher`s linear discriminant.

Image Transmission Using Designed Source-Channel Combined Coder for Mobile Communication Systems (이동통신 시스템을 위한 소스코더와 결합된 채널코딩방법에 의한 영상전송)

  • Lee, Byung-Gil;Park, Pan-Jong;Cho, Hyun-Wook;Park, Gil-houm
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.1
    • /
    • pp.66-75
    • /
    • 2000
  • In this paper, we present the efficient image transmission system using designed source-channel combined coder in W-CDMA mobile communication system. In proposed schemes, we decompose the wavelet transformed hierarchical band-images into some types of different size blocks which have different properties in error sensitivity. The RS(Reed-Solomon) coder with different coding rate is used for each decomposed source blocks which has different importance. In addition, we combine retransmitted error frames in Truncated Hybrid Type I ARQ. The proposed algorithm shows efficient image transmission methods because it is not much degraded in PSNR compared with the existing not combined source-channel coder in erroneous wireless channel.

  • PDF

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.

Grouting compactness monitoring of concrete-filled steel tube arch bridge model using piezoceramic-based transducers

  • Feng, Qian;Kong, Qingzhao;Tan, Jie;Song, Gangbing
    • Smart Structures and Systems
    • /
    • v.20 no.2
    • /
    • pp.175-180
    • /
    • 2017
  • The load-carrying capacity and structural behavior of concrete-filled steel tube (CFST) structures is highly influenced by the grouting compactness in the steel tube. Due to the invisibility of the grout in the steel tube, monitoring of the grouting progress in such a structure is still a challenge. This paper develops an active sensing approach with combined piezoceramic-based smart aggregates (SA) and piezoceramic patches to monitor the grouting compactness of CFST bridge structure. A small-scale steel specimen was designed and fabricated to simulate CFST bridge structure in this research. Before casting, four SAs and two piezoceramic patches were installed in the pre-determined locations of the specimen. In the active sensing approach, selected SAs were utilized as actuators to generate designed stress waves, which were detected by other SAs or piezoceramic patch sensors. Since concrete functions as a wave conduit, the stress wave response can be only detected when the wave path between the actuator and the sensor is filled with concrete. For the sake of monitoring the grouting progress, the steel tube specimen was grouted in four stages, and each stage held three days for cement drying. Experimental results show that the received sensor signals in time domain clearly indicate the change of the signal amplitude before and after the wave path is filled with concrete. Further, a wavelet packet-based energy index matrix (WPEIM) was developed to compute signal energy of the received signals. The computed signal energies of the sensors shown in the WPEIM demonstrate the feasibility of the proposed method in the monitoring of the grouting progress.

Deinterleaving of Multiple Radar Pulse Sequences Using Genetic Algorithm (유전자 알고리즘을 이용한 다중 레이더 펄스열 분리)

  • 이상열;윤기천
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.98-105
    • /
    • 2003
  • We propose a new technique of deinterleaving multiple radar pulse sequences by means of genetic algorithm for threat identification in electronic warfare(EW) system. The conventional approaches based on histogram or continuous wavelet transform are so deterministic that they are subject to failing in detection of individual signal characteristics under real EW signal environment that suffers frequent signal missing, noise, and counter-EW signal. The proposed algorithm utilizes the probabilistic optimization procedure of genetic algorithm. This method, a time-of-arrival(TOA) only strategy, constructs an initial chromosome set using the difference of TOA. To evaluate the fitness of each gene, the defined pulse phase is considered. Since it is rare to meet with a single radar at a moment in EW field of combat, multiple solutions are to be derived in the final stage. Therefore it is designed to terminate genetic process at the prematured generation followed by a chromosome grouping. Experimental results for simulated and real radar signals show the improved performance in estimating both the number of radar and the pulse repetition interval.

VQ Codebook Design and Feature Extraction of Image Information for Multimedia Information Searching (멀티미디어 정보검색에 적합한 영상정보의 벡터 양자화 코드북 설계 및 특징추출)

  • Seo, Seok-Bae;Kim, Dae-Jin;Kang, Dae-Seong
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.101-112
    • /
    • 1999
  • In this paper, the codebook design method of VQ (vector quantization) is proposed an method to extract feature data of image for multimedia information searching. Conventional VQ codebook design methods are unsuitable to extract the feature data of images because they have too much computation time, memory for vector decoding and blocking effects like DCT (discrete cosine transform). The proposed design method is consists of the feature extraction by WT (wavelet transform) and the data group divide method by PCA (principal component analysis). WT is introduced to remove the blocking effect of an image with high compressing ratio. Computer simulations show that the proposed method has the better performance in processing speed than the VQ design method using SOM (self-organizing map).

  • PDF

Construction the pseudo-Hessian matrix in Gauss-Newton Method and Seismic Waveform Inversion (Gauss-Newton 방법에서의 유사 Hessian 행렬의 구축과 이를 이용한 파형역산)

  • Ha, Tae-Young
    • Geophysics and Geophysical Exploration
    • /
    • v.7 no.3
    • /
    • pp.191-196
    • /
    • 2004
  • Seismic waveform inversion can be solved by using the classical Gauss-Newton method, which needs to construct the huge Hessian by the directly computed Jacobian. The property of Hessian mainly depends upon a source and receiver aperture, a velocity model, an illumination Bone and a frequency content of source wavelet. In this paper, we try to invert the Marmousi seismic data by controlling the huge Hessian appearing in the Gauss-Newton method. Wemake the two kinds of he approximate Hessian. One is the banded Hessian and the other is the approximate Hessian with automatic gain function. One is that the 1st updated velocity model from the banded Hessian is nearly the same of the result from the full approximate Hessian. The other is that the stability using the automatic gain function is more improved than that without automatic gain control.

A Hybrid Watermarking Scheme for Color Images (컬러 영상을 위한 하이브리드 워터마킹)

  • Lee Hyun-Suk;Oktavia Vivi;Kim Mi-Ae;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.73-86
    • /
    • 2004
  • This paper presents a hybrid digital watermarking scheme for color images, We insert two watermarks in the DWT domain using spread-spectrum correlation-based watermarking in luminance component of the color image and in spatial domain using pixel-value substitution of blue channel of color image. The objectives of this paper are to have the watermark robust to common signal processing and to detect any changes on the watermarked image for tamper detection at the same time. This watermark scheme will have the robustness characteristic as typical in frequency domain watermark, and also ability to detect any changes on the image (tamper detection).

  • PDF