• Title/Summary/Keyword: 오류 삽입

Search Result 120, Processing Time 0.029 seconds

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theory (Bayes 판단 이론 기반 멀티미디어 워터마크 검출 알고리즘)

  • 권성근;이석환;김병주;권기구;하인성;권기룡;이건일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7A
    • /
    • pp.695-704
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.

Design of Operation for Integrity of Past data in Multi-dimensional GIS (다차원 GIS에서 과거데이터의 무결성을 위한 연산의 설계)

  • Park, Dong-Seon;Kim, Jae-Hong;Bae, Hae-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1737-1745
    • /
    • 2000
  • In the last decade, considerable research effort has been studied ot multi-dimensional GIS and many spatiotemporal operations and query languages have been proposed. Many of them have focused on designing of operation, which process with data that is valid at current point in time. But, research that studied to updata operation that updates or inserts the past data is very rare. This paper designs an update operation and an insertion operation for integrity of past data of multi-dimensional GIS, and propose a new data model for efficient processing of the operations.

  • PDF

Performance Analysis of a Statistical CFB Encryption Algorithm for Cryptographic Synchronization Method in the Wireless Communication Networks (무선 통신망 암호동기에 적합한 Statistical CFB 방식의 암호 알고리즘 성능 분석)

  • Park Dae-seon;Kim Dong-soo;Kim Young-soo;Yoon Jang-hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1419-1424
    • /
    • 2005
  • This paper suggests a new cipher mode of operation which can recover cryptographic synchronization. First, we study the typical cipher modes of operation, especially focused on cryptographic synchronization problems. Then, we suggest a statistical cipher-feedback mode of operation. We define the error sources mathmatically and simulate propagation errors caused by a bit insertion or bit deletion. In the simulation, we compare the effects of changing the synchronization pattern length and feedback key length. After that, we analyze the simulation results with the calculated propagation errors. finally. we evaluate the performance of the statistical cipher-feedback mode of operation and recommand the implementation considerations.

Jeju Jong Nang Channel Code I (제주 정낭 채널 Code I)

  • Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.27-35
    • /
    • 2012
  • In this paper, we look into a Jong Nang Channel which is the origin of digital communications and has been used in Jeju Island since AD 1234. It is one kind of communication ways which informs people of whether a house owner is in one's house or not using its own protocol. It is comprised of three timber and two stone pillars whose one side has three holes respectively. In this paper, we analyze the Jong-Nang Channel both in the light of logic and bit error probability. In addition, we compare it with a conventional binary erasure channel when some errors occur over them respectively. We also show that a capacity of NOR channel approaches Shannon limit.

Enhanced watermarking scheme based on removal of local means (지역 평균값 제거를 통한 개선된 워터마킹 방법)

  • 강현수;홍진우;김광용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1106-1111
    • /
    • 2002
  • This paper presents a new watermarking scheme to reduce the detection error probability through removal of local mean values of an original signal equivalently. At first, we show that the error probability is reduced by the removal of the local mean values. In the removal process, we are in need of a method that equivalently removes the local mean values without modification of the original signal since the process changes the original signal. The method is based on the principle that as the watermark with zero local mean values is embedded, the local mean values of the original signal is equivalently removed in detection of the watermark. The principle are analytically proven, and the superiority of the proposed method is verified by experiments for variety of watermarks.

Characteristics of scenario text reading fluency in middle school students with poor reading skills (중학교 읽기부진 학생의 시나리오 글 읽기 유창성 특성)

  • Jihye Park;Cheoljae Seong
    • Phonetics and Speech Sciences
    • /
    • v.16 no.3
    • /
    • pp.39-48
    • /
    • 2024
  • Reading fluency refers to the ability to read sentences or paragraphs accurately, quickly, and with appropriate prosodic expression. Most reading fluency assessments exclude expressive ability because it is difficult to objectively measure. Therefore, in this study, we examined all elements of reading fluency by analyzing prosodic characteristics of reading scenario texts to maximize expressive reading. The subjects were 30 male students in the first and second grades of middle school (15 normal and 15 poor readers). To analyze the accuracy aspect, error types at the syllable level were analyzed for each group, and related acoustic variables were measured and examined in terms of prosodic aspects. The reading accuracy analysis showed that the poor reading group had a higher error rate than the normal. In terms of error types, the normal group showed the order of 'substitution>omission>correction>insertion>repetition', whereas the poor reading group was in the order of 'correction>substitution>repetition/insertion>omission'. For the speech tempo, the dyslexic students were slower than the typical students for all sentence types. The prosodic variables also showed a high frequency of accentual phrases (AP) and intonation phrases (IP) in sentences along with a wide intensity range.

The Implementation of the Digital watermarking for 3D Polygonal Model (3차원 형상 모델의 디지털 워터마킹 구현)

  • Kim, Sun-Hyung;Lee, Sun-Heum;Kim, Gee-Seog;Ahn, Deog-Sang
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.925-930
    • /
    • 2002
  • This paper discusses techniques for embedding data into 3D polygonal models of geometry. Much researches of Watermarking had been gone as element technology of DRM (digital rights management). But, few research had gone to 3D polygonal model. Most research is limited at text document, 2D image, animation, music etc. RP system is suitable a few production in various goods species, and it is used much in industry to possible reason that produce prototype and find error or incongruent factor at early stage on design in product development childhood. This paper is research about method that insert watermark in STL ( stereolithography) file that have 3D shape model. Proposed algorithm inserts watermark in normal vector region and facet's interior region of 3D shape data. For this reason, 3D shape does not produce some flexure and fulfill invisibility of watermark. Experiment results that insert and extract watermark in normal netter region and facet's Interior region of 3D shape data by proposed algorithm do not influence entirely in 3D shape and show that insertion and extraction of watermark are possible.

Error Detection and Concealment of Transmission Error Using Watermark (워터마크를 이용한 전송 채널 에러의 검출 및 은닉)

  • 박운기;전병우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.262-271
    • /
    • 2004
  • There are channel errors when video data are transmitted between encoder and decoder. These channel errors would make decoded image incorrect, so it is very important to detect and recover channel errors. This paper proposes a method of error detection and recovery by hiding specific information into video bitstream using fragile watermark and checking it later. The proposed method requires no additional bits into compressed bitstream since it embeds a user-specific data pattern in the least significant bits of LEVELs in VLC codewords. The decoder can extract the information to check whether the received bitstream has an error or not. We also propose to use this method to embed essential data such as motion vectors that can be used for error recovery. The proposed method can detect corrupted MBs that usually escape the conventional syntax-based error detection scheme. This proposed method is quite simple and of low complexity. So the method can be applied to multimedia communication system in low bitrate wireless channel.

A Blind Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (RP 시스템 적용을 위한 3차원 메쉬 모델의 블라인드 워터마킹)

  • Ji-Zhe, Cui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1194-1202
    • /
    • 2007
  • In this paper, we proposed a blind watermarking algorithm to apply to the rapid prototyping system. The 3D mesh model is used in the step of the CAD modeling before the making of the prototype system of the rapid prototyping system. STL type mesh modeling which is used in this system reduces the error of the system and improves the accuracy of the system. In the step of the CAD modeling, some transformations which do not change the model accuracy are used, but some transformations which change the model accuracy are not used because the mesh model error is related to the accuracy of the prototype system. Most watermarking algorithms embedded a specific random noise as the watermark information into the model. These kinds of the algorithms are not proper to the 3D model watermarking. The proposed algorithm can be used for the accurate prototyping system because it does not change the model after the watermark embedding This means it can be used for the copyright marking and the data integrity.

An Automatic Setting Method of Data Constraints for Cleansing Data Errors between Business Services (비즈니스 서비스간의 오류 정제를 위한 데이터 제약조건 자동 설정 기법)

  • Lee, Jung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.161-171
    • /
    • 2009
  • In this paper, we propose an automatic method for setting data constraints of a data cleansing service, which is for managing the quality of data exchanged between composite services based on SOA(Service-Oriented Architecture) and enables to minimize human intervention during the process. Because it is impossible to deal with all kinds of real-world data, we focus on business data (i.e. costumer order, order processing) which are frequently used in services such as CRM(Customer Relationship Management) and ERP(Enterprise Resource Planning). We first generate an extended-element vector by extending semantics of data exchanged between composite services and then build a rule-based system for setting data constraints automatically using the decision tree learning algorithm. We applied this rule-based system into the data cleansing service and showed the automation rate over 41% by learning data from multiple registered services in the field of business.