• Title/Summary/Keyword: 영상 코드화

Search Result 206, Processing Time 0.026 seconds

Particle Image Velocimetry Measurements in Nasal Airflow (코 내부 유동의 PIV 해석)

  • Kim, Sung-Kyun;Son, Young-Rak
    • Proceedings of the KSME Conference
    • /
    • 2001.06e
    • /
    • pp.566-569
    • /
    • 2001
  • Researchers have invectigated nasal flow both numerically and experimentally for centuries. Experimental studies most have suffered from various limitations necessary to allow the measurements to be obtained with available equipment. Nasal airflow can be subdivided into two interrelated categories; nasal airflow resistance and heat and mass transfer between the air stream and the walls of the nasal cavity. In this study, thanks to a new method for model casting by a combination of Rapid prototyping and Solidification of clear silicone, a transparent rectangular box containing the complex nasal cavity is made for PIV experiments. The CBC PIV algorithm is used for analysis.

  • PDF

Particle Image Velocimetry Measurements in Nasal Airflow (코 내부 유로(비강) 내부 유동의 PIV해석)

  • Kim, Sung-Kyun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.26 no.6
    • /
    • pp.811-816
    • /
    • 2002
  • For the first time, airflow in the nasal cavity of a normal Korean adult is investigated experimentally by PIV measurement. Nasal airflow can be subdivided into two interrelated categories; nasal airflow resistance and heat and mass transfer between the air stream and the walls of the nasal cavity. In this study, thanks to a new method for the model casting by a combination of the rapid prototyping and curing of clear silicone. a transparent rectangular box containing the complex nasal cavity can be made fur PIV experiments. The CBC PIV algorithm is used for analysis. Average and RMS distributions are obtained for inspirational and expiration nasal airflows. Data fer the airflow at the end of meatuses are obtained for the first time. Comparisons between western and Korean nasal airflows are appreciated. Due to the difference in geometry of the frontal part of nasal cavity, the flow near nares shows the difference.

A Study on Selective Encryption of Huffman Codes (허프만 코드의 선택적 암호화에 관한 연구)

  • Park, Sang-Ho
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.57-63
    • /
    • 2007
  • The security of data in network is provided by encryption. Selective encryption is a recent approach to reduce the computational cost and complexity for large file size data such as image and video. This paper describes techniques to encrypt Huffman code and discusses the performance of proposed scheme. We propose a simple encryption technique applicable to the Huffman code and study effectiveness of encryption against insecure channel. Our scheme combine encryption process and compression process, and it can reduce processing time for encryption and compression by combining two processes.

  • PDF

A Study of Color Video Coding Using Adaptive Wavelet Transform (적응적 웨이블릿 변환을 이용한 컬러 비디오 영상 코딩에 관한 연구)

  • 김혜경;오해석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.538-540
    • /
    • 2000
  • 본 논문에서는 적응적인 웨이블릿 변환에 기초한 저속 비트율 비디오 코딩 방법의 새로운 알고리즘을 제안한다. 접근 방법은 양자화된 웨이블릿 계수들이 웨이블릿 서브밴드 구조내에서 중복성을 활용하는 메커니즘에 의해서 전처리 된다면 코딩 절차가 더욱 효과적으로 나타난다. 그러므로 본 논문에서는 코딩부분의 최적화 활동에 초점을 맞추어 완전한 중복 블록 움직임 보상된 에어프레임에서 일치를 확보하기 위해 이용하고, 향상된 코사인 윈도우를 적용하였다. 또한 웨이블릿 변환은 각 일치한 움직임 보상된 에러 프레임을 전체적인 에너지 컴팩션에 도달하도록 적용된다. 움직임 벡터의 수평적, 수직적 컴포넌트는 적응적 산술적 코딩을 사용하여 독립적으로 인코드되는 반면에 의미있는 웨이블릿 계수는 적응적 산술 코딩을 사용함에 의해서 비트-플레인 순서로 인코드된다. 제안된 부호기는 28Kbits에서 PSNR이 평균적으로 각각 대략 2.07과 1.38dB에 존재하는 H.263과 ZTE를 초과한다. 전체순서 코딩에 대하여도 3DWCVC 방법은 평균적으로 각각 0.35와 0.71dB을 나타내는 H.263과 ZTE보다 우수한 성능을 보인다.

  • PDF

Coded Watermark Detecting Algorithm using a Blind Detecting Method Without Original Videos (원본 동영상 대조 없이 가능한 Blind 검출 방식의 코드화된 워터마크 검출 알고리즘)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.4
    • /
    • pp.395-400
    • /
    • 2010
  • Digital watermark technologies conceal the information of video contents that presents who is the owner and/or who is the user. In spite of various attempts to insert watermark, trials to mark information of users or buyers into contents have not been successful. It is the reason that the rates of detection is decreased seriously if there are some attacks to the contents such as resizing or bitrate decreasing. In this paper, the algorithm to insert the coded watermarks of users into video contents and to detect them without original contents under attacks will be described.

Fast VQ Codebook Design by Sucessively Bisectioning of Principle Axis (주축의 연속적 분할을 통한 고속 벡터 양자화 코드북 설계)

  • Kang, Dae-Seong;Seo, Seok-Bae;Kim, Dai-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.422-431
    • /
    • 2000
  • This paper proposes a new codebook generation method, called a PCA-Based VQ, that incorporates the PCA (Principal Component Analysis) technique into VQ (Vector Quantization) codebook design. The PCA technique reduces the data dimensions by transforming input image vectors into the feature vectors. The cluster of feature vectors in the transformed domain is bisectioned into two subclusters by an optimally chosen partitioning hyperplane. We expedite the searching of the optimal partitioning hyperplane that is the most time consuming process by considering that (1) the optimal partitioning hyperplane is perpendicular to the first principal axis of the feature vectors, (2) it is located on the equilibrium point of the left and right cluster's distortions, and (3) the left and right cluster's distortions can be adjusted incrementally. This principal axis bisectioning is successively performed on the cluster whose difference of distortion between before and after bisection is the maximum among the existing clusters until the total distortion of clusters becomes as small as the desired level. Simulation results show that the proposed PCA-based VQ method is promising because its reconstruction performance is as good as that of the SOFM (Self-Organizing Feature Maps) method and its codebook generation is as fast as that of the K-means method.

  • PDF

A Study on the Image Tamper Detection using Digital Signature (디지털 서명을 이용한 영상의 위변조 검출에 관한 연구)

  • Woo, Chan-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4912-4917
    • /
    • 2015
  • Fragile watermarking is a technique to insert a watermark into an image without significantly degrading its visual quality so that the watermark can be extracted for the purposes of authentication or integrity verification. And the watermark for authentication and integrity verification should be erased easily when the image is changed by filtering etc. In this paper, we propose a image block-wise watermarking method for image tamper proofing using digital signature. In the proposed method, a digital signature is generated from the hash code of the initialized image block. And The proposed method is able to detect the tampered parts of the image without testing the entire block of the watermarked image.

Learning of Rules for Edge Detection of Image using Fuzzy Classifier System (퍼지 분류가 시스템을 이용한 영상의 에지 검출 규칙 학습)

  • 정치선;반창봉;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.252-259
    • /
    • 2000
  • In this paper, we propose a Fuzzy Classifier System(FCS) to find a set of fuzzy rules which can carry out the edge detection of a image. The FCS is based on the fuzzy logic system combined with machine learning. Therefore the antecedent and consequent of a classifier in FCS are the same as those of a fuzzy rule. There are two different approaches, Michigan and Pittsburgh approaches, to acquire appropriate fuzzy rules by evolutionary computation. In this paper, we use the Michigan style in which a single fuzzy if-then rule is coded as an individual. Also the FCS employs the Genetic Algorithms to generate new rules and modify rules when performance of the system needs to be improved. The proposed method is evaluated by applying it to the edge detection of a gray-level image that is a pre-processing step of the computer vision. the differences of average gray-level of the each vertical/horizontal arrays of neighborhood pixels are represented into fuzzy sets, and then the center pixel is decided whether it is edge pixel or not using fuzzy if-then rules. We compare the resulting image with a conventional edge image obtained by the other edge detection method such as Sobel edge detection.

  • PDF

Data Acquisition System Using the Second Binary Code (2차원 부호를 이용한 정보 획득 시스템)

  • Kim, In-Kyeom
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.71-84
    • /
    • 2003
  • In this paper, it is presented the efficient system for data recognition using the proposed binary code images. The proposed algorithm finds the position of binary image. Through the process of the block region classification, it is classified each block with the edge region using the value of gray level only. Each block region is divided horizontal and vertical edge region. If horizontal edge region blocks are classified over six blocks in any region, the proposed algorithm should search the vertical edge region in the start point of the horizontal edge region. If vertical edge region blocks were found over ten blocks in vertical region, the code image would found. Practical code region is acquired from the rate of the total edge region that is computed from the binary image that is processed with the average value. In case of the wrong rate, it is restarted the code search in the point after start point and the total process is followed. It has a short time than the before process time because it had classified block information. The block processing is faster thant the total process. The proposed system acquires the image from the digital camera and makes binary image from the acquired image. Finally, the proposed system extracts various characters from the binary image.

  • PDF

Analyses of the Effect of Inserting Border Lines between Adjacent Color Regions on Detecting Boundaries (경계선 검출에 대한 인접 칼라 영역간 테두리 선 삽입 효과의 분석)

  • Yoo, Hyeon-Joong;Kim, Woo-Sung;Jang, Young-Beom
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.87-95
    • /
    • 2006
  • This paper presents the analyses of the effect of inserting border lines between different color regions on edge detection in color codes, and is not intended to present any new algorithm for color-code recognition. With its role to complement the RFID (radio frequency identification) and the wide and fast spread of digital cameras, an interest on color codes is fast increasing. However, the severe distortion of colors in obtained images prohibits color codes from expanding their applications. To reduce the effect of color distortion it is desirable to process the whole pixels in each color region statistically, instead of relying on some pixels sampled from the region. This requires segmentation, and the segmentation usually requires edge detection. To help detect edges not disconnected, we inserted border lines of the width of two pixels between adjacent color regions. Two colors were used for the border lines: one consisting of white pixels, and the other black pixels. The edge detection was performed on images with either of the two kinds of border lines inserted, and the results were compared to results without inserted border lines. We found that inserting black border lines degraded edge detection by causing zipper effect while inserting white border lines improved it compared to the cases without inserted border lines.

  • PDF