• Title/Summary/Keyword: 디지털 영상복원

Search Result 249, Processing Time 0.031 seconds

Wideband Chirp Waveform Design for High Range Resolution Radar Imaging (고해상도 영상 레이다의 광대역 첩 신호 파형 설계)

  • 곽영길;조호신
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.1
    • /
    • pp.1-7
    • /
    • 2003
  • A recent technology trends in synthetic aperture radar(SAR) requires the ultra high resolution performance in detecting and precisely identifying the targets. In this paper, as a technique for enhancing the radar range resolution, the wideband chirp connection algorithm is presented by stitching the several chirp modules with unit bandwidth based on the linear frequency modulated chirp signal waveform. The principles of the digital chirp signal generation and its architecture for implementation is briefly described, and the wideband chirp signal generator, modulator, and demodulator are designed. The performance analysis for the presented algorithm is given with the simulation results.

Mixed Noise Removal using Histogram and Pixel Information of Local Mask (히스토그램 및 국부 마스크의 화소 정보를 이용한 복합잡음 제거)

  • Kwon, Se-Ik;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.647-653
    • /
    • 2016
  • Recently, the data image processing has been applied to a variety of fields including broadcasting, communication, computer graphics, medicine, and so on. Generally, the image data may develop the noise during their transmission. Therefore, the studies have been actively conducted to remove the noise on the image. There are diverse types of noise on the image including salt and pepper noise, AWGN, and mixed noise. Hence, the filter algorithm for the image recovery was proposed that salt and pepper noise was processed by histogram and spatial weighted values after defining the noise to lessen the impact of mixed noise added in the image, and AWGN was processed by the pixel information of local mask establishing the weighted values in this study. Regarding the processed results by applying Lena images which were corrupted by salt and pepper noise(P=50%) and AWGN(${\sigma}=10$), suggested algorithm showed the improvement by 7.06[dB], 10.90[dB], 5.97[dB] respectively compared with the existing CWMF, A-TMF, AWMF.

A Design on the Wavelet Transform Digital Filter for an Image Processing (영상처리를 위한 웨이브렛 변환 디지털 필터의 설계)

  • Kim, Yun-Hong;Jeon, Gyeong-Il;Bang, Gi-Cheon;Lee, U-Sun;Park, In-Jeong;Lee, Gang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.3
    • /
    • pp.45-55
    • /
    • 2000
  • In this paper, we proposed the hardware architecture of wavelet transform digital filter for an image processing. Filter bank pyramid algorithm is used for wavelet transform and each fillet is implemented by the FIR filter. For DWT computation, because the memory controller is implemented by hardware, we can efficiently process the multisolution decomposition of the image data only input the parameter. As a result of the image Processing in this paper, 33㏈ PSNR has been obtained on 512$\times$512 B/W image due to 11-bit mantissa processing in FPGA Implementation. And because of using QMF( Quadrature Mirror Filter) properties, it reduces half number of the multiplier needed DWT(Discrete Wavelet Transform) computation so the hardware size is reduced largely. The proposed scheme can increase the efficiency of an image Processing as well as hardware size reduced. The hardware design proposed of DWT fillet bank is synthesized by VHDL coding and then the test board is manufactured, the operating Program and the application Program are implemented using MFC++ and C++ language each other.

  • PDF

A Novel Digital Image Protection using Cellular Automata Transform (셀룰라 오토마타 변환을 이용한 정지영상 보호 방법)

  • Shin, Jin-Wook;Yoon, Sook;Yoo, Hyuck-Min;Park, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8C
    • /
    • pp.689-696
    • /
    • 2010
  • The goal of this paper is to present a novel method for protecting digital image using 2-D cellular automata transform (CAT). A copyright and transform coefficients are used to generate a new content-based copyright and an original digital image is distributed without any hidden copyright. The parameter, which is called gateway value, for 2-D CAT is consisted of rule number, initial configuration, lattice length, number of neighbors, and etc. Since 2-D CAT has various gateway values, it is more secure than conventional methods. The proposed algorithm is verified using attacked images such as filtering, cropping, JPEG compression, and rotation for robustness.

Switching Filter based on Noise Estimation in Random Value Impulse Noise Environments (랜덤 임펄스 잡음 환경에서 잡음추정에 기반한 스위칭 필터)

  • Bong-Won, Cheon;Nam-Ho, Kim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.54-61
    • /
    • 2023
  • With the development of IoT technologies and artificial intelligent, diverse digital image equipments are being used in industrial sites. Because image data can be easily damaged by noise while it's obtained with a camera or a sensor and the damaged image has a bad effect on the process of image processing, noise removal is being demanded as preprocessing. In this thesis, for the restoration of image damaged by the noise of random impulse, a switching filter algorithm based on noise estimation was suggested. With the proposed algorithm, noise estimation and error distraction were carried out according to the similarity of the pixel values in the local mask of the image, and a filter was chosen and switched depending on the ratio of noise existing in the local mask. Simulations were conducted to analyze the noise removal performance of the proposed algorithm, and as a result of magnified image and PSNR comparison, it showed superior performance compared to the existing method.

Blurred Image Enhancement Techniques Using Stack-Attention (Stack-Attention을 이용한 흐릿한 영상 강화 기법)

  • Park Chae Rim;Lee Kwang Ill;Cho Seok Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.83-90
    • /
    • 2023
  • Blurred image is an important factor in lowering image recognition rates in Computer vision. This mainly occurs when the camera is unstablely out of focus or the object in the scene moves quickly during the exposure time. Blurred images greatly degrade visual quality, weakening visibility, and this phenomenon occurs frequently despite the continuous development digital camera technology. In this paper, it replace the modified building module based on the Deep multi-patch neural network designed with convolution neural networks to capture details of input images and Attention techniques to focus on objects in blurred images in many ways and strengthen the image. It measures and assigns each weight at different scales to differentiate the blurring of change and restores from rough to fine levels of the image to adjust both global and local region sequentially. Through this method, it show excellent results that recover degraded image quality, extract efficient object detection and features, and complement color constancy.

3D Point Clouds Encryption Method and Analysis of Encryption Ratio in Holographic Reconstruction Image (3D 공간정보 암호화 기법과 홀로그래픽 복원영상의 암호화 효율 분석)

  • Choi, Hyun-Jun;Seo, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1703-1710
    • /
    • 2017
  • This paper propose a 3D point clouds (depth) security technique for digital holographic display service. Image contents encryption is a method to provide only authorized right owners with the original image information by encrypting the entire image or a part of the image. The proposed method detected an edge from a depth and performed quad tree decomposition, and then performed encryption. And encrypts the most significant block among the divided blocks. The encryption effect was evaluated numerically and visually. The experimental results showed that encrypting only 0.43% of the entire data was enough to hide the constants of the original depth. By analyzing the encryption amount and the visual characteristics, we verified a relationship between the threshold for detecting an edge-map. As the threshold for detecting an edge increased, the encryption ratio decreased with respect to the encryption amount.

Digital Watermarking Algorithm for Copyright Protection of JPEG Image (JPEG 영상의 저작권 보호를 위한 Digital Watermarking 알고리즘)

  • Park, Eun-Suk;Woo, Jong-Won;Lee, Seok-Hee;Heo, Yoon-Seok;Cho, Ki-Hyung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.296-305
    • /
    • 2000
  • In this paper, we propose the method of embedding the encrypted digital watermark in quantization coefficient when we encode the image data in the process of JPEC. The proposed method is as following. After a DCT coefficient of each block is quantized, we arrange the quantization coefficient as on dimension with a zigzag scan and replace each block. By applying even-odd feature of frequency of the encrypted watermark to a quantization coefficient of some fixed domain of replaced each block and embedding it, we obtain the compressed image data by encoding after placing it in the order prior to replacement. The advantages of the proposed method here are as follows: We can embed many information keeping a secret as much as possible by using the algorithm of block replacement. We can control the amount of embedding of each use, as we embed the encrypted information by selecting some fixed domain of a quantization coefficient, we can fix the embedding data regardless of the image and the value of quantization. We verified the results by experiments and analyzed the efficiency of them in comparison with the former study.

  • PDF

A Filter Algorithm using Noise Component of Image in Mixed Noise Environments (복합 잡음 환경에서 영상의 잡음 성분을 이용한 필터 알고리즘)

  • Cheon, Bong-Won;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.943-949
    • /
    • 2019
  • As use of digital equipment in various fields is increasing importance of processing video and signals is rising as well. However, in the process of sending and receiving signals, noise occurs due to different reasons and this noise bring about a huge influence on final output of the system. This research suggests algorithm for effectively repairing video in consideration to characteristics of its noise in condition where impulse and AWGN noises are combined. This algorithm tries to preserve video features by considering inference to noise components and resolution of filtering mask. Depending on features of input resolution, standard value is set and similar resolutions is selected for noise removal. This algorithm showing simulation result had outstanding noise removal and is compared and analyzed with existing methods by using different ways such as PSNR.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.